USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    A Template Library to Integrate Thread Scheduling and Locality Management for NUMA MultiprocessorsHotPar '12Zoltan Majo, Thomas R. Gross
    Retrofitted Parallelism Considered Grossly Sub-OptimalHotPar '12Paul E. McKenney
    Parakeet: A Just-In-Time Parallel Accelerator for PythonHotPar '12Alex Rubinsteyn, Eric Hielscher, Nathaniel Weinman, Dennis Shasha
    Concurrency AttacksHotPar '12Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan
    CONCURRIT: Testing Concurrent Programs with Programmable State-Space ExplorationHotPar '12Jacob Burnim, Tayfun Elmas, George Necula, Koushik Sen
    Understanding the Interleaving-Space Overlap across Inputs and Software VersionsHotPar '12Dongdong Deng, Wei Zhang, Borui Wang, Peisen Zhao, Shan Lu
    "Panel: Parallel Programming in the Real World" SlidesHotPar '12
    Poster Session HotPar '12HotPar '12
    "Staying Happy in System Administration" PresentationWiAC '12
    "Overcoming My Biggest Roadblock, Myself" PresentationWiAC '12
    "Career Information and Workload Warriors - Time Saving Tips and Tricks" PresentationWiAC '12
    Uncharted PathsWiAC '12
    Strategies for a Successful Career in ComputingWiAC '12
    Neuroimage Data Sets: Rethinking Privacy PoliciesHealthSec '12
    Who Wears Me? Bioimpedance as a Passive BiometricHealthSec '12
    Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical RecordsHealthSec '12
    Body Area Network Security: Robust Key Establishment Using Human Body ChannelHealthSec '12
    Vis-à-vis Cryptography: Private and Trustworthy In-Person CertificationsHealthSec '12
    Under New Management: Practical Attacks on SNMPv3WOOT '12
    Abusing Notification Services on Smartphones for Phishing and SpammingWOOT '12
    Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol StacksWOOT '12
    Security Analysis of Smartphone Point-of-Sale SystemsWOOT '12
    WAFFle: Fingerprinting Filter Rules of Web Application FirewallsWOOT '12
    Off-Path Attacking the WebWOOT '12
    On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection SchemesWOOT '12

    Pages