usenix.org

Please wait for loading...




      (4793):

    /
     1  ~ 2014 sep 19mit spam conferece 20032003 MIT Spam Conference - USENIXThe Advanced Computing Systems Association &. The System Administrators Guild. & inside: CONFERENCE REPORTS. 2003 MIT Spam Conference  ...
     1  ~ 2014 sep 15hotcloud 2011HotCloud '11 - UsenixHotCloud '11 was part of USENIX Federated Conferences Week. Back for 2011 , USENIX is combining training, established conferences, and 
     1  ~ 2014 sep 08md5cryptMD5 crypt - UsenixMD5 crypt was written by Poul-Henning Kamp for FreeBSD. The main reason for using MD5 was to avoid problems with American export ...
     1  ~ 2014 aug 27yandex spam pliggThe Nuts and Bolts of a Forum Spam Automator - UsenixApproach: to avoid forum spam mitigation techniques ... XRumer, SEnuke, ScrapeBox, AutoPligg , Ultimate WordPress. Comment Submitter ... AltaVista, Yandex .
     1  +56 2014 aug 24learn to trade internetLearning Deployment Trade -offs for Self-Optimization of Internet of The Internet of Things (IoT) is the next big wave in computing characterized by large scale open ended heterogeneous network of things, with varying sensing, ...
     1  ~ 2014 aug 21request network storageInterposed Request Routing for Scalable Network Storage - Usenixunify the decentralized storage resources. This paper explores interposed request routing in. Slice, a new architecture for network storage . Slice interposes a ...
     1  ~ 2014 aug 21file sharing reputationExperience with an Object Reputation System for Peer-to ... - Usenixject reputation and ranking system for large-scale peer- to-peer filesharing networks ... reputation mechanism for peer-to-peer filesharing net- works that enables ...
     1  ~ 2014 aug 19m haber scriptA1: Spreadsheet-based Scripting for Developing Web Tools - UsenixEben M . Haber , Eser Kandogan, Allen Cypher, Paul P. Maglio, and Rob Barrett ... tem administrators often share scripts as they collaborate on a task, or they ...
     1  ~ 2014 aug 06user database administration conclusionUnderstanding and Validating Database System AdministrationDatabase administration is mistake-prone as it involves many complex tasks, such as storage ... systems, database applications and users , causing unavailability and potentially high revenue losses. ... Finally, Section 7 draws our conclusions .
     1  ~ 2014 aug 04high school programming classesTo my daughter's high school programming teacher | USENIXIn fact, she graduated high school last May — two years early — and is ... for the harassment to start in high school , in her programming class .
     1  +8 2014 jul 29sms attack mass smsSMS of Death: from analyzing to attacking mobile phones ... - UsenixSMS of Death: from analyzing to attacking mobile phones on a large scale. Collin Mulliner
     1  ~ 2014 jul 26formscan dr solutionDisaster Recovery as a Cloud Service: Economic Benefits ... - UsenixAbstract. Many businesses rely on Disaster Recovery ( DR ) services to prevent either ... forms can be used to provide low cost DR solutions that. 1In this work we  ...
     1  ~ 2014 jul 24attacks on smartphonesSmudge Attacks on Smartphone Touch Screens - Usenixattacks on touch screens for smartphones , and focus our analysis on the Android ... learned in a smudge attack to guessing an Android pass- word pattern.
     2  ~ 2014 sep 25altavista forumTcl in AltaVista Forum | USENIXHome » Tcl in AltaVista Forum ... AltaVista Forum is an award-winning collaboration environment based on the open technologies of the World-Wide Web and ...
     2  ~ 2014 sep 23the virtual differenceDifference Engine: Harnessing Memory Redundancy in Virtual Virtual machine monitors (VMMs) are a popular platform for. Internet hosting .... loads, Difference Engine imposes less than 7% overhead. We further show that ...
     2  ~ 2014 sep 15constela networks barcelonaAccuRate: Constellation Based Rate Estimation in Wireless Networkstowards improved rate selection in wireless networks . While existing
     2  ~ 2014 sep 13ourmon worm graphOurmon and Network Monitoring Performance - UsenixOurmon is an open-source network management and anomaly detection ..... An RRDTOOL-based worm graph gives us a count of such noisy hosts at any one ...
     2  +1 2014 sep 10crm cesser digitalCRMdig : A generic digital provenance model for scientific ... - UsenixCRMdig : A generic digital provenance model for scientific observation. Martin Doerr .... cessing class can be introduced specializing the more generic ones.
     2  +2 2014 sep 03naas cloud computingNaaS : Network-as-a-Service in the Cloud | USENIXCloud computing realises the vision of utility computing. Tenants can benefit from on-demand provisioning of computational resources according to a ...
     2  ~ 2014 sep 01google indexing nvm fileReconFS: A Reconstructable File System on Flash Storage - Usenixwrites to flash storage dramatically, which hurts both performance and endurance
     2  ~ 2014 aug 28device driver testingSymDrive: Testing Drivers without Devices | USENIXDevice - driver development and testing is a complex and error-prone undertaking . For example, testing errorhandling code requires simulating faulty inputs from ...
     2  +1 2014 aug 28laura rs pen driveReliably Erasing Data From Flash -Based Solid State Drives - UsenixMichael Wei. ∗. , Laura M. Grupp. ∗ ... well-understood for hard drives , flash - based solid state ... drive -oriented techniques and of the SSDs' built-in san- itization ...
     2  +3 2014 aug 27new pay per installMeasuring Pay - per - Install : The Commoditization of Malware - UsenixAs a result, entrepreneurial-minded miscreants have formed pay - per - install ..... means for advertising affiliate PPI services to attract new affiliates. General ...
     2  +4 2014 aug 21embedded user interfaceSecuring Embedded User Interfaces : Android and Beyond | USENIXWeb and smartphone applications commonly embed third-party user interfaces like advertisements and social media widgets. However, this capability comes ...
     2  +1 2014 aug 09tb parallel storageClustered and Parallel Storage System Technologies - UsenixCMU NASD object storage & distributed filesystem ... Provides bridge between system and storage in machines such as the Blue ..... 120 TB parallel file system.
     2  ~ 2014 aug 06live migration apacheCost-Aware Live Migration of Services in the Cloud - UsenixAbstract. Live migration of virtual machines is an important com- ponent of the .... types that are part of the services offered by Apache Olio. [7] as a function of the ...
     2  -1 2014 jul 28captcha solving services ratesCAPTCHAs – Understanding CAPTCHA - Solving Services - UsenixWe examine the market-side of this question in depth, ana- lyzing the behavior and dynamics of CAPTCHA - solving service providers, their price performance, ...
     2  -1 2014 jul 26reliability services and softwareAutomated Software Reliability Services - UsenixAutomated Software Reliability Services . Using Reliability Tools Should Be As Easy As Webmail. George Candea, Stefan Bucur, Vitaly Chipounov, Vova ...
     2  +5 2014 jul 18carrier class middlewareTowards Carrier Grade Linux Platforms - UsenixThe paper focuses on the ongoing work by the Carrier . Grade Linux
     2  ~ 2014 jul 18data storage usergroupUSENIX - USA User GroupsPhoenix Storage Networking User Group (SNUG) Dedicated to discussing the effective application of data storage and storage networking ...
     3  -2 2014 sep 20atc conferenceUSENIX ATC '14 | USENIXAs part of our commitment to open access, the conference proceedings, audio, video, and slides are now free and openly accessible via the technical sessions ...
     3  ~ 2014 sep 17fastest jvmPerformance comparison of different JVM implementations - UsenixFigure 6 shows the average runtime of the four JVMs over three runs. The FastVM is the fastest JVM on jess, javac, and jack, and comes last in mpegaudio and ...
     3  +1 2014 sep 12akaimsBreaking Cell Phone Authentication: Vulnerabilities in AKA, IMS Next generation IP telephony such as the IP Multimedia Subsystem (IMS) framework has been used to create Internet calling services which let cellular users ...
     3  -1 2014 sep 11fatest jvm
     3  -2 2014 sep 07hadoop scalabilityApache Hadoop : The Scalability Update - UsenixScalability is one of the primary forces driving popularity and adoption of the. Apache Hadoop project ... There are many other dimensions to Hadoop scalability .
     3  +10 2014 sep 07power of smart phoneAn Analysis of Power Consumption in a Smartphone - UsenixAn Analysis of Power Consumption in a Smartphone . Aaron Carroll. NICTA and University of New South Wales. Aaron.Carroll@nicta.com.au. Gernot Heiser.
     3  -1 2014 sep 01system for itBro: A System for Detecting Network Intruders in Real-Time - UsenixWe describe Bro, a stand-alone system for detecting net- work intruders in real- time by passively monitoring a network link over which the intruder's traffic transits ...
     3  +2 2014 aug 31facebook data modelTAO: Facebook's Distributed Data Store for the Social Graph | USENIXIt is deployed at Facebook , replacing memcache for many data types that fit its model . The system runs on thousands of machines, is widely distributed, and ...
     3  +7 2014 aug 27detecting time on pageBro: A System for Detecting Network Intruders in Real- Time - UsenixBro: A System for Detecting Network Intruders in Real- Time . Vern Paxson ... Abstract. We describe Bro, a stand-alone system for detecting net-.
     3  ~ 2014 aug 24gpu ssl serverSSLShader : Cheap SSL Acceleration with Commodity ... - UsenixSecond, we build SSLShader , a GPU -accelerated SSL proxy that transparently handles SSL transactions for existing network servers . SSLShader selectively of-.
     3  ~ 2014 aug 22spam engine functionsDetecting Spammers with SNARE: Spatio-temporal ... - UsenixSpatio-temporal Network-level Automatic Reputation Engine . Shuang Hao, Nadeem ... network-level features that can differentiate spammers from legitimate  ...
     3  +3 2014 aug 22low cost rfid cardHow to Build a Low - Cost , Extended-Range RFID Skimmer | USENIXRadio-Frequency Identifier ( RFID ) technology, using the ISO-14443 standard, is becoming increasingly popular, with applications like credit- cards , national-ID ...
     3  +2 2014 aug 19data center storageFlat Datacenter Storage | USENIXFlat Datacenter Storage (FDS) is a high-performance, fault-tolerant, large-scale, locality-oblivious blob store. Using a novel combination of full bisection ...
     3  +4 2014 aug 18store data in pdfElasTraS: An Elastic Transactional Data Store in the Cloud - Usenixthis issue of scalability and elasticity of the data store in a cloud computing environment to leverage from the elas- tic nature of the underlying infrastructure,  ...
     3  +98 2014 aug 18blue sky cloudsBlueSky : A Cloud -Backed File System for the Enterprise | USENIXWe present BlueSky , a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or ...
     3  +23 2014 aug 09internet content supportAn Architecture for Content Routing Support in the Internet - USENIXplicit Internet content layer, and we claim that this system provides better latency and scalability than current approaches. We support these arguments by.
     3  +9 2014 aug 07scale vs platform eventOnix: A Distributed Control Platform for Large- scale ... - USENIXOnix: A Distributed Control Platform for Large- scale Production Networks ..... number of network events (generated by the NIB) or work required to manage them ...
     3  ~ 2014 aug 06building operating systemBOSS: Building Operating System Services | USENIXCommercial buildings are attractive targets for introducing innovative cyber- physical control systems , because they are already highly instrumented distributed ...
     3  ~ 2014 aug 03tor network bandwithThrottling Tor Bandwidth Parasites | USENIXTor is vulnerable to network congestion and performance problems due to bulk data transfers. A large fraction of the available network capacity is consumed by ...
     3  -1 2014 jul 28pay per install usMeasuring Pay - per - Install : The Commoditization of ... - UsenixAs a result, entrepreneurial-minded miscreants have formed pay - per - install ... ture that enables us to interact with PPI services and gather and classify the ...
     3  +2 2014 jul 26distributed storage systemAvailability in Globally Distributed Storage Systems - USENIXrelies on accurate models of system behavior and perfor- mance. In the case of distributed storage systems , this includes quantifying the impact of failures and ...
     4  +6 2014 oct 04search algorithm conferenceIn Search of an Understandable Consensus Algorithm | USENIX2014 USENIX Federated Conferences Week · June 17-20, 2014 · Overview ... You are here. Home » In Search of an Understandable Consensus Algorithm  ...
     4  +1 2014 sep 19server cache high performanceHigh - Performance Caching With The Lava Hit- Server - UsenixHigh - Performance Caching With The Lava Hit- Server . Jochen Liedtke. Vsevolod Panteleenko. Trent Jaeger. Nayeem Islam. Thomas J. Watson Research Center.
     4  -1 2014 sep 19global macOS X Hardening: Securing a Large Global Mac Fleet | USENIXOS X security is evolving: defenses are improving with each OS release but the days of “ Macs don't get malware” are gone. Recent attacks against the Java Web  ...
     4  ~ 2014 sep 18lisaLISA14 | USENIXLISA : Where systems engineering and operations professionals share real-world knowledge about designing, building, and maintaining the critical systems of ...
     4  -2 2014 sep 16abstract domain malwareDetecting Malware Domains at the Upper DNS Hierarchy - UsenixAbstract . In recent years Internet miscreants have been leveraging the DNS to build malicious ... chy, and is able to accurately detect malware domains by.
     4  +1 2014 sep 14find the needleFinding a needle in Haystack: Facebook's photo storage - UsenixFinding a needle in Haystack: Facebook's photo storage. Doug Beaver, Sanjeev Kumar, Harry C. Li, Jason Sobel, Peter Vajgel,. Facebook Inc. {doug, skumar ...
     4  ~ 2014 sep 12known ios 5 infectionsOn the Feasibility of Large-Scale Infections of iOS Devices - Usenixinfections of iOS devices have been discovered because ... anonymized IP addresses in known botnets, we measure ..... iOS device (Step 5 ).
     4  -1 2014 sep 11synergy between 2 networksExploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Thus, there exists a synergy between these two types of networks in terms of the design goals and principles of their routing protocols; both p2p and MANET ...
     4  +1 2014 sep 11converence photo sharingP3: Toward Privacy-Preserving Photo Sharing | USENIXConferences · Students ... P3: Toward Privacy-Preserving Photo Sharing ... On the flip side, photo sharing services have raised privacy concerns such as ...
     4  -1 2014 aug 28sync in a blinkMobile Data Sync in a Blink | USENIXMobile applications are becoming increasingly datacentric — often relying on cloud services to store, share, and analyze data. App developers have to ...
     4  +97 2014 aug 22value of localized ipIP Fault Localization Via Risk Modeling - Usenix[12, 21, 8]) provide great value in automating routine fault management, serious ... fault localization across IP and optical network layers, a difficult problem faced  ...
     4  -2 2014 aug 19analyser provenance siteProvenance for Data Mining - Usenixtween database, workflow, and data mining provenance , suggest new types of .... analysis techniques for provenance (e.g., [18]). Consider the iterative  ...
     4  +3 2014 aug 18this world of oursThis World of Ours | USENIXSometimes, when I check my work email, I'll find a message that says “Talk Announcement: Vertex-based Elliptic Cryptography on N-way Bojangle Spaces.
     4  -1 2014 aug 17social graph dataNathan Bronson, Zach Amsden, George Cabrera, Prasad Chakka, Peter Dimov, Hui Ding, Jack Ferris, Anthony Giardullo, Sachin Kulkarni, Harry Li, Mark ...
     4  ~ 2014 aug 14elara sata multiplierSATA Port Multipliers Considered Harmful - UsenixBy using SATA port multipliers (PMs), the storage ca- pacity of a system can be ... results show that at least one combination of SATA con- trollers, the SATA PMs, ...
     4  ~ 2014 aug 13your reputation precedes youYour Reputation Precedes You : History, Reputation, and ... - UsenixTenth Symposium On Usable Privacy and Security 113. Your Reputation Precedes You : History, Reputation, and the Chrome Malware Warning.
     4  +6 2014 aug 12cloud computing work shopsHotCloud '14 Call for Papers | USENIXHotCloud brings together researchers and practitioners from academia and industry working on cloud computing technologies to share their perspectives, report ...
     4  -3 2014 aug 07ssd random write performanceSFS: Random Write Considered Harmful in Solid State Drives - UsenixSFS: Random Write Considered Harmful in Solid State Drives . Over the ... However, the random write performance in SSDs still remains as a concern. Even in ...
     4  +3 2014 aug 01linux process migrationMigration without Virtualization - UsenixHowever, effecting a practical process migration system has proven challenging ... The compute nodes are conventional rack-mounted, 8-core, Linux 2.6 servers  ...
     4  ~ 2014 jul 31smat phone advertisingAdSplit: Separating Smartphone Advertising from Applications A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application.
     4  -1 2014 jul 28network as a serviceNaaS: Network-as-a-Service in the Cloud | USENIX
     4  ~ 2014 jul 26tomcat bench replay false4th USENIX Symposium on Networked Systems Design Friday: Global Comprehension for Distributed Replay .
     5  +3 2014 oct 01zookeperZooKeeper : Wait-free coordination for Internet-scale systems - UsenixZooKeeper is part of critical infrastructure, ZooKeeper aims to provide a simple and high performance kernel for building more complex coordination primitives at  ...
     5  +30 2014 sep 30sennehiser sis english documentAcoustic Side-Channel Attacks on Printers - Usenixent English text documents , using a dictionary of about. 1,400 words (including the ..... ing a Sennheiser MKH-8040 microphone with nominal frequency range from 30 Hz to 50 ..... Acoustic cryptanaly- sis – On nosy people and noisy machines.
     5  ~ 2014 sep 19state machine replicationPaxos Replicated State Machines as the Basis of a High ... - Usenixdemonstrate that a Paxos-based replicated state machine implementing a storage ... replicated state machine can serve as the data store for a file system or  ...
     5  +2 2014 sep 18flow attackMulti- flow Attacks Against Network Flow Watermarking ... - Usenixmove the watermark from a flow . The attack can be ef- fective even if different the watermarks in different flows carry different messages. We analyze the efficacy ...
     5  +21 2014 sep 16nagios need send message immediatelyExtensible Monitoring with Nagios and Messaging ... - Usenixcommands coming in from the pipe immediately , and write out passive ... need to be sent to a user. ... want to send messages and passes messages between.
     5  +3 2014 sep 15forumspamthis paper we investigate and compare automated tools used to spam forums. We analyze the functionality of the most popular forum spam automator, XRumer, ...
     5  +4 2014 sep 07xrumer automatic create emailmake their websites visible. While link embedded email spam continues to be a popu- .... vided, XRumer will automatically create email accounts on GMail for ...
     5  +2 2014 sep 05cloud file systemBuilding a Cloud File System - UsenixCloud file systems must address challenges that are not addressed by ... To understand the requirements for a cloud file system , one must consider the.
     5  +7 2014 sep 02anatomy of bartering pdfThe Anatomy of Clickbot.A - UsenixThe Anatomy of Clickbot.A ..... Now that we have completed our dissection of the anatomy of the bot .... erator paid or bartered with another, existing botnet operator to have the ....
     5  +1 2014 sep 01handling xml in tclXML Support for Tcl - Usenixa requirement of XML , so Tcl version 8.1 is well positioned to be used for software applications which handle and process XML documents. The following ...
     5  +10 2014 aug 31cloud computing workshopsHotCloud '14 | USENIXThanks to those who joined us in Philadelphia, PA, for HotCloud '14, the 6th USENIX Workshop on Hot Topics in Cloud Computing . As part of our commitment to ...
     5  -1 2014 aug 29google wave federationGoogle Wave | USENIXThe Google Wave Federation Protocol is an open extension to XMPP that defines how these hosted documents are shared between organizations and their ...
     5  +8 2014 aug 29eye on networkAn Eye on Network Intruder-Administrator Shootouts - USENIXAn eye on network intruder-administrator shootouts. Luc Girardin. UBS, Ubilab. Abstract. Carefully logging network activity is essential to meet the requirements ...
     5  ~ 2014 aug 26ip routing softwareDesigning Extensible IP Router Software - Usenixan IP routing software stack with strong emphases on la- tency, scaling, and extensibility. XORP is event-driven, and aims to respond to routing changes with  ...
     5  +4 2014 aug 24heterogeneous cloud softwareAccelerating The Cloud with Heterogeneous Computing - UsenixAccelerating The Cloud with Heterogeneous Computing . Sahil Suneja, Elliott Baron, Eyal de Lara, Ryan Johnson. University of Toronto. Abstract.
     5  -1 2014 aug 21e-business express slaDefining and Monitoring Service-Level Agreements for Dynamic e Defining and Monitoring Service-Level Agreements for Dynamic e - Business ... Service Level Agreements ( SLA ) between service providers and customers. ... i.e. , a model needs to be in place to express system resources in financial terms.
     5  ~ 2014 aug 20simple clickbot googleThe Anatomy of Clickbot .A - UsenixGoogle identified all clicks on its ads exhibiting Clickbot .A- like patterns and .... R's web pages and arrives at web site A. To provide a simple example, a web site  ...
    1 2 of 48 pages