Conferences

Search results

    TitleConferenceSpeaker(s)
    Keynote Address Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper BallotUSENIX Security '08Debra Bowen
    Wide-Scale Data Stream ManagementUSENIX ATC '08Dionysios Logothetis, Kenneth Yocum
    Experiences with Client-based Speculative Remote DisplayUSENIX ATC '08John R. Lange, Peter A. Dinda, Samuel Rossoff
    Current and Next-Generation Digital ForensicsUSENIX ATC '08Golden G. Richard
    The Columbia Accident Investigation and Returning NASA's Space Shuttle to FlightUSENIX ATC '08Matthew Melis
    Handling Flash Crowds from Your GarageUSENIX ATC '08Jeremy Elson, Jon Howell
    Remote Profiling of Resource Constraints of Web Servers Using Mini-Flash CrowdsUSENIX ATC '08Pratap Ramamurthy, Vyas Sekar, Aditya Akella, Balachander Krishnamurthy, Anees Shaikh
    A Dollar from 15 Cents: Cross-Platform Management for Internet ServicesUSENIX ATC '08Christopher Stewart, Terence Kelly, Alex Zhang, Kai Shen
    Xen and the Art of Virtualization RevisitedUSENIX ATC '08Ian Pratt
    Measurement and Analysis of Large-Scale Network File System WorkloadsUSENIX ATC '08Andrew W. Leung, Shankar Pasupathy, Garth Goodson, Ethan L. Miller
    Evaluating Distributed Systems: Does Background Traffic Matter?USENIX ATC '08Kashi Venkatesh Vishwanath, Amin Vahdat
    Cutting Corners: Workbench Automation for Server BenchmarkingUSENIX ATC '08Piyush Shivam, Varun Marupadi, Jeff Chase, Thileepan Subramaniam, Shivnath Babu
    A Report on the Project Darkstar Anthropological Expedition Into the World of Massively Scaled Online GamesUSENIX ATC '08Jim Waldo
    Power-aware Remote Replication for Enterprise-level Disaster Recovery SystemsUSENIX ATC '08Kazuo Goda, Masaru Kitsuregawa
    A Linux Implementation Validation of Track-Aligned Extents and Track-Aligned RAIDsUSENIX ATC '08Jin Qian, Christopher Meyers, An-I Andy Wang
    Using Causality to Diagnose Configuration BugsUSENIX ATC '08Mona Attariyan
    Diverse Replication for Single-Machine Byzantine-Fault ToleranceUSENIX ATC '08Byung-Gon Chun, Petros Maniatis, Scott Shenker
    Internet Surveillance: Building Our Own Trojan HorseUSENIX ATC '08Susan Landau
    Vx32: Lightweight User-level Sandboxing on the x86USENIX ATC '08Bryan Ford, Russ Cox
    LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected LanguagesUSENIX ATC '08Yan Tang, Qi Gao, Feng Qin
    Perspectives: Improving SSH-style Host Authentication with Multi-Path ProbingUSENIX ATC '08Dan Wendlandt, Adrian Perrig
    Spectator: Detection and Containment of JavaScript WormsUSENIX ATC '08Benjamin Livshits, Weidong Cui
    Using Hadoop for Webscale ComputingUSENIX ATC '08Ajay Anand
    A Compacting Real-Time Memory Management SystemUSENIX ATC '08Silviu S. Craciunas, Christoph M. Kirsch, Hannes Payer, Ana Sokolova, Horst Stadler, Robert Staudinger
    Prefetching with Adaptive Cache Culling for Striped Disk ArraysUSENIX ATC '08Sung Hoon Baek, Kyu Ho Park

Pages