NSDI '05 | Designing Extensible IP Router Software | Mark Handley, Eddie Kohler, Atanu Ghosh, Orion Hodson, Pavlin Radoslavov |
NSDI '05 | Using Emulation to Understand and Improve Wireless Networks and Applications | Glenn Judd, Peter Steenkiste |
NSDI '05 | Geographic Routing Made Practical | Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker |
NSDI '05 | Sustaining Cooperation in Multi-hop Wireless Networks | Maya Rodrig, John Zahorjan |
NSDI '05 | ACMS: The Akamai Configuration Management System | Alex Sherman, Philip A. Lisiecki, Andy Berkheimer, Joel Wein |
NSDI '05 | The Collective: A Cache-Based System Management Architecture | Ramesh Chandra, Nickolai Zeldovich, Constantine Sapuntzakis, Monica S. Lam |
NSDI '05 | Live Migration of Virtual Machines | Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield |
NSDI '05 | Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds | Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger |
NSDI '05 | Cashmere: Resilient Anonymous Routing | Li Zhuang, Feng Zhou, Ben Y. Zhao, Antony Rowstron |
NSDI '05 | Decentralized, Adaptive Resource Allocation for Sensor Networks | Geoff Mainland, David C. Parkes, Matt Welsh |
NSDI '05 | Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets | Rodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng Tien Ee, David Culler, Scott Shenker, Ion Stoica |
NSDI '05 | Active Sensor Networks | Philip Levis, David Gay |
USENIX Security '07 | Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing | T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno |
USENIX Security '07 | Web-Based Inference Detection | Jessica Staddon, Philippe Golle, Bryce Zimny |
USENIX Security '07 | Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks | Saar Drimer, Steven J. Murdoch |
USENIX Security '07 | Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords | Julie Thorpe, P.C. van Oorschot |
USENIX Security '07 | Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys | Xavier Boyen |
USENIX Security '07 | Spamscatter: Characterizing Internet Scam Hosting Infrastructure | David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker |
USENIX Security '07 | Exploiting Network Structure for Proactive Spam Mitigation | Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song |
USENIX Security '07 | BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation | Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong |
USENIX ATC '06 | Antfarm: Tracking Processes in a Virtual Machine Environment | Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
USENIX ATC '06 | Optimizing Network Virtualization in Xen | Aravind Menon, Alan L. Cox, Willy Zwaenepoel |
USENIX ATC '06 | High Performance VMM-Bypass I/O in Virtual Machines | Jiuxing Liu, Wei Huang, Bulent Abali, Dhabaleswar K. Panda |
USENIX ATC '06 | Provenance-Aware Storage Systems | Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo Seltzer |
USENIX ATC '06 | Thresher: An Efficient Storage Manager for Copy-on-write Snapshots | Liuba Shrira, Hao Xu |