Top results
this paper is included in the proceedings of the 14th usenix conference on file and storage technologies (fast ’16). february 22–25, 2016 • santa clara, ca, usa isbn…
this paper is included in the proceedings of the 14th usenix conference on file and storage technologies (fast ’16). february 22–25, 2016 • santa clara, ca, usa isbn…
this paper is included in the proceedings of the 14th usenix conference on file and storage technologies fast ’16 february 22–25 2016 • santa clara ca usa isbn 978-1-931971-28-7…
mulval: a logic-based network security analyzer xinming ou, sudhakar govindavajhala, and andrew w. appel princeton university 14th usenix security symposium, august 2005…
this paper is included in the proceedings of the 14th usenix conference on file and storage technologies fast ’16 february 22–25 2016 • santa clara ca usa isbn 978-1-931971-28-7…
power-managed storage: gain control of your growing data longer data life and lower energy consumption aloke guha cto copan systems lisa’06 december 8 2006 washington dc…
usenix association proceedings of the freenix track: 2003 usenix annual technical conference san antonio, texas, usa june 9-14, 2003 the advanced computing systems association…
the magazine of usenix sage april 2001 • volume 26 • number 2 { # inside: conference reports 14th systems administration conference lisa 2000 the advanced computing systems…
usenix sec2000 distributed denial of service is there really a threat? david dittrich university of washington [email protected] http://staff.washington.edu/dittrich…
powerpoint presentationneugraph: parallel deep neural network computation on large graphs lingxiao ma †, zhi yang †, youshan miao †, jilong xue †,
slide 1paruj ratanaworabhan, cornell university heap spraying is a problem firefox 3.5 july 14, 2009 http://www.web2secure.com/2009/07/mozilla-firefox-35-heap-spray.html
microsoft powerpoint - cloudtieratcabhinav duggal fani jenkins philip shilane ramprasad chinthekindi ritesh shah mahesh kamat dell emc – supports deduplication (typically
idedup latency-aware inline deduplication dedupe exploited effectively here 3 dedupe techniques (offline vs inline) offline dedupe • first copy on stable storage is
conference organizers program co-chairs thomas a. limoncelli, google, inc. doug hughes, d. e. shaw research, llc program committee narayan desai, argonne national lab andrew
microsoft powerpoint - everett-mccoy-cset-octanebringing cyber-physical security research to researchers and students 1 6th workshop on cyber security experimentation and
powerpoint presentationucla mit texas a&m university ohio state university ucla chenxi wang, haoran ma, shi liu, yuanqi li, zhenyuan ruan, khanh nguyen, michael d. bond,
arjun guha shriram krishnamurthi browser? 5 browser? 5 browser? 6 6 6 6 top.location.href 7 “r ew rit er s” 8 • 50 calls to
62 au g u s t 20 1 5 vo l . 4 0, n o. 4 www.usenix.org columns ivoyeur how do i even kpi? d a v e j o s e p h s e n dave josephsen is the sometime book-authoring developer
an object model for c onv entional op erating systems prasun dewan eric vasilik purdue university sun microsystems abstract: we have developed an object model for conventional
usenix association proceedings of the freenix track: 2003 usenix annual technical conference san antonio, texas, usa june 9-14, 2003 the advanced computing systems association…