USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Papers
Search results
Conference | Title | Author(s) |
---|---|---|
NSDI '22 | RDMA is Turing complete, we just did not know it yet! | Waleed Reda, Marco Canini, Dejan Kostić, Simon Peter |
NSDI '22 | Backpressure Flow Control | Prateesh Goyal, Preey Shah, Kevin Zhao, Georgios Nikolaidis, Mohammad Alizadeh, Thomas E. Anderson |
NSDI '22 | Bluebird: High-performance SDN for Bare-metal Cloud Services | Manikandan Arumugam, Deepak Bansal, Navdeep Bhatia, James Boerner, Simon Capper, Changhoon Kim, Sarah McClure, Neeraj Motwani, Ranga Narasimhan, Urvish Panchal, Tommaso Pimpo, Ariff Premji, Pranjal Shrivastava, Rishabh Tewari |
NSDI '22 | A Case for Task Sampling based Learning for Cluster Job Scheduling | Akshay Jajoo, Y. Charlie Hu, Xiaojun Lin, Nan Deng |
NSDI '22 | Detecting Ephemeral Optical Events with OpTel | Congcong Miao, Minggang Chen, Arpit Gupta, Zili Meng, Lianjin Ye, Jingyu Xiao, Jie Chen, Zekun He, Xulong Luo, Jilong Wang, Heng Yu |
NSDI '22 | Closed-loop Network Performance Monitoring and Diagnosis with SpiderMon | Weitao Wang, Xinyu Crystal Wu, Praveen Tammana, Ang Chen, T. S. Eugene Ng |
NSDI '22 | Check-N-Run: a Checkpointing System for Training Deep Learning Recommendation Models | Assaf Eisenman, Kiran Kumar Matam, Steven Ingram, Dheevatsa Mudigere, Raghuraman Krishnamoorthi, Krishnakumar Nair, Misha Smelyanskiy, Murali Annavaram |
NSDI '22 | cISP: A Speed-of-Light Internet Service Provider | Debopam Bhattacherjee, Waqar Aqeel, Sangeetha Abdu Jyothi, Ilker Nadi Bozkurt, William Sentosa, Muhammad Tirmazi, Anthony Aguirre, Balakrishnan Chandrasekaran, P. Brighten Godfrey, Gregory Laughlin, Bruce Maggs, Ankit Singla |
NSDI '22 | HeteroSketch: Coordinating Network-wide Monitoring in Heterogeneous and Dynamic Networks | Anup Agarwal, Zaoxing Liu, Srinivasan Seshan |
NSDI '22 | Saiyan: Design and Implementation of a Low-power Demodulator for LoRa Backscatter Systems | Xiuzhen Guo, Longfei Shangguan, Yuan He, Nan Jing, Jiacheng Zhang, Haotian Jiang, Yunhao Liu |
NSDI '22 | Justitia: Software Multi-Tenancy in Hardware Kernel-Bypass Networks | Yiwen Zhang, Yue Tan, Brent Stephens, Mosharaf Chowdhury |
NSDI '22 | In-Network Velocity Control of Industrial Robot Arms | Sándor Laki, Csaba Györgyi, József Pető, Péter Vörös, Géza Szabó |
NSDI '22 | Runtime Programmable Switches | Jiarong Xing, Kuo-Feng Hsu, Matty Kadosh, Alan Lo, Yonatan Piasetzky, Arvind Krishnamurthy, Ang Chen |
NSDI '22 | Configanator: A Data-driven Approach to Improving CDN Performance. | Usama Naseer, Theophilus A. Benson |
NSDI '22 | Accelerating Collective Communication in Data Parallel Training across Deep Learning Frameworks | Joshua Romero, Junqi Yin, Nouamane Laanait, Bing Xie, M. Todd Young, Sean Treichler, Vitalii Starchenko, Albina Borisevich, Alex Sergeev, Michael Matheson |
NSDI '22 | Dynamic Scheduling of Approximate Telemetry Queries | Chris Misa, Walt O'Connor, Ramakrishnan Durairajan, Reza Rejaie, Walter Willinger |
USENIX Security '21 | Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards | Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy |
USENIX Security '21 | YARIX: Scalable YARA-based Malware Intelligence | Michael Brengel, Christian Rossow |
USENIX Security '21 | Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service | Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
USENIX Security '21 | Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs | Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama |
USENIX Security '21 | Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage | Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva |
USENIX Security '21 | The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle | Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Snow, Fabian Monrose, Manos Antonakakis |
USENIX Security '21 | Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance | Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe |
USENIX Security '21 | MAZE: Towards Automated Heap Feng Shui | Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou |
USENIX Security '21 | SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting | Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |