| Panel on Indian Electronic Voting Machines (EVMs) | EVT/WOTE '10 | Joseph Lorenzo Hall, P.V. Indiresan, G.V.L Narasimha Rao, Alok Shukla, J. Alex Halderman |
| Outsmarted Regulators: Gambling Devices in Nevada | EVT/WOTE '10 | Jeff Burbank |
| Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness | EVT/WOTE '10 | Nadia Heninger |
| Super-Simple Simultaneous Single-Ballot Risk-Limiting Audits | EVT/WOTE '10 | Philip B. Stark |
| Single-Ballot Risk-Limiting Audits Using Convex Optimization | EVT/WOTE '10 | Stephen Checkoway, Anand Sarwate |
| Performance Requirements for End-to-End Verifiable Elections | EVT/WOTE '10 | Stefan Popoveniuc, John Kelsey, Andrew Regenscheid, Poorvi Vora |
| Parallel Shuffling and Its Application to Prêt à Voter | EVT/WOTE '10 | Kim Ramchen |
| Eperio: Mitigating Technical Complexity in Cryptographic Election Verification | EVT/WOTE '10 | Aleksander Essex, Carlisle Adams |
| Towards Publishable Event Logs That Reveal Touchscreen Faults | EVT/WOTE '10 | Andrea L. Mascher, Paul T. Cotton, Douglas W. Jones |
| Baseline Usability Data for a Non-Electronic Approach to Accessible Voting | EVT/WOTE '10 | Gillian E. Piner, Michael D. Byrne |
| Speed Kills: Highly Relativistic Spaceflight Would Be Fatal for People and Instruments | EVT/WOTE '10 | William A. Edelstein |
| Welcome, Awards, and Keynote Address | USENIX ATC '10 | |
| Lessons of Scale at Facebook | USENIX ATC '10 | Bobby Johnson |
| DEFCON: High-Performance Event Processing with Information Security | USENIX ATC '10 | Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter Pietzuch |
| Wide-Area Route Control for Distributed Services | USENIX ATC '10 | Vytautas Valancius, Nick Feamster, Jennifer Rexford, Akihiro Nakao |
| LiteGreen: Saving Energy in Networked Desktops Using Virtualization | USENIX ATC '10 | Tathagata Das, Pradeep Padala, Venkat Padmanabhan, Ram Ramjee, Kang G. Shin |
| Visualizing Data | USENIX ATC '10 | Ben Fry |
| Stout: An Adaptive Interface to Scalable Cloud Storage | USENIX ATC '10 | John C. McCullough, John Dunagan, Alec Wolman, Alex C. Snoeren |
| IsoStack—Highly Efficient Network Processing on Dedicated Cores | USENIX ATC '10 | Leah Shalev, Julian Satran, Eran Borovik, Muli Ben-Yehuda |
| A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility | USENIX ATC '10 | Xin Li, Michael C. Huang, Kai Shen, Lingkun Chu |
| The Utility Coprocessor: Massively Parallel Computation from the Coffee Shop | USENIX ATC '10 | John R. Douceur, Jeremy Elson, Jon Howell, Jacob R. Lorch |
| Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems | USENIX ATC '10 | Shaya Potter, Jason Nieh |
| Tolerating Malicious Device Drivers in Linux | USENIX ATC '10 | Silas Boyd-Wickizer, Nickolai Zeldovich |
| Some Thoughts About Concurrency | USENIX ATC '10 | Ivan Sutherland |
| Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks | USENIX ATC '10 | Italo Dacosta, Patrick Traynor |