Conferences

Search results

    TitleConferenceSpeaker(s)
    Panel on Indian Electronic Voting Machines (EVMs)EVT/WOTE '10Joseph Lorenzo Hall, P.V. Indiresan, G.V.L Narasimha Rao, Alok Shukla, J. Alex Halderman
    Outsmarted Regulators: Gambling Devices in NevadaEVT/WOTE '10Jeff Burbank
    Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy RandomnessEVT/WOTE '10Nadia Heninger
    Super-Simple Simultaneous Single-Ballot Risk-Limiting AuditsEVT/WOTE '10Philip B. Stark
    Single-Ballot Risk-Limiting Audits Using Convex OptimizationEVT/WOTE '10Stephen Checkoway, Anand Sarwate
    Performance Requirements for End-to-End Verifiable ElectionsEVT/WOTE '10Stefan Popoveniuc, John Kelsey, Andrew Regenscheid, Poorvi Vora
    Parallel Shuffling and Its Application to Prêt à VoterEVT/WOTE '10Kim Ramchen
    Eperio: Mitigating Technical Complexity in Cryptographic Election VerificationEVT/WOTE '10Aleksander Essex, Carlisle Adams
    Towards Publishable Event Logs That Reveal Touchscreen FaultsEVT/WOTE '10Andrea L. Mascher, Paul T. Cotton, Douglas W. Jones
    Baseline Usability Data for a Non-Electronic Approach to Accessible VotingEVT/WOTE '10Gillian E. Piner, Michael D. Byrne
    Speed Kills: Highly Relativistic Spaceflight Would Be Fatal for People and InstrumentsEVT/WOTE '10William A. Edelstein
    Welcome, Awards, and Keynote AddressUSENIX ATC '10
    Lessons of Scale at FacebookUSENIX ATC '10Bobby Johnson
    DEFCON: High-Performance Event Processing with Information SecurityUSENIX ATC '10Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter Pietzuch
    Wide-Area Route Control for Distributed ServicesUSENIX ATC '10Vytautas Valancius, Nick Feamster, Jennifer Rexford, Akihiro Nakao
    LiteGreen: Saving Energy in Networked Desktops Using VirtualizationUSENIX ATC '10Tathagata Das, Pradeep Padala, Venkat Padmanabhan, Ram Ramjee, Kang G. Shin
    Visualizing DataUSENIX ATC '10Ben Fry
    Stout: An Adaptive Interface to Scalable Cloud StorageUSENIX ATC '10John C. McCullough, John Dunagan, Alec Wolman, Alex C. Snoeren
    IsoStack—Highly Efficient Network Processing on Dedicated CoresUSENIX ATC '10Leah Shalev, Julian Satran, Eran Borovik, Muli Ben-Yehuda
    A Realistic Evaluation of Memory Hardware Errors and Software System SusceptibilityUSENIX ATC '10Xin Li, Michael C. Huang, Kai Shen, Lingkun Chu
    The Utility Coprocessor: Massively Parallel Computation from the Coffee ShopUSENIX ATC '10John R. Douceur, Jeremy Elson, Jon Howell, Jacob R. Lorch
    Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating SystemsUSENIX ATC '10Shaya Potter, Jason Nieh
    Tolerating Malicious Device Drivers in LinuxUSENIX ATC '10Silas Boyd-Wickizer, Nickolai Zeldovich
    Some Thoughts About ConcurrencyUSENIX ATC '10Ivan Sutherland
    Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP NetworksUSENIX ATC '10Italo Dacosta, Patrick Traynor

Pages