Papers

Search results

    ConferenceTitleAuthor(s)
    NSDI '22RDMA is Turing complete, we just did not know it yet!Waleed Reda, Marco Canini, Dejan Kostić, Simon Peter
    NSDI '22Backpressure Flow ControlPrateesh Goyal, Preey Shah, Kevin Zhao, Georgios Nikolaidis, Mohammad Alizadeh, Thomas E. Anderson
    NSDI '22Bluebird: High-performance SDN for Bare-metal Cloud ServicesManikandan Arumugam, Deepak Bansal, Navdeep Bhatia, James Boerner, Simon Capper, Changhoon Kim, Sarah McClure, Neeraj Motwani, Ranga Narasimhan, Urvish Panchal, Tommaso Pimpo, Ariff Premji, Pranjal Shrivastava, Rishabh Tewari
    NSDI '22A Case for Task Sampling based Learning for Cluster Job SchedulingAkshay Jajoo, Y. Charlie Hu, Xiaojun Lin, Nan Deng
    NSDI '22Detecting Ephemeral Optical Events with OpTelCongcong Miao, Minggang Chen, Arpit Gupta, Zili Meng, Lianjin Ye, Jingyu Xiao, Jie Chen, Zekun He, Xulong Luo, Jilong Wang, Heng Yu
    NSDI '22Closed-loop Network Performance Monitoring and Diagnosis with SpiderMonWeitao Wang, Xinyu Crystal Wu, Praveen Tammana, Ang Chen, T. S. Eugene Ng
    NSDI '22Check-N-Run: a Checkpointing System for Training Deep Learning Recommendation ModelsAssaf Eisenman, Kiran Kumar Matam, Steven Ingram, Dheevatsa Mudigere, Raghuraman Krishnamoorthi, Krishnakumar Nair, Misha Smelyanskiy, Murali Annavaram
    NSDI '22cISP: A Speed-of-Light Internet Service ProviderDebopam Bhattacherjee, Waqar Aqeel, Sangeetha Abdu Jyothi, Ilker Nadi Bozkurt, William Sentosa, Muhammad Tirmazi, Anthony Aguirre, Balakrishnan Chandrasekaran, P. Brighten Godfrey, Gregory Laughlin, Bruce Maggs, Ankit Singla
    NSDI '22HeteroSketch: Coordinating Network-wide Monitoring in Heterogeneous and Dynamic NetworksAnup Agarwal, Zaoxing Liu, Srinivasan Seshan
    NSDI '22Saiyan: Design and Implementation of a Low-power Demodulator for LoRa Backscatter SystemsXiuzhen Guo, Longfei Shangguan, Yuan He, Nan Jing, Jiacheng Zhang, Haotian Jiang, Yunhao Liu
    NSDI '22Justitia: Software Multi-Tenancy in Hardware Kernel-Bypass NetworksYiwen Zhang, Yue Tan, Brent Stephens, Mosharaf Chowdhury
    NSDI '22In-Network Velocity Control of Industrial Robot ArmsSándor Laki, Csaba Györgyi, József Pető, Péter Vörös, Géza Szabó
    NSDI '22Runtime Programmable SwitchesJiarong Xing, Kuo-Feng Hsu, Matty Kadosh, Alan Lo, Yonatan Piasetzky, Arvind Krishnamurthy, Ang Chen
    NSDI '22Configanator: A Data-driven Approach to Improving CDN Performance.Usama Naseer, Theophilus A. Benson
    NSDI '22Accelerating Collective Communication in Data Parallel Training across Deep Learning FrameworksJoshua Romero, Junqi Yin, Nouamane Laanait, Bing Xie, M. Todd Young, Sean Treichler, Vitalii Starchenko, Albina Borisevich, Alex Sergeev, Michael Matheson
    NSDI '22Dynamic Scheduling of Approximate Telemetry QueriesChris Misa, Walt O'Connor, Ramakrishnan Durairajan, Reza Rejaie, Walter Willinger
    USENIX Security '21Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit CardsMaxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy
    USENIX Security '21YARIX: Scalable YARA-based Malware IntelligenceMichael Brengel, Christian Rossow
    USENIX Security '21Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-ServiceZhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
    USENIX Security '21Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLsRavindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama
    USENIX Security '21Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud StorageMohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva
    USENIX Security '21The Circle Of Life: A Large-Scale Study of The IoT Malware LifecycleOmar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Snow, Fabian Monrose, Manos Antonakakis
    USENIX Security '21Inexpensive Brainwave Authentication: New Techniques and Insights on User AcceptancePatricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe
    USENIX Security '21MAZE: Towards Automated Heap Feng ShuiYan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou
    USENIX Security '21SelectiveTaint: Efficient Data Flow Tracking With Static Binary RewritingSanchuan Chen, Zhiqiang Lin, Yinqian Zhang

Pages