Papers

Search results

    ConferenceTitleAuthor(s)
    OSDI '02ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and ReplayGeorge W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen
    OSDI '02Integrated Resource Management for Cluster-based Internet ServicesKai Shen, Hong Tang, Tao Yang, University of California, Lingkun Chu
    OSDI '02Resource Overbooking and Application Profiling in Shared Hosting PlatformsBhuvan Urgaonkar, Prashant Shenoy, Timothy Roscoe
    OSDI '02An Integrated Experimental Environment for Distributed Systems and NetworksBrian White, Leigh Stoller, Robert Ricci, Shashi Guruprasad, Mac Newbold, Mike Hibler, Chad Barb, Abhijeet Joglekar
    OSDI '02Scalability and Accuracy in a Large-Scale Network EmulatorAmin Vahdat, Ken Yocum, Kevin Walsh, Priya Mahadevan, Dejan Kostic, Jeff Chase, David Becker
    OSDI '02Pastiche: Making Backup Cheap and EasyLandon P. Cox, Christopher D. Murray, Brian D. Noble
    OSDI '02FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted EnvironmentAtul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer
    OSDI '02Taming Aggressive Replication in the Pangaea Wide-Area File SystemYasushi Saito, Christos Karamanolis, Magnus Karlsson, Mallik Mahalingam
    OSDI '02Ivy: A Read/Write Peer-to-Peer File SystemAthicha Muthitacharoen, Robert Morris, Thomer M. Gil, Benjie Chen
    OSDI '02Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant SoftwareXiaohu Qie, Ruoming Pang, Larry Peterson
    WIESS '02An Examination of the Transition of the Arjuna Distributed Transaction Processing Software from Research to ProductsMark Little, Santosh Shrivastava
    WIESS '02Tree Houses and Real Houses: Research and Commercial SoftwareSusan LoVerso, Margo Seltzer
    WIESS '02Using End-User Latency to Manage Internet InfrastructureBrad Chen, Mike Perkowitz
    WIESS '02Building an "Impossible" Verifier on a Java CardDamien Deville, Gilles Grimaud
    WIESS '02Enhancements for Hyper-Threading Technology in the Operating System: Seeking the Optimal SchedulingJun Nakajima, Venkatesh Pallipadi
    CARDIS '02Implementing Group Signature Schemes with Smart CardsSébastien Canard, Marc Girault
    CARDIS '02Smart Cards in Interaction: Towards Trustworthy Digital SignaturesRoger Kilian-Kehr, Joachim Posegga
    CARDIS '02Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder AuthenticationLuciano Rila, Chris J. Mitchell
    CARDIS '02Secure Method Invocation in JASONRichard Brinkman, Jaap-Henk Hoepman
    CARDIS '02Provably Secure Chipcard Personalization, or, How to Fool Malicious InsidersHelena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen
    CARDIS '02Automatic Code Recognition for Smartcards Using a Kohonen Neural NetworkJean-Jacques Quisquater, David Samyde
    CARDIS '02Breaking the Liardet-Smart Randomized Exponentiation AlgorithmColin D. Walter
    CARDIS '02A Protected Division AlgorithmMarc Joye, Karine Villegas
    CARDIS '02A Java Reference Model of Transacted Memory for Smart CardsErik Poll, Pieter Hartel, Eduard de Jong
    CARDIS '02Model Checking of Multi-Applet JavaCard ApplicationsGennady Chugunov, Lars-Åke Fredlund, Dilian Gurov

Pages