Conferences

Website Maintenance Alert

Due to scheduled maintenance, the USENIX website may not be available on Monday, March 17, from 10:00 am–6:00 pm Pacific Daylight Time (UTC -7). We apologize for the inconvenience and thank you for your patience.

If you would like to register for NSDI '25, SREcon25 Americas, or PEPR '25, please complete your registration before or after this time period.

Search results

    TitleConferenceSpeaker(s)
    CORFU: A Shared Log Design for Flash ClustersNSDI '12Mahesh Balakrishnan, Dahlia Malkhi, Vijayan Prabhakaran, Ted Wobbler, Michael Wei, John D. Davis
    Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingNSDI '12Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauly, Michael J. Franklin, Scott Shenker, Ion Stoica
    Camdoop: Exploiting In-network Aggregation for Big Data ApplicationsNSDI '12Paolo Costa, Austin Donnelly, Antony Rowstron, Greg O'Shea
    WiFi-NC : WiFi Over Narrow ChannelsNSDI '12Krishna Chintalapudi, Bozidar Radunovic, Vlad Balan, Michael Buettener, Srinivas Yerramalli, Vishnu Navda, Ramachandran Ramjee
    Catching Whales and Minnows Using WiFiNet: Deconstructing Non-WiFi Interference Using WiFi HardwareNSDI '12Shravan Rayanchu, Ashish Patro, Suman Banerjee
    RPT: Re-architecting Loss Protection for Content-Aware NetworksNSDI '12Dongsu Han, Ashok Anand, Aditya Akella, Srinivasan Seshan
    Serval: An End-Host Stack for Service-Centric NetworkingNSDI '12Erik Nordström, David Shue, Prem Gopalan, Rob Kiefer, Matvey Arye, Steven Ko, Jennifer Rexford, Michael J. Freedman
    Reliable Client Accounting for P2P-Infrastructure HybridsNSDI '12Paarijaat Aditya, Mingchen Zhao, Yin Lin, Andreas Haeberlen, Peter Druschel, Bruce Maggs, Bill Wishon
    Header Space Analysis: Static Checking for NetworksNSDI '12Peyman Kazemian, George Varghese, Nick McKeown
    A NICE Way to Test OpenFlow ApplicationsNSDI '12Marco Canini, Daniele Venzano, Peter Perešíni, Dejan Kostić, Jennifer Rexford
    Toward Predictable Performance in Software Packet-Processing PlatformsNSDI '12Mihai Dobrescu, Katerina Argyraki, Sylvia Ratnasamy
    Classification of UDP Traffic for DDoS DetectionLEET '12Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth
    Sherlock Holmes and the Case of the Advanced Persistent ThreatLEET '12Ari Juels, Ting-Fang Yen
    Observations on Emerging ThreatsLEET '12Paul Ferguson
    Let's Parse to Prevent PwnageLEET '12Mike Samuel, Ulfar Erlingsson
    W32.Duqu: The Precursor to the Next StuxnetLEET '12Eric Chien, Liam OMurchu, Nicolas Falliere
    So You Want to Take Over a Botnet...LEET '12David Dittrich
    Challenges in Network Application IdentificationLEET '12Alok Tongaonkar, Ram Keralapura, Antonio Nucci
    Tracking DDoS Attacks: Insights into the Business of Disrupting the WebLEET '12Armin Büscher, Thorsten Holz
    RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation AttacksLEET '12Yeongung Park, ChoongHyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-Je Cho
    Clustering Potential Phishing Websites Using DeepMD5LEET '12Jason Britt, Brad Wardman, Dr. Alan Sprague, Gary Warner
    Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data AnalysisLEET '12Tudor Dumitras, Petros Efstathopoulos
    Key Challenges in Defending Against Malicious SocialbotsLEET '12Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu
    Adapting Social Spam Infrastructure for Political CensorshipLEET '12Kurt Thomas, Chris Grier, Vern Paxson
    NaaS: Network-as-a-Service in the CloudHot-ICE '12Paolo Costa, Matteo Migliavacca, Peter Pietzuch, Alexander L. Wolf

Pages