Search results

    How to Obtain and Assert Composable SecurityUSENIX Security '07Ran Canetti
    Addressing Email Loss with SureMail: Measurement, Design, and Evaluation USENIX ATC '07Sharad Agarwal, Venkata N. Padmanabhan, Dilip A. Joseph
    Wresting Control from BGP: Scalable Fine-Grained Route Control USENIX ATC '07Patrick Verkaik, Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren, Jacobus E. van der Merwe
    A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection USENIX ATC '07Vivek Vishnumurthy, Paul Francis
    Perfect Data in an Imperfect WorldUSENIX ATC '07Daniel V. Klein
    Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems USENIX ATC '07Oren Laadan, Jason Nieh
    Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the FlyUSENIX ATC '07Andrew Baumann, Jonathan Appavoo, Robert W. Wisniewski, Dilma Da Silva, Orran Krieger, Gernot Heiser
    Short Paper: Exploring Recovery from Operating System Lockups USENIX ATC '07Francis M. David, Jeffrey C. Carlyle, Roy H. Campbell
    Human ComputationUSENIX ATC '07Luis von Ahn
    Short Paper: Supporting Multiple OSes with OS Switching USENIX ATC '07Jun Sun, Dong Zhou, Steve Longerbeam
    Short Paper: Cool Job Allocation: Measuring the Power Savings of Placing Jobs at Cooling-Efficient Locations in the Data CenterUSENIX ATC '07Cullen Bash, George Forman
    Short Paper: Passwords for Everyone: Secure Mnemonic-based Accessible Authentication USENIX ATC '07Umut Topkara, Mercan Topkara, Mikhail J. Atallah
    Short Paper: Virtually Shared Displays and User Input DevicesUSENIX ATC '07Grant Wallace, Kai Li
    Warehouse-scale ComputersUSENIX ATC '07Luiz André Barroso
    Crossing the Digital Divide: The Latest Efforts from One Laptop per ChildUSENIX ATC '07Mary Lou Jepsen
    SafeStore: A Durable and Practical Storage System USENIX ATC '07Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin
    POTSHARDS: Secure Long-Term Storage Without Encryption USENIX ATC '07Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti
    Dandelion: Cooperative Content Distribution with Robust IncentivesUSENIX ATC '07Michael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki
    Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical ComputingUSENIX ATC '07Win Treese
    Using Provenance to Aid in Personal File SearchUSENIX ATC '07Sam Shah, Craig A.N. Soules, Gregory R. Ganger, Brian D. Noble
    Supporting Practical Content-Addressable Caching with CZIP Compression USENIX ATC '07KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S. Pai
    Short Paper: Implementation and Performance Evaluation of Fuzzy File Block MatchingUSENIX ATC '07Bo Han, Pete Keleher
    Live Malware Attack!USENIX ATC '07Paul Ducklin
    From Trusted to Secure: Building and Executing Applications That Enforce System SecurityUSENIX ATC '07Boniface Hicks, Sandra Rueda, Trent Jaeger
    From STEM to SEAD: Speculative Execution for Automated Defense USENIX ATC '07Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis