Conferences

Search results

    TitleConferenceSpeaker(s)
    Fisc: A Large-scale Cloud-native-oriented File SystemFAST '23Qiang Li, Lulu Chen, Xiaoliang Wang, Shuo Huang, Qiao Xiang, Yuanyuan Dong, Wenhui Yao, Minfei Huang, Puyuan Yang, Shanyang Liu, Zhaosheng Zhu, Huayong Wang, Haonan Qiu, Derui Liu, Shaozong Liu, Yujie Zhou, Yaohui Wu, Zhiwu Wu, Shang Gao, Chao Han, Zicheng Luo, Yuchao Shao, Gexiao Tian, Zhongjie Wu, Zheng Cao, Jinbo Wu, Jiwu Shu, Jie Wu, Jiesheng Wu
    λ-IO: A Unified IO Stack for Computational StorageFAST '23Zhe Yang, Youyou Lu, Xiaojian Liao, Youmin Chen, Junru Li, Siyu He, Jiwu Shu
    NVMeVirt: A Versatile Software-defined Virtual NVMe DeviceFAST '23Sang-Hoon Kim, Jaehoon Shim, Euidong Lee, Seongyeop Jeong, Ilkueon Kang, Jin-Soo Kim
    Fast Application Launch on Personal Computing/Communication DevicesFAST '23Junhee Ryu, Dongeun Lee, Kang G. Shin, Kyungtae Kang
    Revitalizing the Forgotten On-Chip DMA to Expedite Data Movement in NVM-based Storage SystemsFAST '23Jingbo Su, Jiahao Li, Luofan Chen, Cheng Li, Kai Zhang, Liang Yang, Yinlong Xu
    SMRSTORE: A Storage Engine for Cloud Object Storage on HM-SMR DrivesFAST '23Su Zhou, Erci Xu, Hao Wu, Yu Du, Jiacheng Cui, Wanyu Fu, Chang Liu, Yingni Wang, Wenbo Wang, Shouqu Sun, Xianfei Wang, Bo Feng, Biyun Zhu, Xin Tong, Weikang Kong, Linyan Liu, Zhongjie Wu, Jinbo Wu, Qingchao Luo, Jiesheng Wu
    Multi-view Feature-based SSD Failure Prediction: What, When, and WhyFAST '23Yuqi Zhang, Wenwen Hao, Ben Niu, Kangkang Liu, Shuyang Wang, Na Liu, Xing He, Yongwong Gwon, Chankyu Koh
    Integrated Host-SSD Mapping Table Management for Improving User Experience of SmartphonesFAST '23Yoona Kim, Inhyuk Choi, Juhyung Park, Jaeheon Lee, Sungjin Lee, Jihong Kim
    Perseus: A Fail-Slow Detection Framework for Cloud Storage SystemsFAST '23Ruiming Lu, Erci Xu, Yiming Zhang, Fengyi Zhu, Zhaosheng Zhu, Mengtian Wang, Zongpeng Zhu, Guangtao Xue, Jiwu Shu, Minglu Li, Jiesheng Wu
    The Very Hungry Defender: Metamorphosing Security Decision-Making by Incorporating Opportunity CostEnigma 2023Kelly Shortridge
    The Slippery Slope of Cybersecurity AnalogiesEnigma 2023Josiah Dykstra
    Myths and Lies in InfoSecEnigma 2023Adrian Sanabria
    True Crime Journalism: CyberEnigma 2023Joseph Menn, Lily Hay Newman, Alfred Ng
    Building an Automated Machine for Discovering Privacy Violations at ScaleEnigma 2023Suchakra Sharma
    Technical Metamorphosis: The 3 Stages of DSAR AutomationEnigma 2023Alon Levy
    Meaningful Hardware Privacy for a Smart and Augmented FutureEnigma 2023Marcus Hodges
    Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else? HotSec '19
    Enigma 2023
    Hannah Poteat, Holly Hogan, Miju Han, Emily Jones, Gabriela Zanfir-Fortuna
    Open Source Software and Journalism: Field Notes from a Global PerspectiveEnigma 2023Harlo Holmes
    So You're Going to Blow the Whistle? Communications Dos and Don'ts for Whistleblowers.Enigma 2023Emily Schwartz
    Protecting Whistleblower InformationEnigma 2023Shanna Devine
    Understanding Trust and Security Processes in the Open Source Software EcosystemEnigma 2023Dominik Wermke
    Why Is Our Security Research Failing? Five Practices to Change!Enigma 2023Marcus Botacin
    What Public Interest AI Auditors Can Learn from Security Testing: Legislative and Practical WinsEnigma 2023Justin Brookman
    Metric Perversity and Bad Decision-MakingEnigma 2023Lea Kissner
    The Not Fake News HourEnigma 2023Riana Pfefferkorn

Pages