The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Technical Conference (usenix)
2007 (conf/usenix/2007)


  1. Human Computation. [Citation Graph (, )][DBLP]


  2. Live Malware Attack! [Citation Graph (, )][DBLP]


  3. MapReduce and Other Building Blocks for Large-Scale Distributed Systems at Google. [Citation Graph (, )][DBLP]


  4. Wireless Networks. [Citation Graph (, )][DBLP]


  5. Security Is Broken. [Citation Graph (, )][DBLP]


  6. LiveJournal's Backend Technologies. [Citation Graph (, )][DBLP]


  7. Datacenters. [Citation Graph (, )][DBLP]


  8. Life Is Not a State-Machine: The Long Road from Research to Production. [Citation Graph (, )][DBLP]


  9. Programming Languages. [Citation Graph (, )][DBLP]


  10. Perfect Data in an Imperfect World. [Citation Graph (, )][DBLP]


  11. Building and Running an Open-Source Community: The FreeBSD Project. [Citation Graph (, )][DBLP]


  12. Advanced Perl. [Citation Graph (, )][DBLP]


  13. UNIX/Linux and Active Directory Interoperability. [Citation Graph (, )][DBLP]


  14. Second Life. [Citation Graph (, )][DBLP]


  15. Python Programming Language. [Citation Graph (, )][DBLP]


  16. The Impact of Virtualization on Computing Systems. [Citation Graph (, )][DBLP]


  17. VMware Virtual Infrastructure Tools and Techniques. [Citation Graph (, )][DBLP]


  18. Warehouse-scale Computers. [Citation Graph (, )][DBLP]


  19. Exploiting Online Games. [Citation Graph (, )][DBLP]


  20. Crossing the Digital Divide: The Latest Efforts from One Laptop per Child. [Citation Graph (, )][DBLP]


  21. Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical Computing. [Citation Graph (, )][DBLP]


  22. Energy Management for Hypervisor-Based Virtual Machines. [Citation Graph (, )][DBLP]


  23. Xenprobus, a Lightweight User-Space Probing Framework for Xen Virtual Machine. [Citation Graph (, )][DBLP]


  24. Virtual Machine Memory Access Tracing with Hypervisor Exclusive Cache. [Citation Graph (, )][DBLP]


  25. Hyperion: High Volume Stream Archival for Retrospective Querying. [Citation Graph (, )][DBLP]


  26. Load Shedding in Network Monitoring Applications. [Citation Graph (, )][DBLP]


  27. Configuration Management at Massive Scale: System Design and Experience. [Citation Graph (, )][DBLP]


  28. Events Can Make Sense. [Citation Graph (, )][DBLP]


  29. MapJAX: Data Structure Abstractions for Asynchronous Web Applications. [Citation Graph (, )][DBLP]


  30. Sprockets: Safe Extensions for Distributed File Systems. [Citation Graph (, )][DBLP]


  31. SafeStore: A Durable and Practical Storage System. [Citation Graph (, )][DBLP]


  32. POTSHARDS: Secure Long-Term Storage Without Encryption. [Citation Graph (, )][DBLP]


  33. Dandelion: Cooperative Content Distribution with Robust Incentives. [Citation Graph (, )][DBLP]


  34. Using Provenance to Aid in Personal File Search. [Citation Graph (, )][DBLP]


  35. Supporting Practical Content-Addressable Caching with CZIP Compression. [Citation Graph (, )][DBLP]


  36. Implementation and Performance Evaluation of Fuzzy File Block Matching. [Citation Graph (, )][DBLP]


  37. From Trusted to Secure: Building and Executing Applications That Enforce System Security. [Citation Graph (, )][DBLP]


  38. From STEM to SEAD: Speculative Execution for Automated Defense. [Citation Graph (, )][DBLP]


  39. Dynamic Spyware Analysis. [Citation Graph (, )][DBLP]


  40. Evaluating Block-level Optimization Through the IO Path. [Citation Graph (, )][DBLP]


  41. DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch. [Citation Graph (, )][DBLP]


  42. A Memory Soft Error Measurement on Production Systems. [Citation Graph (, )][DBLP]


  43. Addressing Email Loss with SureMail: Measurement, Design, and Evaluation. [Citation Graph (, )][DBLP]


  44. Wresting Control from BGP: Scalable Fine-Grained Route Control. [Citation Graph (, )][DBLP]


  45. A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection. [Citation Graph (, )][DBLP]


  46. Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems. [Citation Graph (, )][DBLP]


  47. Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the Fly. [Citation Graph (, )][DBLP]


  48. Exploring Recovery from Operating System Lockups. [Citation Graph (, )][DBLP]


  49. Supporting Multiple OSes with OS Switching. [Citation Graph (, )][DBLP]


  50. Cool Job Allocation: Measuring the Power Savings of Placing Jobs at Cooling-Efficient Locations in the Data Center. [Citation Graph (, )][DBLP]


  51. Passwords for Everyone: Secure Mnemonic-based Accessible Authentication. [Citation Graph (, )][DBLP]


  52. Virtually Shared Displays and User Input Devices. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002