Papers

Search results

    ConferenceTitleAuthor(s)
    NSDI '05Designing Extensible IP Router SoftwareMark Handley, Eddie Kohler, Atanu Ghosh, Orion Hodson, Pavlin Radoslavov
    NSDI '05Using Emulation to Understand and Improve Wireless Networks and ApplicationsGlenn Judd, Peter Steenkiste
    NSDI '05Geographic Routing Made PracticalYoung-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    NSDI '05Sustaining Cooperation in Multi-hop Wireless NetworksMaya Rodrig, John Zahorjan
    NSDI '05ACMS: The Akamai Configuration Management SystemAlex Sherman, Philip A. Lisiecki, Andy Berkheimer, Joel Wein
    NSDI '05The Collective: A Cache-Based System Management ArchitectureRamesh Chandra, Nickolai Zeldovich, Constantine Sapuntzakis, Monica S. Lam
    NSDI '05Live Migration of Virtual MachinesChristopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield
    NSDI '05Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash CrowdsSrikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger
    NSDI '05Cashmere: Resilient Anonymous Routing Li Zhuang, Feng Zhou, Ben Y. Zhao, Antony Rowstron
    NSDI '05Decentralized, Adaptive Resource Allocation for Sensor Networks Geoff Mainland, David C. Parkes, Matt Welsh
    NSDI '05Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless SensornetsRodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng Tien Ee, David Culler, Scott Shenker, Ion Stoica
    NSDI '05Active Sensor NetworksPhilip Levis, David Gay
    USENIX Security '07Devices That Tell on You: Privacy Trends in Consumer Ubiquitous ComputingT. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
    USENIX Security '07Web-Based Inference DetectionJessica Staddon, Philippe Golle, Bryce Zimny
    USENIX Security '07Keep Your Enemies Close: Distance Bounding Against Smartcard Relay AttacksSaar Drimer, Steven J. Murdoch
    USENIX Security '07Human-Seeded Attacks and Exploiting Hot-Spots in Graphical PasswordsJulie Thorpe, P.C. van Oorschot
    USENIX Security '07Halting Password Puzzles: Hard-to-break Encryption from Human-memorable KeysXavier Boyen
    USENIX Security '07Spamscatter: Characterizing Internet Scam Hosting InfrastructureDavid S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
    USENIX Security '07Exploiting Network Structure for Proactive Spam MitigationShobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song
    USENIX Security '07BotHunter: Detecting Malware Infection Through IDS-Driven Dialog CorrelationGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong
    USENIX ATC '06Antfarm: Tracking Processes in a Virtual Machine Environment Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
    USENIX ATC '06Optimizing Network Virtualization in Xen Aravind Menon, Alan L. Cox, Willy Zwaenepoel
    USENIX ATC '06High Performance VMM-Bypass I/O in Virtual Machines Jiuxing Liu, Wei Huang, Bulent Abali, Dhabaleswar K. Panda
    USENIX ATC '06Provenance-Aware Storage Systems Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo Seltzer
    USENIX ATC '06Thresher: An Efficient Storage Manager for Copy-on-write Snapshots Liuba Shrira, Hao Xu

    Pages