Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
A storage server for continuous media is usually based on disk arrays like RAID. However, this kind of architecture does not provide any flexibility and scalability which are essential for storage ...
Daniel Lowe Wheeler, Dropbox Inc.
We have developed a set of defenses based on the detection of abnormal combinations of network events. For example, to detect the injection of a DNS reply, we use bookkeeping of request-reply pairs to ...
[1] Maar, L, Draschbacher, F., Lamster, L., Mangard, S., Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels ...
Skills and levels of expertise required for handling normal operations and incidents What are the standard or common practices of SRE that can be generalized beyond the SRE book? Additionally, we ...
Bianca Schroeder, University of Toronto; Raghav Lagisetty and Arif Merchant, Google, Inc.
James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, JJ Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild ...
As mobile applications and services continue to grow in importance, the ability for a mobile device to quickly and accurately locate its own position (and that of its user) has also become ...
Nathan Bronson, Zach Amsden, George Cabrera, Prasad Chakka, Peter Dimov, Hui Ding, Jack Ferris, Anthony Giardullo, Sachin Kulkarni, Harry Li, Mark Marchukov, Dmitri ...