Search results

    Configuration Management at Massive Scale: System Design and Experience USENIX ATC '07William Enck, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao, William Aiello
    Exploiting Online GamesUSENIX ATC '07Gary McGraw
    Events Can Make SenseUSENIX ATC '07Maxwell Krohn, Eddie Kohler, M. Frans Kaashoek
    MapJAX: Data Structure Abstractions for Asynchronous Web Applications USENIX ATC '07Daniel S. Myers, Jennifer N. Carlisle, James A. Cowling, Barbara H. Liskov
    Sprockets: Safe Extensions for Distributed File Systems USENIX ATC '07Daniel Peek, Edmund B. Nightingale, Brett D. Higgins, Puspesh Kumar, Jason Flinn
    Second LifeUSENIX ATC '07Rob Lanphier, Mark Lentczner
    SafeStore: A Durable and Practical Storage System USENIX ATC '07Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin
    POTSHARDS: Secure Long-Term Storage Without Encryption USENIX ATC '07Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti
    Dandelion: Cooperative Content Distribution with Robust IncentivesUSENIX ATC '07Michael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki
    Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical ComputingUSENIX ATC '07Win Treese
    Using Provenance to Aid in Personal File SearchUSENIX ATC '07Sam Shah, Craig A.N. Soules, Gregory R. Ganger, Brian D. Noble
    Supporting Practical Content-Addressable Caching with CZIP Compression USENIX ATC '07KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S. Pai
    Short Paper: Implementation and Performance Evaluation of Fuzzy File Block MatchingUSENIX ATC '07Bo Han, Pete Keleher
    Live Malware Attack!USENIX ATC '07Paul Ducklin
    From Trusted to Secure: Building and Executing Applications That Enforce System SecurityUSENIX ATC '07Boniface Hicks, Sandra Rueda, Trent Jaeger
    From STEM to SEAD: Speculative Execution for Automated Defense USENIX ATC '07Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis
    Dynamic Spyware AnalysisUSENIX ATC '07Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Song
    LiveJournal's Backend TechnologiesUSENIX ATC '07Brad Fitzpatrick
    Evaluating Block-level Optimization Through the IO Path USENIX ATC '07Alma Riska
    DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch USENIX ATC '07Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, Xiaodong Zhang
    Short Paper: A Memory Soft Error Measurement on Production Systems USENIX ATC '07Xin Li, Kai Shen, Michael C. Huang, Lingkun Chu
    MapReduce and Other Building Blocks for Large-Scale Distributed Systems at GoogleUSENIX ATC '07Jeffrey Dean
    Addressing Email Loss with SureMail: Measurement, Design, and Evaluation USENIX ATC '07Sharad Agarwal, Venkata N. Padmanabhan, Dilip A. Joseph
    Wresting Control from BGP: Scalable Fine-Grained Route Control USENIX ATC '07Patrick Verkaik, Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren, Jacobus E. van der Merwe
    A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection USENIX ATC '07Vivek Vishnumurthy, Paul Francis