You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Prophecy: Accelerating Mobile Page Loads Using Final-state Write LogsNSDI '18Ravi Netravali, James Mickens
    Vesper: Measuring Time-to-Interactivity for Web PagesNSDI '18Ravi Netravali, Vikram Nathan, James Mickens, Hari Balakrishnan
    Stateless Datacenter Load-balancing with BeamerNSDI '18Vladimir Olteanu, Alexandru Agache, Andrei Voinescu, Costin Raiciu
    SafeBricks: Shielding Network Functions in the CloudNSDI '18Rishabh Poddar, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy
    Inaudible Voice Commands: The Long-Range Attack and DefenseNSDI '18Nirupam Roy, Sheng Shen, Haitham Hassanieh, Romit Roy Choudhury
    Approximating Fair Queueing on Reconfigurable SwitchesNSDI '18Naveen Kr. Sharma, Ming Liu, Kishore Atreya, Arvind Krishnamurthy
    Distributed Network Monitoring and Debugging with SwitchPointerNSDI '18Praveen Tammana, Rachit Agarwal, Myungjin Lee
    Stroboscope: Declarative Network Monitoring on a BudgetNSDI '18Olivier Tilmans, Tobias Bühler, Ingmar Poese, Stefano Vissicchio, Laurent Vanbever
    ResQ: Enabling SLOs in Network Function VirtualizationNSDI '18Amin Tootoonchian, Aurojit Panda, Chang Lan, Melvin Walls, Katerina Argyraki, Sylvia Ratnasamy, Scott Shenker
    Elastic Scaling of Stateful Network FunctionsNSDI '18Shinae Woo, Justine Sherry, Sangjin Han, Sue Moon, Sylvia Ratnasamy, Scott Shenker
    Efficient and Correct Test Scheduling for Ensembles of Network PoliciesNSDI '18Yifei Yuan, Sanjay Chandrasekaran, Limin Jia, Vyas Sekar
    G-NET: Effective GPU Sharing in NFV SystemsNSDI '18Kai Zhang, Bingsheng He, Jiayu Hu, Zeke Wang, Bei Hua, Jiayi Meng, Lishan Yang
    Deepview: Virtual Disk Failure Diagnosis and Pattern Detection for AzureNSDI '18Qiao Zhang, Guo Yu, Chuanxiong Guo, Yingnong Dang, Nick Swanson, Xinsheng Yang, Randolph Yao, Murali Chintalapati, Arvind Krishnamurthy, Thomas Anderson
    Automatically Correcting Networks with NEAtNSDI '18Wenxuan Zhou, Jason Croft, Bingzhe Liu, Elaine Ang, Matthew Caesar
    Operational Excellence in April Fools’ Pranks: Being Funny Is Serious Work!SREcon18 AmericasThomas Limoncelli
    Leaping from Mainframes to AWS: Technology Time Travel in the GovernmentSREcon18 AmericasAndy Brody, James Punteney
    The History of Fire EscapesSREcon18 AmericasTanya Reilly
    Automatic Metric Screening for Service DiagnosisSREcon18 AmericasYu Chen
    Your System Has Recovered from an Incident, but Have Your Developers?SREcon18 AmericasJaime Woo
    Know Thy Enemy: How to Prioritize and Communicate RisksSREcon18 AmericasMatt Brown
    Architecting a Technical Post MortemSREcon18 AmericasWill Gallego
    Building Shopify's PaaS on KubernetesSREcon18 AmericasKaran Thukral
    Whispers in Chaos: Searching for Weak Signals in IncidentsSREcon18 AmericasJ. Paul Reed
    Distributed Tracing, Lessons LearnedSREcon18 AmericasGina Maini
    Approaching the Unacceptable Workload BoundarySREcon18 AmericasBaron Schwartz