diff --git "a/config.json" "b/config.json" new file mode 100644--- /dev/null +++ "b/config.json" @@ -0,0 +1,9997 @@ +{ + "_name_or_path": "distilbert/distilbert-base-uncased", + "activation": "gelu", + "architectures": [ + "DistilBertForSequenceClassification" + ], + "attention_dropout": 0.1, + "dim": 768, + "dropout": 0.1, + "hidden_dim": 3072, + "id2label": { + "0": "MATHEMATICS OF OPERATIONS RESEARCH Approximation Algorithms for Combinatorial Auctions with Complement-Free Bidders", + "1": "Best-Response Mechanisms", + "2": "Truthful Prioritization Schemes for Spectrum Sharing", + "3": "Time-Bounded Sequential Parameter Optimization", + "4": "Learning with Probabilistic Features for Improved Pipeline Models", + "5": "Exploring Content Models for Multi-Document Summarization", + "6": "Simple Coreference Resolution with Rich Syntactic and Semantic Features", + "7": "Approximate Factoring for A * Search", + "8": "Modeling Online Reviews with Multi-grain Topic Models", + "9": "A Latent Variable Model of Synchronous Parsing for Syntactic and Semantic Dependencies", + "10": "Wireless Networks Should Spread Spectrum Based On Demands *", + "11": "Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling", + "12": "A Radio Multiplexing Architecture for High Throughput Point to Multipoint Wireless Networks", + "13": "Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks General Terms", + "14": "In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection", + "15": "Learning spectral graph segmentation", + "16": "Light-weight Contour Tracking in Wireless Sensor Networks", + "17": "Distributed Proximity Maintenance in Ad Hoc Mobile Networks", + "18": "PROP: a Scalable and Reliable P2P Assisted Proxy Streaming System \u00a3", + "19": "On Information-Maximization Clustering: Tuning Parameter Selection and Analytic Solution", + "20": "Language Identification from Text Using N-gram Based Cumulative Frequency Addition", + "21": "Exploiting Structured Ontology to Organize Scattered Online Opinions", + "22": "Conficker and Beyond: A Large-Scale Empirical Study", + "23": "Opinion Integration Through Semi-supervised Topic Modeling", + "24": "Language Models for Genomics Information Retrieval: UIUC at TREC 2007 Genomics Track", + "25": "Personal Social Screen -A Dynamic Privacy Assignment System for Social Sharing in Complex Social Object Networks", + "26": "On Self Adaptive Routing in Dynamic Environments * -An Evaluation and Design Using a Simple, Probabilistic Scheme", + "27": "Learning the Empirical Hardness of Optimization Problems: The case of combinatorial auctions", + "28": "A DoS-Resilient Information System for Dynamic Data Management *", + "29": "Dynamic Internet Congestion with Bursts \ud97b\udf59", + "30": "A TCP with Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses", + "31": "Evaluation via Negativa of Chinese Word Segmentation for Information Retrieval *", + "32": "Parsimonious Explanations of Change in Hierarchical Data", + "33": "TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection", + "34": "VirtualFace: An Algorithm to Guarantee Packet Delivery of Virtual-Coordinate-Based Routing Protocols in Wireless Sensor Networks", + "35": "Axis-Based Virtual Coordinate Assignment Protocol and Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks", + "36": "Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc Networks", + "37": "An Inequality on the Edge Lengths of Triangular Meshes *", + "38": "Searching Dynamic Point Sets in Spaces with Bounded Doubling Dimension *", + "39": "Payment Rules through Discriminant-Based Classifiers", + "40": "Tryst: The Case for Confidential Service Discovery", + "41": "Virtual Switching Without a Hypervisor for a More Secure Cloud", + "42": "Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol", + "43": "BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations", + "44": "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation", + "45": "On Node Isolation under Churn in Unstructured P2P Networks with Heavy-Tailed Lifetimes", + "46": "Link Lifetimes and Randomized Neighbor Selection in DHTs", + "47": "Turbo King: Framework for Large-Scale Internet Delay Measurements", + "48": "Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators", + "49": "Modeling Residual-Geometric Flow Sampling", + "50": "Streaming Scalable Video over WiMAX Networks", + "51": "Analytical Cache Models with Applications to Cache Partitioning", + "52": "Empirical Evaluation of Latency-sensitive Application Performance in the Cloud", + "53": "There's something about MRAI: Timing diversity may exponentially worsen BGP convergence", + "54": "Impact of FEC Overhead on Scalable Video Streaming", + "55": "Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems", + "56": "A Distributed Reputation Approach to Cooperative Internet Routing Protection", + "57": "Link-State Routing With Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering", + "58": "Wavelet and Time-Domain Modeling of Multi-Layer VBR Video Traffic", + "59": "Delayed Stability and Performance of Distributed Congestion Control", + "60": "Path-Quality Monitoring in the Presence of Adversaries", + "61": "On Lifetime-Based Node Failure and Stochastic Resilience of Decentralized Peer-to-Peer Networks", + "62": "Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks", + "63": "Local-Effect Games", + "64": "802.11 User Fingerprinting", + "65": "Inherently Safe Backup Routing with BGP", + "66": "LogTM-SE: Decoupling Hardware Transactional Memory from Caches", + "67": "Query Processing for High-Volume XML Message Brokering", + "68": "Seamless BGP Migration With Router Grafting", + "69": "A Pluralist Approach to Interdomain Communication Security", + "70": "Opportunistic Media Access for Multirate Ad Hoc Networks *", + "71": "Preferences over Sets", + "72": "Predicting Accuracy of Extracting Information from Unstructured Text Collections", + "73": "Modeling Query-Based Access to Text Databases", + "74": "Exploring Social Tagging Graph for Web Object Classification *", + "75": "Dr. Multicast: Rx for Data Center Communication Scalability", + "76": "Landmarks, Critical Paths and Abstractions: What's the Difference Anyway?", + "77": "LogTM: Log-based Transactional Memory", + "78": "A Probabilistic Approach to Spatiotemporal Theme Pattern Mining on Weblogs", + "79": "BDUOL: Double Updating Online Learning on a Fixed Budget", + "80": "Cost-Sharing Approximations for h +", + "81": "Active Feedback in Ad Hoc Information Retrieval", + "82": "A Session-Based Search Engine", + "83": "Exploiting Query History for Document Ranking in Interactive Information Retrieval", + "84": "HASE: A Hybrid Approach to Selectivity Estimation for Conjunctive Predicates", + "85": "Quality-Aware Segment Transmission Scheduling in Peer-to-Peer Streaming Systems", + "86": "Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit Rates", + "87": "Incorporating Site-Level Knowledge for Incremental Crawling of Web Forums: A List-wise Strategy *", + "88": "Memory System Behavior of Java-Based Middleware", + "89": "ISP-Friendly Peer Matching without ISP Collaboration", + "90": "Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach Amit Saha Tropos Networks, CA", + "91": "Experiments in the Wild: Public Evaluation of Off-Screen Visualizations in the Android Market", + "92": "CheckFence: Checking Consistency of Concurrent Data Types on Relaxed Memory Models *", + "93": "SafetyNet: Improving the Availability of Shared Memory Multiprocessors with Global Checkpoint/Recovery", + "94": "Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code", + "95": "Supporting Objects in Run-Time Bytecode Specialization", + "96": "Towards an algebraic theory of bidirectional transformations", + "97": "Lower-Bound Constrained Runs in Weighted Timed Automata", + "98": "Almost ASAP Semantics: from Timed Models to Timed Implementations", + "99": "Airavat: Security and Privacy for MapReduce", + "100": "Lock-Free Consistency Control for Web 2.0 Applications *", + "101": "Landmarks Revisited", + "102": "VARIATIONAL BAYESIAN IMAGE PROCESSING ON STOCHASTIC FACTOR GRAPHS", + "103": "Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems", + "104": "A Framework for Monitoring Agent-Based Normative Systems", + "105": "Reducing Accidental Complexity in Planning Problems", + "106": "Proximity Detection in Distributed Simulation of Wireless Mobile Systems", + "107": "mPuff: Automated Detection of Cigarette Smoking Puffs from Respiration Measurements", + "108": "Cache Placement in Sensor Networks Under Update Cost Constraint", + "109": "Point-based value iteration: An anytime algorithm for POMDPs", + "110": "unknown_110", + "111": "Tuning Skype's Redundancy Control Algorithm for User Satisfaction", + "112": "The Ordinal-Recursive Complexity of Timed-Arc Petri Nets, Data Nets, and Other Enriched Nets", + "113": "Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks", + "114": "Teaching Software Projects at Universities in Tampere", + "115": "Designing an Ontology-based Intelligent Tutoring Agent with Instant Messaging", + "116": "A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment", + "117": "A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL", + "118": "Proceedings of the 2 nd Workshop on Parallel and Distributed Computing in Image Processing, Video Processing, and Multimedia (held in conjunction with IPDPS'01) Dynamic Parallel Media Processing Using Speculative Broadcast Loop (SBL)", + "119": "Structuring Unstructured Peer-to-Peer Networks", + "120": "Probabilistic XML via Markov Chains *", + "121": "Corroborating Information from Disagreeing Views *", + "122": "Managing Wire Delay in Large Chip-Multiprocessor Caches", + "123": "Automatic Wrapper Induction from Hidden-Web Sources with Domain Knowledge", + "124": "A Model-Based Approach for Integrating Third Party Systems with Web Applications", + "125": "Dynamic Cache Partitioning for Simultaneous Multithreading Systems", + "126": "AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks", + "127": "MONKEYSORT", + "128": "Querying and Exchanging XML and RDF on the Web", + "129": "WEB CONTENT EXTRACTION THROUGH HISTOGRAM CLUSTERING", + "130": "Structural Link Analysis from User Profiles and Friends Networks: A Feature Construction Approach", + "131": "Symmetry of Information: A Closer Look", + "132": "Is Transactional Programming Actually Easier?", + "133": "Understanding Transactional Memory Performance", + "134": "TraceBack: First Fault Diagnosis by Reconstruction of Distributed Control Flow", + "135": "Direct Addressed Caches for Reduced Power Consumption", + "136": "BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic", + "137": "Correcting for Missing Data in Information Cascades", + "138": "Diagnosing Performance Overheads in the Xen Virtual Machine Environment Diagnosing Performance Overheads in the Xen Virtual Machine Environment Work done during internship at HP Labs and then at EPFL. General Terms", + "139": "Accelerating Leukocyte Tracking using CUDA: A Case Study in Leveraging Manycore Coprocessors", + "140": "TLC: Transmission Line Caches", + "141": "An Approach to Sensor Correlation", + "142": "Towards A Context-Based Dialog Management Layer for Expert Systems", + "143": "FPGA Self-Repair using an Organic Embedded System Architecture", + "144": "Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs", + "145": "Sequential Hypothesis Testing under Stochastic Deadlines", + "146": "The Cost of Privatization in Software Transactional Memory", + "147": "Tight Bounds for Asynchronous Randomized Consensus * (Preliminary Version) General Terms", + "148": "Optimal Gradient Clock Synchronization in Dynamic Networks", + "149": "Dominant-Strategy Auction Design for Agents with Uncertain, Private Values", + "150": "Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems", + "151": "Towards Automated Performance Diagnosis in a Large IPTV Network", + "152": "Sketch-based Change Detection: Methods, Evaluation, and Applications", + "153": "On Selfish Routing in Internet-Like Environments", + "154": "Inferring Social Ties across Heterogeneous Networks", + "155": "Towards Interactive Training with an Avatar-based Human-Computer Interface", + "156": "Social Action Tracking via Noise Tolerant Time-varying Factor Graphs", + "157": "Social Influence Analysis in Large-scale Networks", + "158": "Email Data Cleaning", + "159": "Shadow Configuration as a Network Management Primitive", + "160": "Glacier: Highly durable, decentralized storage despite massive correlated failures *", + "161": "Interfacing Java to the Virtual Interface Architecture", + "162": "Practical Robust Localization over Large-Scale 802.11 Wireless Networks General Terms", + "163": "Making Argument Systems for Outsourced Computation Practical (Sometimes)", + "164": "Mnikr: Reputation Construction Through Human Trading of Distributed Social Identities", + "165": "Pattern Classification using Rectified Nearest Feature Line Segment", + "166": "LAYERED APPROACH TO INTRINSIC EVOLVABLE HARDWARE USING DIRECT BITSTREAM MANIPULATION OF VIRTEX II PRO DEVICES", + "167": "Anonymity Loves Company: Usability and the Network Effect", + "168": "Contact Sensing for Parts Localization: Sensor Design and Experiments", + "169": "Observing Pose and Motion through Contact", + "170": "On the non-optimality of the FB discipline within the service time distribution class IMRL", + "171": "Comparison of bandwidth-sharing policies in a linear network", + "172": "Automatically Inferring Quantified Loop Invariants by Algorithmic Learning from Simple Templates", + "173": "Neighbor-Specific BGP: More Flexible Routing Policies While Improving Global Stability", + "174": "Server-Friendly Delta Compression for Efficient Web Access", + "175": "Derandomized Constructions of k-Wise (Almost) Independent Permutations *", + "176": "Peppercoin Micropayments", + "177": "Performance Evaluation of Two Allocation Schemes for Combinatorial Group Testing Fault Isolation", + "178": "History-Independent Cuckoo Hashing", + "179": "Recovering Temporally Rewiring Networks: A Model-based Approach", + "180": "Highly Scalable Algorithms for Rectilinear and Octilinear Steiner Trees \u00a3", + "181": "Dynamic Optimization and Learning for Renewal Systems", + "182": "Provably good global buffering by multiterminal multicommodity flow approximation", + "183": "Enabling Contribution Awareness in an Overlay Broadcasting System", + "184": "Belief in Information Flow", + "185": "Fuzzy Joins Using MapReduce", + "186": "Distributed Query Sampling: A Quality-Conscious Approach *", + "187": "Continuous Intersection Joins Over Moving Objects", + "188": "Expediting GA-Based Evolution Using Group Testing Techniques for Reconfigurable Hardware 1", + "189": "Similarity Search: A Matching Based Approach", + "190": "Multiple Aggregations Over Data Streams", + "191": "Making the Pyramid Technique Robust to Query Types and Workloads", + "192": "Completion Time Minimization and Robust Power Control in Wireless Packet Networks", + "193": "Requirements of Secure Storage Systems for Healthcare Records", + "194": "Cost-effective Outbreak Detection in Networks Natalie Glance", + "195": "Impact of Linguistic Analysis on the Semantic Graph Coverage and Learning of Document Extracts", + "196": "Learning Sub-structures of Document Semantic Graphs for Document Summarization", + "197": "Cross-domain Collaboration Recommendation", + "198": "The Download Estimation Task on KDD Cup 2003", + "199": "A Physical Resource Management Approach to Minimizing FPGA Partial Reconfiguration Overhead", + "200": "Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks", + "201": "Fault-Tolerant Communication Runtime Support for Data-Centric Programming Models", + "202": "Designing Energy Efficient Communication Runtime Systems for Data Centric Programming Models", + "203": "Minimizing MPI Resource Contention in Multithreaded Multicore Environments", + "204": "Natively Supporting True One-sided Communication in MPI on Multi-core Systems with InfiniBand *", + "205": "Massively Parallel Genomic Sequence Search on the Blue Gene/P Architecture", + "206": "Analyzing the Impact of Supporting Out-of-Order Communication on In-order Performance with iWARP", + "207": "Architecture for Caching Responses with Multiple Dynamic Dependencies in Multi-Tier Data-Centers over InfiniBand", + "208": "Impact of High Performance Sockets on Data Intensive Applications", + "209": "SATenstein: Automatically Building Local Search SAT Solvers From Components", + "210": "This document is an author-formatted work. The definitive version for citation appears as: \" Triple Modular Redundancy with Standby (TMRSB) SUPPORTING Dynamic RESOURCE Reconfiguration \" accepted to IEEE TRIPLE MODULAR REDUNDANCY WITH STANDBY (TMRSB) SUPPORTING DYNAMIC RESOURCE RECONFIGURATION", + "211": "Supporting the Global Arrays PGAS Model Using MPI One-Sided Communication", + "212": "Performance Evaluation of RDMA over IP: A Case Study with the Ammasso Gigabit Ethernet NIC *", + "213": "Automatic Problem Generation for Capture-the-Flag Competitions", + "214": "An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education", + "215": "Lessons Learned in Game Development for Crowdsourced Software Formal Verification", + "216": "Results of the WMT19 Metrics Shared Task: Segment-Level and Strong MT Systems Pose Big Challenges", + "217": "Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015", + "218": "Multidisciplinary Experiential Learning for Holistic Cy- bersecurity Education, Research and Evaluation", + "219": "AGILE: Adaptive Indexing for Context-Aware Information Filters", + "220": "Challenges for Provenance in Cloud Computing", + "221": "Dynamic Voting Schemes to Enhance Evolutionary Repair In Reconfigurable Logic Devices", + "222": "Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions", + "223": "Pursue robust indefinite scalability", + "224": "Adaptive XML Storage or The Importance of Being Lazy", + "225": "Emulating Goliath Storage Systems with David", + "226": "vIC: Interrupt Coalescing for Virtual Machine Storage Device IO", + "227": "Onyx: A Protoype Phase Change Memory Storage Array", + "228": "Free Lunch: Exploiting Renewable Energy For Computing", + "229": "Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software", + "230": "Getting It Together: Enabling Multi-organization Provenance Exchange", + "231": "Focus Replay Debugging Effort on the Control Plane", + "232": "vIOMMU: Efficient IOMMU Emulation", + "233": "Consensus-based Evaluation for Fault Isolation and On-line Evolutionary Regeneration", + "234": "Virtual machine images as structured data: the Mirage image library", + "235": "On the Limitations of Provenance for Queries With Difference *", + "236": "Fast and Secure Laptop Backups with Encrypted De-duplication", + "237": "What consistency does your key-value store actually provide?", + "238": "Scalable Web Object Inspection and Malfease Collection *", + "239": "Towards proving security in the presence of large untrusted components", + "240": "Provenance Integration Requires Reconciliation", + "241": "Detecting Malware Domains at the Upper DNS Hierarchy", + "242": "Approximate XML Query Answers", + "243": "Block-level RAID is dead", + "244": "Autonomous FPGA Fault Handling through Competitive Runtime Reconfiguration", + "245": "Look Who's Talking: Discovering Dependencies between Virtual Machines Using CPU Utilization", + "246": "On the Benefit of Virtualization: Strategies for Flexible Server Allocation", + "247": "Removing The Costs Of Indirection in Flash-based SSDs with Nameless Writes", + "248": "xJS: Practical XSS Prevention for Web Application Development", + "249": "Automating configuration troubleshooting with dynamic information flow analysis", + "250": "Automatic Physical Database Tuning: A Relaxation-based Approach", + "251": "Efficient System-Enforced Deterministic Parallelism", + "252": "Challenges in Experimenting with Botnet Detection Systems", + "253": "Evading Cellular Data Monitoring with Human Movement Networks", + "254": "Deploying IPv6 in the Google Enterprise Network. Lessons learned", + "255": "Self-Checking Fault Detection using Discrepancy Mirrors", + "256": "SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy", + "257": "Operating System Implications of Fast, Cheap, Non-Volatile Memory", + "258": "Italian for Beginners: The Next Steps for SLO-Based Management *", + "259": "Extensible and Scalable Network Monitoring Using OpenSAFE", + "260": "iSCSI SANs Don't Have To Suck", + "261": "A Fine-Grained Workflow Model with Provenance-Aware Security Views", + "262": "Creating the Knowledge about IT Events", + "263": "Configuration Management for Mac OS X, It's just Unix Right?", + "264": "ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation", + "265": "Finding a needle in Haystack: Facebook's photo storage", + "266": "Area Reclamation Strategies and Metrics for SRAM-Based Reconfigurable Devices", + "267": "The Turtles Project: Design and Implementation of Nested Virtualization", + "268": "SOBA: Secrecy-preserving Observable Ballot-level Audit", + "269": "Don't Thrash: How to Cache your Hash on Flash", + "270": "A First Look at Problems in the Cloud", + "271": "The Case for Fine-Grained Traffic Engineering in Data Centers", + "272": "Deterministic Process Groups in dOS", + "273": "Active Quorum Systems", + "274": "Prediction Promotes Privacy In Dynamic Social Networks", + "275": "Vsys: A programmable sudo", + "276": "Large-scale Incremental Data Processing with Change Propagation", + "277": "Ontology Evolution Analysis with OWL-MeT", + "278": "Virtually Cool Ternary Content Addressable Memory", + "279": "Counterexample-Guided Abstraction Refinement for PLCs", + "280": "The Case for Energy-Oriented Partial Desktop Migration", + "281": "Using TCP/IP traffic shaping to achieve iSCSI service predictability", + "282": "A Case for NUMA-aware Contention Management on Multicore Systems", + "283": "Featherweight Firefox Formalizing the Core of a Web Browser", + "284": "Paxos Replicated State Machines as the Basis of a High-Performance Data Store", + "285": "A Cuckoo's Egg in the Malware Nest On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks", + "286": "A Geometric Model for On-line Social Networks *", + "287": "An Analysis of Linux Scalability to Many Cores", + "288": "Dialog Management for Rapid-Prototyping of Speech-Based Training Agents Dialog Management for Rapid-Prototyping of Speech-Based Training Agents", + "289": "Tolerating Malicious Device Drivers in Linux", + "290": "Experiences with Eucalyptus: Deploying an Open Source Cloud", + "291": "Cost-Aware Live Migration of Services in the Cloud", + "292": "Exploiting MISD Performance Opportunities in Multi-core Systems", + "293": "Virtualize Everything but Time", + "294": "Scaling on EC2 in a fast-paced environment Practice and Experience Report LISA 11", + "295": "Auditing a DRE-Based Election in South Carolina", + "296": "Dewdrop: An Energy-Aware Runtime for Computational RFID", + "297": "Media Access Control Address Spoofing Attacks against Port Security", + "298": "Running mixnet-based elections with Helios", + "299": "Generation of Conformance Test Suites for Compositions of Web Services Using Model Checking", + "300": "GuardRails: A Data-Centric Web Application Security Framework", + "301": "Chipping Away at Censorship Firewalls with User-Generated Content", + "302": "Webseclab Security Education Workbench", + "303": "JSZap: Compressing JavaScript Code", + "304": "Measuring Pay-per-Install: The Commoditization of Malware Distribution", + "305": "A Framework for Policies over Provenance", + "306": "TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion", + "307": "Isolated virtualised clusters: testbeds for high-risk security experimentation and training *", + "308": "Local System Security via SSHD Instrumentation", + "309": "Toward Online Testing of Federated and Heterogeneous Distributed Systems", + "310": "Search Combinators", + "311": "Model-based testing without a model: Assessing portability in the Seattle testbed", + "312": "An Analysis of Power Consumption in a Smartphone", + "313": "Estimating the Margin of Victory for Instant-Runoff Voting", + "314": "BenchLab: An Open Testbed for Realistic Benchmarking of Web Applications", + "315": "The Case for Power-Agile Computing", + "316": "Capacity Forecasting in a Backup Storage Environment", + "317": "Separating Web Applications from User Data Storage with BSTORE", + "318": "Provenance Needs Incentives for Everyone", + "319": "Characterizing Database User's Access Patterns", + "320": "Semantics of Caching with SPOCA: A Stateless, Proportional, Optimally-Consistent Addressing Algorithm", + "321": "Super Solutions for Combinatorial Auctions", + "322": "Are Text-Only Data Formats Safe? Or, Use This L A T E X Class File to Pwn Your Computer", + "323": "First Step Towards Automatic Correction of Firewall Policy Faults", + "324": "KnowOps: Towards an Embedded Knowledge Base for Network Management and Operations", + "325": "CAFTL: A Content-Aware Flash Translation Layer Enhancing the Lifespan of Flash Memory based Solid State Drives", + "326": "Provenance for System Troubleshooting", + "327": "Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications", + "328": "MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery", + "329": "Insights from the Inside: A View of Botnet Management from Infiltration", + "330": "Strange Bedfellows: Community Identification in BitTorrent", + "331": "See Spot Run: Using Spot Instances for MapReduce Workflows", + "332": "PEDAGOGICAL POSSIBILITIES FOR THE DICE GAME PIG *", + "333": "VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension", + "334": "Detecting Malicious Web Links and Identifying Their Attack Types", + "335": "A Middleware for Gossip Protocols", + "336": "Mobile Apps: It's Time to Move Up to CondOS", + "337": "Lyrebird -Assigning Meanings to Machines", + "338": "Keeping Track of 70,000+ Servers: The Akamai Query System", + "339": "Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring", + "340": "Cost-Based Labeling of Groups of Mass Spectra X-XXXXX-XX-X/XX/XX ...$5.00", + "341": "Macho: Programming With Man Pages", + "342": "Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing *", + "343": "Stable Deterministic Multithreading through Schedule Memoization", + "344": "Cache-Oblivious Simulation of Parallel Programs", + "345": "Authentication Codes", + "346": "Trusted Disk Loading in the Emulab Network Testbed", + "347": "Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks", + "348": "HiTune: Dataflow-Based Performance Analysis for Big Data Cloud", + "349": "HiTune: Dataflow-Based Performance Analysis for Big Data Cloud_349", + "350": "Power-law Revisited: A Large Scale Measurement Study of P2P Content Popularity", + "351": "Liquidity in Credit Networks: A Little Trust Goes a Long Way", + "352": "WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server Requests", + "353": "Data Swapping: Variations on a Theme by Dalenius and Reiss", + "354": "DBTaint: Cross-Application Information Flow Tracking via Databases *", + "355": "Reasoning about B+ Trees with Operational Semantics and Separation Logic", + "356": "ChunkStash: Speeding up Inline Storage Deduplication using Flash Memory", + "357": "Resource Provisioning of Web Applications in Heterogeneous Clouds", + "358": "A survey of system configuration tools", + "359": "Deriving Private Information from Randomized Data", + "360": "mCarve: Carving Attributed Dump Sets", + "361": "Provenance, End-User Trust and Reuse: An Empirical Investigation", + "362": "Tradeoffs in Scalable Data Routing for Deduplication Clusters", + "363": "Content-aware Load Balancing for Distributed Backup", + "364": "A Rising Tide Lifts All Boats: How Memory Error Prediction and Prevention Can Help with Virtualized System Longevity", + "365": "Performance Profiling in a Virtualized Environment", + "366": "Frame Rules from Answer Types for Code Pointers", + "367": "Correctness Proofs for Device Drivers in Embedded Systems", + "368": "Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware", + "369": "Cloaking Malware with the Trusted Platform Module", + "370": "Rethinking Deduplication Scalability", + "371": "Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling", + "372": "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones", + "373": "Effective Data-Race Detection for the Kernel", + "374": "Work-in-progress: Automated Named Entity Extraction for Tracking Censorship of Current Events", + "375": "Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols", + "376": "FARMER: Finding Interesting Rule Groups in Microarray Datasets", + "377": "Learning Markov Logic Network Structure via Hypergraph Lifting", + "378": "Experiences with practice-focused undergraduate security education", + "379": "Fast Computation of Database Operations using Graphics Processors", + "380": "Fault-Tolerance in the Borealis Distributed Stream Processing System", + "381": "Using Syslog Message Sequences for Predicting Disk Failures", + "382": "A Design for Comprehensive Kernel Instrumentation", + "383": "SPORC: Group Collaboration using Untrusted Cloud Resources", + "384": "On the Potential of Proactive Domain Blacklisting", + "385": "Peer-to-Peer Bargaining in Container-Based Datacenters", + "386": "TidyFS: A Simple and Small Distributed File System", + "387": "Exploring the Relationship Between Web Application Development Tools and Security", + "388": "Extracting Semantic Networks from Text Via Relational Clustering", + "389": "Experiences with Tracing Causality in Networked Services", + "390": "Cybercasing the Joint: On the Privacy Implications of Geo-Tagging", + "391": "Provenance Query Patterns for Many-Task Scientific Computing", + "392": "Outtweeting the Twitterers -Predicting Information Cascades in Microblogs", + "393": "Exposing iClass Key Diversification", + "394": "Default-all is dangerous!", + "395": "Fine Grain Provenance Using Temporal Databases", + "396": "Comet: An active distributed key-value store", + "397": "Dominant Resource Fairness: Fair Allocation of Multiple Resource Types", + "398": "The Effects of Restrictions on Number of Connections in OSNs: A Case-Study on Twitter", + "399": "Statistical Predicate Invention", + "400": "Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments", + "401": "We Crashed, Now What? *", + "402": "Reexamining Some Holy Grails of Data Provenance", + "403": "Automating Network Monitoring on Experimental Testbeds", + "404": "Secure In-Band Wireless Pairing", + "405": "VAMOS: Virtualization Aware Middleware", + "406": "Toward Secure Embedded Web Interfaces", + "407": "Outsourcing the Decryption of ABE Ciphertexts", + "408": "GULFSTREAM: Staged Static Analysis for Streaming JavaScript Applications", + "409": "Model Checking a Networked System Without the Network", + "410": "Learning the Structure of Markov Logic Networks", + "411": "Privad: Practical Privacy in Online Advertising", + "412": "Cloud-Scale Resource Management: Challenges and Techniques", + "413": "mClock: Handling Throughput Variability for Hypervisor IO Scheduling", + "414": "FATE and DESTINI: A Framework for Cloud Recovery Testing", + "415": "Towards Automatically Checking Thousands of Failures with Micro-specifications", + "416": "CDE: Run Any Linux Application On-Demand Without Installation", + "417": "CDE: Using System Call Interposition to Automatically Create Portable Software Packages", + "418": "G 2 : A Graph Processing System for Diagnosing Distributed Systems", + "419": "Pegasus: Coordinated Scheduling for Virtualized Accelerator-based Systems", + "420": "Leveraging Value Locality in Optimizing NAND Flash-based SSDs", + "421": "The Knowledge Gradient Policy for Offline Learning with Independent Normal Rewards", + "422": "SIP CLF: A Common Log Format (CLF) for the Session Initiation Protocol (SIP)", + "423": "DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements", + "424": "Differential Privacy Under Fire", + "425": "Accountable Virtual Machines", + "426": "Secure Internet Voting on Limited Devices with Anonymized DSA Public Keys", + "427": "Dynamic Provenance for SPARQL Updates using Named Graphs", + "428": "Secure Cloud Computing with a Virtualized Network Infrastructure", + "429": "StarTrack Next Generation: A Scalable Infrastructure for Track-Based Applications", + "430": "Okeanos: Wasteless Journaling for Fast and Reliable Multistream Storage", + "431": "vDC: Virtual Data Center Powered with AS Alliance for Enabling Cost-Effective Business Continuity and Coverage", + "432": "VALUE OF INFORMATION METHODS FOR PAIRWISE SAMPLING WITH CORRELATIONS", + "433": "What If You Could Actually Trust Your Kernel?", + "434": "Static Scheduling in Clouds", + "435": "Automated Planning for Configuration Changes", + "436": "Revisiting the Storage Stack in Virtualized NAS Environments", + "437": "Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center", + "438": "unknown_438", + "439": "In-Flight Mechanics A Software Package Management Conversion Project", + "440": "Towards Automatic Update of Access Control Policy", + "441": "Faster Secure Two-Party Computation Using Garbled Circuits", + "442": "Privacy-Preserving Applications on Smartphones", + "443": "GUESSING PREFERENCES: A NEW APPROACH TO MULTI-ATTRIBUTE RANKING AND SELECTION", + "444": "Putting BGP on the Right Path: Better Performance via Next-Hop Routing", + "445": "Just-In-Time Analytics on Large File Systems", + "446": "A DNS Reflection Method for Global Traffic Management", + "447": "ZooKeeper: Wait-free coordination for Internet-scale systems", + "448": "Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm", + "449": "\u00d0\u00d9\u00ccae \u00d3\u00bb\u00bf\u00ad\u00ab\u00ae\u00b7\u00b2\u00b9 \u00d3\u00b1\u00be\u00b7\u00b4\u00b7\u00ac \u00a7 \u00ce\u00bb\u00b4\u00bf\u00ac\u00b7\u00b1\u00b2\u00ad\u00b8\u00b7\u00b0 \u00ab\u00ad\u00b7\u00b2\u00b9 \u00d0\u00bb\u00ae\u00ad\u00b1\u00b2\u00bf\u00b4\u00f4 \u00d9\u00b4\u00b1\u00be\u00bf\u00b4\u00bf\u00b2\u00bc\u00d9\u00b4\u00b1\u00be\u00bf\u00b4\u00bf\u00b2\u00bc \u00cc\u00bb\u00b3\u00b0\u00b1\u00ae\u00bf\u00b4\u00da\u00bf\u00bd\u00ac\u00b1\u00ae\u00ad\u00cc\u00bb\u00b3\u00b0\u00b1\u00ae\u00bf\u00b4\u00da\u00bf\u00bd\u00ac\u00b1\u00ae\u00ad \u00d8\u00b1\u00b2\u00b9 \u00b6\u00b7\u00bf\u00b2 \u00c9\u00bf\u00b2\u00b9 \u00f4 AE\u00b8\u00bb\u00b2\u00b8\u00ab\u00b7 \u00d4\u00b7 \u00f4 \u00c9\u00bf\u00b2\u00b9\u00f3\u00dd\u00b8\u00b7\u00bb\u00b2 \u00d4\u00bb\u00bb \u00a7 \u00dd\u00b1\u00b4\u00b4\u00bb\u00b9\u00bb \u00b1\u00ba \u00d7\u00b2\u00ba\u00b1\u00ae\u00b3\u00bf\u00ac\u00b7\u00b1\u00b2 \u00cd\u00bd\u00b7\u00bb\u00b2\u00bd\u00bb\u00ad \u00bf\u00b2\u00bc \u00cc\u00bb\u00bd\u00b8\u00b2\u00b1\u00b4\u00b1\u00b9 \u00a7\u00f4 \u00d0\u00bb\u00b2\u00b2\u00ad \u00a7\u00b4\u00aa\u00bf\u00b2\u00b7\u00bf \u00cd\u00ac\u00bf\u00ac\u00bb \u00cb\u00b2\u00b7\u00aa\u00bb\u00ae\u00ad\u00b7\u00ac \u00a7", + "450": "Wide-area Network Acceleration for the Developing World", + "451": "Comparing BitTorrent Clients in the Wild: The Case of Download Speed", + "452": "YAF: Yet Another Flowmeter", + "453": "SpecNet: Spectrum Sensing SansFront\u00ec eres", + "454": "JACKSTRAWS: Picking Command and Control Connections from Bot Traffic", + "455": "PERFORMANCE MEASURES FOR RANKING AND SELECTION PROCEDURES", + "456": "Simplifying Manageability, Scalability and Host Mobility in Large-Scale Enterprise Networks using VEIL-click", + "457": "Retroactive Detection of Malware With Applications to Mobile Platforms", + "458": "EVE: Verifying Correct Execution of Cloud-Hosted Web Applications", + "459": "SSLShader: Cheap SSL Acceleration with Commodity Processors", + "460": "An Analysis of Write-in Marks on Optical Scan Ballots", + "461": "deSEO: Combating Search-Result Poisoning", + "462": "Tracking Emigrant Data via Transient Provenance", + "463": "FAST: Quick Application Launch on Solid-State Drives", + "464": "User freedom to attach devices", + "465": "Online Measurement of Large Traffic Aggregates on Commodity Switches", + "466": "SIMULATION MODEL CALIBRATION WITH CORRELATED KNOWLEDGE-GRADIENTS", + "467": "Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message Detection", + "468": "Toward Risk Assessment as a Service in Cloud Environments", + "469": "Show Me the Money: Characterizing Spam-advertised Revenue", + "470": "Putting Out a HIT: Crowdsourcing Malware Installs", + "471": "No Plan Survives Contact: Experience with Cybercrime Measurement", + "472": "Secure Data Preservers for Web Services", + "473": "Making Programs Forget: Enforcing Lifetime For Sensitive Data", + "474": "Usability Analysis of Helios -An Open Source Verifiable Remote Electronic Voting System", + "475": "Behavior-Based Problem Localization for Parallel File Systems", + "476": "Bypassing Internet Censorship for News Broadcasters", + "477": "unknown_477", + "478": "TimeGraph: GPU Scheduling for Real-Time Multi-Tasking Environments", + "479": "Optimizing Data Partitioning for Data-Parallel Computing", + "480": "The \"Platform as a Service\" Model for Networking", + "481": "In Search of I/O-Optimal Recovery from Disk Failures", + "482": "Should Security Researchers Experiment More and Draw More Inferences?", + "483": "Polygraph: System for Dynamic Reduction of False Alerts in Large-Scale IT Service Delivery Environments *", + "484": "Intrusion Recovery Using Selective Re-execution", + "485": "Challenges in Access Right Assignment for Secure Home Networks *", + "486": "Automated and Scalable QoS Control for Network Convergence", + "487": "Pixaxe: A Declarative, Client-Focused Web Application Framework", + "488": "Evaluating Legal Argument Instruction with Graphical Representations using LARGO", + "489": "Provable Security: How feasible is it?", + "490": "Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance", + "491": "The HybrEx Model for Confidentiality and Privacy in Cloud Computing", + "492": "Privacy Leakage in Mobile Online Social Networks", + "493": "DNS Prefetching and Its Privacy Implications: When Good Things Go Bad", + "494": "Log Analysis and Event Correlation Using Variable Temporal Event Correlator (VTEC)", + "495": "CloudSense: Continuous Fine-Grain Cloud Monitoring With Compressive Sensing", + "496": "Experiences on a Design Approach for Interactive Web Applications", + "497": "Multicore OS benchmarks: we can do better", + "498": "Saliency-driven Word Alignment Interpretation for Neural Machine Translation", + "499": "Incorporating a User Model to Improve Detection of Unhelpful Robot Answers", + "500": "Finding Concurrency Errors in Sequential Code -OS-level, In-vivo Model Checking of Process Races", + "501": "SplitX: Split Guest/Hypervisor Execution on Multi-Core", + "502": "Honeybot, Your Man in the Middle for Automated Social Engineering", + "503": "Applying a Reusable Election Threat Model at the County Level", + "504": "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users", + "505": "Spying the World from your Laptop \u2212 Identifying and Profiling Content Providers and Big Downloaders in BitTorrent", + "506": "Slow Down or Sleep, that is the Question", + "507": "Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud", + "508": "AjaxTracker: Active Measurement System for High-Fidelity Characterization of AJAX Applications", + "509": "Balancing Gossip Exchanges in Networks with Firewalls *", + "510": "Compiling X10 to Java", + "511": "Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade", + "512": "Analyzing Web Logs to Detect User-Visible Failures", + "513": "A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility *", + "514": "CloudCmp: Shopping for a Cloud Made Easy", + "515": "Europa: Efficient User Mode Packet Forwarding in Network Virtualization", + "516": "Power Budgeting for Virtualized Data Centers", + "517": "Migration, Assignment, and Scheduling of Jobs in Virtualized Environment", + "518": "On the Effects of Registrar-level Intervention", + "519": "The Data Furnace: Heating Up with Cloud Computing", + "520": "Mathematical Modeling of Competition in Sponsored Search Market", + "521": "Fast Deterministic Distributed Algorithms for Sparse Spanners", + "522": "Cutting MapReduce Cost with Spot Market", + "523": "In-situ MapReduce for Log Processing", + "524": "In-situ MapReduce for Log Processing_524", + "525": "Trade & Cap A Customer-Managed, Market-Based System for Trading Bandwidth Allowances at a Shared Link", + "526": "SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks", + "527": "What papers should I cite from my reading list? User evaluation of a manuscript preparatory assistive task", + "528": "The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness", + "529": "ServerSwitch: A Programmable and High Performance Platform for Data Center Networks", + "530": "Bringing Up Cielo: Experiences with a Cray XE6 System or, Getting Started with Your New 140k Processor System", + "531": "Don't Love Thy Nearest Neighbor", + "532": "Venus: Verification for Untrusted Cloud Storage", + "533": "Collecting Provenance via the Xen Hypervisor", + "534": "Turning Down the LAMP: Software Specialisation for the Cloud", + "535": "Typed Assembly Language for Implementing OS Kernels in SMP/Multi-Core Environments with Interrupts", + "536": "Computing the Margin of Victory in IRV Elections", + "537": "Depot: Cloud storage with minimal trust", + "538": "Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection", + "539": "MOMMIE Knows Best: Systematic Optimizations for Verifiable Distributed Algorithms", + "540": "Challenges in managing implicit and abstract provenance data: experiences with ProvManager", + "541": "The Design and Evolution of Live Storage Migration in VMware ESX", + "542": "StAN: Exploiting Shared Interests without Disclosing Them in Gossip-based Publish/Subscribe *", + "543": "Towards Survivability of Application-Level Multicast", + "544": "Stout: An Adaptive Interface to Scalable Cloud Storage", + "545": "On Dynamic Malware Payloads Aimed at Programmable Logic Controllers", + "546": "Embedded Firmware Diversity for Smart Electric Meters", + "547": "The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion", + "548": "Bringing Provenance to its Full Potential using Causal Reasoning", + "549": "Public and private BitTorrent communities: A measurement study", + "550": "A Study of Practical Deduplication", + "551": "Energy efficiency of mobile clients in cloud computing", + "552": "DEFCON: High-Performance Event Processing with Information Security", + "553": "Incremental workflow improvement through analysis of its data provenance", + "554": "The Structure of Least-Favorable Noise in Gaussian Vector Broadcast Channels", + "555": "The Price of Uncertainty", + "556": "PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval *", + "557": "Dirty Jobs: The Role of Freelance Labor in Web Service Abuse", + "558": "Measuring Online Service Availability Using Twitter", + "559": "Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks", + "560": "Taming the Flying Cable Monster: A Topology Design and Optimization Framework for Data-Center Networks", + "561": "Taming the Flying Cable Monster: A Topology Design and Optimization Framework for Data-Center Networks_561", + "562": "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space", + "563": "TRESOR Runs Encryption Securely Outside RAM", + "564": "SMS of Death: from analyzing to attacking mobile phones on a large scale", + "565": "Multiple Aggregations Over Data Streams_565", + "566": "Learning Markov Network Structure with Decision Trees", + "567": "SilverLine: Data and Network Isolation for Cloud Services", + "568": "unknown_568", + "569": "Non-deterministic parallelism considered useful", + "570": "Scripting the cloud with Skywriting", + "571": "Security Fusion: A New Security Architecture for Resource-Constrained Environments", + "572": "Herbert West -Deanonymizer", + "573": "A Preliminary Analysis of TCP Performance in an Enterprise Network", + "574": "The Margrave Tool for Firewall Analysis", + "575": "PeerMon: A Peer-to-Peer Network Monitoring System", + "576": "Exposing the Lack of Privacy in File Hosting Services", + "577": "Learning Arithmetic Circuits", + "578": "DieHarder: Securing the Heap *", + "579": "Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure", + "580": "Exploiting the hard-working DWARF: Trojan and Exploit Techniques With No Native Executable Code", + "581": "Visual Security Policy for the Web", + "582": "Enabling Consolidation and Scaling Down to Provide Power Management for Cloud Computing", + "583": "Online Event-driven Subsequence Matching over Financial Data Streams", + "584": "Managing State for Ajax-Driven Web Components", + "585": "unknown_585", + "586": "Content Pricing in Peer-to-Peer Networks", + "587": "TrapperKeeper: The Case for Using Virtualization to Add Type Awareness to File Systems", + "588": "Efficient Weight Learning for Markov Logic Networks", + "589": "Verification of Stack Manipulation in the SCIP Processor", + "590": "Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed", + "591": "A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud", + "592": "Security Exercises for the Online Classroom with DETER", + "593": "Blindfold: A System to \"See No Evil\" in Content Discovery", + "594": "Staging Package Deployment via Repository Management", + "595": "Accessible Polling Places for the Visually Impaired: A Compilation of Survey Results", + "596": "ADsafety Type-Based Verification of JavaScript Sandboxing", + "597": "Enabling Security in Cloud Storage SLAs with CloudProof", + "598": "Building Extensible Networks with Rule-Based Forwarding", + "599": "Recursive Random Fields", + "600": "Transactional Consistency and Automatic Management in an Application Data Cache", + "601": "Autonomous storage management for personal devices with PodBase", + "602": "Bazaar: Strengthening user reputations in online marketplaces", + "603": "Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems", + "604": "Piccolo: Building Fast, Distributed Programs with Partitioned Tables", + "605": "Depletable Storage Systems", + "606": "Privacy Preserving OLAP", + "607": "Proactive Re-Optimization", + "608": "Server Operational Cost Optimization for Cloud Computing Service Providers over a Time Horizon", + "609": "Query-Sensitive Embeddings", + "610": "Interdomain Routing as Social Choice", + "611": "Chukwa: A system for reliable large-scale log collection", + "612": "A graphical representation for identifier structure in logs", + "613": "Towards Automated Identification of Security Zone Classification in Enterprise Networks", + "614": "TransMR: Data-Centric Programming Beyond Data Parallelism", + "615": "TritonSort: A Balanced Large-Scale Sorting System", + "616": "JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications", + "617": "Reference Reconciliation in Complex Information Spaces", + "618": "Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records *", + "619": "Sleepless in Seattle No Longer", + "620": "Subscription Dynamics and Competition in Communications Markets", + "621": "Optimal Capacity Sharing of Networks with Multiple Overlays", + "622": "AONT-RS: Blending Security and Performance in Dispersed Storage Systems", + "623": "Privacy-Sensitive VM Retrospection", + "624": "tiqr: a novel take on two-\u00ad-factor authentication", + "625": "Towards a Robust Query Optimizer: A Principled and Practical Approach", + "626": "Gatekeeper: Supporting Bandwidth Guarantees for Multi-tenant Datacenter Networks", + "627": "It's Time for Low Latency", + "628": "Leveraging Cognitive Factors in Securing WWW with CAPTCHA", + "629": "Pr\u00eatPr\u00eat\u00e0 Voter with Confirmation Codes", + "630": "RC2 -A Living Lab for Cloud Computing", + "631": "Exploiting Half-wits: Smarter Storage for Low-Power Devices", + "632": "The Case for Enterprise-Ready Virtual Private Clouds", + "633": "On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned", + "634": "Diagnosing performance changes by comparing request flows", + "635": "Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries", + "636": "FlashVM: Virtual Memory Management on Flash", + "637": "Distance Matters: Geo-social Metrics for Online Social Networks", + "638": "Popularity is everything A new approach to protecting passwords from statistical-guessing attacks", + "639": "Improving throughput for small disk requests with proximal I/O", + "640": "Synoptic: Summarizing System Logs with Refinement", + "641": "Q: Exploit Hardening Made Easy", + "642": "Toward practical and unconditional verification of remote computations", + "643": "Measuring and Fingerprinting Click-Spam in Ad Networks", + "644": "IsoStack -Highly Efficient Network Processing on Dedicated Cores", + "645": "Capo: Recapitulating Storage for Virtual Desktops", + "646": "Getting to Elastic: Adapting a Legacy Vertical Application Environment for Scalability", + "647": "Estimating Peer Similarity using Distance of Shared Files", + "648": "Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability", + "649": "Can the Production Network Be the Testbed?", + "650": "Seawall: Performance Isolation for Cloud Datacenter Networks", + "651": "The Nuts and Bolts of a Forum Spam Automator", + "652": "PIE in the Sky: Online Passive Interference Estimation for Enterprise WLANs", + "653": "dBug: Systematic Evaluation of Distributed Systems", + "654": "COPE: Traffic Engineering in Dynamic Networks", + "655": "Enabling Flow-level Latency Measurements across Routers in Data Centers", + "656": "Proactive Network Management of IPTV Networks", + "657": "A Transparently-Scalable Metadata Service for the Ursa Minor Storage System", + "658": "A Precise Memory Model for Low-Level Bounded Model Checking", + "659": "make world", + "660": "Exception-Less System Calls for Event-Driven Servers", + "661": "FlexSC: Flexible System Call Scheduling with Exception-Less System Calls", + "662": "DarkNOC: Dashboard for Honeypot Management", + "663": "WebCop: Locating Neighborhoods of Malware on the Web", + "664": "Eyo: Device-Transparent Personal Storage", + "665": "Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications", + "666": "Bayesian Combinatorial Auctions", + "667": "Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance", + "668": "BOTMAGNIFIER: Locating Spambots on the Internet", + "669": "Summarizing and Mining Inverse Distributions on Data Streams via Dynamic Inverse Sampling", + "670": "Static Detection of Access Control Vulnerabilities in Web Applications", + "671": "Making the Common Case the Only Case with Anticipatory Memory Allocation", + "672": "Accelerating The Cloud with Heterogeneous Computing", + "673": "Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine", + "674": "Adaptive Memory System over Ethernet", + "675": "FVD: a High-Performance Virtual Machine Image Format for Cloud", + "676": "I rate you. You rate me. Should we do so publicly?", + "677": "Fast Accurate Computation of Large-Scale IP Traffic Matrices from Link Loads", + "678": "SeerSuite: Developing a scalable and reliable application framework for building digital libraries by crawling the web", + "679": "CiteSeer x : a Cloud Perspective", + "680": "Active Learning with the CyberCIEGE Video Game", + "681": "HyperFlow: A Distributed Control Plane for OpenFlow", + "682": "Online migration for geo-distributed storage systems", + "683": "Collusion-resilient Credit-based Reputations for Peer-to-peer Content Distribution", + "684": "Resizable, Scalable, Concurrent Hash Tables via Relativistic Programming", + "685": "The SCADS Director: Scaling a Distributed Storage System Under Stringent Performance Requirements", + "686": "Empirical Virtual Machine Models for Performance Guarantees", + "687": "Truly Non-blocking Writes", + "688": "On the Constancy of Internet Path Properties", + "689": "A Decision-Analytic Approach for P2P Cooperation Policy Setting", + "690": "Wide-Area Route Control for Distributed Services", + "691": "Fine-grained access-control for the Puppet configuration language", + "692": "Efficient Query Computing for Uncertain Possibilistic Databases with Provenance", + "693": "The Case for VOS: The Vector Operating System", + "694": "Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory", + "695": "All Your Droid Are Belong To Us: A Survey of Current Android Attacks", + "696": "Beyond the Best: Real-Time Non-Invasive Collection of BGP Messages", + "697": "A Semantic Framework for Data Analysis in Networked Systems *", + "698": "Exertion-based billing for cloud storage access", + "699": "On the Use and Performance of Content Distribution Networks", + "700": "Forensic Triage for Mobile Phones with DEC0DE", + "701": "Effective Digital Forensics Research is Investigator-Centric", + "702": "Victim Disk First: An Asymmetric Cache to Boost the Performance of Disk Arrays under Faulty Conditions", + "703": "Nested QoS: Providing Flexible Performance in Shared IO Environment", + "704": "A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable", + "705": "Distributed Systems Meet Economics: Pricing in the Cloud", + "706": "OpenFlow-Based Server Load Balancing Gone Wild", + "707": "Using Hierarchal Change Mining to Manage Network Security Policy Evolution", + "708": "Topology Switching for Data Center Networks", + "709": "Diffusion dynamics of games on online social networks", + "710": "ShadowStream: Performance Evaluation as a Capability in Production Internet Live Streaming Networks", + "711": "Anycast as a Load Balancing feature", + "712": "Towards Client-side HTML Security Policies", + "713": "SliceTime: A platform for scalable and accurate network emulation", + "714": "jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components", + "715": "Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise *", + "716": "Unshackle the Cloud!", + "717": "Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip", + "718": "unknown_718", + "719": "Fine-Grained Censorship Mapping Information Sources, Legality and Ethics", + "720": "Energy Attack on Server Systems", + "721": "Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET", + "722": "Bypassing Races in Live Applications with Execution Filters", + "723": "OFRewind: Enabling Record and Replay Troubleshooting for Networks", + "724": "Telex: Anticensorship in the Network Infrastructure", + "725": "SiLo: A Similarity-Locality based Near-Exact Deduplication Scheme with Low RAM Overhead and High Throughput", + "726": "Andbot: Towards Advanced Mobile Botnets", + "727": "Ad Hoc Synchronization Considered Harmful", + "728": "A Scheduling Framework that Makes any Disk Schedulers Non-work-conserving solely based on Request Characteristics", + "729": "Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities using Machine Learning", + "730": "ORDER: Object centRic DEterministic Replay for Java", + "731": "AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets *", + "732": "FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road", + "733": "SSD Characterization: From Energy Consumption's Perspective", + "734": "Profiling Network Performance for Multi-Tier Data Center Applications", + "735": "Context-based Online Configuration-Error Detection", + "736": "The Datacenter Needs an Operating System", + "737": "Spark: Cluster Computing with Working Sets", + "738": "Debug Determinism: The Sweet Spot for Replay-Based Debugging", + "739": "SVC: Selector-based View Composition for Web Frameworks", + "740": "A Method to Build and Analyze Scientific Workflows from Provenance through Process Mining", + "741": "Provenance In Dynamic Data Systems *", + "742": "Dynamic Resource Allocation for Spot Markets in Clouds", + "743": "Contracts: Practical Contribution Incentives for P2P Live Streaming", + "744": "Inflight Modifications of Content: Who are the Culprits?", + "745": "An Evaluation of Per-Chip Nonuniform Frequency Scaling on Multicores *", + "746": "Voice of the Customers: Mining Online Customer Reviews for Product Feature-based Ranking", + "747": "Low Cost Working Set Size Tracking *", + "748": "Orion: Shortest Path Estimation for Large Social Graphs", + "749": "FastScale: Accelerate RAID Scaling by Minimizing Data Migration", + "750": "TAP: Time-aware Provenance for Distributed Systems", + "751": "Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives", + "752": "Maximizing Efficiency By Trading Storage for Computation \u2020", + "753": "Lightweight Encryption for Email", + "754": "Incentive-Compatible Opportunistic Routing for Wireless Networks", + "755": "Efficient Receipt-Free Ballot Casting Resistant to Covert Channels", + "756": "Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios", + "757": "Centrifuge: Integrated Lease Management and Partitioning for Cloud Services", + "758": "Volley: Automated Data Placement for Geo-Distributed Cloud Services", + "759": "EndRE: An End-System Redundancy Elimination Service for Enterprises", + "760": "NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge", + "761": "Storage Performance Isolation: An Investigation of Contemporary I/O Schedulers", + "762": "Generating Realistic Impressions for File-System Benchmarking", + "763": "Generating Realistic Impressions for File-System Benchmarking_763", + "764": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Scheduling and Simulation: How to Upgrade Distributed Systems", + "765": "P4P: Provider Portal for Applications", + "766": "Hedera: Dynamic Flow Scheduling for Data Center Networks", + "767": "What Ought A Program Committee To Do?", + "768": "An Architecture for Developing Behavioral History", + "769": "Interstate Voter Registration Database Matching: The Oregon-Washington 2008 Pilot Project *", + "770": "Cheap and Large CAMs for High Performance Data-Intensive Networked Systems", + "771": "Cloud analytics: Do we really need to reinvent the storage stack?", + "772": "Capture, conversion, and analysis of an intense NFS workload", + "773": "Towards a Model of Computer Systems Research", + "774": "HoneySpam: Honeypots fighting spam at the source", + "775": "Automating Voting Terminal Event Log Analysis", + "776": "Managing Energy and Server Resources in Hosting Centers", + "777": "Evaluating the Performance Limitations of MPMD Communication", + "778": "A Conceptual Model and Predicate Language for Data Selection and Projection Based on Provenance", + "779": "Mentoring talent in IT security -A case study", + "780": "Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom", + "781": "Weighted parsing for grammar-based language models", + "782": "Development of Peer Instruction Questions for Cybersecurity Education", + "783": "Scalable and lightweight CTF infrastructures using application containers", + "784": "A Tool for Teaching Reverse Engineering", + "785": "On the design of security games: from frustrating to engaging learning", + "786": "Self-efficacy in Cybersecurity Tasks and its Relationship with Cybersecurity Competition and Work-related Outcomes", + "787": "Finding the Balance Between Guidance and Independence in Cybersecurity Exercises", + "788": "A Precise and Efficient Evaluation of the Proximity between Web Clients and their Local DNS Servers", + "789": "Teaching Computer Science with Cybersecurity Education Built-in", + "790": "Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education", + "791": "Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story", + "792": "Lowering the Barriers to Capture The Flag Administration and Participation", + "793": "On the Practical Computational Power of Finite Precision RNNs for Language Recognition", + "794": "Labtainers: A Docker-based Framework for Cybersecurity Labs", + "795": "Peer Instruction for Digital Forensics", + "796": "CTF: State-of-the-Art and Building the Next Generation", + "797": "The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance", + "798": "InfoSec Cinema: Using Films for Information Security Teaching", + "799": "SatelliteLab: Adding Heterogeneity to Planetary-Scale Network Testbeds", + "800": "King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing", + "801": "Phishing Attacks: Learning by Doing", + "802": "Lowering the Barriers to Industrial Control System Security with GRFICS", + "803": "Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks", + "804": "Authenticity, Ethicality, and Motivation: A Formal Evaluation of a 10-week Computer Security Alternate Reality Game for CS Undergraduates", + "805": "Teaching with angr: A Symbolic Execution Curriculum and CTF *", + "806": "Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition", + "807": "On Auditing Elections When Precincts Have Different Sizes", + "808": "Abstractions for Usable Information Flow Control in Aeolus", + "809": "Building a power-proportional software router", + "810": "PeerReview: Practical Accountability for Distributed Systems", + "811": "Generating Realistic Datasets for Deduplication Analysis", + "812": "Rivet: Browser-agnostic Remote Debugging for Web Applications", + "813": "Software Techniques for Avoiding Hardware Virtualization Exits", + "814": "Characterizing the Impact of Geometric Properties of Word Embeddings on Task Performance", + "815": "The Click2NetFPGA Toolchain", + "816": "Revisiting Software Zero-Copy for Web-caching Applications with Twin Memory Allocation *", + "817": "Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems", + "818": "AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring", + "819": "A Scalable Server for 3D Metaverses", + "820": "Erasure Coding in Windows Azure Storage", + "821": "The Case for Byzantine Fault Detection", + "822": "Managing Large Graphs on Multi-Cores With Graph Awareness", + "823": "Practical Hardening of Crash-Tolerant Systems", + "824": "Composable Reliability for Asynchronous Systems", + "825": "An Empirical Study of Memory Sharing in Virtual Machines", + "826": "MemProf: a Memory Profiler for NUMA Multicore Systems", + "827": "Trickle: Rate Limiting YouTube Video Streaming", + "828": "Remote Core Locking: Migrating Critical-Section Execution to Improve the Performance of Multithreaded Applications", + "829": "Tolerating Overload Attacks Against Packet Capturing Systems", + "830": "Toward Efficient Querying of Compressed Network Payloads", + "831": "Demand Based Hierarchical QoS Using Storage Resource Pools", + "832": "Monarch: A Tool to Emulate Transport Protocol Flows over the Internet at Large", + "833": "Primary Data Deduplication -Large Scale Study and System Design", + "834": "Enforcing Murphy's Law for Advance Identification of Run-time Failures *", + "835": "High Performance Vehicular Connectivity with Opportunistic Erasure Coding", + "836": "Design and Implementation of an Embedded Python Run-Time System", + "837": "Gdev: First-Class GPU Resource Management in the Operating System", + "838": "Mosh: An Interactive Remote Shell for Mobile Clients", + "839": "Wimpy Nodes with 10GbE: Leveraging One-Sided Operations in Soft-RDMA to Boost Memcached", + "840": "AddressSanitizer: A Fast Address Sanity Checker", + "841": "TROPIC: Transactional Resource Orchestration Platform In the Cloud", + "842": "The Forgotten 'Uncore': On the Energy-Efficiency of Heterogeneous Cores", + "843": "Having your Cake and Eating it too: Routing Security with Privacy Protections", + "844": "Seagull: Intelligent Cloud Bursting for Enterprise Applications", + "845": "Server-assisted Latency Management for Wide-area Distributed Systems", + "846": "Software Persistent Memory", + "847": "Dynamic Reconfiguration of Primary/Backup Clusters", + "848": "Surviving congestion in geo-distributed storage systems", + "849": "Incorporating Satellite Documents into Co-citation Networks for Scientific Paper Searches", + "850": "Efficient and Scalable Paravirtual I/O System", + "851": "I/O Stack Optimization for Smartphones", + "852": "DEFINED: Deterministic Execution for Interactive Control-Plane Debugging", + "853": "Characterization of Incremental Data Changes for Efficient Data Protection", + "854": "Optimistic Replication for Internet Data Services", + "855": "Optimizing VM Checkpointing for Restore Performance in VMware ESXi", + "856": "Open access to the Proceedings of USENIX ATC '14: 2014 USENIX Annual Technical Conference is sponsored by USENIX. ShuffleWatcher: Shuffle-aware Scheduling in Multi-tenant MapReduce Clusters ShuffleWatcher: Shuffle-aware Scheduling in Multi-tenant MapReduce Clusters*", + "857": "Medusa: Managing Concurrency and Communication in Embedded Systems Medusa: Managing Concurrency and Communication in Embedded Systems", + "858": "Sirius: Distributing and Coordinating Application Reference Data Sirius: Distributing and Coordinating Application Reference Data", + "859": "Making State Explicit for Imperative Big Data Processing Making State Explicit for Imperative Big Data Processing", + "860": "Exploiting Bounded Staleness to Speed Up Big Data Analytics Exploiting bounded staleness to speed up Big Data analytics", + "861": "Gleaner: Mitigating the Blocked-Waiter Wakeup Problem for Virtualized Multicore Applications Gleaner: Mitigating the Blocked-Waiter Wakeup Problem for Virtualized Multicore Applications", + "862": "Open access to the Proceedings of USENIX ATC '14: 2014 USENIX Annual Technical Conference is sponsored by USENIX. Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information", + "863": "Large Pages May Be Harmful on NUMA Systems Large Pages May Be Harmful on NUMA Systems", + "864": "Missive: Fast Application Launch From an Untrusted Buffer Cache Missive: Fast Application Launch From an Untrusted Buffer Cache", + "865": "Bridging the Gap between Legacy Services and Web Services", + "866": "ELF: Efficient Lightweight Fast Stream Processing at Scale ELF: Efficient Lightweight Fast Stream Processing at Scale", + "867": "FlexECC: Partially Relaxing ECC of MLC SSD for Better Cache Performance FlexECC: Partially Relaxing ECC of MLC SSD for Better Cache Performance", + "868": "Pythia: Diagnosing Performance Problems in Wide Area Providers Pythia: Diagnosing Performance Problems in Wide Area Providers", + "869": "Efficient Tracing of Cold Code via Bias-Free Sampling Efficient Tracing of Cold Code via Bias-Free Sampling", + "870": "OSv-Optimizing the Operating System for Virtual Machines OS v -Optimizing the Operating System for Virtual Machines", + "871": "Panopticon: Reaping the Benefits of Incremental SDN Deployment in Enterprise Networks Panopticon: Reaping the Benefits of Incremental SDN Deployment in Enterprise Networks", + "872": "Automating the Choice of Consistency Levels in Replicated Systems Automating the choice of consistency levels in replicated systems", + "873": "Nitro: A Capacity-Optimized SSD Cache for Primary Storage Nitro: A Capacity-Optimized SSD Cache for Primary Storage", + "874": "MiniBox: A Two-Way Sandbox for x86 Native Code MiniBox: A Two-Way Sandbox for x86 Native Code", + "875": "XvMotion: Unified Virtual Machine Migration over Long Distance XvMotion: Unified Virtual Machine Migration over Long Distance", + "876": "Differential Privacy Under Fire_876", + "877": "vCacheShare: Automated Server Flash Cache Space Management in a Virtualization Environment vCacheShare: Automated Server Flash Cache Space Management in a Virtualization Environment", + "878": "Insight: In-situ Online Service Failure Path Inference in Production Computing Infrastructures Insight: In-situ Online Service Failure Path Inference in Production Computing Infrastructures", + "879": "Reliable Writeback for Client-side Flash Caches Reliable Writeback for Client-side Flash Caches", + "880": "A Modular and Efficient Past State System for Berkeley DB A Modular and Efficient Past State System for Berkeley DB *", + "881": "Open access to the Proceedings of USENIX ATC '14: 2014 USENIX Annual Technical Conference is sponsored by USENIX. Flash on Rails: Consistent Flash Performance through Redundancy Flash on Rails: Consistent Flash Performance through Redundancy", + "882": "Implementing a Leading Loads Performance Predictor on Commodity Processors Implementing a Leading Loads Performance Predictor on Commodity Processors", + "883": "BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks", + "884": "GPUvm: Why Not Virtualizing GPUs at the Hypervisor? GPUvm: Why Not Virtualizing GPUs at the Hypervisor?", + "885": "A Full GPU Virtualization Solution with Mediated Pass-Through A Full GPU Virtualization Solution with Mediated Pass-Through", + "886": "GASPP: A GPU-Accelerated Stateful Packet Processing Framework GASPP: A GPU-Accelerated Stateful Packet Processing Framework", + "887": "Accountable Virtual Machines_887", + "888": "Linear Programming Boosting for Uneven Datasets", + "889": "The TURBO Diaries: Application-controlled Frequency Scaling Explained The TURBO Diaries: Application-controlled Frequency Scaling Explained", + "890": "Application-Defined Decentralized Access Control Application-Defined Decentralized Access Control", + "891": "Post Retraction Citations in Context", + "892": "Bibliometrics, Information Retrieval and Natural Language Processing: Natural Synergies to Support Digital Library Research", + "893": "Identifying Trends in Enterprise Data Protection Systems Identifying Trends in Enterprise Data Protection Systems", + "894": "Tiered Replication: A Cost-effective Alternative to Full Cluster Geo-replication Tiered Replication: A Cost-effective Alternative to Full Cluster Geo-replication", + "895": "Systematically Exploring the Behavior of Control Programs Systematically Exploring the Behavior of Control Programs", + "896": "Hawk: Hybrid Datacenter Scheduling Hawk: Hybrid Datacenter Scheduling", + "897": "Slipstream: Automatic Interprocess Communication Optimization Slipstream: Automatic Interprocess Communication Optimization", + "898": "Log 2 : A Cost-Aware Logging Mechanism for Performance Diagnosis Log 2 : A Cost-Aware Logging Mechanism for Performance Diagnosis", + "899": "NetReview: Detecting when interdomain routing goes wrong", + "900": "Boosting GPU Virtualization Performance with Hybrid Shadow Page Tables Boosting GPU Virtualization Performance with Hybrid Shadow Page Tables", + "901": "Bistro: Scheduling Data-Parallel Jobs Against Live Production Systems Bistro: Scheduling Data-Parallel Jobs Against Live Production Systems", + "902": "NightWatch: Integrating Lightweight and Transparent Cache Pollution Control into Dynamic Memory Allocation Systems NightWatch: Integrating Lightweight and Transparent Cache Pollution Control into Dynamic Memory Allocation Systems", + "903": "LPD: Low Power Display Mechanism for Mobile and Wearable Devices LPD: Low Power Display Mechanism for Mobile and Wearable Devices", + "904": "MetaSync: File Synchronization Across Multiple Untrusted Storage Services MetaSync: File Synchronization Across Multiple Untrusted Storage Services", + "905": "Callisto-RTS: Fine-Grain Parallel Loops Callisto-RTS : Fine-Grain Parallel Loops", + "906": "LAMA: Optimized Locality-aware Memory Allocation for Key-value Cache LAMA: Optimized Locality-aware Memory Allocation for Key-value Cache", + "907": "Spartan: A Distributed Array Framework with Smart Tiling Spartan: A Distributed Array Framework with Smart Tiling", + "908": "WearDrive: Fast and Energy-Efficient Storage for Wearables WearDrive: Fast and Energy-Efficient Storage for Wearables", + "909": "Shoal: Smart Allocation and Replication of Memory For Parallel Programs Shoal: smart allocation and replication of memory for parallel programs", + "910": "Fine-Grain Performance Scaling of Soft Vector Processors", + "911": "SpanFS: A Scalable File System on Fast Storage Devices SpanFS: A Scalable File System on Fast Storage Devices", + "912": "Mercury: Hybrid Centralized and Distributed Scheduling in Large Shared Clusters Mercury: Hybrid Centralized and Distributed Scheduling in Large Shared Clusters", + "913": "Request-Oriented Durable Write Caching for Application Performance Request-Oriented Durable Write Caching for Application Performance", + "914": "Accurate Latency-based Congestion Feedback for Datacenters Accurate Latency-based Congestion Feedback for Datacenters", + "915": "WALDIO: Eliminating the Filesystem Journaling in Resolving the Journaling of Journal Anomaly WALDIO: Eliminating the Filesystem Journaling in Resolving the Journaling of Journal Anomaly", + "916": "Thread and Memory Placement on NUMA Systems: Asymmetry Matters Thread and Memory Placement on NUMA Systems: Asymmetry Matters", + "917": "CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal", + "918": "Pyro: A Spatial-Temporal Big-Data Storage System Pyro: A Spatial-Temporal Big-Data Storage System", + "919": "Fence: Protecting Device Availability With Uniform Resource Control Fence: Protecting Device Availability With Uniform Resource Control", + "920": "NVMKV: A Scalable, Lightweight, FTL-aware Key-Value Store NVMKV: A Scalable, Lightweight, FTL-aware Key-Value Store", + "921": "TLM POWER3: Power Estimation Methodology for SystemC TLM 2.0", + "922": "Selectively Taming Background Android Apps to Improve Battery Lifetime Selectively Taming Background Android Apps to Improve Battery Lifetime", + "923": "Lightweight Application-Level Crash Consistency on Transactional Flash Storage Lightweight Application-Level Crash Consistency on Transactional Flash Storage", + "924": "U-root: A Go-based, Firmware Embeddable Root File System with On-demand Compilation U-root: A Go-based, firmware embeddable root file system with on-demand compilation", + "925": "Latency-Tolerant Software Distributed Shared Memory Latency-Tolerant Software Distributed Shared Memory", + "926": "Mahimahi: Accurate Record-and-Replay for HTTP Mahimahi: Accurate Record-and-Replay for HTTP", + "927": "Bolt: Faster Reconfiguration in Operating Systems Bolt: Faster Reconfiguration in Operating Systems", + "928": "Utilizing the IOMMU Scalably Utilizing the IOMMU Scalably", + "929": "Memory-Centric Data Storage for Mobile Systems Memory-Centric Data Storage for Mobile Systems", + "930": "Lamassu: Storage-Efficient Host-Side Encryption Lamassu: Storage-Efficient Host-Side Encryption", + "931": "Surviving Peripheral Failures in Embedded Systems Surviving Peripheral Failures in Embedded Systems", + "932": "Automated Hardware Synthesis from Formal Specification using SAT solvers", + "933": "Experience with Rules-Based Programming for Distributed, Concurrent, Fault-Tolerant Code Experience with Rules-Based Programming for Distributed, Concurrent, Fault-Tolerant Code", + "934": "Secure Deduplication of General Computations Secure Deduplication of General Computations", + "935": "Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications", + "936": "GraphQ: Graph Query Processing with Abstraction Refinement-Scalable and Programmable Analytics over Very Large Graphs on a Single PC GraphQ: Graph Query Processing with Abstraction Refinement Scalable and Programmable Analytics over Very Large Graphs on a Single PC", + "937": "SecPod: a Framework for Virtualization-based Security Systems SecPod: A Framework for Virtualization-based Security Systems", + "938": "LSM-trie: An LSM-tree-based Ultra-Large Key-Value Store for Small Data LSM-trie: An LSM-tree-based Ultra-Large Key-Value Store for Small Data", + "939": "GridGraph: Large-Scale Graph Processing on a Single Machine Using 2-Level Hierarchical Partitioning GridGraph: Large-Scale Graph Processing on a Single Machine Using 2-Level Hierarchical Partitioning", + "940": "Editorial for the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL) at JCDL 2016", + "941": "MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate Computing MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate Computing", + "942": "Caching Doesn't Improve Mobile Web Performance (Much) Caching Doesn't Improve Mobile Web Performance (Much)", + "943": "DATA PARALLEL FPGA WORKLOADS: SOFTWARE VERSUS HARDWARE", + "944": "Secure and Efficient Application Monitoring and Replication", + "945": "FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication", + "946": "Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads Using Simultaneous Multithreading Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads using Simultaneous Multithreading", + "947": "ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash Devices ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash Devices", + "948": "Energy Discounted Computing on Multicore Smartphones Energy Discounted Computing on Multicore Smartphones", + "949": "StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs", + "950": "Modelling Valence and Arousal in Facebook posts", + "951": "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. Blockstack: A Global Naming and Storage System Secured by Blockchains Blockstack: A Global Naming and Storage System Secured by Blockchains", + "952": "Getting Back Up: Understanding How Enterprise Data Backups Fail Getting Back Up: Understanding How Enterprise Data Backups Fail", + "953": "Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection", + "954": "VESPA: Portable, Scalable, and Flexible FPGA-Based Vector Processors", + "955": "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. Horton Tables: Fast Hash Tables for In-Memory Data-Intensive Computing Horton Tables: Fast Hash Tables for In-Memory Data-Intensive Computing", + "956": "Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality", + "957": "Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices", + "958": "Apps with Hardware: Enabling Run-time Architectural Customization in Smart Phones Apps with Hardware: Enabling Run-time Architectural Customization in Smart Phones", + "959": "Unlocking Energy Unlocking Energy", + "960": "Ginseng: Market-Driven LLC Allocation Ginseng : Market-Driven LLC Allocation", + "961": "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. Multicore Locks: The Case Is Not Closed Yet Multicore Locks: The Case is not Closed Yet", + "962": "Kinetic Modeling of Data Eviction in Cache Kinetic Modeling of Data Eviction in Cache", + "963": "An Evolutionary Study of Linux Memory Management for Fun and Profit An Evolutionary Study of Linux Memory Management for Fun and Profit", + "964": "Unsafe Time Handling in Smartphones Unsafe Time Handling in Smartphones", + "965": "Improving Memory System Performance for Soft Vector Processors", + "966": "Design Guidelines for High Performance RDMA Systems Design Guidelines for High Performance RDMA Systems", + "967": "Instant OS Updates via Userspace Checkpoint-and-Restart Instant OS Updates via Userspace Checkpoint-and-Restart", + "968": "SLIK: Scalable Low-Latency Indexes for a Key-Value Store SLIK: Scalable Low-Latency Indexes for a Key-Value Store", + "969": "Subversive-C: Abusing and Protecting Dynamic Message Dispatch Subversive-C: Abusing and Protecting Dynamic Message Dispatch", + "970": "Modular Composition of Coordination Services Modular Composition of Coordination Services", + "971": "Greening the Video Transcoding Service with Low-Cost Hardware Transcoders Greening The Video Transcoding Service With Low-Cost Hardware Transcoders 1", + "972": "Understanding Manycore Scalability of File Systems Understanding Manycore Scalability of File Systems", + "973": "Balancing CPU and Network in the Cell Distributed B-Tree Store Balancing CPU and Network in the Cell Distributed B-Tree Store", + "974": "SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering Precision SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering Precision", + "975": "Callinicos: Robust Transactional Storage for Distributed Data Structures Callinicos: Robust Transactional Storage for Distributed Data Structures", + "976": "New Ternary and Quaternary Sequences with Two-Level Autocorrelation", + "977": "Tucana: Design and Implementation of a Fast and Efficient Scale-up Key-value Store Tucana: Design and implementation of a fast and efficient scale-up key-value store", + "978": "Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions", + "979": "Satellite: Joint Analysis of CDNs and Network-Level Interference Satellite: Joint Analysis of CDNs and Network-Level Interference", + "980": "Beam: Ending Monolithic Applications for Connected Devices Beam: Ending Monolithic Applications for Connected Devices", + "981": "Cheap and Available State Machine Replication Cheap and Available State Machine Replication", + "982": "Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core Sharing Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core Sharing", + "983": "Replex: A Scalable, Highly Available Multi-Index Data Store Replex: A Scalable, Highly Available Multi-Index Data Store", + "984": "Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph Processing Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph Processing", + "985": "A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT) A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT)", + "986": "Scalable In-Memory Transaction Processing with HTM Scalable In-Memory Transaction Processing with HTM", + "987": "Fast Discrete Fourier Spectra Attacks on Stream Ciphers", + "988": "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory Space gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory Space", + "989": "FLICK: Developing and Running Application- Specific Network Services FLICK: Developing and Running Application-Specific Network Services", + "990": "Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data Centers Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data Centers", + "991": "SoftFlow: A Middlebox Architecture for Open vSwitch SoftFlow: A Middlebox Architecture for Open vSwitch", + "992": "Squeezing out All the Value of Loaded Data: An Out-of-core Graph Processing System with Reduced Disk I/O Squeezing out All the Value of Loaded Data: An Out-of-core Graph Processing System with Reduced Disk I/O", + "993": "Optimizing the TLB Shootdown Algorithm with Page Access Tracking Optimizing the TLB Shootdown Algorithm with Page Access Tracking", + "994": "TRIAD: Creating Synergies Between Memory, Disk and Log in Log Structured Key-Value Stores TRIAD: Creating Synergies Between Memory, Disk and Log in Log Structured Key-Value Stores", + "995": "SPIN: Seamless Operating System Integration of Peer-to-Peer DMA Between SSDs and GPUs SPIN: Seamless Operating System Integration of Peer-to-Peer DMA Between SSDs and GPUs", + "996": "Hyperbolic Caching: Flexible Caching for Web Applications Hyperbolic Caching: Flexible Caching for Web Applications", + "997": "Persona: A High-Performance Bioinformatics Framework Persona: A High-Performance Bioinformatics Framework", + "998": "YAPA: A generic tool for computing intruder knowledge", + "999": "Data Integration with Dependent Sources", + "1000": "Preemptive, Low Latency Datacenter Scheduling via Lightweight Virtualization Preemptive, Low Latency Datacenter Scheduling via Lightweight Virtualization", + "1001": "Giza: Erasure Coding Objects across Global Data Centers Giza: Erasure Coding Objects across Global Data Centers", + "1002": "Memshare: a Dynamic Multi-tenant Key-value Cache Memshare: a Dynamic Multi-tenant Key-value Cache", + "1003": "Optimizing the Design and Implementation of the Linux ARM Hypervisor Optimizing the Design and Implementation of the Linux ARM Hypervisor", + "1004": "cHash: Detection of Redundant Compilations via AST Hashing cHash: Detection of Redundant Compilations via AST Hashing", + "1005": "Soft Updates Made Simple and Fast on Non-volatile Memory Soft Updates Made Simple and Fast on Non-volatile Memory", + "1006": "Multi-Hypervisor Virtual Machines: Enabling an Ecosystem of Hypervisor-level Services Multi-hypervisor Virtual Machines: Enabling an Ecosystem of Hypervisor-level Services", + "1007": "Unobtrusive Deferred Update Stabilization for Efficient Geo-Replication Unobtrusive Deferred Update Stabilization for Efficient Geo-Replication", + "1008": "Pricing Intra-Datacenter Networks with Over- Committed Bandwidth Guarantee Pricing Intra-Datacenter Networks with Over-Committed Bandwidth Guarantee", + "1009": "Improving File System Performance of Mobile Storage Systems Using a Decoupled Defragmenter Improving File System Performance of Mobile Storage Systems Using a Decoupled Defragmenter", + "1010": "Reputation in Privacy Enhancing T Reputation in Privacy Enhancing T Reputation in Privacy Enhancing T Reputation in Privacy Enhancing T Reputation in Privacy Enhancing Technologies echnologies echnologies echnologies echnologies An Example: Remailer Networks An Example: Remailer Networks An Example: Remailer Networks An Example: Remailer Networks An Example: Remailer Networks", + "1011": "High-Resolution Side Channels for Untrusted Operating Systems High-Resolution Side Channels for Untrusted Operating Systems", + "1012": "GPU Taint Tracking GPU Taint Tracking", + "1013": "Log-Structured Non-Volatile Main Memory Log-Structured Non-Volatile Main Memory", + "1014": "Towards Production-Run Heisenbugs Reproduction on Commercial Hardware Towards Production-Run Heisenbugs Reproduction on Commercial Hardware", + "1015": "Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling", + "1016": "Scalable NUMA-aware Blocking Synchronization Primitives Scalable NUMA-aware Blocking Synchronization Primitives", + "1017": "CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems CAB-FUZZ: Practical Concolic Testing Techniques for COTS Operating Systems", + "1018": "Falcon: Scaling IO Performance in Multi-SSD Volumes Falcon: Scaling IO Performance in Multi-SSD Volumes", + "1019": "Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories", + "1020": "PARIX: Speculative Partial Writes in Erasure-Coded Systems PARIX: Speculative Partial Writes in Erasure-Coded Systems", + "1021": "Secure and Efficient Network Access", + "1022": "Repair Pipelining for Erasure-Coded Storage Repair Pipelining for Erasure-Coded Storage", + "1023": "Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path", + "1024": "Glamdring: Automatic Application Partitioning for Intel SGX Glamdring: Automatic Application Partitioning for Intel SGX", + "1025": "Octopus: an RDMA-enabled Distributed Persistent Memory File System Octopus: an RDMA-enabled Distributed Persistent Memory File System", + "1026": "Garaph: Efficient GPU-accelerated Graph Processing on a Single Machine with Balanced Replication Garaph: Efficient GPU-accelerated Graph Processing on a Single Machine with Balanced Replication", + "1027": "Everything you always wanted to know about multicore graph processing but were afraid to ask Everything you always wanted to know about multicore graph processing but were afraid to ask", + "1028": "Execution Templates: Caching Control Plane Decisions for Strong Scaling of Data Analytics Execution Templates: Caching Control Plane Decisions for Strong Scaling of Data Analytics", + "1029": "Scaling Distributed File Systems in Resource-Harvesting Datacenters Scaling Distributed File Systems in Resource-Harvesting Datacenters *", + "1030": "Engineering Record And Replay For Deployability Engineering Record And Replay For Deployability", + "1031": "iJournaling: Fine-Grained Journaling for Improving the Latency of Fsync System Call iJournaling: Fine-Grained Journaling for Improving the Latency of Fsync System Call", + "1032": "Curvature-Based Computation of Antipodal Grasps", + "1033": "deTector: a Topology-aware Monitoring System for Data Center Networks deTector: a Topology-aware Monitoring System for Data Center Networks", + "1034": "A DSL Approach to Reconcile Equivalent Divergent Program Executions A DSL Approach to Reconcile Equivalent Divergent Program Executions", + "1035": "The RCU-Reader Preemption Problem in VMs The RCU-Reader Preemption Problem in VMs", + "1036": "PrivApprox: Privacy-Preserving Stream Analytics PrivApprox: Privacy-Preserving Stream Analytics", + "1037": "E-Team: Practical Energy Accounting for Multi-Core Systems E-Team: Practical Energy Accounting for Multi-Core Systems", + "1038": "Protego: Cloud-Scale Multitenant IPsec Gateway Protego: Cloud-Scale Multitenant IPsec Gateway", + "1039": "Titan: Fair Packet Scheduling for Commodity Multiqueue NICs Titan: Fair Packet Scheduling for Commodity Multiqueue NICs", + "1040": "SmartCuckoo: A Fast and Cost-Efficient Hashing Index Scheme for Cloud Storage Systems SmartCuckoo: A Fast and Cost-Efficient Hashing Index Scheme for Cloud Storage Systems", + "1041": "Understanding Security Implications of Using Containers in the Cloud Understanding Security Implications of Using Containers in the Cloud", + "1042": "Popularity Prediction of Facebook Videos for Higher Quality Streaming Popularity Prediction of Facebook Videos for Higher Quality Streaming", + "1043": "Localization on Curved Objects Using Tactile Information", + "1044": "Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX", + "1045": "Cache Modeling and Optimization using Miniature Simulations Cache Modeling and Optimization using Miniature Simulations", + "1046": "Elastic Memory Management for Cloud Data Analytics Elastic Memory Management for Cloud Data Analytics", + "1047": "Replication-driven Live Reconfiguration for Fast Distributed Transaction Processing Replication-driven Live Reconfiguration for Fast Distributed Transaction Processing", + "1048": "HiKV: A Hybrid Index Key-Value Store for DRAM-NVM Memory Systems HiKV: A Hybrid Index Key-Value Store for DRAM-NVM Memory Systems", + "1049": "Bunshin: Compositing Security Mechanisms through Diversification BUNSHIN: Compositing Security Mechanisms through Diversification", + "1050": "Poseidon: An Efficient Communication Architecture for Distributed Deep Learning on GPU Clusters Poseidon: An Efficient Communication Architecture for Distributed Deep Learning on GPU Clusters", + "1051": "Source Phrase Segmentation and Translation for Japanese-English Translation Using Dependency Structure", + "1052": "SAND: Towards High-Performance Serverless Computing SAND: Towards High-Performance Serverless Computing", + "1053": "Can't We All Get Along? Redesigning Protection Storage for Modern Workloads Can't We All Get Along? Redesigning Protection Storage for Modern Workloads", + "1054": "Grasping Curved Objects through Rolling", + "1055": "On the diversity of cluster workloads and its impact on research results On the diversity of cluster workloads and its impact on research results", + "1056": "Don't share, Don't lock: Large-scale Software Connection Tracking with Krononat Don't share, Don't lock: Large-scale Software Connection Tracking with Krononat", + "1057": "Getting to the Root of Concurrent Binary Search Tree Performance Getting to the Root of Concurrent Binary Search Tree Performance", + "1058": "DSAC: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules DSAC: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules", + "1059": "Putting the \"Micro\" Back in Microservice Putting the \"Micro\" Back in Microservice", + "1060": "The Battle of the Schedulers: FreeBSD ULE vs. Linux CFS The Battle of the Schedulers: FreeBSD ULE vs. Linux CFS", + "1061": "Towards Better Understanding of Black-box Auto-Tuning: A Comparative Analysis for Storage Systems Towards Better Understanding of Black-box Auto-Tuning: A Comparative Analysis for Storage Systems", + "1062": "Soteria: Automated IoT Safety and Security Analysis SOTERIA: Automated IoT Safety and Security Analysis", + "1063": "DynaMix: Dynamic Mobile Device Integration for Efficient Cross-device Resource Sharing DynaMix: Dynamic Mobile Device Integration for Efficient Cross-device Resource Sharing", + "1064": "HashKV: Enabling Efficient Updates in KV Storage via Hashing HashKV: Enabling Efficient Updates in KV Storage via Hashing", + "1065": "Bound Analysis of Closed Queueing Networks with Workload Burstiness", + "1066": "Locality-Aware Software Throttling for Sparse Matrix Operation on GPUs Locality-Aware Software Throttling for Sparse Matrix Operation on GPUs", + "1067": "Applying Hardware Transactional Memory for Concurrency-Bug Failure Recovery in Production Runs Applying Hardware Transactional Memory for Concurrency-Bug Failure Recovery in Production Runs", + "1068": "Log-Free Concurrent Data Structures Log-Free Concurrent Data Structures *", + "1069": "RAFI: Risk-Aware Failure Identification to Improve the RAS in Erasure-coded Data Centers RAFI: Risk-Aware Failure Identification to Improve the RAS in Erasure-coded Data Centers", + "1070": "Placement of Virtual Containers on NUMA systems: A Practical and Comprehensive Model Placement of Virtual Containers on NUMA systems: A Practical and Comprehensive Model", + "1071": "ClickNF: a Modular Stack for Custom Network Functions ClickNF: a Modular Stack for Custom Network Functions", + "1072": "aiql: Enabling Efficient Attack Investigation from System Monitoring Data AIQL: Enabling Efficient Attack Investigation from System Monitoring Data", + "1073": "HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows", + "1074": "FastTrack: Foreground App-Aware I/O Management for Improving User Experience of Android Smartphones FastTrack: Foreground App-Aware I/O Management for Improving User Experience of Android Smartphones", + "1075": "Application Memory Isolation on Ultra-Low-Power MCUs Application Memory Isolation on Ultra-Low-Power MCUs", + "1076": "Discriminatory Processor Sharing Revisited", + "1077": "Tributary: spot-dancing for elastic services with latency SLOs Tributary: spot-dancing for elastic services with latency SLOs", + "1078": "TxFS: Leveraging File-System Crash Consistency to Provide ACID Transactions TxFS: Leveraging File-System Crash Consistency to Provide ACID Transactions", + "1079": "EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs", + "1080": "Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs", + "1081": "PerfIso: Performance Isolation for Commercial Latency-Sensitive Services PerfIso: Performance Isolation for Commercial Latency-Sensitive Services C\u02d8 alin Iorgulescu* EPFL", + "1082": "Effectively Mitigating I/O Inactivity in vCPU Scheduling Effectively Mitigating I/O Inactivity in vCPU Scheduling", + "1083": "Geriatrix: Aging what you see and what you don't see. A file system aging approach for modern storage systems Geriatrix: Aging what you see and what you don't see A file system aging approach for modern storage systems", + "1084": "Redesigning LSMs for Nonvolatile Memory with NoveLSM Redesigning LSMs for Nonvolatile Memory with NoveLSM", + "1085": "Scaling Guest OS Critical Sections with eCS Scaling Guest OS Critical Sections with eCS", + "1086": "On Smart Query Routing: For Distributed Graph Querying with Decoupled Storage On Smart Query Routing: For Distributed Graph Querying with Decoupled Storage", + "1087": "The Effect of the Initial Window Size and Limited Transmit Algorithm on the Transient Behavior of TCP Transfers", + "1088": "AutoSSD: an Autonomic SSD Architecture AutoSSD: an Autonomic SSD Architecture", + "1089": "Selecta: Heterogeneous Cloud Storage Configuration for Data Analytics Selecta: Heterogeneous Cloud Storage Configuration for Data Analytics", + "1090": "Understanding Ephemeral Storage for Serverless Analytics Understanding Ephemeral Storage for Serverless Analytics", + "1091": "On Fault Tolerance, Locality, and Optimality in Locally Repairable Codes On Fault Tolerance, Locality, and Optimality in Locally Repairable Codes", + "1092": "Accelerating PageRank using Partition-Centric Processing Accelerating PageRank using Partition-Centric Processing", + "1093": "Coccinelle: 10 Years of Automated Evolution in the Linux Kernel Coccinelle: 10 Years of Automated Evolution in the Linux Kernel", + "1094": "Touchstone: Generating Enormous Query-Aware Test Databases Touchstone: Generating Enormous Query-Aware Test Databases", + "1095": "Fine-grained consistency for geo-replicated systems Fine-grained consistency for geo-replicated systems", + "1096": "Siphon: Expediting Inter-Datacenter Coflows in Wide-Area Data Analytics Siphon: Expediting Inter-Datacenter Coflows in Wide-Area Data Analytics", + "1097": "Troubleshooting Transiently-Recurring Errors in Production Systems with Blame-Proportional Logging Troubleshooting Transiently-Recurring Problems in Production Systems with Blame-Proportional Logging", + "1098": "KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes", + "1099": "Kernel-Supported Cost-Effective Audit Logging for Causality Tracking Kernel-Supported Cost-Effective Audit Logging for Causality Tracking", + "1100": "Accurate Timeout Detection Despite Arbitrary Processing Delays Accurate Timeout Detection Despite Arbitrary Processing Delays", + "1101": "SOCK: Rapid Task Provisioning with Serverless-Optimized Containers SOCK: Rapid Task Provisioning with Serverless-Optimized Containers", + "1102": "Varys: Protecting SGX enclaves from practical side-channel attacks Varys Protecting SGX Enclaves From Practical Side-Channel Attacks", + "1103": "SLAOrchestrator: Reducing the Cost of Performance SLAs for Cloud Data Analytics SLAOrchestrator: Reducing the Cost of Performance SLAs for Cloud Data Analytics", + "1104": "TerseCades: Efficient Data Compression in Stream Processing TerseCades: Efficient Data Compression in Stream Processing", + "1105": "MDev-NVMe: A NVMe Storage Virtualization Solution with Mediated Pass-Through MDev-NVMe: A NVMe Storage Virtualization Solution with Mediated Pass-Through", + "1106": "STMS: Improving MPTCP Throughput Under Heterogeneous Networks STMS: Improving MPTCP Throughput Under Heterogeneous Networks", + "1107": "Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow", + "1108": "Stable and Consistent Membership at Scale with Rapid Stable and Consistent Membership at Scale with Rapid", + "1109": "An Efficient Algorithm for the Exact Analysis of Multiclass Queueing Networks with Large Population Sizes", + "1110": "HeatProbe: A Thermal-based Power Meter for Accounting Disaggregated Electricity Usage", + "1111": "Incentives for Sharing in Peer-to-Peer Networks", + "1112": "Tailwind: Fast and Atomic RDMA-based Replication Tailwind: Fast and Atomic RDMA-based Replication", + "1113": "Toward Coordination-free and Reconfigurable Mixed Concurrency Control Toward Coordination-free and Reconfigurable Mixed Concurrency Control", + "1114": "Throwhammer: Rowhammer Attacks over the Network and Defenses Throwhammer: Rowhammer Attacks over the Network and Defenses", + "1115": "Cntr: Lightweight OS Containers CNTR: Lightweight OS Containers", + "1116": "Albis: High-Performance File Format for Big Data Systems Albis: High-Performance File Format for Big Data Systems", + "1117": "Spindle: Informed Memory Access Monitoring Spindle: Informed Memory Access Monitoring", + "1118": "Peeking Behind the Curtains of Serverless Platforms Peeking Behind the Curtains of Serverless Platforms", + "1119": "Fast and Concurrent RDF Queries using RDMA-assisted GPU Graph Exploration Fast and Concurrent RDF Queries using RDMA-assisted GPU Graph Exploration", + "1120": "VideoChef: Efficient Approximation for Streaming Video Processing Pipelines VIDEOCHEF: Efficient Approximation for Streaming Video Processing Pipelines", + "1121": "Cavs: An Efficient Runtime System for Dynamic Neural Networks Cavs: An Efficient Runtime System for Dynamic Neural Networks", + "1122": "Load Balancing in Processor Sharing Systems", + "1123": "Improving Service Availability of Cloud Systems by Predicting Disk Error Improving Service Availability of Cloud Systems by Predicting Disk Error", + "1124": "Pantheon: the training ground for Internet congestion-control research Pantheon: the training ground for Internet congestion-control research", + "1125": "NanoLog: A Nanosecond Scale Logging System NanoLog: A Nanosecond Scale Logging System", + "1126": "DeepCPU: Serving RNN-based Deep Learning Models 10x Faster DeepCPU: Serving RNN-based Deep Learning Models 10x Faster", + "1127": "CGraph: A Correlations-aware Approach for Efficient Concurrent Iterative Graph Processing CGraph: A Correlations-aware Approach for Efficient Concurrent Iterative Graph Processing", + "1128": "Bank of Communications", + "1129": "Chinese-to-Japanese Patent Machine Translation based on Syntactic Pre-ordering for WAT 2015", + "1130": "JumpSwitches: Restoring the Performance of Indirect Branches In the Era of Spectre JumpSwitches: Restoring the Performance of Indirect Branches In the Era of Spectre", + "1131": "M \u00b3 x: Autonomous Accelerators via Context- Enabled Fast-Path Communication M 3 X: Autonomous Accelerators via Context-Enabled Fast-Path Communication", + "1132": "Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers", + "1133": "Chapter 11 FLUID MODEL OF AN INTERNET ROUTER UNDER THE MIMD CONTROL SCHEME", + "1134": "SILK: Preventing Latency Spikes in Log-Structured Merge Key-Value Stores SILK: Preventing Latency Spikes in Log-Structured Merge Key-Value Stores", + "1135": "Extension Framework for File Systems in User space Extension Framework for File Systems in User space", + "1136": "GAIA: An OS Page Cache for Heterogeneous Systems GAIA: An OS Page Cache for Heterogeneous Systems", + "1137": "OPTR: Order-Preserving Translation and Recovery Design for SSDs with a Standard Block Device Interface OPTR: Order-Preserving Translation and Recovery Design for SSDs with a Standard Block Device Interface", + "1138": "BRAVO-Biased Locking for Reader-Writer Locks BRAVO -Biased Locking for Reader-Writer Locks", + "1139": "Data Domain Cloud Tier: Backup here, backup there, deduplicated everywhere! Data Domain Cloud Tier: Backup here, backup there, deduplicated everywhere!", + "1140": "Parallelizable Stack Long Short-Term Memory", + "1141": "NICA: An Infrastructure for Inline Acceleration of Network Applications NICA: An Infrastructure for Inline Acceleration of Network Applications", + "1142": "From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers", + "1143": "EdgEWisE: A Better Stream Processing Engine for the Edge EDGEWISE: A Better Stream Processing Engine for the Edge", + "1144": "How Computers Work: Computational Thinking for Everyone", + "1145": "EROFS: A Compression-friendly Readonly File System for Resource-scarce Devices EROFS: A Compression-friendly Readonly File System for Resource-scarce Devices", + "1146": "Secured Routines: Language-based Construction of Trusted Execution Environments Secured Routines: Language-based Construction of Trusted Execution Environments", + "1147": "Pisces: A Scalable and Efficient Persistent Transactional Memory Pisces: A Scalable and Efficient Persistent Transactional Memory", + "1148": "Transkernel: Bridging Monolithic Kernels to Peripheral Cores Transkernel: Bridging Monolithic Kernels to Peripheral Cores", + "1149": "Track-based Translation Layers for Interlaced Magnetic Recording Track-based Translation Layers for Interlaced Magnetic Recording", + "1150": "Multi-Queue Fair Queuing Multi-Queue Fair Queueing", + "1151": "Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries", + "1152": "SemperOS: A Distributed Capability System SemperOS: A Distributed Capability System", + "1153": "QZFS: QAT Accelerated Compression in File System for Application Agnostic and Cost Efficient Data Storage QZFS: QAT Accelerated Compression in File System for Application Agnostic and Cost Efficient Data Storage", + "1154": "Tangram: Bridging Immutable and Mutable Abstractions for Distributed Data Analytics Tangram: Bridging Immutable and Mutable Abstractions for Distributed Data Analytics", + "1155": "Property-Based Testing and Verification: a Catalog of Classroom Examples", + "1156": "Evaluating File System Reliability on Solid State Drives Evaluating File System Reliability on Solid State Drives", + "1157": "Your Coflow has Many Flows: Sampling them for Fun and Speed Your Cooow Has Many Flows: Sampling Them for Fun and Speed", + "1158": "Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code", + "1159": "Analysis of Large-Scale Multi-Tenant GPU Clusters for DNN Training Workloads Analysis of Large-Scale Multi-Tenant GPU Clusters for DNN Training Workloads", + "1160": "PostMan: Rapidly Mitigating Bursty Traffic by Offloading Packet Processing PostMan: Rapidly Mitigating Bursty Traffic by Offloading Packet Processing", + "1161": "FlexGroup Volumes: A Distributed WAFL File System FlexGroup Volumes: A Distributed WAFL File System", + "1162": "Alleviating Garbage Collection Interference Through Spatial Separation in All Flash Arrays Alleviating Garbage Collection Interference through Spatial Separation in All Flash Arrays *", + "1163": "STRADS-AP: Simplifying Distributed Machine Learning Programming without Introducing a New Programming Model STRADS-AP: Simplifying Distributed Machine Learning Programming without Introducing a New Programming Model", + "1164": "Practical Erase Suspension for Modern Low-latency SSDs Practical Erase Suspension for Modern Low-latency SSDs", + "1165": "R2P2: Making RPCs first-class datacenter citizens R2P2: Making RPCs first-class datacenter citizens", + "1166": "MeCC: Memory Comparison-based Clone Detector *", + "1167": "Everyone Loves File: File Storage Service (FSS) in Oracle Cloud Infrastructure Everyone Loves File: File Storage Service (FSS) in Oracle Cloud Infrastructure", + "1168": "Pre-Select Static Caching and Neighborhood Ordering for BFS-like Algorithms on Disk-based Graph Engines Pre-Select Static Caching and Neighborhood Ordering for BFS-like Algorithms on Disk-based Graph Engines", + "1169": "Asynchronous I/O Stack: A Low-latency Kernel I/O Stack for Ultra-Low Latency SSDs Asynchronous I/O Stack: A Low-latency Kernel I/O Stack for Ultra-Low Latency SSDs", + "1170": "ElasticBF: Elastic Bloom Filter with Hotness Awareness for Boosting Read Performance in Large Key-Value Stores ElasticBF: Elastic Bloom Filter with Hotness Awareness for Boosting Read Performance in Large Key-Value Stores", + "1171": "Accelerating Rule-matching Systems with Learned Rankers Accelerating Rule-matching Systems with Learned Rankers", + "1172": "Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval", + "1173": "simd-x: Programming and Processing of Graph Algorithms on GPUs SIMD-X: Programming and Processing of Graph Algorithms on GPUs", + "1174": "E3: Energy-Efficient Microservices on SmartNIC-Accelerated Servers E3: Energy-Efficient Microservices on SmartNIC-Accelerated Servers", + "1175": "Optimizing CNN Model Inference on CPUs Optimizing CNN Model Inference on CPUs", + "1176": "NeuGraph: Parallel Deep Neural Network Computation on Large Graphs NeuGraph: Parallel Deep Neural Network Computation on Large Graphs", + "1177": "Deriving Invariants by Algorithmic Learning, Decision Procedures, and Predicate Abstraction", + "1178": "Sophia: Online Reconfiguration of Clustered NoSQL Databases for Time-Varying Workloads SOPHIA: Online Reconfiguration of Clustered NoSQL Databases for Time-Varying Workload", + "1179": "Partisan: Scaling the Distributed Actor Runtime PARTISAN: Scaling the Distributed Actor Runtime", + "1180": "Supporting Security Sensitive Tenants in a Bare-Metal Cloud Supporting Security Sensitive Tenants in a Bare-Metal Cloud * \u2020", + "1181": "LXDs: Towards Isolation of Kernel Subsystems LXDs: Towards Isolation of Kernel Subsystems", + "1182": "CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves", + "1183": "IASO: A Fail-Slow Detection and Mitigation Framework for Distributed Storage Services IASO: A Fail-Slow Detection and Mitigation Framework for Distributed Storage Services", + "1184": "Zanzibar: Google's Consistent, Global Authorization System Zanzibar: Google's Consistent, Global Authorization System", + "1185": "StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone", + "1186": "libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK) libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK)", + "1187": "Insider: Designing In-Storage Computing System for Emerging High-Performance Drive INSIDER: Designing In-Storage Computing System for Emerging High-Performance Drive", + "1188": "Attacking Cryptographic Schemes Based on \"Perturbation Polynomials\"", + "1189": "Transactuations: Where Transactions Meet the Physical World Transactuations: Where Transactions Meet the Physical World", + "1190": "Unleashing the Power of Learning: An Enhanced Learning-Based Approach for Dynamic Binary Translation Unleashing the Power of Learning: An Enhanced Learning-Based Approach for Dynamic Binary Translation", + "1191": "A Retargetable System-Level DBT Hypervisor A Retargetable System-Level DBT Hypervisor", + "1192": "Unification of Temporary Storage in the NodeKernel Architecture Unification of Temporary Storage in the NodeKernel Architecture", + "1193": "Mitigating Asymmetric Read and Write Costs in Cuckoo Hashing for Storage Systems Mitigating Asymmetric Read and Write Costs in Cuckoo Hashing for Storage Systems", + "1194": "Who's Afraid of Uncorrectable Bit Errors? Online Recovery of Flash Errors with Distributed Redundancy Who's Afraid of Uncorrectable Bit Errors? Online Recovery of Flash Errors with Distributed Redundancy", + "1195": "MTS: Bringing Multi-Tenancy to Virtual Networking MTS: Bringing Multi-Tenancy to Virtual Networking", + "1196": "Lumos: Dependency-Driven Disk-based Graph Processing LUMOS: Dependency-Driven Disk-based Graph Processing", + "1197": "Dayu: Fast and Low-interference Data Recovery in Very-large Storage Systems Dayu: Fast and Low-interference Data Recovery in Very-large Storage Systems", + "1198": "Pragh: Locality-preserving Graph Traversal with Split Live Migration Pragh: Locality-preserving Graph Traversal with Split Live Migration", + "1199": "Immunizing Encryption Schemes from Decryption Errors", + "1200": "Lessons and Actions: What We Learned from 10K SSD-Related Storage System Failures Lessons and Actions: What We Learned from 10K SSD-Related Storage System Failures", + "1201": "SmartDedup: Optimizing Deduplication for Resource-constrained Devices SmartDedup: Optimizing Deduplication for Resource-constrained Devices", + "1202": "Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies", + "1203": "MArk: Exploiting Cloud Services for Cost-Effective, SLO-Aware Machine Learning Inference Serving MArk: Exploiting Cloud Services for Cost-Effective, SLO-Aware Machine Learning Inference Serving", + "1204": "Pangolin: A Fault-Tolerant Persistent Memory Programming Library Pangolin: A Fault-Tolerant Persistent Memory Programming Library", + "1205": "Cross-dataset Time Series Anomaly Detection for Cloud Systems Cross-dataset Time Series Anomaly Detection for Cloud Systems", + "1206": "Sampling-based Alignment and Hierarchical Sub-sentential Alignment in Chinese-Japanese Translation of Patents", + "1207": "NeuOS: A Latency-Predictable Multi-Dimensional Optimization Framework for DNN-driven Autonomous Systems NeuOS: A Latency-Predictable Multi-Dimensional Optimization Framework for DNN-driven Autonomous Systems", + "1208": "Adaptive Placement for In-memory Storage Functions Adaptive Placement for In-memory Storage Functions", + "1209": "Twizzler: a Data-Centric OS for Non-Volatile Memory Twizzler: a Data-Centric OS for Non-Volatile Memory", + "1210": "ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval", + "1211": "Lightweight Preemptible Functions Lightweight Preemptible Functions", + "1212": "Efficient Miss Ratio Curve Computation for Heterogeneous Content Popularity Efficient Miss Ratio Curve Computation for Heterogeneous Content Popularity", + "1213": "Lock-free Concurrent Level Hashing for Persistent Memory Lock-free Concurrent Level Hashing for Persistent Memory", + "1214": "Libnvmmio: Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface Libnvmmio: Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface", + "1215": "SplinterDB: Closing the Bandwidth Gap for NVMe Key-Value Stores SplinterDB: Closing the Bandwidth Gap for NVMe Key-Value Stores", + "1216": "Percival: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning", + "1217": "Reexamining Direct Cache Access to Optimize I/O Intensive Applications for Multi-hundred-gigabit Networks Reexamining Direct Cache Access to Optimize I/O Intensive Applications for Multi-hundred-gigabit Networks", + "1218": "SweynTooth: Unleashing Mayhem over Bluetooth Low Energy SweynTooth: Unleashing Mayhem over Bluetooth Low Energy", + "1219": "Reverse Debugging of Kernel Failures in Deployed Systems Reverse Debugging of Kernel Failures in Deployed Systems", + "1220": "go-pmem: Native Support for Programming Persistent Memory in Go go-pmem: Native Support for Programming Persistent Memory in Go", + "1221": "Optimized Query Execution in Large Search Engines with Global Page Ordering", + "1222": "Searching for Stability in Interdomain Routing", + "1223": "Fewer Cores, More Hertz: Leveraging High-Frequency Cores in the OS Scheduler for Improved Application Performance Fewer Cores, More Hertz: Leveraging High-Frequency Cores in the OS Scheduler for Improved Application Performance", + "1224": "Reconstructing proprietary video streaming algorithms Reconstructing proprietary video streaming algorithms", + "1225": "Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication", + "1226": "PinK: High-speed In-storage Key-value Store with Bounded Tails PinK: High-speed In-storage Key-value Store with Bounded Tails", + "1227": "FuZZan: Efficient Sanitizer Metadata Design for Fuzzing FuZZan: Efficient Sanitizer Metadata Design for Fuzzing", + "1228": "vSMT-IO: Improving I/O Performance and Efficiency on SMT Processors in Virtualized Clouds VSMT-IO: Improving I/O Performance and Efficiency on SMT Processors in Virtualized Clouds", + "1229": "OpenExpress: Fully Hardware Automated Open Research Framework for Future Fast NVMe Devices OpenExpress: Fully Hardware Automated Open Research Framework for Future Fast NVMe Devices", + "1230": "Lessons Learned from the Chameleon Testbed Lessons Learned from the Chameleon Testbed", + "1231": "End the Senseless Killing: Improving Memory Management for Mobile Operating Systems End the Senseless Killing: Improving Memory Management for Mobile Operating Systems", + "1232": "A Decentralized Blockchain with High Throughput and Fast Confirmation A Decentralized Blockchain with High Throughput and Fast Confirmation", + "1233": "On the Notion of Pseudo-Free Groups", + "1234": "DADI: Block-Level Image Service for Agile and Elastic Application Deployment DADI Block-Level Image Service for Agile and Elastic Application Deployment", + "1235": "AutoSys: The Design and Operation of Learning-Augmented Systems AutoSys: The Design and Operation of Learning-Augmented Systems", + "1236": "Acclaim: Adaptive Memory Reclaim to Improve User Experience in Android Systems Acclaim: Adaptive Memory Reclaim to Improve User Experience in Android Systems", + "1237": "Retwork: Exploring Reader Network with COTS RFID Systems Retwork: Exploring Reader Network with a COTS RFID System", + "1238": "Firefly: Untethered Multi-user VR for Commodity Mobile Devices Firefly: Untethered Multi-user VR for Commodity Mobile Devices", + "1239": "OptimusClOud: Heterogeneous Configuration Optimization for Distributed Databases in the Cloud OPTIMUSCLOUD: Heterogeneous Configuration Optimization for Distributed Databases in the Cloud", + "1240": "Effectively Prefetching Remote Memory with Leap Effectively Prefetching Remote Memory with Leap", + "1241": "BASTION: A Security Enforcement Network Stack for Container Networks BASTION: A Security Enforcement Network Stack for Container Networks", + "1242": "NetKernel: Making Network Stack Part of the Virtualized Infrastructure NetKernel: Making Network Stack Part of the Virtualized Infrastructure", + "1243": "Optimizing Memory-mapped I/O for Fast Storage Devices Optimizing Memory-mapped I/O for Fast Storage Devices", + "1244": "Perspectives on Financial Cryptography", + "1245": "HetPipe: Enabling Large DNN Training on (Whimpy) Heterogeneous GPU Clusters through Integration of Pipelined Model Parallelism and Data Parallelism HetPipe: Enabling Large DNN Training on (Whimpy) Heterogeneous GPU Clusters through Integration of Pipelined Model Parallelism and Data Parallelism", + "1246": "Ureqa: Leveraging Operation-Aware Error Rates for Effective Quantum Circuit Mapping on NISQ-Era Quantum Computers UREQA: Leveraging Operation-Aware Error Rates for Effective Quantum Circuit Mapping on NISQ-Era Quantum Computers", + "1247": "Posh: A Data-Aware Shell POSH: A Data-Aware Shell", + "1248": "Can Applications Recover from fsync Failures? Can Applications Recover from fsync Failures?", + "1249": "Fine-Grained Isolation for Scalable, Dynamic, Multi-tenant Edge Clouds Fine-Grained Isolation for Scalable, Dynamic, Multi-tenant Edge Clouds", + "1250": "SPINFER: Inferring Semantic Patches for the Linux Kernel SPINFER: Inferring Semantic Patches for the Linux Kernel", + "1251": "Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider", + "1252": "Faasm: Lightweight Isolation for Efficient Stateful Serverless Computing FAASM: Lightweight Isolation for Efficient Stateful Serverless Computing", + "1253": "Midgress-aware traffic provisioning for content delivery Midgress-aware traffic provisioning for content delivery", + "1254": "sRDMA -Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access sRDMA -Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access", + "1255": "Chaffing and Winnowing: Confidentiality without Encryption", + "1256": "coIOMMU: A Virtual IOMMU with Cooperative DMA Buffer Tracking for Efficient Memory Management in Direct I/O coIOMMU: A Virtual IOMMU with Cooperative DMA Buffer Tracking for Effi- cient Memory Management in Direct I/O", + "1257": "Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores", + "1258": "Peregreen -modular database for efficient storage of historical time series in cloud environments Peregreen -modular database for efficient storage of historical time series in cloud environments", + "1259": "ALERT: Accurate Learning for Energy and Timeliness ALERT: Accurate Learning for Energy and Timeliness", + "1260": "Austere Flash Caching with Deduplication and Compression Austere Flash Caching with Deduplication and Compression", + "1261": "GraphWalker: An I/O-Efficient and Resource-Friendly Graph Analytic System for Fast and Scalable Random Walks GraphWalker: An I/O-Efficient and Resource-Friendly Graph Analytic System for Fast and Scalable Random Walks", + "1262": "AC-Key: Adaptive Caching for LSM-based Key-Value Stores AC-Key: Adaptive Caching for LSM-based Key-Value Stores", + "1263": "Platinum: A CPU-Efficient Concurrent Garbage Collector for Tail-Reduction of Interactive Services Platinum: A CPU-Efficient Concurrent Garbage Collector for Tail-Reduction of Interactive Services", + "1264": "PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations", + "1265": "Spool: Reliable Virtualized NVMe Storage Pool in Public Cloud Infrastructure Spool: Reliable Virtualized NVMe Storage Pool in Public Cloud Infrastructure", + "1266": "PayWord and MicroMint: Two Simple Micropayment Schemes", + "1267": "A Deep Dive into DNS Query Failures A Deep Dive into DNS Query Failures", + "1268": "MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with Matrix Container in NVM MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with a Matrix Container in NVM", + "1269": "Offload Annotations: Bringing Heterogeneous Computing to Existing Libraries and Workloads Offload Annotations: Bringing Heterogeneous Computing to Existing Libraries and Workloads", + "1270": "BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning", + "1271": "FineStream: Fine-Grained Window-Based Stream Processing on CPU-GPU Integrated Architectures FineStream: Fine-Grained Window-Based Stream Processing on CPU-GPU Integrated Architectures", + "1272": "HDDse: Enabling High-Dimensional Disk State Embedding for Generic Failure Detection System of Heterogeneous Disks in Large Data Centers HDDse: Enabling High-Dimensional Disk State Embedding for Generic Failure Detection System of Heterogeneous Disks in Large Data Centers", + "1273": "OSCA: An Online-Model Based Cache Allocation Scheme in Cloud Block Storage Systems OSCA: An Online-Model Based Cache Allocation Scheme in Cloud Block Storage Systems", + "1274": "DupHunter: Flexible High-Performance Deduplication for Docker Registries DupHunter: Flexible High-Performance Deduplication for Docker Registries", + "1275": "Scaph: Scalable GPU-Accelerated Graph Processing with Value-Driven Differential Scheduling Scaph: Scalable GPU-Accelerated Graph Processing with Value-Driven Differential Scheduling", + "1276": "Fast Software Cache Design for Network Appliances Fast Software Cache Design for Network Appliances", + "1277": "Lightweight Encryption for Email_1277", + "1278": "Daydream: Accurately Estimating the Efficacy of Optimizations for DNN Training Daydream: Accurately Estimating the Efficacy of Optimizations for DNN Training", + "1279": "A Comprehensive Analysis of Superpage Management Mechanisms and Policies A Comprehensive Analysis of Superpage Management Mechanisms and Policies", + "1280": "Automated Experiment-Driven Management of (Database) Systems", + "1281": "DIADS: Addressing the \"My-Problem-or-Yours\" Syndrome with Integrated SAN and Database Diagnosis", + "1282": "HashCache: Cache Storage for the Next Billion", + "1283": "Tolerating File-System Mistakes with EnvyFS", + "1284": "Making Routers Last Longer with ViAggre", + "1285": "Toward Cloud-based Collaboration Services", + "1286": "CA-NFS: A Congestion-Aware Network File System", + "1287": "Your computer is already a distributed system. Why isn't your OS?", + "1288": "A Modular Voting Architecture (\"Frogs\")", + "1289": "Audit Mechanisms for Privacy Protection in Healthcare Environments", + "1290": "PADS: A Policy Architecture for Distributed Storage Systems", + "1291": "Unraveling the Complexity of Network Management", + "1292": "The Virtual Power System Testbed and Inter-Testbed Integration", + "1293": "The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet", + "1294": "USENIX Association 7th USENIX Conference on File and Storage Technologies 183 BORG: Block-reORGanization for Self-optimizing Storage Systems", + "1295": "Storing Trees on Disk Drives", + "1296": "Adapting RAID Methods for Use in Object Storage Systems", + "1297": "Overcoming Challenges of Maturity", + "1298": "E-Voting and Forensics: Prying Open the Black Box", + "1299": "Scratch & Vote Self-Contained Paper-Based Cryptographic Voting", + "1300": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two", + "1301": "A Dependency-to-String Model for Chinese-Japanese SMT System", + "1302": "Write Endurance in Flash Drives: Measurements and Analysis", + "1303": "Statistical Machine Learning Makes Automatic Control Practical for Internet Datacenters", + "1304": "Proceedings of the Special Workshop on Intelligence at the Network Edge", + "1305": "Kawa -Compiling Dynamic Languages to the Java VM", + "1306": "Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed", + "1307": "FLAME: A Flow-Level Anomaly Modeling Engine", + "1308": "Towards Query Interoperability: PASSing PLUS * \u2020", + "1309": "Internet Filtering Trends in Western Liberal Democracies", + "1310": "Branching vs. Linear Time: Semantical Perspective Version 1.2 \u22c6", + "1311": "A graph model of data and workflow provenance", + "1312": "Controlling File System Write Ordering", + "1313": "Fido: Fast Inter-Virtual-Machine Communication for Enterprise Appliances", + "1314": "Improving Efficiency and Enhancing Concurrency of Untrusted Storage", + "1315": "Now Do Voters Notice Review Screen Anomalies? A Look at Voting System Usability", + "1316": "Open Cirrus TM Cloud Computing Testbed: Federated Data Centers for Open Source Systems and Services Research", + "1317": "Persistent Security, Privacy, and Governance for Healthcare Information", + "1318": "Transparent Mobile Storage Protection in Trusted Virtual Domains", + "1319": "SplitScreen: Enabling Efficient, Distributed Malware Detection", + "1320": "Nebulas: Using Distributed Voluntary Resources to Build Clouds", + "1321": "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy", + "1322": "Diamonds are forever, files are not * \"Reducing Storage Management Costs via Informed User-Based Poli- cies,\" in Mass", + "1323": "Provenance-based Belief", + "1324": "Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage", + "1325": "ShadowNet: A Platform for Rapid and Safe Network Evolution", + "1326": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems USENIX Association 133 Certifying Program Execution with Secure Processors", + "1327": "Style Guide for Voting System Documentation: Why User-Centered Documentation Matters to Voting Security", + "1328": "Tiered Fault Tolerance for Long-Term Integrity", + "1329": "Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults", + "1330": "Decentralized Deduplication in SAN Cluster File Systems", + "1331": "MapReduce Online", + "1332": "Cluster-Based Delta Compression of a Collection of Files", + "1333": "Adaptively Parallelizing Distributed Range Queries", + "1334": "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets", + "1335": "Empirical Study of Power Consumption of x86-64 Instruction Decoder", + "1336": "Understanding the Impact of Cache Locations on Storage Performance and Energy Consumption of Virtualization Systems", + "1337": "Estimating Environmental Costs", + "1338": "Census: Location-Aware Membership Management for Large-Scale Distributed Systems", + "1339": "Hunting for problems with Artemis", + "1340": "Scaling Internet Research Publication Processes to Internet scale", + "1341": "A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed", + "1342": "Collaborative Red Teaming for Anonymity System Evaluation", + "1343": "Methodically Modeling the Tor Network", + "1344": "Design and Implementation of a High-Performance Distributed Web Crawler", + "1345": "Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack", + "1346": "Virtual machine introspection in a hybrid honeypot architecture", + "1347": "Learning from Early Attempts to Measure Information Security Performance", + "1348": "Conducting an Ethical Study of Web Traffic", + "1349": "Towards a Framework for Evaluating BGP Security", + "1350": "Do malware reports expedite cleanup? An experimental study", + "1351": "Beyond Disk Imaging for Preserving User State in Network Testbeds", + "1352": "Students Who Don't Understand Information Flow Should be Eaten: An Experience Paper", + "1353": "A High Coverage Method for Automatic False Friends Detection for Spanish and Portuguese", + "1354": "Internet Measurements and Public Policy: Mind the Gap", + "1355": "C-DEM: A Multi-Modal Query System for Drosophila Embryo Databases", + "1356": "MINESTRONE: Testing the SOUP", + "1357": "OCTANE: Open Car Testbed And Network Experiments Bringing Cyber-Physical Security Research to Researchers and Students", + "1358": "Valuing Security by Getting [d0x3d!] Experiences with a network security board game", + "1359": "BugBox : A Vulnerability Corpus for PHP Web Applications", + "1360": "Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems *", + "1361": "RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation", + "1362": "Safe and Automated Live Malware Experimentation on Public Testbeds *", + "1363": "EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments", + "1364": "Four Week Summer Program in Cyber Security for High School Students: Practice and Experience Report", + "1365": "TESTREX: a Testbed for Repeatable Exploits", + "1366": "Multi-Project Reticle Design and Wafer Dicing under Uncertain Demand *", + "1367": "Large-Scale Evaluation of a Vulnerability Analysis Framework", + "1368": "A Metric for the Evaluation and Comparison of Keylogger Performance", + "1369": "DACSA: A Decoupled Architecture for Cloud Security Analysis", + "1370": "Effective Entropy: Security-Centric Metric for Memory Randomization Techniques", + "1371": "Computer security clinical trials: Lessons learned from a 4-month pilot study", + "1372": "Simulating Malicious Insiders in Real Host-Monitored User Data", + "1373": "Experiences with Honey-Patching in Active Cyber Security Education", + "1374": "PRISM: Private Retrieval of the Internet's Sensitive Metadata", + "1375": "A Crowd-Annotated Spanish Corpus for Humor Analysis", + "1376": "This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates Mark Gondree Naval Postgraduate School", + "1377": "Non-tree Routing for Reliability and Yield Improvement \u00a3", + "1378": "Experimental Study of Fuzzy Hashing in Malware Clustering Analysis", + "1379": "Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", + "1380": "Developing Security Reputation Metrics for Hosting Providers (Step Right Up! Metrics Galore! )", + "1381": "Build It Break It: Measuring and Comparing Development Security", + "1382": "A Cybersecurity Test and Evaluation Facility for the Next Generation Air Transportation System (NextGen)", + "1383": "Evaluating Malware Mitigation by Android Market Operators", + "1384": "Honey Sheets: What Happens To Leaked Google Spreadsheets?", + "1385": "Providing SCADA network data sets for intrusion detection research", + "1386": "Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?", + "1387": "Chappie Swarm: Persona-Driven Web Corpus Generation", + "1388": "Genotype Error Detection using Hidden Markov Models of Haplotype Diversity", + "1389": "Metrics for runtime detection of allocators in binaries", + "1390": "Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser", + "1391": "Revisiting Static Analysis of Android Malware", + "1392": "Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research", + "1393": "Multipath Transport for Virtual Private Networks", + "1394": "Measuring the Effectiveness of Embedded Phishing Exercises", + "1395": "Malware Analysis Through High-level Behavior", + "1396": "Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations", + "1397": "AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation", + "1398": "Supporting Docker in Emulab-Based Network Testbeds", + "1399": "Improved Tag Set Design and Multiplexing Algorithms for Universal Arrays \ud97b\udf59", + "1400": "BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization", + "1401": "On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World", + "1402": "DEW: Distributed Experiment Workflows", + "1403": "Galaxy: A Network Emulation Framework for Cybersecurity", + "1404": "High Performance Tor Experimentation from the Magic of Dynamic ELFs", + "1405": "Percentages, Probabilities and Professions of Performance", + "1406": "A Multi-level Fidelity Microgrid Testbed Model for Cybersecurity Experimentation", + "1407": "A Data-Driven Reflection on 36 Years of Security and Privacy Research", + "1408": "Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized Through Software Debloating", + "1409": "Triton: A Software-Reconfigurable Federated Avionics Testbed", + "1410": "A New Heuristic for Rectilinear Steiner Trees I o n I . M andoiu \ud97b\udf59 Vijay V . V azirani \ud97b\udf59", + "1411": "Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds", + "1412": "The DComp Testbed", + "1413": "Automated Attack Discovery in Data Plane Systems", + "1414": "Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking", + "1415": "CAERUS: Chronoscopic Assessment Engine for Recovering Undocumented Specifications", + "1416": "Proteus: A DLT-Agnostic Emulation and Analysis Framework", + "1417": "Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks", + "1418": "Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)", + "1419": "UBCIS: Ultimate Benchmark for Container Image Scanning", + "1420": "Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques", + "1421": "Floorplan Evaluation with Timing-Driven Global Wireplanning, Pin Assignment, and Buffer/Wire Sizing \u00a3", + "1422": "ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource", + "1423": "Historical Analysis of Exploit Availability Timelines", + "1424": "Toward Orchestration of Complex Networking Experiments", + "1425": "On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence", + "1426": "Towards Adversarial Phishing Detection", + "1427": "Bridging Missing Gaps in Evaluating DDoS Research", + "1428": "HAI 1.0: HIL-based Augmented ICS Security Dataset", + "1429": "APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences", + "1430": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Sensing User Intention and Context for Energy Management", + "1431": "EVA: A Framework for Network Analysis and Risk Assessment", + "1432": "Imputation-based local ancestry inference in admixed populations", + "1433": "Detecting Spam in VoIP Networks", + "1434": "ElasTraS: An Elastic Transactional Data Store in the Cloud", + "1435": "USENIX Association Proceedings of FAST '03: 2nd USENIX Conference on File and Storage Technologies 2nd USENIX Conference on File and Storage Technologies USENIX Association 175 The Direct Access File System", + "1436": "An Awkward Disparity between BLEU / RIBES Scores and Human Judgements in Machine Translation", + "1437": "Carnegie Mellon's CyDAT Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics", + "1438": "Glasnost: Enabling End Users to Detect Traffic Differentiation Massimiliano Marcon Ratul Mahajan", + "1439": "Paper Rating vs. Paper Ranking", + "1440": "Best Practices for the Care and Feeding of a Program Committee, and Other Thoughts on Conference Organization", + "1441": "Implementing IPv6 for Windows NT Implementing IPv6 for Windows NT", + "1442": "Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic", + "1443": "Towards Accurate Detection and Genotyping of Expressed Variants from Whole Transcriptome Sequencing Data", + "1444": "Empirically Testing Decision Making in TAC SCM", + "1445": "HYDRAstor: a Scalable Secondary Storage", + "1446": "The ACL Anthology: Current State and Future Directions", + "1447": "Mobility Changes Everything in Low-Power Wireless Sensornets", + "1448": "Refactoring human roles solves systems problems", + "1449": "Alpine: A User-Level Infrastructure for Network Protocol Development", + "1450": "Minuet: Rethinking Concurrency Control in Storage Area Networks", + "1451": "Panache: A Parallel File System Cache for Global File Access", + "1452": "Mandatory Access Control for the Android Dalvik Virtual Machine", + "1453": "Probing the Front Lines: Pollworker Perceptions of Security & Privacy", + "1454": "Improving Helios with Everlasting Privacy Towards the Public", + "1455": "Estimation of alternative splicing isoform frequencies from RNA-Seq data \u22c6", + "1456": "A Hybrid Touch Interface for Pr\u00eatPr\u00eat\u00e0 Voter", + "1457": "A Systematic Process-Model-Based Approach for Synthesizing Attacks and Evaluating Them", + "1458": "BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes", + "1459": "Cobra: Toward Concurrent Ballot Authorization for Internet Voting", + "1460": "Coercion-Resistant Electronic Elections with Write-In Candidates", + "1461": "Operator-Assisted Tabulation of Optical Scan Ballots", + "1462": "Using Pr\u00eatPr\u00eat\u00e0 Voter in Victorian State elections", + "1463": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 81 Memory Efficient Sanitization of a Deduplicated Storage System", + "1464": "Extending the Lifetime of Flash-based Storage through Reducing Write Amplification from File Systems", + "1465": "Unioning of the Buffer Cache and Journaling Layers with Non-volatile Memory", + "1466": "Accurate Estimation of Gene Expression Levels from DGE Sequencing Data", + "1467": "Warming up Storage-Level Caches with Bonfire", + "1468": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 243 LDPC-in-SSD: Making Advanced Error Correction Codes Work Effectively in Solid State Drives", + "1469": "Arc-Hybrid Non-Projective Dependency Parsing with a Static-Dynamic Oracle", + "1470": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 285 Gecko: Contention-Oblivious Disk Arrays for Cloud Storage", + "1471": "Building Workload-Independent Storage with VT-Trees", + "1472": "To Zip or not to Zip: Effective Resource Usage for Real-Time Compression *", + "1473": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 215 Getting Real: Lessons in Transitioning Research Simulations into Hardware Systems", + "1474": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 1 ffsck: The Fast File System Checker", + "1475": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 175 File Recipe Compression in Data Deduplication Systems", + "1476": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 133 MixApart: Decoupled Analytics for Shared Storage Systems", + "1477": "Evaluation of Authentication Signaling Loads in 3GPP LTE/SAE Networks", + "1478": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 45 Write Policies for Host-side Flash Caches", + "1479": "HARDFS: Hardening HDFS with Selective and Lightweight Versioning", + "1480": "A Study of Linux File System Evolution", + "1481": "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 307 Virtual Machine Workloads: The Case for New Benchmarks for NAS", + "1482": "Concurrent Deletion in a Distributed Content-Addressable Storage System with Global Deduplication", + "1483": "NAVER Machine Translation System for WAT 2015", + "1484": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Parity Logging with Reserved Space: Towards Efficient Updates and Recovery in Erasure-coded Clustered Storage Parity Logging with Reserved Space: Towards Efficient Updates and Recovery in Erasure-coded Clustered Storage", + "1485": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Lifetime Improvement of NAND Flash-based Storage Systems Using Dynamic Program and Erase Scaling Lifetime Improvement of NAND Flash-based Storage Systems Using Dynamic Program and Erase Scaling", + "1486": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Wear Unleveling: Improving NAND Flash Lifetime by Balancing Page Endurance Wear Unleveling: Improving NAND Flash Lifetime by Balancing Page Endurance", + "1487": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by STAIR Codes: A General Family of Erasure Codes for Tolerating Device and Sector Failures in Practical Storage Systems STAIR Codes: A General Family of Erasure Codes for Tolerating Device and Sector Failures in Practical Storage Systems", + "1488": "unknown_1488", + "1489": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Migratory Compression: Coarse-grained Data Reordering to Improve Compressibility Migratory Compression: Coarse-grained Data Reordering to Improve Compressibility", + "1490": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces", + "1491": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by CRAID: Online RAID Upgrades Using Dynamic Hot Data Reorganization CRAID: Online RAID Upgrades Using Dynamic Hot Data Reorganization", + "1492": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Balancing Fairness and Efficiency in Tiered Storage Systems with Bottleneck-Aware Allocation Balancing Fairness and Efficiency in Tiered Storage Systems with Bottleneck-Aware Allocation", + "1493": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by SpringFS: Bridging Agility and Performance in Elastic Distributed Storage SpringFS: Bridging Agility and Performance in Elastic Distributed Storage", + "1494": "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by ViewBox: Integrating Local File Systems with Cloud Storage Services ViewBox: Integrating Local File Systems with Cloud Storage Services", + "1495": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Skylight-A Window on Shingled Disk Operation USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 135 Skylight-A Window on Shingled Disk Operation", + "1496": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX A Practical Implementation of Clustered Fault Tolerant Write Acceleration in a Virtualized Environment A Practical Implementation of Clustered Fault Tolerant Write Acceleration in a Virtualized Environment", + "1497": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Non-blocking Writes to Files Non-blocking Writes to Files", + "1498": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Design Tradeoffs for Data Deduplication Performance in Backup Workloads Design Tradeoffs for Data Deduplication Performance in Backup Workloads", + "1499": "Provably Good Global Buffering Using an Available Buffer Block Plan", + "1500": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Reliable, Consistent, and Efficient Data Sync for Mobile Apps Reliable, Consistent, and Efficient Data Sync for Mobile Apps", + "1501": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks", + "1502": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Analysis of the ECMWF Storage Landscape https://www.usenix.org/conference/fast15/technical-sessions/presentation/grawinkel USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 15 Analysis of the ECMWF Storage Landscape", + "1503": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Host-side Filesystem Journaling for Durable Shared Storage Host-side Filesystem Journaling for Durable Shared Storage", + "1504": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Reducing File System Tail Latencies with Chopper Reducing File System Tail Latencies with Chopper", + "1505": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Boosting Quasi-Asynchronous I/O for Better Responsiveness in Mobile Devices Boosting Quasi-Asynchronous I/O for Better Responsiveness in Mobile Devices", + "1506": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Chronicle: Capture and Analysis of NFS Workloads at Line Rate Chronicle: Capture and Analysis of NFS Workloads at Line Rate", + "1507": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Towards SLO Complying SSDs Through OPS Isolation USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 183 Towards SLO Complying SSDs Through OPS Isolation", + "1508": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX LADS: Optimizing Data Transfers Using Layout-Aware Data Scheduling USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 67 LADS: Optimizing Data Transfers using Layout-Aware Data Scheduling", + "1509": "Modelling Protagonist Goals and Desires in First-Person Narrative", + "1510": "Efficient Multidimensional Blocking for Link Discovery without losing Recall", + "1511": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX How Much Can Data Compressibility Help to Improve NAND Flash Memory Lifetime? How Much Can Data Compressibility Help to Improve NAND Flash Memory Lifetime?", + "1512": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX RAIDShield: Characterizing, Monitoring, and Proactively Protecting Against Disk Failures USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 241 RAIDShield: Characterizing, Monitoring, and Proactively Protecting Against Disk Failures", + "1513": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Efficient Intra-Operating System Protection Against Harmful DMAs Efficient Intra-Operating System Protection Against Harmful DMAs", + "1514": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage, and Network-bandwidth USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 81 Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage and Network-bandwidth", + "1515": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX RIPQ: Advanced Photo Caching on Flash for Facebook USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 373 RIPQ: Advanced Photo Caching on Flash for Facebook", + "1516": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Efficient MRC Construction with SHARDS USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 95 Efficient MRC Construction with SHARDS", + "1517": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX A Tale of Two Erasure Codes in HDFS A Tale of Two Erasure Codes in HDFS", + "1518": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Write Once, Get 50% Free: Saving SSD Erase Costs Using WOM Codes USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 257 Write Once, Get 50% Free: Saving SSD Erase Costs Using WOM Codes", + "1519": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX NV-Tree: Reducing Consistency Cost for NVM-based Single Level Systems NV-Tree: Reducing Consistency Cost for NVM-based Single Level Systems", + "1520": "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX FlashGraph: Processing Billion-Node Graphs on an Array of Commodity SSDs USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 45 FlashGraph: Processing Billion-Node Graphs on an Array of Commodity SSDs", + "1521": "The R2R Framework: Publishing and Discovering Mappings on the Web", + "1522": "Errata Slip", + "1523": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX BTrDB: Optimizing Storage System Design for Timeseries Processing BTrDB: Optimizing Storage System Design for Timeseries Processing", + "1524": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX CloudCache: On-demand Flash Cache Management for Cloud Computing CloudCache: On-demand Flash Cache Management for Cloud Computing", + "1525": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Mitigating Sync Amplification for Copy-on-write Virtual Disk Mitigating Sync Amplification for Copy-on-write Virtual Disk", + "1526": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX OrderMergeDedup: Efficient, Failure-Consistent Deduplication on Flash OrderMergeDedup: Efficient, Failure-Consistent Deduplication on Flash", + "1527": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Uncovering Bugs in Distributed Storage Systems during Testing (Not in Production!) Uncovering Bugs in Distributed Storage Systems during Testing (not in Production!)", + "1528": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX The Tail at Store: A Revelation from Millions of Hours of Disk and SSD Deployments The Tail at Store: A Revelation from Millions of Hours of Disk and SSD Deployments", + "1529": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Estimating Unseen Deduplication- from Theory to Practice Estimating Unseen Deduplication -from Theory to Practice", + "1530": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Slacker: Fast Distribution with Lazy Docker Containers Slacker: Fast Distribution with Lazy Docker Containers", + "1531": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX PCAP: Performance-aware Power Capping for the Disk Drive in the Cloud PCAP: Performance-Aware Power Capping for the Disk Drive in the Cloud", + "1532": "Benchmarking the Performance of Storage Systems that expose SPARQL Endpoints", + "1533": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Application-Managed Flash Application-Managed Flash", + "1534": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Flamingo: Enabling Evolvable HDD-based Near-Line Storage Flamingo: Enabling Evolvable HDD-based Near-Line Storage", + "1535": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Access Characteristic Guided Read and Write Cost Regulation for Performance Improvement on Flash Memory Access Characteristic Guided Read and Write Cost Regulation for Performance Improvement on Flash Memory", + "1536": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX CacheDedup: In-line Deduplication for Flash Caching CacheDedup: In-line Deduplication for Flash Caching", + "1537": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Towards Accurate and Fast Evaluation of Multi-Stage Log-structured Designs Towards Accurate and Fast Evaluation of Multi-Stage Log-Structured Designs", + "1538": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX WiscKey: Separating Keys from Values in SSD-conscious Storage WiscKey: Separating Keys from Values in SSD-Conscious Storage", + "1539": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Using Hints to Improve Inline Block-layer Deduplication Using Hints to Improve Inline Block-Layer Deduplication", + "1540": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Environmental Conditions and Disk Reliability in Free-cooled Datacenters Environmental Conditions and Disk Reliability in Free-Cooled Datacenters", + "1541": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX The Devil Is in the Details: Implementing Flash Page Reuse with WOM Codes The Devil is in the Details: Implementing Flash Page Reuse with WOM Codes", + "1542": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Flash Reliability in Production: The Expected and the Unexpected Flash Reliability in Production: The Expected and the Unexpected", + "1543": "The RDF Book Mashup: From Web APIs to a Web of Data", + "1544": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Isotope: Transactional Isolation for Block Storage Isotope: Transactional Isolation for Block Storage", + "1545": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX sRoute: Treating the Storage Stack Like a Network sRoute: Treating the Storage Stack Like a Network", + "1546": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories", + "1547": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Optimizing Every Operation in a Write-optimized File System Optimizing Every Operation in a Write-Optimized File System", + "1548": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Efficient and Available In-memory KV-Store with Hybrid Erasure Coding and Replication Efficient and Available In-memory KV-Store with Hybrid Erasure Coding and Replication", + "1549": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX The Composite-file File System: Decoupling the One-to-One Mapping of Files and Metadata for Better Performance The Composite-file File System: Decoupling the One-to-one Mapping of Files and Metadata for Better Performance", + "1550": "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Reducing Solid-State Storage Device Write Stress through Opportunistic In-place Delta Compression Reducing Solid-State Storage Device Write Stress Through Opportunistic In-Place Delta Compression", + "1551": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Evolving Ext4 for Shingled Disks Evolving Ext4 for Shingled Disks", + "1552": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. LightNVM: The Linux Open-Channel SSD Subsystem LightNVM: The Linux Open-Channel SSD Subsystem", + "1553": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. On the Performance Variation in Modern Storage Stacks On the Performance Variation in Modern Storage Stacks", + "1554": "Fresnel: A Browser-Independent Presentation Vocabulary for RDF", + "1555": "Temporal Action-Graph Games: A New Representation for Dynamic Games", + "1556": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. vNFS: Maximizing NFS Performance with Compounds and Vectorized I/O vNFS: Maximizing NFS Performance with Compounds and Vectorized I/O", + "1557": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. File Systems Fated for Senescence? Nonsense, Says Science! File Systems Fated for Senescence? Nonsense, Says Science!", + "1558": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Knockoff: Cheap Versions in the Cloud Knockoff: Cheap versions in the cloud", + "1559": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). The Logic of Physical Garbage Collection in Deduplicating Storage The Logic of Physical Garbage Collection in Deduplicating Storage", + "1560": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed Storage Reactions to Single Errors and Corruptions Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed Storage Reactions to Single Errors and Corruptions", + "1561": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Crystal: Software-Defined Storage for Multi-Tenant Object Stores Crystal: Software-Defined Storage for Multi-tenant Object Stores", + "1562": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. On the Accuracy and Scalability of Intensive I/O Workload Replay On the Accuracy and Scalability of Intensive I/O Workload Replay", + "1563": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. SMaRT: An Approach to Shingled Magnetic Recording Translation SMaRT: An Approach to Shingled Magnetic Recording Translation", + "1564": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Algorithms and Data Structures for Efficient Free Space Reclamation in WAFL Algorithms and Data Structures for Efficient Free Space Reclamation in WAFL", + "1565": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. SHRD: Improving Spatial Locality in Flash Storage Accesses by Sequentializing in Host and Randomizing in Device SHRD: Improving Spatial Locality in Flash Storage Accesses by Sequentializing in Host and Randomizng in Device", + "1566": "Quantification of Integrity", + "1567": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Enlightening the I/O Path: A Holistic Approach for Application Performance Enlightening the I/O Path: A Holistic Approach for Application Performance", + "1568": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. High Performance Metadata Integrity Protection in the WAFL Copy-on-Write File System High-Performance Metadata Integrity Protection in the WAFL Copy-on-Write File System", + "1569": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Chronix: Long Term Storage and Retrieval Technology for Anomaly Detection in Operational Data Chronix: Long Term Storage and Retrieval Technology for Anomaly Detection in Operational Data", + "1570": "Evaluating Neural Machine Translation in English-Japanese Task", + "1571": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Facilitating Magnetic Recording Technology Scaling for Data Center Hard Disk Drives through Filesystem-Level Transparent Local Erasure Coding Facilitating Magnetic Recording Technology Scaling for Data Center Hard Disk Drives through Filesystem-level Transparent Local Erasure Coding", + "1572": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Graphene: Fine-Grained IO Management for Graph Computing Graphene: Fine-Grained IO Management for Graph Computing", + "1573": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases", + "1574": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Omid, Reloaded: Scalable and Highly-Available Transaction Processing Omid, Reloaded: Scalable and Highly-Available Transaction Processing", + "1575": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). DIDACache: A Deep Integration of Device and Application for Flash Based Key-Value Caching DIDACache: A Deep Integration of Device and Application for Flash based Key-value Caching", + "1576": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). To FUSE or Not to FUSE: Performance of User-Space File Systems To FUSE or Not to FUSE: Performance of User-Space File Systems", + "1577": "Probe, Cluster, and Discover: Focused Extraction of QA-Pagelets from the Deep Web", + "1578": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Mirador: An Active Control Plane for Datacenter Storage Mirador: An Active Control Plane for Datacenter Storage", + "1579": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Tiny-Tail Flash: Near-Perfect Elimination of Garbage Collection Tail Latencies in NAND SSDs Tiny-Tail Flash: Near-Perfect Elimination of Garbage Collection Tail Latencies in NAND SSDs", + "1580": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. FlashBlox: Achieving Both Performance Isolation and Uniform Lifetime for Virtualized SSDs FlashBlox: Achieving Both Performance Isolation and Uniform Lifetime for Virtualized SSDs", + "1581": "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Application Crash Consistency and Performance with CCFS Application Crash Consistency and Performance with CCFS", + "1582": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Protocol-Aware Recovery for Consensus-Based Storage Protocol-Aware Recovery for Consensus-Based Storage", + "1583": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Improving Docker Registry Design based on Production Workload Analysis Improving Docker Registry Design based on Production Workload Analysis", + "1584": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Towards Robust File System Checkers Towards Robust File System Checkers", + "1585": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Logical Synchronous Replication in the Tintri VMstore File System Logical Synchronous Replication in the Tintri VMstore File System", + "1586": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Endurable Transient Inconsistency in Byte- Addressable Persistent B+-Tree Endurable Transient Inconsistency in Byte-Addressable Persistent B+-Tree", + "1587": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Designing a True Direct-Access File System with DevFS Designing a True Direct-Access File System with DevFS", + "1588": "Dissecting Video Server Selection Strategies in the YouTube CDN", + "1589": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. WAFL Iron: Repairing Live Enterprise File Systems WAFL Iron: Repairing Live Enterprise File Systems", + "1590": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX The CASE of FEMU: Cheap, Accurate, Scalable and Extensible Flash Emulator The CASE of FEMU: Cheap, Accurate, Scalable and Extensible Flash Emulator", + "1591": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. PEN: Design and Evaluation of Partial-Erase for 3D NAND-Based High Density SSDs PEN: Design and Evaluation of Partial-Erase for 3D NAND-Based High Density SSDs", + "1592": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. FStream: Managing Flash Streams in the File System FStream: Managing Flash Streams in the File System", + "1593": "KyotoEBMT System Description for the 2nd Workshop on Asian Translation", + "1594": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Spiffy: Enabling File-System Aware Storage Applications Spiffy: Enabling File-System Aware Storage Applications", + "1595": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. MQSim: A Framework for Enabling Realistic Studies of Modern Multi-Queue SSD Devices MQSim: A Framework for Enabling Realistic Studies of Modern Multi-Queue SSD Devices", + "1596": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Clay Codes: Moulding MDS Codes to Yield an MSR Code Clay Codes: Moulding MDS Codes to Yield an MSR Code", + "1597": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Barrier-Enabled IO Stack for Flash Storage", + "1598": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. UKSM: Swift Memory Deduplication via Hierarchical and Adaptive Memory Region Distilling UKSM: Swift Memory Deduplication via Hierarchical and Adaptive Memory Region Distilling", + "1599": "Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System", + "1600": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Towards Web-based Delta Synchronization for Cloud Storage Services Towards Web-based Delta Synchronization for Cloud Storage Services", + "1601": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. RFLUSH: Rethink the Flush RFLUSH: Rethink the Flush", + "1602": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. The Full Path to Full-Path Indexing The Full Path to Full-Path Indexing", + "1603": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures", + "1604": "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Stash in a Flash Stash in a Flash", + "1605": "Toshiba MT System Description for the WAT2015 Workshop", + "1606": "NICT at WAT 2015", + "1607": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Optimizing Systems for Byte-Addressable NVM by Reducing Bit Flipping This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Optimizing Systems for Byte-Addressable NVM by Reducing Bit Flipping", + "1608": "Sliding Look-Back Window Assisted Data Chunk Rewriting for Improving Deduplication Restore Performance This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Sliding Look-Back Window Assisted Data Chunk Rewriting for Improving Deduplication Restore Performance", + "1609": "Speculative Encryption on GPU Applied to Cryptographic File Systems This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Speculative Encryption on GPU Applied to Cryptographic File Systems", + "1610": "Beating Burnashev in delay with noisy feedback", + "1611": "Large-Scale Graph Processing on Emerging Storage Devices This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Large-Scale Graph Processing on Emerging Storage Devices", + "1612": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Software Wear Management for Persistent Memories This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Software Wear Management for Persistent Memories", + "1613": "This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Automatic, Application-Aware I/O Forwarding Resource Allocation Automatic, Application-Aware I/O Forwarding Resource Allocation", + "1614": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Pay Migration Tax to Homeland: Anchor-based Scalable Reference Counting for Multicores This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Pay Migration Tax to Homeland: Anchor-based Scalable Reference Counting for Multicores", + "1615": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Cluster storage systems gotta have HeART: improving storage efficiency by exploiting disk-reliability heterogeneity This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Cluster storage systems gotta have HeART: improving storage efficiency by exploiting disk-reliability heterogeneity", + "1616": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by SLM-DB: Single-Level Key-Value Store with Persistent Memory This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). SLM-DB: Single-Level Key-Value Store with Persistent Memory", + "1617": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Storage Gardening: Using a Virtualization Layer for Efficient Defragmentation in the WAFL File System This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Storage Gardening: Using a Virtualization Layer for Efficient Defragmentation in the WAFL File System", + "1618": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Design Tradeoffs for SSD Reliability This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Design Tradeoffs for SSD Reliability", + "1619": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Fully Automatic Stream Management for Multi-Streamed SSDs Using Program Contexts This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Fully Automatic Stream Management for Multi-Streamed SSDs Using Program Contexts", + "1620": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Reaping the performance of fast NVM storage with uDepot This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Reaping the performance of fast NVM storage with uDepot", + "1621": "Crime and Punishment for Cognitive Radios", + "1622": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by GraphOne: A Data Store for Real-time Analytics on Evolving Graphs This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). GRAPHONE: A Data Store for Real-time Analytics on Evolving Graphs", + "1623": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems", + "1624": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by DistCache: Provable Load Balancing for Large- Scale Storage Systems with Distributed Caching This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). DistCache: Provable Load Balancing for Large-Scale Storage Systems with Distributed Caching", + "1625": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Write-Optimized Dynamic Hashing for Persistent Memory This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Write-Optimized Dynamic Hashing for Persistent Memory", + "1626": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by INSTalytics: Cluster Filesystem Co-design for Big-data Analytics This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). INSTalytics: Cluster Filesystem Co-design for Big-data Analytics", + "1627": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by ScaleCheck: A Single-Machine Approach for Discovering Scalability Bugs in Large Distributed Systems This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). ScaleCheck: A Single-Machine Approach for Discovering Scalability Bugs in Large Distributed Systems", + "1628": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Orion: A Distributed File System for Non-Volatile Main Memory and RDMA-Capable Networks This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Orion: A Distributed File System for Non-Volatile Main Memories and RDMA-Capable Networks", + "1629": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction", + "1630": "This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Finesse: Fine-Grained Feature Locality based Fast Resemblance Detection for Post-Deduplication Delta Compression Finesse: Fine-Grained Feature Locality based Fast Resemblance Detection for Post-Deduplication Delta Compression", + "1631": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Ziggurat: A Tiered File System for Non-Volatile Main Memories and Disks This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Ziggurat: A Tiered File System for Non-Volatile Main Memories and Disks", + "1632": "Some Remarks on Factor Graphs", + "1633": "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques", + "1634": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by Carver: Finding Important Parameters for Storage System Tuning Carver: Finding Important Parameters for Storage System Tuning", + "1635": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Characterizing, Modeling, and Benchmarking RocksDB Key-Value Workloads at Facebook Characterizing, Modeling, and Benchmarking RocksDB Key-Value Workloads at Facebook", + "1636": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Strong and Efficient Consistency with Consistency-Aware Durability Strong and Efficient Consistency with Consistency-Aware Durability", + "1637": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20)", + "1638": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by Quiver: An Informed Storage Cache for Deep Learning Quiver: An Informed Storage Cache for Deep Learning", + "1639": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Making Disk Failure Predictions SMARTer! Making Disk Failure Predictions SMARTer!", + "1640": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) A Study of SSD Reliability in Large Scale Enterprise Storage Deployments A Study of SSD Reliability in Large Scale Enterprise Storage Deployments", + "1641": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) GoSeed: Generating an Optimal Seeding Plan for Deduplicated Storage GoSeed: Generating an Optimal Seeding Plan for Deduplicated Storage", + "1642": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by GIFT: A Coupon Based Throttle-and-Reward Mechanism for Fair and Efficient I/O Bandwidth Management on Parallel Storage Systems GIFT: A Coupon Based Throttle-and-Reward Mechanism for Fair and Efficient I/O Bandwidth Management on Parallel Storage Systems", + "1643": "Islands of Near-Perfect Self-Prediction", + "1644": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Uncovering Access, Reuse, and Sharing Characteristics of I/O-Intensive Files on Large-Scale Production HPC Systems Uncovering Access, Reuse, and Sharing Characteristics of I/O-Intensive Files on Large-Scale Production HPC Systems", + "1645": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Hybrid Data Reliability for Emerging Key-Value Storage Devices Hybrid Data Reliability for Emerging Key-Value Storage Devices", + "1646": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) InfiniCache: Exploiting Ephemeral Serverless Functions to Build a Cost-Effective Memory Cache INFINICACHE: Exploiting Ephemeral Serverless Functions to Build a Cost-Effective Memory Cache", + "1647": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by BCW: Buffer-Controlled Writes to HDDs for SSD-HDD Hybrid Storage Server BCW: Buffer-Controlled Writes to HDDs for SSD-HDD Hybrid Storage Server", + "1648": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by CRaft: An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost CRaft: An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost", + "1649": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by An Empirical Guide to the Behavior and Use of Scalable Persistent Memory An Empirical Guide to the Behavior and Use of Scalable Persistent Memory", + "1650": "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) How to Copy Files How to Copy Files", + "1651": "Towards Model-based Management of Database Fragmentation", + "1652": "A Control Theoretic Approach to Analyzing Peer-to-Peer Searching", + "1653": "The Challenge of Cloud Control", + "1654": "Approximate NN Queries on Streams with Guaranteed Error/performance Bounds", + "1655": "On the Stability of a Market-Oriented Cloud Computing Model with Time-Varying Workloads", + "1656": "ARPE: A tool to build equation models of computing systems", + "1657": "Online Resource Management for Data Center with Energy Capping", + "1658": "Mobile Computing: Challenges and Opportunities for Autonomy and Feedback", + "1659": "Cyber Physical System Challenges for Human-in-the-Loop Control", + "1660": "Adaptive Control of Apache Web Server", + "1661": "Two-level Throughput and Latency IO Control for Parallel File Systems", + "1662": "Discrete Control for the Internet of Things and Smart Environments", + "1663": "Energy Efficient Soft Real-Time Computing through Cross-Layer Predictive Control", + "1664": "A Model-based Approach to Self-Protection in SCADA Systems", + "1665": "A Formal Foundation for XrML *", + "1666": "Beyond Equilibrium: Predicting Human Behavior in Normal-Form Games", + "1667": "From the Outside Looking In: Probing Web APIs to Build Detailed Workload Profiles", + "1668": "E-cubed: End-to-End Energy Management of Virtual Desktop Infrastructure with Guaranteed Performance", + "1669": "Demand Response of Data Centers: A Real-time Pricing Game between Utilities in Smart Grid", + "1670": "Utility-Based Control Feedback in a Digital Library Search Engine: Cases in CiteSeerX", + "1671": "Load Balancing of Heterogeneous Workloads in Memcached Clusters", + "1672": "On Subliminal Channels in Encrypt-on-Cast Voting Systems", + "1673": "Neural Reranking Improves Subjective Quality of Machine Translation: NAIST at WAT2015", + "1674": "Inferring Mechanics of Web Censorship Around the World", + "1675": "Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations", + "1676": "Protecting Free and Open Communications on the Internet Against Man-in-the-middle Attacks on Third-party Software: We're FOCI'd", + "1677": "Minimum Expected Distortion in Gaussian Source Coding with Uncertain Side Information", + "1678": "How the Great Firewall of China is Blocking Tor", + "1679": "One-way indexing for plausible deniability in censorship resistant storage", + "1680": "Internet Censorship in Iran: A First Look", + "1681": "Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts", + "1682": "Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion Independent researcher \u2020", + "1683": "The Anatomy of Web Censorship in Pakistan", + "1684": "Five incidents, one theme: Twitter spam as a weapon to drown voices of protest", + "1685": "Towards a Censorship Analyser for Tor", + "1686": "Towards Provably-Secure Scalable Anonymous Broadcast", + "1687": "Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance", + "1688": "Minimum Expected Distortion in Gaussian Layered Broadcast Coding with Successive Refinement", + "1689": "Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search", + "1690": "Half Baked: The opportunity to secure cookie-based identifiers from passive surveillance", + "1691": "Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China", + "1692": "Understanding Internet Censorship Policy: The Case of Greece", + "1693": "DNS-sly: Avoiding Censorship through Network Complexity", + "1694": "GhostPost: Seamless Restoration of Censored Social Media Posts", + "1695": "Censors' Delay in Blocking Circumvention Proxies", + "1696": "Privacy and Security Issues in BAT Web Browsers", + "1697": "Adblocking and Counter-Blocking: A Slice of the Arms Race", + "1698": "Matryoshka: Hiding Secret Communication in Plain Sight", + "1699": "ON SEQUENTIALLY NORMALIZED MAXIMUM LIKELIHOOD MODELS", + "1700": "Measuring Decentralization of Chinese Keyword Censorship via Mobile Games", + "1701": "Best We Forget: Expressive Freedom and the Right to be Forgotten", + "1702": "Exploring User Mental Models of End-to-End Encrypted Communication Tools", + "1703": "Analyzing China's Blocking of Unpublished Tor Bridges", + "1704": "Automatically Generating a Large, Culture-Specific Blocklist for China", + "1705": "An analysis of automatic image filtering on WeChat Moments", + "1706": "MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption", + "1707": "From Russia With Crypto: A Political History of Telegram 1", + "1708": "HSTS Supports Targeted Surveillance", + "1709": "A Bestiary of Blocking The Motivations and Modes behind Website Unavailability", + "1710": "Remembrance: The Unbearable Sentience of Being Digital", + "1711": "A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure", + "1712": "Measuring Privacy Threats in China-Wide Mobile Networks", + "1713": "On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention", + "1714": "Measuring I2P Censorship at a Global Scale", + "1715": "Improving Meek With Adversarial Techniques", + "1716": "An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message", + "1717": "Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia", + "1718": "Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior", + "1719": "Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance", + "1720": "Slitheen++: Stealth TLS-based Decoy Routing", + "1721": "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance", + "1722": "Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter", + "1723": "Annotation, Modelling and Analysis of Fine-Grained Emotions on a Stance and Sentiment Detection Corpus", + "1724": "Turbo Tunnel, a good way to design censorship circumvention protocols", + "1725": "HTTPT: A Probe-Resistant Proxy", + "1726": "MIMIQ: Masking IPs with Migration in QUIC", + "1727": "A Comprehensive Study of DNS-over-HTTPS Downgrade Attack", + "1728": "Identifying Disinformation Websites Using Infrastructure Features", + "1729": "The Output of a Cache under the Independent Reference Model -Where Did the Locality of Reference Go?", + "1730": "Thoughts on Improving Review Quality", + "1731": "Experiences with CoralCDN: A Five-Year Operational View", + "1732": "A Statistical Analysis of Disclosed Storage Security Breaches", + "1733": "Predicting Computer System Failures Using Support Vector Machines", + "1734": "CloudViews: Communal Data Sharing in Public Clouds", + "1735": "Software Support for Software-Independent Auditing -Short Paper", + "1736": "STOW: A Spatially and Temporally Optimized Write Caching Algorithm", + "1737": "System Combination of RBMT plus SPE and Preordering plus SMT", + "1738": "Improving Spam Detection Based on Structural Similarity", + "1739": "Reliability Markov models are becoming unreliable (WIP submission)", + "1740": "The XtreemOS JScheduler: Using Self-Scheduling Techniques in Large Computing Architectures", + "1741": "BASIL: Automated IO Load Balancing Across Storage Devices", + "1742": "USENIX Association 7th USENIX Conference on File and Storage Technologies PARDA: Proportional Allocation of Resources for Distributed Storage Access", + "1743": "Synergy: A Policy-driven, Trust-aware Information Dissemination Framework", + "1744": "Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks", + "1745": "Towards practical incremental recomputation for scientists: An implementation for the Python language", + "1746": "Personality Driven Differences in Paraphrase Preference", + "1747": "Efficient Disk Space Management for Virtual Machines", + "1748": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems One Hop Lookups for Peer-to-Peer Overlays", + "1749": "Towards Carrier Grade Linux Platforms Network Element SAF Standard Interfaces PICMG ATCA Carrier Grade Linux Standards-Based Proprietary Network Element SAF Standard Interfaces PICMG ATCA Carrier Grade Linux", + "1750": "NetReview: Detecting when interdomain routing goes wrong_1750", + "1751": "A Unifying Approach to the Exploitation of File Semantics in Distributed File Systems", + "1752": "You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems", + "1753": "Implementing Risk-Limiting Post-Election Audits in California", + "1754": "The Evolution of Storage Service Providers: Techniques and Challenges to Outsourcing Storage", + "1755": "Improving the Security, Transparency and Efficiency of California's 1% Manual Tally Procedures", + "1756": "Maranello: Practical Partial Packet Recovery for 802.11", + "1757": "Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices", + "1758": "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance_1758", + "1759": "Wave Computing in the Cloud", + "1760": "Development of a System Framework for Implementation of an Enhanced Role- Based Access Control Model to Support Collaborative Processes", + "1761": "Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records", + "1762": "Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry Position Paper", + "1763": "Body Area Network Security: Robust Key Establishment Using Human Body Channel", + "1764": "Tragedy of Anticommons in Digital Right Management of Medical Records", + "1765": "I/O-Efficient Map Overlay and Point Location in Low-Density Subdivisions *", + "1766": "Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems", + "1767": "Accountings of Relationships", + "1768": "On XACML's Adequacy to Specify and to Enforce HIPAA", + "1769": "Neuroimage Data Sets: Rethinking Privacy Policies", + "1770": "An Analysis of HIPAA Breach Data", + "1771": "Vis-` a-vis Cryptography: Private and Trustworthy In-Person Certifications", + "1772": "Enabling Robust Information Accountability in E-healthcare Systems *", + "1773": "Who wears me? Bioimpedance as a passive biometric", + "1774": "Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure", + "1775": "Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data", + "1776": "WALKING YOUR DOG IN THE WOODS IN POLYNOMIAL TIME", + "1777": "Computing Pure Strategy Nash Equilibria in Compact Symmetric Games", + "1778": "Understanding the Challenges with Medical Data Segmentation for Privacy", + "1779": "Using Bowel Sounds to Create a Forensically-aware Insulin Pump System", + "1780": "Electronic Prescription for Controlled Substances: A Cybersecurity Perspective", + "1781": "Privacy Aspects of Health Related Information Sharing in Online Social Networks", + "1782": "ElasticTree: Saving Energy in Data Center Networks", + "1783": "Overview of the 2nd Workshop on Asian Translation", + "1784": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Access Control to Information in Pervasive Computing Environments", + "1785": "A Common Substrate for Cluster Computing", + "1786": "Using R for Iterative and Incremental Processing", + "1787": "Dynamic Virtual Machine Scheduling in Clouds for Architectural Shared Resources", + "1788": "Meme-tracking and the Dynamics of the News Cycle", + "1789": "vCRIB: Virtualized Rule Management in the Cloud", + "1790": "Small is Big: Functionally Partitioned File Caching in Virtualized Environments", + "1791": "Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters", + "1792": "Opening Up Black Box Networks with CloudTalk", + "1793": "GRIN: Utilizing the Empty Half of Full Bisection Networks", + "1794": "EyeQ: Practical Network Performance Isolation for the Multi-tenant Cloud", + "1795": "Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2", + "1796": "The Resource-as-a-Service (RaaS) Cloud", + "1797": "Automated diagnosis without predictability is a recipe for failure", + "1798": "RAMCube: Exploiting Network Proximity for RAM-Based Key-Value Store", + "1799": "Scalable Modeling of Real Graphs using Kronecker Multiplication", + "1800": "Predicting Execution Bottlenecks in Map-Reduce Clusters", + "1801": "Sweet Storage SLOs with Frosting", + "1802": "Icebergs in the Clouds: the Other Risks of Cloud Computing", + "1803": "Towards Fair Sharing of Block Storage in a Multi-tenant Cloud", + "1804": "Why let resources idle? Aggressive Cloning of Jobs with Dolly", + "1805": "Plugging Side-Channel Leaks with Timing Information Flow Control", + "1806": "North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms", + "1807": "The seven deadly sins of cloud computing research", + "1808": "Saving Cash by Using Less Cache", + "1809": "A Case for Performance-Centric Network Allocation", + "1810": "Web Projections: Learning from Contextual Subgraphs of the Web", + "1811": "Verifiable Computation with Massively Parallel Interactive Proofs", + "1812": "Achieving 10Gbps line-rate key-value stores with FPGAs", + "1813": "Using Set Cover to Optimize a Large-Scale Low Latency Distributed Graph", + "1814": "MrLazy: Lazy Runtime Label Propagation for MapReduce", + "1815": "Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications", + "1816": "BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing", + "1817": "Building a Scalable Multimedia Search Engine Using Infiniband", + "1818": "Rethinking the Network Stack for Rack-scale Computers", + "1819": "LOOM: Optimal Aggregation Overlays for In-Memory Big Data Processing *", + "1820": "POMAC: Properly Offloading Mobile Applications to Clouds", + "1821": "Supervised Probabilistic Principal Component Analysis", + "1822": "A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems", + "1823": "Cicada: Introducing Predictive Guarantees for Cloud Networks", + "1824": "Mobile App Acceleration via Fine-Grain Offloading to the Cloud", + "1825": "Mechanisms and Architectures for Tail-Tolerant System Operations in Cloud", + "1826": "Towards a Leaner Geo-distributed Cloud Infrastructure", + "1827": "A Way Forward: Enabling Operating System Innovation in the Cloud", + "1828": "Practical Confidentiality Preserving Big Data Analysis *", + "1829": "A Case for Virtualizing the Electric Utility in Cloud Data Centers Position paper", + "1830": "Software Defining System Devices with the 'Banana' Double-Split Driver Model", + "1831": "Impression Store: Compressive Sensing-based Storage for Big Data Analytics", + "1832": "Collaborative Ordinal Regression", + "1833": "SmartSwitch: Blurring the Line Between Network Infrastructure & Cloud Applications", + "1834": "The Case for System Testing with Swift Hierarchical VM Fork", + "1835": "An Optimization Case in Support of Next Generation NFV Deployment", + "1836": "Oh Flow, Are Thou Happy? TCP sendbuffer advertising for make benefit of clouds and tenants", + "1837": "Pricing Games for Hybrid Object Stores in the Cloud: Provider vs. Tenant", + "1838": "Dynacache: Dynamic Cloud Caching", + "1839": "Highly Auditable Distributed Systems", + "1840": "Privacy-Preserving Offloading of Mobile App to the Public Cloud", + "1841": "The Importance of Features for Statistical Anomaly Detection", + "1842": "Enabling Scalable Social Group Analytics via Hypergraph Analysis Systems", + "1843": "A Probabilistic Clustering-Projection Model for Discrete Data", + "1844": "Provenance Issues in Platform-as-a-Service Model of Cloud Computing", + "1845": "Optimizing Network Performance in Distributed Machine Learning", + "1846": "App-Bisect: Autonomous Healing for Microservice-based Apps", + "1847": "Soroban: Attributing Latency in Virtualized Environments", + "1848": "GreenMap: MapReduce with Ultra High Efficiency Power Delivery", + "1849": "Towards Pre-Deployment Detection of Performance Failures in Cloud Distributed Systems", + "1850": "Towards Hybrid Programming in Big Data", + "1851": "Enabling Topological Flexibility for Data Centers Using OmniSwitch", + "1852": "CodePlugin: Plugging Deduplication into Erasure Coding for Cloud Storage", + "1853": "The Cloud is Not Enough: Saving IoT from the Cloud", + "1854": "Multi-Label Informed Latent Semantic Indexing", + "1855": "Supporting Dynamic GPU Computing Result Reuse in the Cloud", + "1856": "Low-Profile Source-side Deduplication for Virtual Machine Backup", + "1857": "Design patterns for container-based distributed systems", + "1858": "When Apache Spark Meets FPGAs: A Case Study for Next-Generation DNA Sequencing Acceleration", + "1859": "Mapping Cross-Cloud Systems: Challenges and Opportunities", + "1860": "Interactive Debugging for Big Data Analytics", + "1861": "Serverless Computation with OpenLambda", + "1862": "Graviton: Twisting Space and Time to Speed Up CoFlows", + "1863": "QoX: Quality of Service and Consumption in the Cloud", + "1864": "Neutrality in Future Public Clouds: Implications and Challenges *", + "1865": "Multi-Output Regularized Projection", + "1866": "Accelerating Complex Data Transfer for Cluster Computing", + "1867": "The Tail at Scale: How to Predict It?", + "1868": "Scalable Cloud Security via Asynchronous Virtual Machine Introspection", + "1869": "How Not to Bid the Cloud", + "1870": "Cloud Spot Markets are Not Sustainable: The Case for Transient Guarantees", + "1871": "On The [Ir]relevance of Network Performance for Data Processing", + "1872": "An Experiment on Bare-Metal BigData Provisioning", + "1873": "Unikernel Monitors: Extending Minimalism Outside of the Box", + "1874": "HyperOptics: A High Throughput and Low Latency Multicast Architecture for Datacenters", + "1875": "Towards a Network Marketplace in a Cloud", + "1876": "Enabling Fast, Noncontiguous GPU Data Movement in Hybrid MPI+GPU Environments", + "1877": "Leader or Majority: Why have one when you can have both? Improving Read Scalability in Raft-like consensus protocols", + "1878": "A Cloud-based Content Gathering Network", + "1879": "ENVI: Elastic resource flexing for Network function VIrtualization", + "1880": "Time-based Coordination in Geo-Distributed Cyber-Physical Systems", + "1881": "FRAPpuccino: Fault-detection through Runtime Analysis of Provenance", + "1882": "The HCl Scheduler: Going all-in on Heterogeneity", + "1883": "Bohr: Similarity Aware Geo-distributed Data Analytics", + "1884": "Paracloud: Bringing Application Insight into Cloud Operations", + "1885": "Configtron: Tackling network diversity with heterogeneous configurations", + "1886": "DAL: A Locality-Optimizing Distributed Shared Memory System", + "1887": "Noncollective Communicator Creation in MPI \ud97b\udf59", + "1888": "Relational retrieval using a combination of path-constrained random walks", + "1889": "DCCast: Efficient Point to Multipoint Transfers Across Datacenters", + "1890": "Growing a protocol", + "1891": "Performance Annotations for Cloud Computing", + "1892": "Towards Deploying Decommissioned Mobile Devices as Cheap Energy-Efficient Compute Nodes", + "1893": "Towards Index-based Global Trading in Cloud Spot Markets", + "1894": "Lube: Mitigating Bottlenecks in Wide Area Data Analytics", + "1895": "TapCon: Practical Third-Party Attestation for the Cloud", + "1896": "JavaScript for Extending Low-latency In-memory Key-value Stores", + "1897": "NodeFinder: Scalable Search over Highly Dynamic Geo-distributed State", + "1898": "Cloud-Native File Systems", + "1899": "Multi-core and Network Aware MPI Topology Functions", + "1900": "From JVM to FPGA: Bridging Abstraction Hierarchy via Optimized Deep Pipelining", + "1901": "Seer: Leveraging Big Data to Navigate The Complexity of Cloud Debugging", + "1902": "A parallel collection of clinical trials in Portuguese and English", + "1903": "M: Gaining Command on Geo-Distributed Graph Analytics", + "1904": "Towards Fast and Scalable Graph Pattern Mining", + "1905": "Making Cloud Easy: Design Considerations and First Components of a Distributed Operating System for Cloud", + "1906": "Rethinking Adaptability in Wide-Area Stream Processing Systems", + "1907": "A Case for Packing and Indexing in Cloud File Systems", + "1908": "To Relay or Not to Relay for Inter-Cloud Transfers?", + "1909": "RAMP: A Lightweight RDMA Abstraction for Loosely Coupled Applications", + "1910": "iWARP Redefined: Scalable Connectionless Communication over High-Speed Ethernet", + "1911": "Packet-Level Analytics in Software without Compromises", + "1912": "Enforcing Context-Aware BYOD Policies with In-Network Security", + "1913": "A Secure Cloud with Minimal Provider Trust *", + "1914": "RECap: Run-Escape Capsule for On-demand Managed Service Delivery in the Cloud", + "1915": "Steel: Simplified Development and Deployment of Edge-Cloud Applications", + "1916": "Reinventing Video Streaming for Distributed Vision Analytics", + "1917": "Say Goodbye to Virtualization for a Safer Cloud", + "1918": "A Side-channel Attack on HotSpot Heap Management", + "1919": "CacheCloud: Towards Speed-of-light Datacenter Communication", + "1920": "Designing an Efficient Replicated Log Store with Consensus Protocol", + "1921": "Power and Performance Characterization of Computational Kernels on the GPU", + "1922": "Co-evolving Tracing and Fault Injection with Box of Pain", + "1923": "A Black-Box Approach for Estimating Utilization of Polled IO Network Functions", + "1924": "DLion: Decentralized Distributed Deep Learning in Micro-Clouds", + "1925": "The Case for Unifying Data Loading in Machine Learning Clusters", + "1926": "Accelerating Deep Learning Inference via Freezing", + "1927": "Tackling Parallelization Challenges of Kernel Network Stack for Container Overlay Networks", + "1928": "Jumpgate: In-Network Processing as a Service for Data Analytics", + "1929": "The Seven Sins of Personal-Data Processing Systems under GDPR", + "1930": "A Double-Edged Sword: Security Threats and Opportunities in One-Sided Network Communication", + "1931": "Bridging the Edge-Cloud Barrier for Real-time Advanced Vision Analytics", + "1932": "PMI: A Scalable Parallel Process-Management Interface for Extreme-Scale Systems", + "1933": "NetWarden: Mitigating Network Covert Channels without Performance Loss", + "1934": "No Reservations: A First Look at Amazon's Reserved Instance Marketplace", + "1935": "Disaggregation and the Application", + "1936": "Towards Plan-aware Resource Allocation in Serverless Query Processing", + "1937": "AI4DL: Mining Behaviors of Deep Learning Workloads for Resource Management", + "1938": "On the Impact of Isolation Costs on Locality-aware Cloud Scheduling", + "1939": "A Cloud Gaming Framework for Dynamic Graphical Rendering Towards Achieving Distributed Game Engines", + "1940": "Towards Supporting Millions of Users in Modifiable Virtual Environments by Redesigning Minecraft-Like Games as Serverless Systems", + "1941": "Rethinking Isolation Mechanisms for Datacenter Multitenancy", + "1942": "Towards An Application Objective-Aware Network Interface", + "1943": "Leveraging MPI's One-Sided Communication Interface for Shared-Memory Programming", + "1944": "Serverless Boom or Bust? An Analysis of Economic Incentives", + "1945": "Resource Efficient Stream Processing Platform with Latency-Aware Scheduling Algorithms", + "1946": "More IOPS for Less: Exploiting Burstable Storage in Public Clouds", + "1947": "Stratus: Clouds with Microarchitectural Resource Management", + "1948": "A Cloud-native Architecture for Replicated Data Services", + "1949": "Securing RDMA for High-Performance Datacenter Storage Systems", + "1950": "Auto-sizing for Stream Processing Applications at LinkedIn", + "1951": "JACKPOT: Online Experimentation of Cloud Microservices", + "1952": "Spotnik: Designing Distributed Machine Learning for Transient Cloud Resources", + "1953": "Multitenancy for Fast and Programmable Networks in the Cloud", + "1954": "Enabling Concurrent Multithreaded MPI Communication on Multicore Petascale Systems", + "1955": "Towards GPU Utilization Prediction for Cloud Deep Learning", + "1956": "Model-Switching: Dealing with Fluctuating Workloads in Machine-Learning-as-a-Service Systems", + "1957": "When is the Cache Warm? Manufacturing a Rule of Thumb", + "1958": "Who Watches the Watchmen? -Protecting Operating System Reliability Mechanisms", + "1959": "Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability", + "1960": "CoRD: A Collaborative Framework for Distributed Data Race Detection", + "1961": "Is Linux Kernel Oops Useful or Not?", + "1962": "Automatic Undo for Cloud Management via AI Planning", + "1963": "Running ZooKeeper Coordination Services in Untrusted Clouds", + "1964": "Towards General-Purpose Resource Management in Shared Cloud Services", + "1965": "Implementing MPI on Windows: Comparison with Common Approaches on Unix", + "1966": "Erasure Code with Shingled Local Parity Groups for Efficient Recovery from Multiple Disk Failures", + "1967": "Compute Globally, Act Locally: Protecting Federated Systems from Systemic Threats", + "1968": "Leveraging Trusted Computing and Model Checking to Build Dependable Virtual Machines", + "1969": "Store-Edge RippleStream: Versatile Infrastructure for IoT Data Transfer", + "1970": "Towards IoT-DDoS Prevention Using Edge Computing", + "1971": "Are FPGAs Suitable for Edge Computing?", + "1972": "An Industrial Robot System Based on Edge Computing: An Early Experience", + "1973": "Edge Computing Resource Management System: a Critical Building Block! Initiating the debate via OpenStack", + "1974": "DataFog: Towards a Holistic Data Management Platform for the IoT Age at the Network Edge", + "1975": "EdgeCons: Achieving Efficient Consensus in Edge Computing Networks", + "1976": "A Study of Hardware Assisted IP over InfiniBand and its Impact on Enterprise Data Center Performance", + "1977": "Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach", + "1978": "A Privacy-Preserving Deep Learning Approach for Face Recognition with Edge Computing", + "1979": "MODI: Mobile Deep Inference Made Efficient by Edge Computing", + "1980": "An Edge Datastore Architecture For Latency-Critical Distributed Machine Vision Applications", + "1981": "Paying Less for More? Combo Plans for Edge-Computing Services", + "1982": "Toward Optimal Performance with Network Assisted TCP at Mobile Edge", + "1983": "Shimmy: Shared Memory Channels for High Performance Inter-Container Communication", + "1984": "Home, SafeHome: Ensuring a Safe and Reliable Home Using the Edge", + "1985": "Navigating the Visual Fog: Analyzing and Managing Visual Data from Edge to Cloud", + "1986": "Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network", + "1987": "GePSeA: A General-Purpose Software Acceleration Framework for Lightweight Task Offloading *", + "1988": "Devices-as-Services: Rethinking Scalable Service Architectures for the Internet of Things", + "1989": "Exploring the Use of Synthetic Gradients for Distributed Deep Learning across Cloud and Edge Resources", + "1990": "Edge-based Transcoding for Adaptive Live Video Streaming", + "1991": "SMC: Smart Media Compression for Edge Storage Offloading", + "1992": "The Case for Determinism on the Edge", + "1993": "Secure Incentivization for Decentralized Content Delivery", + "1994": "OneOS: IoT Platform based on POSIX and Actors", + "1995": "DeCaf: Iterative Collaborative Processing over the Edge", + "1996": "An Edge-based Framework for Cooperation in Internet of Things Applications", + "1997": "Collaborative Learning on the Edges: A Case Study on Connected Vehicles", + "1998": "Efficient Multithreaded Context ID Allocation in MPI", + "1999": "Polynomial-time Computation of Exact Correlated Equilibrium in Compact Games", + "2000": "Publish-Pay-Subscribe Protocol for Payment-driven Edge Computing", + "2001": "Towards a Serverless Platform for Edge AI", + "2002": "LiveMicro: An Edge Computing System for Collaborative Telepathology", + "2003": "HydraOne: An Indoor Experimental Research and Education Platform for CAVs", + "2004": "Modeling The Edge: Peer-to-Peer Reincarnated", + "2005": "Open Infrastructure for Edge: A Distributed Ledger Outlook", + "2006": "Distributing Deep Neural Networks with Containerized Partitions at the Edge", + "2007": "Trustless IoT: A Logic-Driven Architecture for IoT Hubs", + "2008": "Toward Loosely Coupled Orchestration for the LEO Satellite Edge", + "2009": "SMARTER: Experiences with Cloud Native on the Edge", + "2010": "Sockets Direct Protocol for Hybrid Network Stacks: A Case Study with iWARP over 10G Ethernet \u22c6", + "2011": "Fast and Efficient Container Startup at the Edge via Dependency Scheduling", + "2012": "P4EC: Enabling Terabit Edge Computing in Enterprise 4G LTE", + "2013": "Interactive Planning-based Cognitive Assistance on the Edge", + "2014": "Benchmarking in The Dark: On the Absence of Comprehensive Edge Datasets", + "2015": "Scale-out Edge Storage Systems with Embedded Storage Nodes to Get Better Availability and Cost-Efficiency At the Same Time", + "2016": "A Comparison of Communication Mechanisms in Vehicular Edge Computing", + "2017": "Adaptively Compressing IoT Data on the Resource-constrained Edge", + "2018": "Towards an Architecture for Trusted Edge IoT Security Gateways", + "2019": "Transparent Microsegmentation in Smart Home IoT Networks", + "2020": "Toward Lighter Containers for the Edge", + "2021": "Communication Analysis of Parallel 3D FFT for Flat Cartesian Meshes on Large Blue Gene Systems \u22c6", + "2022": "Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Computing Systems", + "2023": "FERRET: Fall-back to LTE Microservices for Low Latency Data Access", + "2024": "Sharing and Caring of Data at the Edge", + "2025": "Understanding and Tackling the Hidden Memory Latency for Edge-based Heterogeneous Platform", + "2026": "EdgeBalance: Model-Based Load Balancing for Network Edge Data Planes", + "2027": "Cost-effective Hardware Accelerator Recommendation for Edge Computing *", + "2028": "SaFace: Towards Scenario-aware Face Recognition via Edge Computing System", + "2029": "The Personal Cloud -Design, Architecture and Matchmaking Algorithms for Resource Management", + "2030": "Synergy2Cloud: Introducing Cross-Sharing of Application Experiences Into the Cloud Management Cycle", + "2031": "Building Access Oblivious Storage Cloud for Enterprise", + "2032": "Making a Case for Proactive Flow Control in Optical Circuit-Switched Networks", + "2033": "NaaS: Network-as-a-Service in the Cloud", + "2034": "Towards an understanding of oversubscription in cloud", + "2035": "DAPA: Diagnosing Application Performance Anomalies for Virtualized Infrastructures", + "2036": "Automatic Extraction of Parallel Speech Corpora from Dubbed Movies", + "2037": "ECOS: Practical Mobile Application Offloading for Enterprises", + "2038": "Virtual Switching Without a Hypervisor for a More Secure Cloud_2038", + "2039": "Participatory Networking", + "2040": "Challenges to Adopting Stronger Consistency at Scale", + "2041": "Beyond Storage APIs: Provable Semantics for Storage Stacks", + "2042": "Route Bazaar: Automatic Interdomain Contract Negotiation", + "2043": "Non-Data-Communication Overheads in MPI: Analysis on Blue Gene/P", + "2044": "Fault Tolerance and the Five-Second Rule", + "2045": "ASPIRE: Iterative Specification Synthesis for Security", + "2046": "Recommendations for Randomness in the Operating System or, How to Keep Evil Children out of Your Pool and Other Random Facts", + "2047": "Broom: sweeping out Garbage Collection from Big Data systems", + "2048": "The Most Dangerous Code in the Browser", + "2049": "Distributing the Data Plane for Remote Storage Access", + "2050": "Elastic Memory: Bring Elasticity Back to In-Memory Big Data Analytics", + "2051": "Failure Sketches: A Better Way to Debug", + "2052": "FlexNIC: Rethinking Network DMA", + "2053": "Trash Day: Coordinating Garbage Collection in Distributed Systems", + "2054": "Toward Efficient Support for Multithreaded MPI Communication", + "2055": "Scalability! But at what COST?", + "2056": "Inferring the Network Latency Requirements of Cloud Tenants", + "2057": "Practical Always-On Taint Tracking on Mobile Devices", + "2058": "A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases", + "2059": "A Case for Ending Monolithic Apps for Connected Devices", + "2060": "Lax: Driver Interfaces for Approximate Sensor Device Access", + "2061": "The Case for Less Predictable Operating System Behavior", + "2062": "From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud", + "2063": "Software Engagement with Sleeping CPUs", + "2064": "Retrofitted Parallelism Considered Grossly Sub-Optimal", + "2065": "A Simple, Pipelined Algorithm for Large, Irregular All-gather Problems \u22c6", + "2066": "A Template Library to Integrate Thread Scheduling and Locality Management for NUMA Multiprocessors", + "2067": "HydraVM: Extracting Parallelism from Legacy Sequential Code Using STM", + "2068": "CONCURRIT: Testing Concurrent Programs with Programmable State-Space Exploration", + "2069": "\"Simultaneous\" Considered Harmful: Modular Parallelism (deprecating \"locks\", \"semaphores\", serializability, and other sequential thinking)", + "2070": "Parakeet: A Just-In-Time Parallel Accelerator for Python", + "2071": "Parallel Programming for the Web", + "2072": "For Extreme Parallelism, Your OS Is Sooooo Last-Millennium *", + "2073": "Operating Systems Should Manage Accelerators", + "2074": "Concurrency Attacks", + "2075": "Do We Need a Crystal Ball for Task Migration?", + "2076": "Impact of Network Sharing in Multi-core Architectures *", + "2077": "Understanding the Interleaving-Space Overlap across Inputs and Software Versions", + "2078": "A Case for Parallelizing Web Pages", + "2079": "Parallelization by Simulated Tunneling", + "2080": "Collection-focused Parallelism", + "2081": "Using Elimination and Delegation to Implement a Scalable NUMA-Friendly Stack", + "2082": "Durability Semantics for Lock-based Multithreaded Programs", + "2083": "Constrained Data-Driven Parallelism", + "2084": "Parallelization Primitives for Dynamic Sparse Computations", + "2085": "Parallel Synchronization-Free Approximate Data Structure Construction", + "2086": "MediaMeter: A Global Monitor for Online News Coverage", + "2087": "Distributed I/O with ParaMEDIC: Experiences with a Worldwide Supercomputer *", + "2088": "Towards Performance-Portable, Scalable, and Convenient Linear Algebra", + "2089": "Determinism Is Overrated: What Really Makes Multithreaded Programs Hard to Get Right and What Can Be Done about It?", + "2090": "Supporting Distributed Execution of Smartphone Workloads on Loosely Coupled Heterogeneous Processors", + "2091": "Towards Verifying Android Apps for the Absence of No-Sleep Energy Bugs", + "2092": "Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors", + "2093": "Lucky scheduling for energy-efficient heterogeneous multi-core systems", + "2094": "Power and Performance Analysis of GPU-Accelerated Systems", + "2095": "The Implications of Shared Data Synchronization Techniques on Multi-Core Energy Efficiency", + "2096": "Memory Performance at Reduced CPU Clock Speeds: An Analysis of Current x86 64 Processors", + "2097": "Quantitative Estimation of the Performance Delay with Propagation Effects in Disk Power Savings *", + "2098": "ParaMEDIC: Parallel Metadata Environment for Distributed I/O and Computing (Storage Challenge, Supercomputing 2007)", + "2099": "Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions", + "2100": "Can Data Center Become Water Self-Sufficient? *", + "2101": "A Case for Battery Charging-Aware Power Management and Deferrable Task Scheduling in Smartphones", + "2102": "Memory Throttling on BG/Q: A Case Study with Explicit Hydrodynamics", + "2103": "MixApart: Decoupled Analytics for Shared Storage Systems", + "2104": "Exploiting Peak Device Throughput from Random Access Workload", + "2105": "Efficient QoS for Multi-Tiered Storage Systems", + "2106": "Delta Compressed and Deduplicated Storage Using Stream-Informed Locality", + "2107": "A Parallel Page Cache: IOPS and Caching for Multicore Systems", + "2108": "LoadIQ: Learning to Identify Workload Phases from a Live Storage Trace", + "2109": "Advanced Flow-control Mechanisms for the Sockets Direct Protocol over InfiniBand *", + "2110": "Random Walk Inference and Learning in A Large Scale Knowledge Base", + "2111": "Finding soon-to-fail disks in a haystack", + "2112": "The TokuFS Streaming File System", + "2113": "Access Control and Replication Protocols in \"Home\" Environments", + "2114": "An Evaluation of Different Page Allocation Strategies on High-Speed SSDs", + "2115": "Non-Linear Compression: Gzip Me Not!", + "2116": "Gecko: A Contention-Oblivious Design for Cloud Storage", + "2117": "Multi-structured redundancy", + "2118": "Analyzing Compute vs. Storage Tradeoff for Video-aware Storage Efficiency", + "2119": "Fault Isolation and Quick Recovery in Isolation File Systems", + "2120": "Don't Let RAID Raid the Lifetime of Your SSD Array", + "2121": "Analyzing and Minimizing the Impact of Opportunity Cost in QoS-aware Job Scheduling *", + "2122": "A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster", + "2123": "*-Box: Towards Reliability and Consistency in Dropbox-like File Synchronization Services", + "2124": "Novel Address Mappings for Shingled Write Disks", + "2125": "The Multi-streamed Solid-State Drive", + "2126": "Evaluation of Codes with Inherent Double Replication for Hadoop", + "2127": "Accelerating External Sorting via On-the-fly Data Merge in Active SSDs", + "2128": "Assert(!Defined(Sequential I/O))", + "2129": "Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds", + "2130": "On the Importance of Evaluating Storage Systems' $Costs", + "2131": "qNVRAM: quasi Non-Volatile RAM for Low Overhead Persistency Enforcement in Smartphones", + "2132": "Nonuniformly Communicating Noncontiguous Data: A Case Study with PETSc and MPI * \u2020", + "2133": "On the Feasibility of Data Loss Insurance for Personal Cloud Storage", + "2134": "NVMKV: A Scalable and Lightweight Flash Aware Key-Value Store", + "2135": "Towards High-Performance Application-Level Storage Management", + "2136": "Harmonium: Elastic Cloud Storage via File Motifs", + "2137": "Power, Energy and Thermal Considerations in SSD-Based I/O Acceleration", + "2138": "On the Non-Suitability of Non-Volatility", + "2139": "Enabling Automated, Rich, and Versatile Data Management for Android Apps with BlueMountain", + "2140": "Storage Efficiency Opportunities and Analysis for Video Repositories", + "2141": "Toward Eidetic Distributed File Systems", + "2142": "MDHIM: A Parallel Key/Value Framework for HPC", + "2143": "Head-to-TOE Evaluation of High-Performance Sockets over Protocol Offload Engines *", + "2144": "Accordion: Multi-Scale Recipes for Adaptive Detection of Duplication", + "2145": "Beehive: Erasure Codes for Fixing Multiple Failures in Distributed Storage Systems", + "2146": "Metadata Considered Harmful ... to Deduplication", + "2147": "Suspend-aware Segment Cleaning in Log-structured File System", + "2148": "Acquisition of Translation Lexicons for Historically Unwritten Languages via Bridging Loanwords", + "2149": "Terra Incognita: On the Practicality of User-Space File Systems", + "2150": "Edelta: A Word-Enlarging Based Fast Delta Compression Approach", + "2151": "It's Not Where Your Data Is, It's How It Got There", + "2152": "Parametric Optimization of Storage Systems", + "2153": "Leveraging Progressive Programmability of SLC Flash Pages to Realize Zero-overhead Delta Compression for Metadata Storage", + "2154": "Performance Characterization of a 10-Gigabit Ethernet TOE *", + "2155": "Improving I/O Resource Sharing of Linux Cgroup for NVMe SSDs on Multi-core Systems", + "2156": "ClusterOn: Building Highly Configurable and Reusable Clustered Data Services using Simple Data Nodes", + "2157": "Feeding the Pelican: using archival hard drives for cold storage racks", + "2158": "Finding Consistency in an Inconsistent World: Towards Deep Semantic Understanding of Scale-out Distributed Databases", + "2159": "Quartet: Harmonizing task scheduling and caching for cluster computing", + "2160": "A Simulation Result of Replicating Data with Another Layout for Reducing Media Exchange of Cold Storage", + "2161": "Lazy Analytics: Let Other Queries Do the Work For You", + "2162": "Pixelsior: Photo Management as a Platform Service for Mobile Apps", + "2163": "An Empirical Study of File-System Fragmentation in Mobile Storage Systems", + "2164": "SEeSAW -Similarity Exploiting Storage for Accelerating Analytics Workflows", + "2165": "On the Provision of Prioritization and Soft QoS in Dynamically Reconfigurable Shared Data-Centers over InfiniBand", + "2166": "NVMeDirect: A User-space I/O Framework for Application-specific Optimization on NVMe SSDs", + "2167": "Why Do We Always Blame The Storage Stack?", + "2168": "ZEA, A Data Management Approach for SMR", + "2169": "Non-volatile memory through customized key-value stores", + "2170": "Write Amplification Reduction in Flash-Based SSDs Through Extent-Based Temperature Identification", + "2171": "Optimizing Flash-based Key-value Cache Systems", + "2172": "99 Deduplication Problems", + "2173": "Unblinding the OS to Optimize User-Perceived Flash SSD Latency", + "2174": "Exo-clones: Better Container Runtime Image Management across the Clouds", + "2175": "Silver: A scalable, distributed, multi-versioning, Always growing (Ag) File System", + "2176": "Towards Provision of Quality of Service Guarantees in Job Scheduling", + "2177": "Neutrino: Revisiting Memory Caching for Iterative Data Analytics", + "2178": "Avoiding the Streetlight Effect: I/O Workload Analysis with SSDs in Mind", + "2179": "Deduplicating Compressed Contents in Cloud Storage Environment", + "2180": "Efficient Memory Mapped File I/O for In-Memory File Systems", + "2181": "News clustering approach based on discourse text structure", + "2182": "Big data gets bigger: what about data cleaning as a storage service?", + "2183": "Understanding the Fault Resilience of File System Checkers", + "2184": "CC-Log: Drastically Reducing Storage Requirements for Robots Using Classification and Compression", + "2185": "Addressing the Dark Side of Vision Research: Storage", + "2186": "Enabling NVMe WRR support in Linux Block Layer", + "2187": "Sockets Direct Procotol over InfiniBand in Clusters: Is it Beneficial? *", + "2188": "BARNS: Towards Building Backup and Recovery for NoSQL Databases", + "2189": "Managing Array of SSDs When the Storage Device is No Longer the Performance Bottleneck", + "2190": "Openly Addressable Device Tiers", + "2191": "Understanding Rack-Scale Disaggregated Storage", + "2192": "Canopus: Enabling Extreme-Scale Data Analytics on Big HPC Storage via Progressive Refactoring", + "2193": "IOPriority: To The Device and Beyond", + "2194": "Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory", + "2195": "CrashMonkey: A Framework to Systematically Test File-System Crash Consistency", + "2196": "Storage on Your Smartphone Uses More Energy Than You Think", + "2197": "Interactive Second Language Learning from News Websites", + "2198": "Opportune Job Shredding: An Effective Approach for Scheduling Parameter Sweep Applications", + "2199": "Virtual Guard: A Track-Based Translation Layer for Shingled Disks", + "2200": "DeclStore: Layering is for the Faint of Heart", + "2201": "Practical Web-based Delta Synchronization for Cloud Storage Services", + "2202": "Customizing Progressive JPEG for Efficient Image Storage", + "2203": "Overview of the NLP-TEA 2015 Shared Task for Chinese Grammatical Error Diagnosis", + "2204": "When Address Remapping Techniques Meet Consistency Guarantee Mechanisms", + "2205": "Utilitarian Performance Isolation in Shared SSDs", + "2206": "Exploring System Challenges of Ultra-Low Latency Solid State Drives", + "2207": "How to Teach an Old File System Dog New Object Store Tricks", + "2208": "Reducing NVM Writes with Optimized Shadow Paging *", + "2209": "Efficient Collective Operations using Remote Memory Operations on VIA-Based Clusters", + "2210": "BIBIM: A Prototype Multi-Partition Aware Heterogeneous New Memory", + "2211": "mLSM: Making Authenticated Storage Faster in Ethereum", + "2212": "Tintenfisch: File System Namespace Schemas and Generators", + "2213": "Towards Transparent and Seamless Storage-As-You-Go with Persistent Memory *", + "2214": "Breaking Apart the VFS for Managing File Systems", + "2215": "Driving Cache Replacement with ML-based LeCaR", + "2216": "Caching or Not: Rethinking Virtual File System for Non-Volatile Main Memory", + "2217": "DenseFS: A Cache-Compact Filesystem", + "2218": "Deep Investigation of Cross-Language Plagiarism Detection Methods", + "2219": "A Case for Biased Programming in Flash", + "2220": "Efficient Intranode Communication in GPU-Accelerated Systems", + "2221": "Two-Sided Matching with Partial Information", + "2222": "Semantic-Driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies", + "2223": "DREAM: Data Representation Aware of Damage to Extend the Lifetime of MLC NAND Flash Memory", + "2224": "ElasticBF: Fine-grained and Elastic Bloom Filter Towards Efficient Read for LSM-tree-based KV Stores", + "2225": "SecPM: a Secure and Persistent Memory System for Non-volatile Memory", + "2226": "Revisiting Concurrency in High-Performance NoSQL Databases", + "2227": "Caching in the Multiverse", + "2228": "Respecting the block interface -computational storage using virtual objects", + "2229": "Jungle: Towards Dynamically Adjustable Key-Value Store by Combining LSM-Tree and Copy-On-Write B + -Tree", + "2230": "A Tale of Two Abstractions: The Case for Object Space", + "2231": "Graphs Are Not Enough: Using Interactive Visual Analytics in Storage Research", + "2232": "Linearizable Quorum Reads in Paxos", + "2233": "Extending MPI to Accelerators", + "2234": "Fair Resource Allocation in Consolidated Flash Systems", + "2235": "Filesystem Aging: It's more Usage than Fullness", + "2236": "Transaction Support using Compound Commands in Key-Value SSDs", + "2237": "Specialize in Moderation -Building Application-aware Storage Services using FPGAs in the Datacenter", + "2238": "Mismatched Memory Management of Android Smartphones", + "2239": "The Case for Dual-access File Systems over Object Storage", + "2240": "File Systems as Processes", + "2241": "Automating Context-Based Access Pattern Hint Injection for System Performance and Swap Storage Durability", + "2242": "Fair-EDF: A Latency Fairness Framework for Shared Storage Systems", + "2243": "Analyzing the Impact of GDPR on Storage Systems", + "2244": "Dynamic Time-Variant Connection Management for PGAS Models on InfiniBand", + "2245": "ZoneAlloy: Elastic Data and Space Management for Hybrid SMR Drives", + "2246": "Towards an Unwritten Contract of Intel Optane SSD", + "2247": "Reducing Garbage Collection Overhead in SSD Based on Workload Prediction", + "2248": "EvFS: User-level, Event-Driven File System for Non-Volatile Memory", + "2249": "Designing a Storage Software Stack for Accelerators", + "2250": "Could cloud storage be disrupted in the next decade?", + "2251": "A New LSM-style Garbage Collection Scheme for ZNS SSDs", + "2252": "Desperately Seeking ... Optimal Multi-Tier Cache Configurations", + "2253": "It's Time to Revisit LRU vs. FIFO", + "2254": "SplitKV: Splitting IO Paths for Different Sized Key-Value Items with Advanced Storage Devices", + "2255": "In the workshop on Communication Architecture for Clusters (CAC)", + "2256": "Ultra-Low Latency SSDs' Impact on Overall Energy Efficiency", + "2257": "Rethinking WOM Codes to Enhance the Lifetime in New SSD Generations", + "2258": "Need for a Deeper Cross-Layer Optimization for Dense NAND SSD to Improve Read Performance of Big Data Applications: A Case for Melded Pages", + "2259": "In support of workload-aware streaming state management", + "2260": "Too Many Knobs to Tune? Towards Faster Database Tuning by Pre-selecting Important Knobs", + "2261": "MicroMon: A Monitoring Framework for Tackling Distributed Heterogeneity", + "2262": "Say Goodbye to Off-heap Caches! On-heap Caches Using Memory-Mapped I/O", + "2263": "Can We Store the Whole World's Data in DNA Storage?", + "2264": "Differentiating Cache Files for Fine-grain Management to Improve Mobile Performance and Lifetime", + "2265": "StripeFinder: Erasure Coding of Small Objects over Key-Value Storage Devices (An Uphill Battle)", + "2266": "Supporting iWARP Compatibility and Features for Regular Network Adapters *", + "2267": "The Case for Benchmarking Control Operations in Cloud Native Storage", + "2268": "Processing in Storage Class Memory", + "2269": "CompoundFS: Compounding I/O Operations in Firmware File Systems", + "2270": "Neural Trees: Using Neural Networks as an Alternative to Binary Comparison in Classical Search Trees", + "2271": "Understanding and Finding Crash-Consistency Bugs in Parallel File Systems", + "2272": "Prefetching in Hybrid Main Memory Systems", + "2273": "SelectiveEC: Selective Reconstruction in Erasure-coded Storage Systems", + "2274": "Reinforcement Learning-Based SLC Cache Technique for Enhancing SSD Write Performance", + "2275": "Re-think Data Management Software Design Upon the Arrival of Storage Hardware with Built-in Transparent Compression", + "2276": "A file system for safely interacting with untrusted USB flash drives", + "2277": "Workload-driven Analysis of File Systems in Shared Multi-tier Data-Centers over InfiniBand", + "2278": "The Architecture and Implementation of an Extensible Web Crawler", + "2279": "Hierarchically Structured Meta-learning", + "2280": "Minoan linguistic resources: The Linear A Digital Corpus", + "2281": "RBF: A New Storage Structure for Space-Efficient Queries for Multidimensional Metadata in OSS", + "2282": "Autonomic Management of Dynamically Partially Reconfigurable FPGA Architectures using Discrete Control", + "2283": "Coriolis: Scalable VM Clustering in Clouds", + "2284": "Integrating Query Performance Prediction in Term Scoring for Diachronic Thesaurus", + "2285": "QoS-Aware Admission Control in Heterogeneous Datacenters", + "2286": "iShuffle: Improving Hadoop Performance with Shuffle-on-Write", + "2287": "Elasticity in Cloud Computing: What It Is, and What It Is Not", + "2288": "Sockets vs RDMA Interface over 10-Gigabit Networks: An In-depth analysis of the Memory Traffic Bottleneck", + "2289": "Adaptive Performance-Aware Distributed Memory Caching", + "2290": "Real-Time User-Centric Management of Time-Intensive Analytics Using Convergence of Local Functions", + "2291": "AGILE: elastic distributed resource scaling for Infrastructure-as-a-Service", + "2292": "AUTOPLACER: Scalable Self-Tuning Data Placement in Distributed Key-value Stores", + "2293": "Reliability and Timeliness Analysis of Fault-tolerant Distributed Publish / Subscribe Systems", + "2294": "Application Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach", + "2295": "Exploiting Processor Heterogeneity for Interactive Services", + "2296": "PACMan: Performance Aware Virtual Machine Consolidation", + "2297": "To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds", + "2298": "Preemptive ReduceTask Scheduling for Fair and Fast Job Completion", + "2299": "Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand", + "2300": "Performance Inconsistency in Large Scale Data Processing Clusters", + "2301": "Five Centuries of Monarchy in Korea: Mining the Text of the Annals of the Joseon Dynasty", + "2302": "Power-Aware Throughput Control for Database Management Systems", + "2303": "K-Scope: Online Performance Tracking for Dynamic Cloud Applications", + "2304": "A Discriminative Model for Semantics-to-String Translation", + "2305": "A Model-Based Namespace Metadata Benchmark for HDFS A Model-Based Namespace Metadata Benchmark for HDFS", + "2306": "Is Your Web Server Suffering from Undue Stress due to Duplicate Requests? Is Your Web Server Suffering from Undue Stress due to Duplicate Requests?", + "2307": "ShuttleDB: Database-Aware Elasticity in the Cloud ShuttleDB: Database-Aware Elasticity in the Cloud", + "2308": "Active Control of Memory for Java Virtual Machines and Applications Active Control of Memory for Java Virtual Machines and Applications", + "2309": "Matrix: Achieving Predictable Virtual Machine Performance in the Clouds Matrix: Achieving Predictable Virtual Machine Performance in the Clouds", + "2310": "Supporting Strong Coherency for Active Caches in Multi-Tier Data-Centers over InfiniBand", + "2311": "CloudPowerCap: Integrating Power Budget and Resource Management across a Virtualized Server Cluster CloudPowerCap: Integrating Power Budget and Resource Management across a Virtualized Server Cluster", + "2312": "Adaptive, Model-driven Autoscaling for Cloud Applications Adaptive, Model-driven Autoscaling for Cloud Applications", + "2313": "Inferring Origin Flow Patterns in Wi-Fi with Deep Learning Inferring Origin Flow Patterns in Wi-Fi with Deep Learning", + "2314": "Guarded Modules: Adaptively Extending the VMM's Privilege Into the Guest Guarded Modules: Adaptively Extending the VMM's Privileges Into the Guest", + "2315": "Exploiting Temporal Diversity of Water Efficiency to Make Data Center Less \"Thirsty\" Exploiting Temporal Diversity of Water Efficiency to Make Data Center Less \"Thirsty\"", + "2316": "Real-time Edge Analytics for Cyber Physical Systems using Compression Rates Real-time Edge Analytics for Cyber Physical Systems using Compression Rates", + "2317": "Integrating Adaptation Mechanisms Using Control Theory Centric Architecture Models: A Case Study Integrating Adaptation Mechanisms Using Control Theory Centric Architecture Models: A Case Study", + "2318": "Towards Combining Online & Offline Management for Big Data Applications Towards Combining Online & Offline Management for Big Data Applications", + "2319": "Managing Green Datacenters Powered by Hybrid Renewable Energy Systems Managing Green Datacenters Powered by Hybrid Renewable Energy Systems", + "2320": "Coordinating Liquid and Free Air Cooling with Workload Allocation for Data Center Power Minimization Coordinating Liquid and Free Air Cooling with Workload Allocation for Data Center Power Minimization", + "2321": "QoPS: A QoS based scheme for Parallel Job Scheduling", + "2322": "An Enterprise Dynamic Thresholding System An Enterprise Dynamic Thresholding System", + "2323": "On-demand, Spot, or Both: Dynamic Resource Allocation for Executing Batch Jobs in the Cloud On-demand, Spot, or Both: Dynamic Resource Allocation for Executing Batch Jobs in the Cloud", + "2324": "Colocation Demand Response: Why Do I Turn Off My Servers? Colocation Demand Response: Why Do I Turn Off My Servers?", + "2325": "A Comprehensive Resource Management Solution for Web-based Systems A Comprehensive Resource Management Solution for Web-based Systems", + "2326": "Storage Workload Isolation via Tier Warming: How Models Can Help Storage Workload Isolation via Tier Warming: How Models Can Help", + "2327": "Real-Time Scheduling of Skewed MapReduce Jobs in Heterogeneous Environments Real-time Scheduling of Skewed MapReduce Jobs in Heterogeneous Environments", + "2328": "Panda: A System for Provenance and Data *", + "2329": "Improving Flash Storage Performance by Caching Address Mapping Table in Host Memory", + "2330": "NVM Compression -Hybrid Flash-Aware Application Level Compression", + "2331": "EqualChance: Addressing Intra-set Write Variation to Increase Lifetime of Non-volatile Caches", + "2332": "Network Interface Cards as First-Class Citizens *", + "2333": "On the Hardness of Being Truthful", + "2334": "Erasure Coding & Read/Write Separation in Flash Storage", + "2335": "Don't stack your Log on my Log", + "2336": "Compression and SSD: Where and How?", + "2337": "Enabling NVM for Data-Intensive Scientific Services", + "2338": "NVMOVE: Helping Programmers Move to Byte-Based Persistence", + "2339": "ElCached: Elastic Multi-Level Key-Value Cache", + "2340": "Couture: Tailoring STT-MRAM for Persistent Main Memory", + "2341": "On the Impact of Garbage Collection on flash-based SSD Endurance", + "2342": "ROSS: A Design of Read-Oriented STT-MRAM Storage for Energy-Efficient Non-Uniform Cache Architecture", + "2343": "Integrating Case Frame into Japanese to Chinese Hierarchical Phrase-based Translation Model", + "2344": "VOCL: An Optimized Environment for Transparent Virtualization of Graphics Processing Units", + "2345": "STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System", + "2346": "Rethinking Voter Coercion: The Realities Imposed by Technology", + "2347": "An Analysis of Long Lines in Richland County, South Carolina", + "2348": "How To Build an Undervoting Machine: Lessons from an Alternative Ballot Design", + "2349": "Improved Support for Machine-Assisted Ballot-Level Audits", + "2350": "Testing Voters' Understanding of a Security Mechanism used in Verifiable Voting", + "2351": "From Helios to Zeus", + "2352": "Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting", + "2353": "The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds", + "2354": "Understanding Customer Problem Troubleshooting from Storage System Logs", + "2355": "Building Algorithmically Nonstop Fault Tolerant MPI Programs", + "2356": "DFS: A File System for Virtualized Flash Storage", + "2357": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe", + "2358": "RADoN: QoS in storage Networks", + "2359": "Towards Optimizing Hadoop Provisioning in the Cloud", + "2360": "Analyzing Cooperative Containment of Fast Scanning Worms", + "2361": "Rump File Systems: Kernel Code Reborn", + "2362": "Black-Box Problem Diagnosis in Parallel File Systems", + "2363": "Reverse traceroute", + "2364": "Proceedings of the 10 th USENIX Security Symposium PDM: A New Strong Password-Based Protocol", + "2365": "IntelliLight: A Reinforcement Learning Approach for Intelligent Traffic Light Control", + "2366": "Wake-on-WLAN", + "2367": "Seamless BGP Migration With Router Grafting_2367", + "2368": "Towards Energy Proportional Cloud for Data Processing Frameworks", + "2369": "Round-trips with meaning stopovers", + "2370": "I/O Deduplication: Utilizing Content Similarity to Improve I/O Performance", + "2371": "FlexiCache: A Flexible Interface for Customizing Linux File System Buffer Cache Replacement Policies", + "2372": "Private Virtual Infrastructure for Cloud Computing", + "2373": "Bimodal Content Defined Chunking for Backup Streams", + "2374": "Carousel: Scalable Logging for Intrusion Prevention Systems", + "2375": "Response time approximations in fork-join queues", + "2376": "FlexFS: A Flexible Flash File System for MLC NAND Flash Memory", + "2377": "Long-Distance 802.11b Links: Performance Measurements and Experience *", + "2378": "Observations on Emerging Threats", + "2379": "Key Challenges in Defending Against Malicious Socialbots", + "2380": "W32.Duqu: The Precursor to the Next Stuxnet", + "2381": "Adapting Social Spam Infrastructure for Political Censorship", + "2382": "RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks", + "2383": "Classification of UDP Traffic for DDoS Detection", + "2384": "Tracking DDoS Attacks: Insights into the Business of Disrupting the Web", + "2385": "Clustering Potential Phishing Websites Using DeepMD5", + "2386": "Sherlock Holmes and The Case of the Advanced Persistent Threat", + "2387": "There Are No Free iPads: An Analysis of Survey Scams as a Business", + "2388": "Implications of Link Range and (In)Stability on Sensor Network Architecture", + "2389": "Understanding the Emerging Threat of DDoS-As-a-Service", + "2390": "unknown_2390", + "2391": "unknown_2391", + "2392": "SinkMiner: Mining Botnet Sinkholes for Fun and Profit", + "2393": "The Devil is Phishing: Rethinking Web Single Sign-On Systems Security", + "2394": "Extended Abstract: Image Matching for Branding Phishing Kit Images", + "2395": "Wh\u00af anau: A Sybil-proof Distributed Hash Table", + "2396": "USENIX Association 7th USENIX Conference on File and Storage Technologies Spyglass: Fast, Scalable Metadata Search for Large-Scale Storage Systems", + "2397": "Scaling Security for Big, Parallel File Systems", + "2398": "Detecting Voter Fraud in an Electronic Voting Context: An Analysis of the Unlimited Reelection Vote in Venezuela", + "2399": "Revisiting MAC Design for an 802.11-based Mesh Network", + "2400": "TrInc: Small Trusted Hardware for Large Distributed Systems", + "2401": "WebProphet: Automating Performance Prediction for Web Services", + "2402": "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 423 Block-switched Networks: A New Paradigm for Wireless Transport", + "2403": "Work in Progress: Performance Evaluation of RAID6 Systems", + "2404": "Work in Progress: On The Scalability of Storage Sub-System Back-end Network", + "2405": "USENIX Association 26th Large Installation System Administration Conference (LISA '12) 135 Teaching System Administration", + "2406": "A sustainable model for ICT capacity building in developing countries", + "2407": "HSS: A simple file storage system for web applications", + "2408": "Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector", + "2409": "What Your CDN Won't Tell You: Optimizing a News Website for Speed and Stability", + "2410": "Design and Evaluation of a new MAC Protocol for Long-Distance 802.11 Mesh Networks * braman AT iitk DOT ac DOT in chebrolu AT iitk DOT ac DOT in", + "2411": "Progress of DNS Security Deployment in the Federal Government", + "2412": "Introduction and Overview Building a Wireless Network for a High Density of Users 248 26th Large Installation System Administration Conference (LISA '12) USENIX Association", + "2413": "USENIX Association 26th Large Installation System Administration Conference (LISA '12) 203 204 26th Large Installation System Administration Conference (LISA '12) USENIX Association", + "2414": "Training and Professional Development in an IT Community", + "2415": "USENIX Association 26th Large Installation System Administration Conference (LISA '12) 153 Extensible Monitoring with Nagios and Messaging Middleware", + "2416": "Managing User Requests with the Grand Unified Task System (GUTS)", + "2417": "Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters", + "2418": "Evaluating text coherence based on semantic similarity graph", + "2419": "Bayllocator: A proactive system to predict server utilization and dynamically allocate memory resources using Bayesian networks and ballooning", + "2420": "Building the Network Infrastructure for the International Mathematics Olympiad", + "2421": "Dolly: Virtualization-driven Database Provisioning for the Cloud", + "2422": "Building a protocol validator for Business to Business Communications", + "2423": "IDO: Intelligent Data Outsourcing with Improved RAID Reconstruction Performance in Large-Scale Data Centers", + "2424": "HotSnap: A Hot Distributed Snapshot System For Virtual Machine Cluster HotSnap: A Hot Distributed Snapshot System for Virtual Machine Cluster", + "2425": "Building Software Environments for Research Computing Clusters Building Software Environments for Research Computing Clusters", + "2426": "dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data", + "2427": "Managing Smartphone Testbeds with SmartLab Managing Smartphone Testbeds with SmartLab", + "2428": "Challenges to Error Diagnosis in Hadoop Ecosystems USENIX Association 27th Large Installation System Administration Conference 145 Challenges to Error Diagnosis in Hadoop Ecosystems", + "2429": "Supporting Undoability in Systems Operations Supporting Undoability in Systems Operations", + "2430": "HotRestore: A Fast Restore System for Virtual Machine Cluster HotRestore: A Fast Restore System for Virtual Machine Cluster", + "2431": "Realtime High-Speed Network Traffic Monitoring Using ntopng", + "2432": "Profiling and Modeling Resource Usage of Virtualized Applications", + "2433": "ParaSwift: File I/O Trace Modeling for the Future ParaSwift: File I/O trace modeling for the future", + "2434": "Compiling Abstract Specifications into Concrete Systems-Bringing Order to the Cloud Compiling Abstract Specifications into Concrete Systems -Bringing Order to the Cloud", + "2435": "Towards Detecting Target Link Flooding Attack Towards Detecting Target Link Flooding Attack", + "2436": "Automatic and Dynamic Configuration of Data Compression for Web Servers Automatic and Dynamic Configuration of Data Compression for Web Servers", + "2437": "Spyglass: Demand-Provisioned Linux Containers for Private Network Access Spyglass: Demand-Provisioned Linux Containers for Private Network Access", + "2438": "SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware SF-TAP: Scalable and Flexible Traffic Analysis Platform running on Commodity Hardware", + "2439": "Computer Meteorology: Monitoring Compute Clouds", + "2440": "CLIC: CLient-Informed Caching for Storage Servers", + "2441": "Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery", + "2442": "CiAO: An Aspect-Oriented Operating-System Family for Resource-Constrained Embedded Systems *", + "2443": "Multi-user Data Sharing in Radar Sensor Networks Keywords", + "2444": "A Polynomial-Time Algorithm for Action-Graph Games", + "2445": "COLOCATION GAMES And Their Application to Distributed Resource Management", + "2446": "LINA: Identifying Comparable Documents from Wikipedia", + "2447": "Design and implementation of TCP data probes for reliable and metric-rich network path monitoring", + "2448": "HyFS: A Highly Available Distributed File System", + "2449": "Trusted Computing and Provenance: Better Together", + "2450": "Tracking Back References in a Write-Anywhere File System", + "2451": "unknown_2451", + "2452": "A Framework for Thermal and Performance Management", + "2453": "Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation", + "2454": "Transparent System Call Based Performance Debugging for Cloud Computing", + "2455": "Rethinking Data Management for Storage-centric Sensor Networks *", + "2456": "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 137 iPlane Nano: Path Prediction for Peer-to-Peer Applications", + "2457": "Immediate Multi-Threaded Dynamic Software Updates Using Stack Reconstruction", + "2458": "Obtaining SMT dictionaries for related languages", + "2459": "A Factory of Comparable Corpora from Wikipedia", + "2460": "Using Provenance to Extract Semantic File Attributes", + "2461": "Evaluating SFI for a CISC Architecture", + "2462": "Towards a Secure and Efficient System for End-to-End Provenance", + "2463": "A Critical Analysis of the Council of Europe Recommendations on e-voting", + "2464": "Hera-JVM: Abstracting Processor Heterogeneity Behind a Virtual Machine", + "2465": "Formalising the Swedish Constructicon in Grammatical Framework", + "2466": "Drivolution: Rethinking the Database Driver Lifecycle", + "2467": "THE ADVANCED COMPUTING SYSTEMS ASSOCIATION Investigations of Power Analysis Attacks on Smartcards", + "2468": "Learning from Multiple Cities: A Meta-Learning Approach for Spatial-Temporal Prediction", + "2469": "StrobeLight: Lightweight Availability Mapping and Anomaly Detection", + "2470": "Crom: Faster Web Browsing Using Speculative Execution", + "2471": "Mugshot: Deterministic Capture and Replay for JavaScript Applications", + "2472": "Bunker: A Privacy-Oriented Platform for Network Tracing", + "2473": "Satori: Enlightened page sharing", + "2474": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems POST: A secure, resilient, cooperative messaging system *", + "2475": "Operating System Support for NVM+DRAM Hybrid Main Memory", + "2476": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems TCP offload is a dumb idea whose time has come", + "2477": "SAABNet: Managing Qualitative Knowledge in Software Architecture Assessment", + "2478": "Dynamic Load Balancing in Ceph", + "2479": "USENIX Association Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference", + "2480": "SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies", + "2481": "Provenance for the Cloud", + "2482": "Layering in Provenance Systems", + "2483": "Causality-Based Versioning", + "2484": "SEEdit: SELinux Security Policy Configuration System with Higher Level Language", + "2485": "A Joint Model for Chinese Microblog Sentiment Analysis", + "2486": "The Beauty and the Beast: Vulnerabilities in Red Hat's Packages", + "2487": "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 395 Wishbone: Profile-based Partitioning for Sensornet Applications", + "2488": "unknown_2488", + "2489": "Rethink the Sync!", + "2490": "A NICE Way to Test OpenFlow Applications", + "2491": "Orchestrating the Deployment of Computations in the Cloud with Conductor", + "2492": "Koi: A Location-Privacy Platform for Smartphone Apps", + "2493": "Camdoop: Exploiting In-network Aggregation for Big Data Applications", + "2494": "How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP", + "2495": "XIA: Efficient Support for Evolvable Internetworking", + "2496": "Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing", + "2497": "Toward Predictable Performance in Software Packet-Processing Platforms", + "2498": "An Operating System for the Home", + "2499": "A Multi-Agent Learning Approach to Online Distributed Resource Allocation", + "2500": "Detecting and Defending Against Third-Party Tracking on the Web", + "2501": "Less is More: Trading a little Bandwidth for Ultra-Low Latency in the Data Center", + "2502": "Reliable Client Accounting for P2P-Infrastructure Hybrids", + "2503": "Re-optimizing Data-Parallel Computing", + "2504": "Towards Statistical Queries over Distributed Private User Data", + "2505": "Serval: An End-Host Stack for Service-Centric Networking", + "2506": "Aiding the Detection of Fake Accounts in Large Scale Social Online Services", + "2507": "RPT: Re-architecting Loss Protection for Content-Aware Networks", + "2508": "Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems", + "2509": "Fitting Square Pegs Through Round Pipes Unordered Delivery Wire-Compatible with TCP and TLS", + "2510": "An Adaptive Link Layer for Range Diversity in Multi-radio Mobile Sensor Networks", + "2511": "Don't Lose Sleep Over Availability: The GreenUp Decentralized Wakeup Service", + "2512": "Header Space Analysis: Static Checking For Networks", + "2513": "Jellyfish: Networking Data Centers Randomly", + "2514": "OSA: An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility", + "2515": "Design and Implementation of a Consolidated Middlebox Architecture", + "2516": "Optimizing Data Shuffling in Data-Parallel Computation by Understanding User-Defined Functions", + "2517": "USENIX Association 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13) 15 VeriFlow: Verifying Network-Wide Invariants in Real Time", + "2518": "Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks", + "2519": "Software Defined Traffic Measurement with OpenSketch", + "2520": "Rhea: automatic filtering for unstructured cloud storage", + "2521": "Co-Training as a Human Collaboration Policy", + "2522": "Walkie-Markie: Indoor Pathway Mapping Made Easy", + "2523": "V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics", + "2524": "SoNIC: Precise Realtime Software Access and Control of Wired Networks", + "2525": "Yank: Enabling Green Data Centers to Pull the Plug", + "2526": "Dasu: Pushing Experiments to the Internet's Edge", + "2527": "Stronger Semantics for Low-Latency Geo-Replicated Storage", + "2528": "LOUP: The Principles and Practice of Intra-Domain Route Dissemination", + "2529": "Scalable Rule Management for Data Centers", + "2530": "P3: Toward Privacy-Preserving Photo Sharing", + "2531": "Scaling Memcache at Facebook", + "2532": "Humans Learn Using Manifolds, Reluctantly", + "2533": "Demystifying Page Load Performance with WProf", + "2534": "PinPoint: Localizing Interfering Radios", + "2535": "Expanding Rural Cellular Networks with Virtual Coverage", + "2536": "Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets", + "2537": "Chatty Tenants and the Cloud Network Sharing Problem", + "2538": "MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing", + "2539": "SloMo: Downclocking WiFi Communication", + "2540": "Split/Merge: System Support for Elastic Execution in Virtual Middleboxes", + "2541": "F10: A Fault-Tolerant Engineered Network", + "2542": "Splash: Fast Data Dissemination with Constructive Interference in Wireless Sensor Networks", + "2543": "Incorporating Domain Knowledge into Topic Modeling via Dirichlet Forest Priors", + "2544": "EyeQ: Practical Network Performance Isolation at the Edge", + "2545": "Effective Straggler Mitigation: Attack of the Clones", + "2546": "Composing Software-Defined Networks", + "2547": "Robustness in the Salus scalable block store", + "2548": "Wire Speed Name Lookup: A GPU-based Approach", + "2549": "\u03c0Box: A Platform for Privacy-Preserving Apps", + "2550": "USENIX Association 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13) 71 ArrayTrack: A Fine-Grained Indoor Location System", + "2551": "Ensuring Connectivity via Data Plane Mechanisms", + "2552": "Bobtail: Avoiding Long Tails in the Cloud", + "2553": "Real Time Network Policy Checking using Header Space Analysis", + "2554": "Keepin' It Real: Semi-Supervised Learning with Realistic Tuning", + "2555": "Secure Program Execution via Dynamic Information Flow Tracking", + "2556": "Embassies: Radically Refactoring the Web", + "2557": "USENIX Association 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13) 443 BOSS: Building Operating System Services", + "2558": "Improving availability in distributed systems with failure informers", + "2559": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX 3D Tracking via Body Radio Reflections 3D Tracking via Body Radio Reflections", + "2560": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX GRASS: Trimming Stragglers in Approximation Analytics GRASS: Trimming Stragglers in Approximation Analytics", + "2561": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Operational Experiences with Disk Imaging in a Multi-Tenant Datacenter Operational Experiences with Disk Imaging in a Multi-Tenant Datacenter USENIX Symposium on Networked Systems Design and Implementation-Operational Systems Track", + "2562": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Adtributor: Revenue Debugging in Advertising Systems Adtributor: Revenue Debugging in Advertising Systems", + "2563": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Full Duplex MIMO Radios Full Duplex MIMO Radios", + "2564": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX ipShield: A Framework For Enforcing Context-Aware Privacy ipShield: A Framework For Enforcing Context-Aware Privacy", + "2565": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX cTPM: A Cloud TPM for Cross-Device Trusted Applications cTPM: A Cloud TPM for Cross-Device Trusted Applications", + "2566": "SOME NEW DIRECTIONS IN GRAPH-BASED SEMI-SUPERVISED LEARNING", + "2567": "Introduction to SIGHAN 2015 Bake-off for Chinese Spelling Check", + "2568": "Software Dataplane Verification Mihai Dobrescu and Katerina Argyraki, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne Software Dataplane Verification", + "2569": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX FaRM: Fast Remote Memory FaRM: Fast Remote Memory", + "2570": "Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags", + "2571": "Bolt: Data Management for Connected Homes Bolt: Data management for connected homes", + "2572": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks", + "2573": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms NetVM: High Performance and Flexible Networking using Virtualization on Commodity Platforms", + "2574": "mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems mTCP: A Highly Scalable User-level TCP Stack for Multicore Systems", + "2575": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Easy Freshness with Pequod Cache Joins Easy Freshness with Pequod Cache Joins", + "2576": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Network Virtualization in Multi-tenant Datacenters Network Virtualization in Multi-tenant Datacenters", + "2577": "Statistical Debugging using Latent Topic Models *", + "2578": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX PHY Covert Channels: Can you see the Idles? PHY Covert Channels: Can you see the Idles?", + "2579": "Epsilon: A Visible Light Based Positioning System Epsilon: A Visible Light Based Positioning System", + "2580": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX MICA: A Holistic Approach to Fast In-Memory Key-Value Storage MICA: A Holistic Approach to Fast In-Memory Key-Value Storage", + "2581": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps", + "2582": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Circuit Switching Under the Radar with REACToR Circuit Switching Under the Radar with REACToR", + "2583": "ClickOS and the Art of Network Function Virtualization ClickOS and the Art of Network Function Virtualization", + "2584": "This paper is included in the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14). Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications", + "2585": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Recursively Cautious Congestion Control Recursively Cautious Congestion Control", + "2586": "Tierless Programming and Reasoning for Software-Defined Networks Tierless Programming and Reasoning for Software-Defined Networks", + "2587": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Building Web Applications on Top of Encrypted Data Using Mylar Building web applications on top of encrypted data using Mylar", + "2588": "Kernel Regression with Order Preferences *", + "2589": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area Aggregation and Degradation in JetStream: Streaming analytics in the wide area", + "2590": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX SENIC: Scalable NIC for End-Host Rate Limiting SENIC: Scalable NIC for End-Host Rate Limiting", + "2591": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX High Throughput Data Center Topology Design High Throughput Data Center Topology Design", + "2592": "How Speedy is SPDY? How speedy is SPDY?", + "2593": "Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems", + "2594": "Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks", + "2595": "Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting Environments Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting Environments", + "2596": "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX NetCheck: Network Diagnoses from Blackbox Traces NetCheck: Network Diagnoses from Blackbox Traces", + "2597": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Multi-Person Localization via RF Body Reflections https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/adib USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 279 Multi-Person Localization via RF Body Reflections", + "2598": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Increasing Datacenter Network Utilisation with GRIN Increasing Datacenter Network Utilisation with GRIN", + "2599": "Seeing stars when there aren't many stars: Graph-based semi-supervised learning for sentiment categorization", + "2600": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Succinct: Enabling Queries on Compressed Data Succinct: Enabling Queries on Compressed Data", + "2601": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Information-Agnostic Flow Scheduling for Commodity Data Centers Information-Agnostic Flow Scheduling for Commodity Data Centers", + "2602": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure", + "2603": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Scalable Error Isolation for Distributed Systems Scalable error isolation for distributed systems", + "2604": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Klotski: Reprioritizing Web Content to Improve User Experience on Mobile Devices KLOTSKI: Reprioritizing Web Content to Improve User Experience on Mobile Devices", + "2605": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX FlexRadio: Fully Flexible Radios and Networks FlexRadio: Fully Flexible Radios and Networks", + "2606": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Towards Wifi Mobility without Fast Handover Towards WiFi Mobility without Fast Handover", + "2607": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX PCC: Re-architecting Congestion Control for Consistent High Performance https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/dong USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 395 PCC: Re-architecting Congestion Control for Consistent High Performance", + "2608": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX FastRoute: A Scalable Load-Aware Anycast Routing Architecture for Modern CDNs FastRoute: A Scalable Load-Aware Anycast Routing Architecture for Modern CDNs", + "2609": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX C3: Internet-Scale Control Plane for Video Quality Optimization https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/ganjam USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 131 C3: Internet-Scale Control Plane for Video Quality Optimization", + "2610": "unknown_2610", + "2611": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Queues Don't Matter When You Can JUMP Them! Queues don't matter when you can JUMP them!", + "2612": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Securing RFIDs by Randomizing the Modulation and Channel Securing RFIDs by Randomizing the Modulation and Channel", + "2613": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Explicit Path Control in Commodity Data Centers: Design and Applications Explicit Path Control in Commodity Data Centers: Design and Applications", + "2614": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CellIQ : Real-Time Cellular Network Analytics at Scale CellIQ: Real-Time Cellular Network Analytics at Scale", + "2615": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CoVisor: A Compositional Hypervisor for Software-Defined Networks CoVisor: A Compositional Hypervisor for Software-Defined Networks", + "2616": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Compiling Packet Programs to Reconfigurable Switches Compiling Packet Programs to Reconfigurable Switches", + "2617": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Attaining the Promise and Avoiding the Pitfalls of TCP in the Datacenter Attaining the Promise and Avoiding the Pitfalls of TCP in the Datacenter", + "2618": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Raising the Bar for Using GPUs in Software Packet Processing Raising the Bar for Using GPUs in Software Packet Processing", + "2619": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Kinetic: Verifiable Dynamic Network Control Kinetic: Verifiable Dynamic Network Control", + "2620": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Checking Beliefs in Dynamic Networks Checking Beliefs in Dynamic Networks", + "2621": "N-best Reranking by Multitask Learning", + "2622": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services", + "2623": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Jitsu: Just-In-Time Summoning of Unikernels Jitsu: Just-In-Time Summoning of Unikernels", + "2624": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Making Sense of Performance in Data Analytics Frameworks Making Sense of Performance in Data Analytics Frameworks", + "2625": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX ModNet: A Modular Approach to Network Stack Extension ModNet: A modular approach to network stack extension", + "2626": "Graph Methods for Multilingual FrameNets", + "2627": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX The Design and Implementation of Open vSwitch The Design and Implementation of Open vSwitch", + "2628": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Ripple: Communicating through Physical Vibration USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 265 Ripple: Communicating through Physical Vibration", + "2629": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling", + "2630": "Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Wormhole: Reliable Pub-Sub to Support Geo-replicated Internet Services Wormhole: Reliable Pub-Sub to support Geo-replicated Internet Services", + "2631": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Beyond Sensing: Multi-GHz Realtime Spectrum Analytics https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/shi USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 159 Beyond Sensing: Multi-GHz Realtime Spectrum Analytics", + "2632": "Learning from Bullying Traces in Social Media", + "2633": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX C3: Cutting Tail Latency in Cloud Data Stores via Adaptive Replica Selection/nsdi15/technical-sessions/presentation/suresh USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 513 C3: Cutting Tail Latency in Cloud Data Stores via Adaptive Replica Selection", + "2634": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Global Analytics in the Face of Bandwidth and Regulatory Constraints Global analytics in the face of bandwidth and regulatory constraints", + "2635": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CosTLO: Cost-Effective Redundancy for Lower Latency Variance on Cloud Storage Services CosTLO: Cost-Effective Redundancy for Lower Latency Variance on Cloud Storage Services", + "2636": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CubicRing: Enabling One-Hop Failure Detection and Recovery for Distributed In-Memory Storage Systems CubicRing: Enabling One-Hop Failure Detection and Recovery for Distributed In-Memory Storage Systems", + "2637": "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Enforcing Customizable Consistency Properties in Software-Defined Networks Enforcing Customizable Consistency Properties in Software-Defined Networks", + "2638": "ACBiMA: Advanced Chinese Bi-Character Word Morphological Analyzer", + "2639": "Proceedings of the 2nd Workshop on Computational Linguistics and Clinical Psychology: From Linguistic Signal The Role of Personality, Age and Gender in Tweeting about Mental Illnesses", + "2640": "Enabling ECN in Multi-Service Multi-Queue Data Centers Enabling ECN in Multi-Service Multi-Queue Data Centers", + "2641": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. DFC: Accelerating String Pattern Matching for Network Applications DFC: Accelerating String Pattern Matching for Network Applications", + "2642": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. HUG: Multi-Resource Fairness for Correlated and Elastic Demands HUG: Multi-Resource Fairness for Correlated and Elastic Demands", + "2643": "A Framework for Incorporating General Domain Knowledge into Latent Dirichlet Allocation using First-Order Logic", + "2644": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Cliffhanger: Scaling Performance Cliffs in Web Memory Caches Cliffhanger: Scaling Performance Cliffs in Web Memory Caches", + "2645": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space", + "2646": "Sibyl: A Practical Internet Route Oracle Sibyl: A Practical Internet Route Oracle", + "2647": "Maglev: A Fast and Reliable Software Network Load Balancer Maglev: A Fast and Reliable Software Network Load Balancer", + "2648": "The Design and Implementation of the Warp Transactional Filesystem The Design and Implementation of the Warp Transactional Filesystem", + "2649": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Bitcoin-NG: A Scalable Blockchain Protocol This paper is included in the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16). Bitcoin-NG: A Scalable Blockchain Protocol *", + "2650": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. BUZZ: Testing Context-Dependent Policies in Stateful Networks BUZZ: Testing Context-Dependent Policies in Stateful Networks", + "2651": "A Scalable Multi-User Uplink for Wi-Fi A Scalable Multi-User Uplink for Wi-Fi", + "2652": "An Industrial-Scale Software Defined Internet Exchange Point An Industrial-Scale Software Defined Internet Exchange Point", + "2653": "Scalable and Private Media Consumption with Popcorn Scalable and private media consumption with Popcorn", + "2654": "Extending Logic Programs with Description Logic Expressions for the Semantic Web", + "2655": "Simplifying Software-Defined Network Optimization Using SOL Simplifying Software-Defined Network Optimization Using SOL", + "2656": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Consensus in a Box: Inexpensive Coordination in Hardware Consensus in a Box: Inexpensive Coordination in Hardware", + "2657": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. CFA: A Practical Prediction System for Video QoE Optimization CFA: A Practical Prediction System for Video QoE Optimization", + "2658": "Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions", + "2659": "Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr", + "2660": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/khandelwal USENIX Association 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) 485 BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores", + "2661": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Diplomat: Using Delegations to Protect Community Repositories Diplomat: Using Delegations to Protect Community Repositories", + "2662": "Embark: Securely Outsourcing Middleboxes to the Cloud Embark: Securely Outsourcing Middleboxes to the Cloud", + "2663": "XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers", + "2664": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. iCellular: Device-Customized Cellular Network Access on Commodity Smartphones iCellular: Device-Customized Cellular Network Access on Commodity Smartphones", + "2665": "Well-Supported Semantics for Description Logic Programs", + "2666": "Symmetries and the Complexity of Pure Nash Equilibrium", + "2667": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. FlowRadar: A Better NetFlow for Data Centers FlowRadar: A Better NetFlow for Data Centers", + "2668": "Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard", + "2669": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Be Fast, Cheap and in Control with SwitchKV This paper is included in the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16). Be Fast, Cheap and in Control with SwitchKV", + "2670": "StreamScope: Continuous Reliable Distributed Processing of Big Data Streams STREAMSCOPE: Continuous Reliable Distributed Processing of Big Data Streams", + "2671": "Efficiently Delivering Online Services over Integrated Infrastructure Efficiently Delivering Online Services over Integrated Infrastructure", + "2672": "Universal Packet Scheduling Universal Packet Scheduling", + "2673": "Compiling Path Queries Compiling Path Queries", + "2674": "Polaris: Faster Page Loads Using Fine-grained Dependency Tracking Polaris: Faster Page Loads Using Fine-grained Dependency Tracking", + "2675": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. FairRide: Near-Optimal, Fair Cache Sharing FairRide: Near-Optimal, Fair Cache Sharing", + "2676": "PhyCloak: Obfuscating Sensing from Communication Signals PhyCloak: Obfuscating Sensing from Communication Signals", + "2677": "Learning to Translate with Source and Target Syntax", + "2678": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Ripple II: Faster Communication through Physical Vibration USENIX Association 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) 671 Ripple II: Faster Communication through Physical Vibration", + "2679": "Minimizing Faulty Executions of Distributed Systems Minimizing Faulty Executions of Distributed Systems", + "2680": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Social Hash: An Assignment Framework for Optimizing Distributed Systems Operations on Social Networks Social Hash: an Assignment Framework for Optimizing Distributed Systems Operations on Social Networks", + "2681": "BeamSpy: Enabling Robust 60 GHz Links Under Blockage BeamSpy: Enabling Robust 60 GHz Links Under Blockage", + "2682": "Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network", + "2683": "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. VAST: A Unified Platform for Interactive Network Forensics VAST: A Unified Platform for Interactive Network Forensics", + "2684": "Decimeter-Level Localization with a Single WiFi Access Point Decimeter-Level Localization with a Single WiFi Access Point", + "2685": "Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics", + "2686": "Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds", + "2687": "Speeding up Web Page Loads with Shandian Speeding up Web Page Loads with Shandian", + "2688": "1,001 New Features for Statistical Machine Translation *", + "2689": "Earp: Principled Storage, Sharing, and Protection for Mobile Apps Earp: Principled Storage, Sharing, and Protection for Mobile Apps", + "2690": "AnonRep: Towards Tracking-Resistant Anonymous Reputation AnonRep: Towards Tracking-Resistant Anonymous Reputation", + "2691": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). AdaptSize: Orchestrating the Hot Object Memory Cache in a Content Delivery Network AdaptSize: Orchestrating the Hot Object Memory Cache in a Content Delivery Network", + "2692": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Skip-Correlation for Multi-Power Wireless Carrier Sensing Skip-Correlation for Multi-Power Wireless Carrier Sensing", + "2693": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Curator: Self-Managing Storage for Enterprise Clusters Curator: Self-Managing Storage for Enterprise Clusters", + "2694": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Robust Validation of Network Designs under Uncertain Demands and Failures Robust validation of network designs under uncertain demands and failures", + "2695": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch Enabling Wide-spread Communications on Optical Fabric with MegaSwitch", + "2696": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). A System to Verify Network Behavior of Known Cryptographic Clients A System to Verify Network Behavior of Known Cryptographic Clients", + "2697": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Prio: Private, Robust, and Scalable Computation of Aggregate Statistics Prio: Private, Robust, and Scalable Computation of Aggregate Statistics", + "2698": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Clipper: A Low-Latency Online Prediction Serving System Clipper: A Low-Latency Online Prediction Serving System", + "2699": "A Tool for Constructing Syntax-Directed Editors", + "2700": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). VFP: A Virtual Switch Platform for Host SDN in the Public Cloud VFP: A Virtual Switch Platform for Host SDN in the Public Cloud", + "2701": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads", + "2702": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). APUNet: Revitalizing GPU as Packet Processing Accelerator APUNet: Revitalizing GPU as Packet Processing Accelerator", + "2703": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Efficient Memory Disaggregation with InfInIswap Efficient Memory Disaggregation with INFINISWAP", + "2704": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Delta-net: Real-time Network Verification Using Atoms Delta-net: Real-time Network Verification Using Atoms", + "2705": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). The Design, Implementation, and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files for a File-Storage Service The Design, Implementation, and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files For a File-Storage Service", + "2706": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds", + "2707": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. FlexCore: Massively Parallel and Flexible Processing for Large MIMO Access Points FlexCore: Massively Parallel and Flexible Processing for Large MIMO Access Points", + "2708": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes", + "2709": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Stateless Network Functions: Breaking the Tight Coupling of State and Processing Stateless Network Functions: Breaking the Tight Coupling of State and Processing", + "2710": "Design and Implementation of the CCC Parallel Programming Language", + "2711": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Improving User Perceived Page Load Times Using Gaze Improving User Perceived Page Load Time Using Gaze", + "2712": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). ViewMap: Sharing Private In-Vehicle Dashcam Videos ViewMap: Sharing Private In-Vehicle Dashcam Videos", + "2713": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments Enhancing Security and Privacy of Tor's Ecosystem by using Trusted Execution Environments", + "2714": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. I Can't Believe It's Not Causal! Scalable Causal Consistency with No Slowdown Cascades I Can't Believe It's Not Causal! Scalable Causal Consistency with No Slowdown Cascades", + "2715": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Decibel: Isolation and Sharing in Disaggregated Rack-Scale Storage Decibel: Isolation and Sharing in Disaggregated Rack-Scale Storage", + "2716": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Flexplane: An Experimentation Platform for Resource Management in Datacenters Flexplane: An Experimentation Platform for Resource Management in Datacenters", + "2717": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). SCL: Simplifying Distributed SDN Control Planes SCL: Simplifying Distributed SDN Control Planes", + "2718": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Verifying Reachability in Networks with Mutable Datapaths Verifying Reachability in Networks with Mutable Datapaths", + "2719": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Flowtune: Flowlet Control for Datacenter Networks Flowtune: Flowlet Control for Datacenter Networks", + "2720": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Passive Realtime Datacenter Fault Detection and Localization Passive Realtime Datacenter Fault Detection and Localization", + "2721": "unknown_2721", + "2722": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Correct by Construction Networks Using Stepwise Refinement Correct by Construction Networks using Stepwise Refinement", + "2723": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Evaluating the Power of Flexible Packet Processing for Network Resource Allocation Evaluating the Power of Flexible Packet Processing for Network Resource Allocation", + "2724": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching Let it Flow: Resilient Asymmetric Load Balancing with Flowlet Switching", + "2725": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. FarmBeats: An IoT Platform for Data-Driven Agriculture FarmBeats: An IoT Platform for Data-Driven Agriculture", + "2726": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. FM Backscatter: Enabling Connected Cities and Smart Fabrics FM Backscatter: Enabling Connected Cities and Smart Fabrics", + "2727": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Splinter: Practical Private Queries on Public Data Splinter: Practical Private Queries on Public Data", + "2728": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. vCorfu: A Cloud-Scale Object Store on a Shared Log vCorfu: A Cloud-Scale Object Store on a Shared Log", + "2729": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Facilitating Robust 60 GHz Network Deployment by Sensing Ambient Reflectors Facilitating Robust 60 GHz Network Deployment By Sensing Ambient Reflectors", + "2730": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Automated Bug Removal for Software-Defined Networks Automated Bug Removal for Software-Defined Networks", + "2731": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. TuX 2 : Distributed Graph Computation for Machine Learning TUX 2 : Distributed Graph Computation for Machine Learning", + "2732": "Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks", + "2733": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Live Video Analytics at Scale with Approximation and Delay-Tolerance Live Video Analytics at Scale with Approximation and Delay-Tolerance", + "2734": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Opaque: An Oblivious and Encrypted Distributed Analytics Platform Opaque: An Oblivious and Encrypted Distributed Analytics Platform", + "2735": "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). RAIL: A Case for Redundant Arrays of Inexpensive Links in Data Center Networks RAIL: A Case for Redundant Arrays of Inexpensive Links in Data Center Networks", + "2736": "Consistent Improvement in Translation Quality of Chinese-Japanese Technical Texts by Adding Additional Quasi-parallel Training Data", + "2737": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Balancing on the Edge: Transport Affinity without Network State Balancing on the edge: transport affinity without network state", + "2738": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Copa: Practical Delay-Based Congestion Control for the Internet Copa: Practical Delay-Based Congestion Control for the Internet", + "2739": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. 007: Democratically Finding the Cause of Packet Drops This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). 007: Democratically Finding The Cause of Packet Drops", + "2740": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. LHD: Improving Cache Hit Rate by Maximizing Hit Density This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). LHD: Improving Cache Hit Rate by Maximizing Hit Density", + "2741": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Net2Text: Query-Guided Summarization of Network Forwarding Behaviors This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Net2Text: Query-Guided Summarization of Network Forwarding Behaviors", + "2742": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Odin: Microsoft's Scalable Fault-Tolerant CDN Measurement System This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Odin: Microsoft's Scalable Fault-Tolerant CDN Measurement System", + "2743": "JPure: A Modular Purity System for Java", + "2744": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Larry: Practical Network Reconfigurability in the Data Center This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Larry: Practical Network Reconfigurability in the Data Center", + "2745": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PowerMan: An Out-of-Band Management Network for Datacenters Using Power Line Communication This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). PowerMan: An Out-of-Band Management Network for Datacenters using Power Line Communication", + "2746": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Andromeda: Performance, Isolation, and Velocity at Scale in Cloud Network Virtualization This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Andromeda: Performance, Isolation, and Velocity at Scale in Cloud Network Virtualization", + "2747": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PCC Vivace: Online-Learning Congestion Control This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18)", + "2748": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion", + "2749": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Azure Accelerated Networking: SmartNICs in the Public Cloud Azure Accelerated Networking: SmartNICs in the Public Cloud", + "2750": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Salsify: Low-Latency Network Video through Tighter Integration between a Video Codec and a Transport Protocol This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Salsify: Low-Latency Network Video Through Tighter Integration Between a Video Codec and a Transport Protocol", + "2751": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. LiveTag: Sensing Human-Object Interaction through Passive Chipless WiFi Tags This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). LiveTag: Sensing Human-Object Interaction Through Passive Chipless WiFi Tags", + "2752": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. SnailTrail: Generalizing Critical Paths for Online Analysis of Distributed Dataflows This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). SnailTrail: Generalizing Critical Paths for Online Analysis of Distributed Dataflows *", + "2753": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PASTE: A Network Programming Interface for Non-Volatile Main Memory This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). PASTE: A Network Programming Interface for Non-Volatile Main Memory", + "2754": "Implementing a Language with Flow-Sensitive and Structural Typing on the JVM", + "2755": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. NetChain: Scale-Free Sub-RTT Coordination This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18)", + "2756": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Metron: NFV Service Chains at the True Speed of the Underlying Hardware This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Metron: NFV Service Chains at the True Speed of the Underlying Hardware", + "2757": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Iron: Isolating Network-based CPU in Container Environments This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Iron: Isolating Network-based CPU in Container Environments", + "2758": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Semi-Oblivious Traffic Engineering: The Road Not Taken This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Semi-Oblivious Traffic Engineering: The Road Not Taken", + "2759": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Multi-Path Transport for RDMA in Datacenters This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Multi-Path Transport for RDMA in Datacenters", + "2760": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Towards Battery-Free HD Video Streaming Towards Battery-Free HD Video Streaming", + "2761": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. zkLedger: Privacy-Preserving Auditing for Distributed Ledgers This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). zkLedger: Privacy-Preserving Auditing for Distributed Ledgers", + "2762": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Vesper: Measuring Time-to-Interactivity for Web Pages This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Vesper: Measuring Time-to-Interactivity for Web Pages", + "2763": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Stateless Datacenter Load-balancing with Beamer Stateless Datacenter Load-balancing with Beamer", + "2764": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). SafeBricks: Shielding Network Functions in the Cloud SafeBricks: Shielding Network Functions in the Cloud", + "2765": "FLP Semantics Without Circular Justifications for General Logic Programs", + "2766": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Inaudible Voice Commands: The Long-Range Attack and Defense This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Inaudible Voice Commands: The Long-Range Attack and Defense", + "2767": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Approximating Fair Queueing on Reconfigurable Switches This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Approximating Fair Queueing on Reconfigurable Switches", + "2768": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Distributed Network Monitoring and Debugging with SwitchPointer This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Distributed Network Monitoring and Debugging with SwitchPointer", + "2769": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Stroboscope: Declarative Network Monitoring on a Budget This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Stroboscope: Declarative Network Monitoring on a Budget", + "2770": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. ResQ: Enabling SLOs in Network Function Virtualization This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). ResQ: Enabling SLOs in Network Function Virtualization", + "2771": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PLOVER: Fast, Multi-core Scalable Virtual Machine Fault-tolerance This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). PLOVER: Fast, Multi-core Scalable Virtual Machine Fault-tolerance", + "2772": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Elastic Scaling of Stateful Network Functions Elastic Scaling of Stateful Network Functions", + "2773": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. G-NET: Effective GPU Sharing in NFV Systems This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). G-NET: Effective GPU Sharing in NFV Systems", + "2774": "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Deepview: Virtual Disk Failure Diagnosis and Pattern Detection for Azure This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Deepview: Virtual Disk Failure Diagnosis and Pattern Detection for Azure", + "2775": "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Automatically Correcting Networks with NEAt Automatically Correcting Networks with NEAt", + "2776": "Comparison of Internet Traffic Classification Tools", + "2777": "On the Hardness and Existence of Quasi-Strict Equilibria", + "2778": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks", + "2779": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Hydra: a federated resource manager for data-center scale analytics Hydra: a federated resource manager for data-center scale analytics", + "2780": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). TrackIO: Tracking First Responders Inside-Out TrackIO: Tracking First Responders Inside-Out", + "2781": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Size-aware Sharding For Improving Tail Latencies in In-memory Key-value Stores Size-aware Sharding For Improving Tail Latencies in In-memory Key-value Stores", + "2782": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Is advance knowledge of flow sizes a plausible assumption? Is advance knowledge of flow sizes a plausible assumption?", + "2783": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Tiresias: A GPU Cluster Manager for Distributed Deep Learning Tiresias: A GPU Cluster Manager for Distributed Deep Learning", + "2784": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-cost Radios SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-Cost Radios", + "2785": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Scaling Community Cellular Networks with CommunityCellularManager Scaling Community Cellular Networks with CommunityCellularManager", + "2786": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). NetScatter: Enabling Large-Scale Backscatter Networks NetScatter: Enabling Large-Scale Backscatter Networks", + "2787": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Blink: Fast Connectivity Recovery Entirely in the Data Plane Blink: Fast Connectivity Recovery Entirely in the Data Plane", + "2788": "Bipartite Index Coding", + "2789": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Performance Contracts for Software Network Functions Performance Contracts for Software Network Functions", + "2790": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Janus: Fast and Flexible Deep Learning via Symbolic Graph Execution of Imperative Programs JANUS: Fast and Flexible Deep Learning via Symbolic Graph Execution of Imperative Programs", + "2791": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Stable and Practical AS Relationship Inference with ProbLink Stable and Practical AS Relationship Inference with ProbLink", + "2792": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Many-to-Many Beam Alignment in Millimeter Wave Networks Many-to-Many Beam Alignment in Millimeter Wave Networks", + "2793": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shinjuku: Preemptive Scheduling for \u00b5second-scale Tail Latency Shinjuku: Preemptive Scheduling for \u00b5second-scale Tail Latency", + "2794": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Datacenter RPCs can be General and Fast Datacenter RPCs can be General and Fast", + "2795": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Correctness and Performance for Stateful Chained Network Functions Correctness and Performance for Stateful Chained Network Functions", + "2796": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Confluo: Distributed Monitoring and Diagnosis Stack for High-speed Networks Confluo: Distributed Monitoring and Diagnosis Stack for High-speed Networks", + "2797": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). FreeFlow: Software-based Virtual RDMA Networking for Containerized Clouds FreeFlow: Software-based Virtual RDMA Networking for Containerized Clouds", + "2798": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). DETER: Deterministic TCP Replay for Performance Diagnosis DETER: Deterministic TCP Replay for Performance Diagnosis", + "2799": "Wireless Peer-to-Peer Scheduling in Mobile Networks", + "2800": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Towards Programming the Radio Environment with Large Arrays of Inexpensive Antennas Towards Programming the Radio Environment with Large Arrays of Inexpensive Antennas", + "2801": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Alembic: Automated Model Inference for Stateful Network Functions Alembic: Automated Model Inference for Stateful Network Functions *", + "2802": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads", + "2803": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Exploiting Commutativity For Practical Fast Replication Exploiting Commutativity For Practical Fast Replication", + "2804": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). FlowBlaze: Stateful Packet Processing in Hardware FlowBlaze: Stateful Packet Processing in Hardware", + "2805": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shuffling, Fast and Slow: Scalable Analytics on Serverless Infrastructure Shuffling, Fast and Slow: Scalable Analytics on Serverless Infrastructure", + "2806": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Eiffel: Efficient and Flexible Software Packet Scheduling Eiffel: Efficient and Flexible Software Packet Scheduling", + "2807": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shoal: A Network Architecture for Disaggregated Racks Shoal: A Network Architecture for Disaggregated Racks", + "2808": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Direct Universal Access: Making Data Center Resources Available to FPGA Direct Universal Access: Making Data Center Resources Available to FPGA", + "2809": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Deniable Upload and Download via Passive Participation Deniable Upload and Download via Passive Participation", + "2810": "Efficient Algorithms for Renewable Energy Allocation to Delay Tolerant Consumers", + "2811": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Loom: Flexible and Efficient NIC Packet Scheduling Loom: Flexible and Efficient NIC Packet Scheduling", + "2812": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). BLAS-on-flash: An Efficient Alternative for Large Scale ML Training and Inference? BLAS-on-flash : An Efficient Alternative for Large Scale ML Training and Inference?", + "2813": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Model-Agnostic and Efficient Exploration of Numerical State Space of Real-World TCP Congestion Control Implementations Model-Agnostic and Efficient Exploration of Numerical State Space of Real-World TCP Congestion Control Implementations", + "2814": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). NetBouncer: Active Device and Link Failure Localization in Data Center Networks NetBouncer: Active Device and Link Failure Localization in Data Center Networks", + "2815": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Monoxide: Scale out Blockchains with Asynchronous Consensus Zones Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones", + "2816": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Pushing the Range Limits of Commercial Passive RFIDs Pushing the Range Limits of Commercial Passive RFIDs", + "2817": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs", + "2818": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). End-to-end I/O Monitoring on a Leading Supercomputer End-to-end I/O Monitoring on a Leading Supercomputer", + "2819": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). dShark: A General, Easy to Program and Scalable Framework for Analyzing In-network Packet Traces dShark: A General, Easy to Program and Scalable Framework for Analyzing In-network Packet Traces", + "2820": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Understanding Lifecycle Management Complexity of Datacenter Topologies Understanding Lifecycle Management Complexity of Datacenter Topologies", + "2821": "Optimal Pricing in a Free Market Wireless Network", + "2822": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Minimal Rewiring: Efficient Live Expansion for Clos Data Center Networks Minimal Rewiring: Efficient Live Expansion for Clos Data Center Networks", + "2823": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Slim: OS Kernel Support for a Low-Overhead Container Overlay Network Slim: OS Kernel Support for a Low-Overhead Container Overlay Network", + "2824": "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Stardust: Divide and Conquer in the Data Center Network Stardust: Divide and Conquer in the Data Center Network", + "2825": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Firecracker: Lightweight Virtualization for Serverless Applications Firecracker: Lightweight Virtualization for Serverless Applications", + "2826": "CarMap: Fast 3D Feature Map Updates for Automobiles This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) CarMap: Fast 3D Feature Map Updates for Automobiles", + "2827": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) SP-PIFO: Approximating Push-In First-Out Behaviors using Strict-Priority Queues SP-PIFO: Approximating Push-In First-Out Behaviors using Strict-Priority Queues", + "2828": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency", + "2829": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Config2Spec: Mining Network Specifications from Network Configurations Config2Spec: Mining Network Specifications from Network Configurations", + "2830": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Millions of Tiny Databases Millions of Tiny Databases", + "2831": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Gryff: Unifying Consensus and Shared Registers Gryff: Unifying Consensus and Shared Registers", + "2832": "Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity", + "2833": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control", + "2834": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) AmphiLight: Direct Air-Water Communication with Laser Light AmphiLight: Direct Air-Water Communication with Laser Light", + "2835": "Predicate-Argument Structure-based Preordering for Japanese-English Statistical Machine Translation of Scientific Papers", + "2836": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Re-architecting Congestion Management in Lossless Ethernet Re-architecting Congestion Management in Lossless Ethernet", + "2837": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat", + "2838": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust", + "2839": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Telekine: Secure Computing with Cloud GPUs Telekine: Secure Computing with Cloud GPUs", + "2840": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) TCP \u2248 RDMA: CPU-efficient Remote Storage Access with i10 TCP \u2248 RDMA: CPU-efficient Remote Storage Access with i10", + "2841": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Measuring Congestion in High-Performance Datacenter Interconnects Measuring Congestion in High-Performance Datacenter Interconnects", + "2842": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Finding Network Misconfigurations by Automatic Template Inference Finding Network Misconfigurations by Automatic Template Inference", + "2843": "Learning to Extract Relations from the Web using Minimal Supervision", + "2844": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) NetTLP: A Development Platform for PCIe devices in Software Interacting with Hardware NetTLP: A Development Platform for PCIe devices in Software Interacting with Hardware", + "2845": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Performant TCP for Low-Power Wireless Networks Performant TCP for Low-Power Wireless Networks", + "2846": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Sol: Fast Distributed Computation Over Slow Networks Sol: Fast Distributed Computation Over Slow Networks", + "2847": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Batchy: Batch-scheduling Data Flow Graphs with Service-level Objectives Batchy: Batch-scheduling Data Flow Graphs with Service-level Objectives", + "2848": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) VMscatter: A Versatile MIMO Backscatter VMscatter: A Versatile MIMO Backscatter", + "2849": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Understanding, Detecting and Localizing Partial Failures in Large System Software Understanding, Detecting and Localizing Partial Failures in Large System Software", + "2850": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Themis: Fair and Efficient GPU Cluster Scheduling THEMIS: Fair and Efficient GPU Cluster Scheduling", + "2851": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Experiences with Modeling Network Topologies at Multiple Levels of Abstraction Experiences with Modeling Network Topologies at Multiple Levels of Abstraction", + "2852": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) AccelTCP: Accelerating Network Applications with Stateful TCP Offloading AccelTCP: Accelerating Network Applications with Stateful TCP Offloading", + "2853": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Adapting TCP for Reconfigurable Datacenter Networks Adapting TCP for Reconfigurable Datacenter Networks", + "2854": "Coarse-to-Fine Syntactic Machine Translation using Language Projections", + "2855": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Programmable Calendar Queues for High-speed Packet Scheduling Programmable Calendar Queues for High-speed Packet Scheduling", + "2856": "Learning Relaxed Belady for Content Distribution Network Caching This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Learning Relaxed Belady for Content Distribution Network Caching", + "2857": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) FLAIR: Accelerating Reads with Consistency-Aware Network Routing FLAIR: Accelerating Reads with Consistency-Aware Network Routing", + "2858": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Near-Optimal Latency Versus Cost Tradeoffs in Geo-Distributed Storage Near-Optimal Latency Versus Cost Tradeoffs in Geo-Distributed Storage", + "2859": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Is Big Data Performance Reproducible in Modern Cloud Networks? Is Big Data Performance Reproducible in Modern Cloud Networks?", + "2860": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Diamond-Miner: Comprehensive Discovery of the Internet's Topology Diamonds Diamond-Miner: Comprehensive Discovery of the Internet's Topology Diamonds", + "2861": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Learning in situ: a randomized experiment in video streaming Learning in situ: a randomized experiment in video streaming", + "2862": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) FileMR: Rethinking RDMA Networking for Scalable Persistent Memory FileMR: Rethinking RDMA Networking for Scalable Persistent Memory", + "2863": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Check before You Change: Preventing Correlated Failures in Service Updates Check before You Change: Preventing Correlated Failures in Service Updates", + "2864": "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) APKeep: Realtime Verification for Real Networks APKeep: Realtime Network Verification for Real Networks", + "2865": "Prototype-Driven Learning for Sequence Models", + "2866": "Weblio Pre-reordering Statistical Machine Translation System", + "2867": "Forest-to-String SMT for Asian Language Translation: NAIST at WAT 2014", + "2868": "Buzzenger: Asynchronous (Time-Sliced) Missed Call Duration Messaging", + "2869": "Speed-Breaker Early Warning System", + "2870": "Intelligent Transport Systems for Indian Cities", + "2871": "IVR Junction: Building Scalable and Distributed Voice Forums in the Developing World", + "2872": "A Service Adaptation Middleware for Delay Tolerant Network based on HTTP Simple Queue Service", + "2873": "The Moving Cloud: Predictive Placement in the Wild", + "2874": "An Evaluation of Web Acceleration Techniques for the Developing World *", + "2875": "Enabling MAC Protocol Implementations on Software-Defined Radios", + "2876": "Prototype-Driven Grammar Induction", + "2877": "unknown_2877", + "2878": "Opportunities and Challenges Of Machine Learning Accelerators In Production", + "2879": "Shooting the moving target: machine learning in cybersecurity Shooting the moving target: machine learning in cybersecurity", + "2880": "Stratum: A Serverless Framework for the Lifecycle Management of Machine Learning-based Data Analytics Tasks Stratum: A Serverless Framework for the Lifecycle Management of Machine Learning-based Data Analytics Tasks", + "2881": "KnowledgeNet: Disaggregated and Distributed Training and Serving of Deep Neural Networks KnowledgeNet: Disaggregated and Distributed Training and Serving of Deep Neural Networks", + "2882": "Towards Taming the Resource and Data Heterogeneity in Federated Learning Towards Taming the Resource and Data Heterogeneity in Federated Learning", + "2883": "MPP: Model Performance Predictor MPP: Model Performance Predictor", + "2884": "tensorflow-tracing: A Performance Tuning Framework for Production tensorflow-tracing: A Performance Tuning Framework for Production", + "2885": "TonY: An Orchestrator for Distributed Machine Learning Jobs TonY: An Orchestrator for Distributed Machine Learning Jobs", + "2886": "Transfer Learning for Performance Modeling of Deep Neural Network Systems Transfer Learning for Performance Modeling of Deep Neural Network Systems", + "2887": "A Hierarchical Pitman-Yor Process HMM for Unsupervised Part of Speech Induction", + "2888": "Taming the Computational Complexity of Combinatorial Auctions: Optimal and Approximate Approaches", + "2889": "MLOp Lifecycle Scheme for Vision-based Inspection Process in Manufacturing MLOp Lifecycle Scheme for Vision-based Inspection Process in Manufacturing", + "2890": "Deep Learning Inference Service at Microsoft Deep Learning Inference Service at Microsoft", + "2891": "Low-latency Job Scheduling with Preemption for the Development of Deep Learning Low-latency Job Scheduling with Preemption for the Development of Deep Learning", + "2892": "Disdat: Bundle Data Management for Machine Learning Pipelines Disdat: Bundle Data Management for Machine Learning Pipelines", + "2893": "Accelerating Large Scale Deep Learning Inference through DeepCPU at Microsoft Accelerating Large Scale Deep Learning Inference through DeepCPU at Microsoft", + "2894": "Katib: A Distributed General AutoML Platform on Kubernetes Katib: A Distributed General AutoML Platform on Kubernetes", + "2895": "Challenges and Experiences with MLOps for Performance Diagnostics in Hybrid-Cloud Enterprise Software Deployments Challenges and Experiences with MLOps for Performance Diagnostics in Hybrid-Cloud Enterprise Software Deployments", + "2896": "Detecting Feature Eligibility Illusions in Enterprise AI Autopilots", + "2897": "DLSpec: A Deep Learning Task Exchange Specification DLSpec: A Deep Learning Task Exchange Specification", + "2898": "RIANN: Real-time Incremental Learning with Approximate Nearest Neighbor on Mobile Devices RIANN: Real-time Incremental Learning with Approximate Nearest Neighbor on Mobile Devices", + "2899": "A Bayesian Approach to Unsupervised Semantic Role Induction", + "2900": "Finding Bottleneck in Machine Learning Model Life Cycle Finding Bottleneck in Machine Learning Model Life Cycle", + "2901": "Time Travel and Provenance for Machine Learning Pipelines", + "2902": "An Experimentation and Analytics Framework for Large-Scale AI Operations Platforms An Experimentation and Analytics Framework for Large-Scale AI Operations Platforms", + "2903": "Auto Content Moderation in C2C e-Commerce Auto Content Moderation in C2C e-Commerce", + "2904": "Challenges Towards Production-Ready Explainable Machine Learning Challenges Towards Production-Ready Explainable Machine Learning", + "2905": "FlexServe: Deployment of PyTorch Models as Flexible REST Endpoints FlexServe: Deployment of PyTorch Models as Flexible REST Endpoints", + "2906": "A Clean-Slate Look at Disk Scrubbing", + "2907": "Efficient Object Storage Journaling in a Distributed Parallel File System", + "2908": "Proceedings of the Special Workshop on Intelligence at the Network Edge Towards a Platform for Intelligent Activity at the Edge", + "2909": "Overview of the 1st Workshop on Asian Translation", + "2910": "Domain Adaptation by Constraining Inter-Domain Variability of Latent Feature Representation", + "2911": "Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels", + "2912": "Automated Concurrency-Bug Fixing", + "2913": "Be Conservative: Enhancing Failure Diagnosis with Proactive Logging", + "2914": "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 93 COMET: Code Offload by Migrating Execution Transparently", + "2915": "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 179 Dissent in Numbers: Making Strong Anonymity Scale", + "2916": "Dune: Safe User-level Access to Privileged CPU Features", + "2917": "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 31 GraphChi: Large-Scale Graph Computation on Just a PC", + "2918": "Efficient patch-based auditing for web application vulnerabilities", + "2919": "Spanner: Google's Globally-Distributed Database", + "2920": "Making Geo-Replicated Systems Fast as Possible, Consistent when Necessary", + "2921": "Bootstrapping Semantic Analyzers from Non-Contradictory Texts", + "2922": "DJoin: Differentially Private Join Queries over Distributed Databases", + "2923": "PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs", + "2924": "Experiences from a Decade of TinyOS Development", + "2925": "All about Eve: Execute-Verify Replication for Multi-Core Servers", + "2926": "CleanOS: Limiting Mobile Data Exposure with Idle Eviction", + "2927": "Performance Isolation and Fairness for Multi-Tenant Cloud Storage", + "2928": "Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE", + "2929": "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 307 X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software", + "2930": "Hails: Protecting Data Privacy in Untrusted Web Applications", + "2931": "SymDrive: Testing Drivers without Devices", + "2932": "Online Graph Planarisation for Synchronous Parsing of Semantic and Syntactic Dependencies", + "2933": "MegaPipe: A New Programming Interface for Scalable Network I/O", + "2934": "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 1 Flat Datacenter Storage", + "2935": "Improving Integer Security for Systems with KINT", + "2936": "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 107 AppInsight: Mobile App Performance Monitoring in the Wild", + "2937": "End-to-end Performance Isolation Through Virtual Datacenters End-to-end Performance Isolation through Virtual Datacenters", + "2938": "A Self-Configurable Geo-Replicated Cloud Storage System A Self-Configurable Geo-Replicated Cloud Storage System", + "2939": "Pelican: A Building Block for Exascale Cold Data Storage Pelican: A building block for exascale cold data storage", + "2940": "Shielding Applications from an Untrusted Cloud with Haven Shielding applications from an untrusted cloud with Haven", + "2941": "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency", + "2942": "Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing", + "2943": "A Joint Model of Text and Aspect Ratings for Sentiment Summarization", + "2944": "Detecting Covert Timing Channels with Time-Deterministic Replay Detecting Covert Timing Channels with Time-Deterministic Replay", + "2945": "Identifying Information Disclosure in Web Applications with Retroactive Auditing Identifying information disclosure in web applications with retroactive auditing", + "2946": "The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services The Mystery Machine: End-to-end performance analysis of large-scale Internet services", + "2947": "Eidetic Systems Eidetic Systems", + "2948": "SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration", + "2949": "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. GraphX: Graph Processing in a Distributed Dataflow Framework GraphX: Graph Processing in a Distributed Dataflow Framework", + "2950": "Ironclad Apps: End-to-End Security via Automated Full-System Verification Ironclad Apps: End-to-End Security via Automated Full-System Verification", + "2951": "GPUnet: Networking Abstractions for GPU Programs GPUnet: Networking Abstractions for GPU Programs", + "2952": "Code-Pointer Integrity Code-Pointer Integrity", + "2953": "Scaling Distributed Machine Learning with the Parameter Server Scaling Distributed Machine Learning with the Parameter Server", + "2954": "Optimal Parsing Strategies for Linear Context-Free Rewriting Systems", + "2955": "Physical Disentanglement in a Container-Based File System Physical Disentanglement in a Container-Based File System", + "2956": "SHILL: A Secure Shell Scripting Language SHILL: A Secure Shell Scripting Language", + "2957": "Extracting More Concurrency from Distributed Transactions Extracting More Concurrency from Distributed Transactions", + "2958": "Pydron: Semi-Automatic Parallelization for Multi-Core and the Cloud Pydron: semi-automatic parallelization for multi-core and the cloud", + "2959": "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. f4: Facebook's Warm BLOB Storage System f4: Facebook's Warm BLOB Storage System", + "2960": "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Phase Reconciliation for Contended In-Memory Transactions Phase Reconciliation for Contended In-Memory Transactions", + "2961": "Arrakis: The Operating System is the Control Plane Arrakis: The Operating System is the Control Plane", + "2962": "All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications", + "2963": "User-Guided Device Driver Synthesis", + "2964": "Willow: A User-Programmable SSD Willow: A User-Programmable SSD", + "2965": "Reliable and Efficient Programming Abstractions for Wireless Sensor Networks", + "2966": "Protecting Users by Confining JavaScript with COWL Protecting Users by Confining JavaScript with COWL", + "2967": "The Power of Choice in Data-Aware Cluster Scheduling The Power of Choice in Data-Aware Cluster Scheduling", + "2968": "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Jitk: A Trustworthy In-Kernel Interpreter Infrastructure Jitk: A Trustworthy In-Kernel Interpreter Infrastructure", + "2969": "Characterizing Storage Workloads with Counter Stacks Characterizing Storage Workloads with Counter Stacks", + "2970": "Salt: Combining ACID and BASE in a Distributed Database Salt: Combining ACID and BASE in a Distributed Database", + "2971": "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems Simple Testing Can Prevent Most Critical Failures An Analysis of Production Failures in Distributed Data-intensive Systems", + "2972": "Decoupling Cores, Kernels, and Operating Systems Decoupling Cores, Kernels, and Operating Systems", + "2973": "Heading Off Correlated Failures through Independence-as-a-Service Heading Off Correlated Failures through Independence-as-a-Service", + "2974": "Customizable and Extensible Deployment for Mobile/Cloud Applications Customizable and Extensible Deployment for Mobile/Cloud Applications", + "2975": "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. lprof: A Non-intrusive Request Flow Profiler for Distributed Systems lprof : A Non-intrusive Request Flow Profiler for Distributed Systems", + "2976": "Green Enterprise Computing Data: Assumptions and Realities", + "2977": "Torturing Databases for Fun and Profit Torturing Databases for Fun and Profit", + "2978": "Fast Databases with Fast Durability and Recovery Through Multicore Parallelism Fast Databases with Fast Durability and Recovery Through Multicore Parallelism", + "2979": "Robust Unsupervised and Semi-Supervised Methods in Natural Language Processing", + "2980": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Slicer: Auto-Sharding for Datacenter Applications Slicer: Auto-Sharding for Datacenter Applications", + "2981": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Correlated Crash Vulnerabilities Correlated Crash Vulnerabilities", + "2982": "Unobservable Communication over Fully Untrusted Infrastructure Unobservable communication over fully untrusted infrastructure", + "2983": "SCONE: Secure Linux Containers with Intel SGX SCONE: Secure Linux Containers with Intel SGX", + "2984": "DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services DQBarge: Improving data-quality tradeoffs in large-scale Internet services", + "2985": "To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code", + "2986": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Network Requirements for Resource Disaggregation Network Requirements for Resource Disaggregation", + "2987": "Maximizing the Contact Opportunity for Vehicular Internet Access", + "2988": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Firmament: Fast, Centralized Cluster Scheduling at Scale Firmament: fast, centralized cluster scheduling at scale", + "2989": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Altruistic Scheduling in Multi-Resource Clusters Altruistic Scheduling in Multi-Resource Clusters", + "2990": "Graphene: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters G: Packing and Dependency-aware Scheduling for Data-Parallel Clusters", + "2991": "CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels", + "2992": "Incremental Consistency Guarantees for Replicated Objects Incremental Consistency Guarantees for Replicated Objects", + "2993": "Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data", + "2994": "Morpheus: Towards Automated SLOs for Enterprise Clusters Morpheus: Towards Automated SLOs for Enterprise Clusters", + "2995": "Machine-Aware Atomic Broadcast Trees for Multicores Machine-aware Atomic Broadcast Trees for Multicores", + "2996": "FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs FaSST: Fast, Scalable and Simple Distributed Transactions with Two-sided (RDMA) Datagram RPCs", + "2997": "Coordinated and Efficient Huge Page Management with Ingens Coordinated and Efficient Huge Page Management with Ingens", + "2998": "Detecting Research Topics via the Correlation between Graphs and Texts", + "2999": "Clustering Query Refinements by User Intent", + "3000": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Just say NO to Paxos Overhead: Replacing Consensus with Network Ordering Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering", + "3001": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Don't Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems Understand and Eliminate JVM Warm-up Overhead in Data-parallel Systems", + "3002": "Light-Weight Contexts: An OS Abstraction for Safety and Performance Light-weight Contexts: An OS Abstraction for Safety and Performance", + "3003": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. XFT: Practical Fault Tolerance beyond Crashes XFT: Practical Fault Tolerance Beyond Crashes", + "3004": "The SNOW Theorem and Latency-Optimal Read-Only Transactions The SNOW Theorem and Latency-Optimal Read-Only Transactions", + "3005": "Consolidating Concurrency Control and Consensus for Commits under Conflicts Consolidating Concurrency Control and Consensus for Commits under Conflicts", + "3006": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Yak: A High-Performance Big-Data-Friendly Garbage Collector Yak: A High-Performance Big-Data-Friendly Garbage Collector", + "3007": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. NetBricks: Taking the V out of NFV NetBricks: Taking the V out of NFV", + "3008": "Big Data Analytics over Encrypted Datasets with Seabed Big Data Analytics over Encrypted Datasets with Seabed", + "3009": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. RE X : A Development Platform and Online Learning Approach for Runtime Emergent Software Systems RE X : A Development Platform and Online Learning Approach for Runtime Emergent Software Systems", + "3010": "Joint Energy Management and Resource Allocation in Rechargeable Sensor Networks", + "3011": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. JetStream: Cluster-Scale Parallelization of Information Flow Queries JetStream: Cluster-scale parallelization of information flow queries", + "3012": "EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding EC-Cache: Load-balanced, Low-latency Cluster Caching with Online Erasure Coding", + "3013": "EbbRT: A Framework for Building Per-Application Library Operating Systems EbbRT: A Framework for Building Per-Application Library Operating Systems", + "3014": "Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent Realizing the fault-tolerance promise of cloud storage using locks with intent", + "3015": "Fast and Concurrent RDF Queries with RDMA- Based Distributed Graph Exploration Fast and Concurrent RDF Queries with RDMA-based Distributed Graph Exploration", + "3016": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Simplifying Datacenter Network Debugging with PathDump Simplifying Datacenter Network Debugging with PathDump", + "3017": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Intermittent Computation without Hardware Support or Programmer Intervention Intermittent Computation without Hardware Support or Programmer Intervention", + "3018": "Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services", + "3019": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Clarinet: WAN-Aware Optimization for Analytics Queries CLARINET: WAN-Aware Optimization for Analytics Queries", + "3020": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Shuffler: Fast and Deployable Continuous Code Re-Randomization Shuffler: Fast and Deployable Continuous Code Re-Randomization", + "3021": "Alpha Coverage: Bounding the Interconnection Gap for Vehicular Internet Access", + "3022": "Early Detection of Configuration Errors to Reduce Failure Damage Early Detection of Configuration Errors to Reduce Failure Damage", + "3023": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications Diamond: Automating Data Management and Storage for Wide-area, Reactive Applications", + "3024": "Exploring the Hidden Dimension in Graph Processing Exploring the Hidden Dimension in Graph Processing", + "3025": "History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters", + "3026": "Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle Non-intrusive Performance Profiling for Entire Software Stacks based on the Flow Reconstruction Principle", + "3027": "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Gemini: A Computation-Centric Distributed Graph Processing System Gemini: A Computation-Centric Distributed Graph Processing System", + "3028": "Fault-Tolerance, Fast and Slow: Exploiting Failure Asynchrony in Distributed Systems Fault-Tolerance, Fast and Slow: Exploiting Failure Asynchrony in Distributed Systems", + "3029": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. An Analysis of Network-Partitioning Failures in Cloud Systems An Analysis of Network-Partitioning Failures in Cloud Systems", + "3030": "Neural Question Answering at BioASQ 5B", + "3031": "RobinHood: Tail Latency Aware Caching- Dynamic Reallocation from Cache-Rich to Cache-Poor RobinHood: Tail Latency-Aware Caching - Dynamically Reallocating from Cache-Rich to Cache-Poor", + "3032": "Hierarchical Spatial Gossip for Multi-Resolution Representations in Sensor Networks", + "3033": "Orca: Differential Bug Localization in Large-Scale Services Orca: Differential Bug Localization in Large-Scale Services", + "3034": "Verifying concurrent software using movers in CspeC Verifying concurrent software using movers in CSPEC", + "3035": "TVM: An Automated End-to-End Optimizing Compiler for Deep Learning TVM: An Automated End-to-End Optimizing Compiler for Deep Learning", + "3036": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Obladi: Oblivious Serializable Transactions in the Cloud Obladi: Oblivious Serializable Transactions in the Cloud", + "3037": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. REPT: Reverse Debugging of Failures in Deployed Software REPT: Reverse Debugging of Failures in Deployed Software", + "3038": "The benefits and costs of writing a POSIX kernel in a high-level language The benefits and costs of writing a POSIX kernel in a high-level language", + "3039": "Flare: Optimizing Apache Spark with Native Compilation for Scale-Up Architectures and Medium-Size Data Flare: Optimizing Apache Spark with Native Compilation for Scale-Up Architectures and Medium-Size Data", + "3040": "Noria: dynamic, partially-stateful data-flow for high-performance web applications Noria: dynamic, partially-stateful data-flow for high-performance web applications", + "3041": "Focus: Querying Large Video Datasets with Low Latency and Low Cost Focus: Querying Large Video Datasets with Low Latency and Low Cost", + "3042": "Capturing and Enhancing In Situ System Observability for Failure Detection Capturing and Enhancing In Situ System Observability for Failure Detection", + "3043": "Shape Segmentation and Applications in Sensor Networks", + "3044": "Proving confidentiality in a file system using Disksec Proving confidentiality in a file system using DISKSEC", + "3045": "ASAP: Fast, Approximate Graph Pattern Mining at Scale ASAP: Fast, Approximate Graph Pattern Mining at Scale", + "3046": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Differential Energy Profiling: Energy Optimization via Diffing Similar Apps Differential Energy Profiling: Energy Optimization via Diffing Similar Apps", + "3047": "Three steps is all you need: fast, accurate, automatic scaling decisions for distributed streaming dataflows Three steps is all you need: fast, accurate, automatic scaling decisions for distributed streaming dataflows", + "3048": "Sharing, Protection and Compatibility for Reconfigurable Fabric with AmorphoS Sharing, Protection, and Compatibility for Reconfigurable Fabric with AMORPHOS", + "3049": "Pocket: Elastic Ephemeral Storage for Serverless Analytics Pocket: Elastic Ephemeral Storage for Serverless Analytics", + "3050": "ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks", + "3051": "Splinter: Bare-Metal Extensions for Multi-Tenant Low-Latency Storage Splinter: Bare-Metal Extensions for Multi-Tenant Low-Latency Storage", + "3052": "Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis", + "3053": "Pretzel: Opening the Black Box of Machine Learning Prediction Serving Systems PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems", + "3054": "Staying in the Middle: Exact and Approximate Medians in R 1 and R 2 for Moving Points *", + "3055": "The FuzzyLog: A Partially Ordered Shared Log The FuzzyLog: A Partially Ordered Shared Log", + "3056": "Dynamic Query Re-Planning using QOOP Dynamic Query Re-Planning Using QOOP", + "3057": "Finding Crash-Consistency Bugs with Bounded Black-Box Crash Testing Finding Crash-Consistency Bugs with Bounded Black-Box Crash Testing", + "3058": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Floem: A Programming System for NIC-Accelerated Network Applications Floem: A Programming System for NIC-Accelerated Network Applications", + "3059": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Arachne: Core-Aware Thread Management Arachne: Core-Aware Thread Management", + "3060": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Sledgehammer: Cluster-Fueled Debugging Sledgehammer: Cluster-fueled debugging", + "3061": "Proving the correct execution of concurrent services in zero-knowledge Proving the correct execution of concurrent services in zero-knowledge", + "3062": "LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation", + "3063": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. \u00b5Tune: Auto-Tuned Threading for OLDI Microservices \u00b5Tune: Auto-Tuned Threading for OLDI Microservices", + "3064": "Maelstrom: Mitigating Datacenter-level Disasters by Draining Interdependent Traffic Safely and Efficiently Maelstrom: Mitigating Datacenter-level Disasters by Draining Interdependent Traffic Safely and Efficiently", + "3065": "The Emergence of Sparse Spanners and Greedy Well-Separated Pair Decomposition", + "3066": "Graviton: Trusted Execution Environments on GPUs Graviton: Trusted Execution Environments on GPUs", + "3067": "RStream: Marrying Relational Algebra with Streaming for Efficient Graph Mining on A Single Machine RStream: Marrying Relational Algebra with Streaming for Efficient Graph Mining on A Single Machine *", + "3068": "Deconstructing RDMA-enabled Distributed Transactions: Hybrid is Better! Deconstructing RDMA-enabled Distributed Transactions: Hybrid is Better!", + "3069": "Gandiva: Introspective Cluster Scheduling for Deep Learning Gandiva: Introspective Cluster Scheduling for Deep Learning", + "3070": "Principled Schedulability Analysis for Distributed Storage Systems using Thread Architecture Models Principled Schedulability Analysis for Distributed Storage Systems using Thread Architecture Models", + "3071": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Neural Adaptive Content-aware Internet Video Delivery Neural Adaptive Content-aware Internet Video Delivery", + "3072": "Flashshare: Punching Through Server Storage Stack from Kernel to Firmware for Ultra-Low Latency SSDs FLASHSHARE: Punching Through Server Storage Stack from Kernel to Firmware for Ultra-Low Latency SSDs", + "3073": "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. wPerf: Generic Off-CPU Analysis to Identify Bottleneck Waiting Events wPerf: Generic Off-CPU Analysis to Identify Bottleneck Waiting Events", + "3074": "Write-Optimized and High-Performance Hashing Index Scheme for Persistent Memory Write-Optimized and High-Performance Hashing Index Scheme for Persistent Memory", + "3075": "Win32 API Emulation on UNIX for Software DSM Win32 API Emulation on UNIX for Software DSM", + "3076": "Analysis of Incomplete Data and an Intrinsic-Dimension Helly Theorem", + "3077": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems USENIX Association 31 TCP Meets Mobile Code", + "3078": "Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces", + "3079": "Antfarm: Efficient Content Distribution with Managed Swarms", + "3080": "Contracts: Practical Contribution Incentives for P2P Live Streaming_3080", + "3081": "On the Use of Abstract Workflows to Capture Scientific Process Provenance", + "3082": "A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage", + "3083": "An Analysis of Network Configuration Artifacts", + "3084": "Hashing Round-down Prefixes for Rapid Packet Classification", + "3085": "DryadInc: Reusing work in large-scale computations", + "3086": "A new Distributed Security Model for Linux Clusters", + "3087": "On the Potential of Structure-free Data Aggregation in Sensor Networks", + "3088": "Leveraging Transliterations from Multiple Languages", + "3089": "A Centralized Failure Handler for File Systems", + "3090": "Exposing privacy concerns in mHealth", + "3091": "Learning Discriminative Projections for Text Similarity Measures", + "3092": "Layout-aware Exhaustive Search", + "3093": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Cassyopia: Compiler Assisted System Optimization", + "3094": "Block Management in Solid-State Devices", + "3095": "Decaf: Moving Device Drivers to a Modern Language", + "3096": "Understanding the Security Properties of Ballot-Based Verification Techniques (Short Paper)", + "3097": "On the Security of Election Audits with Low Entropy Randomness", + "3098": "Eigenvoice Speaker Adaptation via Composite Kernel PCA", + "3099": "A Highly Immersive Approach to Teaching Reverse Engineering", + "3100": "Disk Drive Workload Captured in Logs Collected During the Field Return Incoming Test", + "3101": "A Bayesian Method for Auditing Elections", + "3102": "CIMDIFF: Advanced difference tracking tool for CIM compliant devices", + "3103": "Airavat: Security and Privacy for MapReduce_3103", + "3104": "Ballot Permutations in Pr\u00eatPr\u00eat\u00e0 Voter", + "3105": "Error Log Processing for Accurate Failure Prediction", + "3106": "Perspective: Semantic data management for the home", + "3107": "CLUEBOX: A Performance Log Analyzer for Automated Troubleshooting", + "3108": "The case for networked remote voting precincts", + "3109": "PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs", + "3110": "Computing Nash Equilibria of Action-Graph Games", + "3111": "Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets", + "3112": "Towards Trusted Cloud Computing", + "3113": "Understanding latent sector errors and how to protect against them", + "3114": "A Comparative Experimental Study of Parallel File Systems for Large-Scale Data Processing", + "3115": "From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware", + "3116": "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks", + "3117": "Taking proof-based verified computation a few steps closer to practicality 1", + "3118": "PUBCRAWL: Protecting Users and Businesses from CRAWLers", + "3119": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness", + "3120": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX On the Security of RC4 in TLS On the Security of RC4 in TLS 1", + "3121": "Delving into Internet Streaming Media Delivery: A Quality and Resource Utilization Perspective", + "3122": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX DupLESS: Server-Aided Encryption for Deduplicated Storage DupLESS: Server-Aided Encryption for Deduplicated Storage", + "3123": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Language-based Defenses against Untrusted Browser Origins", + "3124": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies", + "3125": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Secure Outsourced Garbled Circuit Evaluation for Mobile Devices", + "3126": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution", + "3127": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX ZMap: Fast Internet-wide Scanning and Its Security Applications ZMap: Fast Internet-Wide Scanning and its Security Applications", + "3128": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX An Empirical Study of Vulnerability Rewards Programs An Empirical Study of Vulnerability Rewards Programs", + "3129": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks", + "3130": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations Dowsing for overflows: A guided fuzzer to find buffer boundary violations", + "3131": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation", + "3132": "Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency", + "3133": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers", + "3134": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Eradicating DNS Rebinding with the Extended Same-Origin Policy Eradicating DNS Rebinding with the Extended Same-Origin Policy", + "3135": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation PCF: A Portable Circuit Format For Scalable Two-Party Secure Computation", + "3136": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates", + "3137": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Sancus: Low-cost trustworthy extensible networked devices with a zero-software Trusted Computing Base", + "3138": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Practical Comprehensive Bounds on Surreptitious Communication Over DNS Practical Comprehensive Bounds on Surreptitious Communication Over DNS", + "3139": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Securing Embedded User Interfaces: Android and Beyond Securing Embedded User Interfaces: Android and Beyond", + "3140": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Impression Fraud in On-line Advertising via Pay-Per-View Networks Impression Fraud in Online Advertising via Pay-Per-View Networks", + "3141": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse", + "3142": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis MetaSymploit: Day-One Defense Against Script-based Attacks with Security-Enhanced Symbolic Analysis", + "3143": "Exploiting Content Localities for Efficient Search in P2P Systems \ud97b\udf59", + "3144": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX You Are How You Click: Clickstream Analysis for Sybil Detection You are How You Click: Clickstream Analysis for Sybil Detection", + "3145": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization", + "3146": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services Steal This Movie -Automatically Bypassing DRM Protection in Streaming Media Services", + "3147": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors", + "3148": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Control Flow Integrity for COTS Binaries Control Flow Integrity for COTS Binaries *", + "3149": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX On the Security of Picture Gesture Authentication On the Security of Picture Gesture Authentication", + "3150": "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions", + "3151": "Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing", + "3152": "ByteWeight: Learning to Recognize Functions in Binary Code BYTEWEIGHT: Learning to Recognize Functions in Binary Code", + "3153": "Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture", + "3154": "LightFlood: an Efficient Flooding Scheme for File Search in Unstructured Peer-to-Peer Systems", + "3155": "Brahmastra: Driving Apps to Test the Security of Third-Party Components Brahmastra: Driving Apps to Test the Security of Third-Party Components", + "3156": "Towards Reliable Storage of 56-bit Secrets in Human Memory Towards reliable storage of 56-bit secrets in human memory", + "3157": "Open access to the Proceedings of the 23rd USENIX Security Symposium is sponsored by USENIX iSeeYou: Disabling the MacBook Webcam Indicator LED USENIX Association 23rd USENIX Security Symposium 337 i \u0131SeeYou: Disabling the MacBook Webcam Indicator LED", + "3158": "ROP is Still Dangerous: Breaking Modern Defenses ROP is Still Dangerous: Breaking Modern Defenses", + "3159": "On the Practical Exploitability of Dual EC in TLS Implementations On the Practical Exploitability of Dual EC in TLS Implementations", + "3160": "Peeking into Your App without Actually Seeing it: UI State Inference and Novel Android Attacks Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks", + "3161": "A Large-Scale Analysis of the Security of Embedded Firmwares A Large-Scale Analysis of the Security of Embedded Firmwares", + "3162": "SpanDex: Secure Password Tracking for Android SpanDex: Secure Password Tracking for Android", + "3163": "Static Detection of Second-Order Vulnerabilities in Web Applications Static Detection of Second-Order Vulnerabilities in Web Applications", + "3164": "Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns", + "3165": "Value Function Approximation on Non-Linear Manifolds for Robot Motor Control", + "3166": "Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection", + "3167": "Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens", + "3168": "An Internet-Wide View of Internet-Wide Scanning An Internet-Wide View of Internet-Wide Scanning", + "3169": "Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components", + "3170": "Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts *", + "3171": "Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard", + "3172": "ASM: A Programmable Interface for Extending Android Security ASM: A Programmable Interface for Extending Android Security", + "3173": "Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport", + "3174": "Hulk: Eliciting Malicious Behavior in Browser Extensions Hulk: Eliciting Malicious Behavior in Browser Extensions", + "3175": "On the Effective Prevention of TLS Man-in-the- Middle Attacks in Web Applications On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications", + "3176": "Principal Component Analysis for Sparse High-Dimensional Data", + "3177": "Open access to the Proceedings of the 23rd USENIX Security Symposium is sponsored by USENIX ret2dir: Rethinking Kernel Isolation ret2dir: Rethinking Kernel Isolation", + "3178": "BareCloud: Bare-metal Analysis-based Evasive Malware Detection BareCloud: Bare-metal Analysis-based Evasive Malware Detection", + "3179": "Telepathwords: Preventing Weak Passwords by Reading Users' Minds Telepathwords: preventing weak passwords by reading users' minds", + "3180": "TrueSeT: Faster Verifiable Set Computations TRUESET: Faster Verifiable Set Computations *", + "3181": "Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Exit from Hell? Reducing the Impact of Amplification DDoS Attacks", + "3182": "Mimesis Aegis: A Mimicry Privacy Shield- A System's Approach to Data Privacy on Public Cloud Mimesis Aegis: A Mimicry Privacy Shield A System's Approach to Data Privacy on Public Cloud", + "3183": "XRay: Enhancing the Web's Transparency with Differential Correlation XRay: Enhancing the Web's Transparency with Differential Correlation", + "3184": "SDDR: Light-Weight, Secure Mobile Encounters SDDR: Light-Weight, Secure Mobile Encounters", + "3185": "A Large-Scale Empirical Analysis of Chinese Web Passwords A Large-Scale Empirical Analysis of Chinese Web Passwords", + "3186": "The Emperor's New Password Manager: Security Analysis of Web-based Password Managers The Emperor's New Password Manager: Security Analysis of Web-based Password Managers", + "3187": "Nonlinear Relational Markov Networks with an Application to the Game of Go", + "3188": "LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes", + "3189": "Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks", + "3190": "Gyrophone: Recognizing Speech from Gyroscope Signals Gyrophone: Recognizing Speech From Gyroscope Signals", + "3191": "Security Analysis of a Full-Body Scanner Security Analysis of a Full-Body Scanner", + "3192": "From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television", + "3193": "Preventing Cryptographic Key Leakage in Cloud Virtual Machines Preventing Cryptographic Key Leakage in Cloud Virtual Machines", + "3194": "X-Force: Force-Executing Binary Programs for Security Applications X-Force: Force-Executing Binary Programs for Security Applications", + "3195": "Faster Private Set Intersection Based on OT Extension Faster Private Set Intersection based on OT Extension", + "3196": "Optimizing Seed Selection for Fuzzing Optimizing Seed Selection for Fuzzing", + "3197": "DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse", + "3198": "Oscillatory Neural Network for Image Segmentation with Biased Competition for Attention", + "3199": "Cardinal Pill Testing of System Virtual Machines Cardinal Pill Testing of System Virtual Machines", + "3200": "Password Managers: Attacks and Defenses Password Managers: Attacks and Defenses", + "3201": "Automatically Detecting Vulnerable Websites Before They Turn Malicious Automatically Detecting Vulnerable Websites Before They Turn Malicious", + "3202": "Precise Client-side Protection against DOM-based Cross-Site Scripting Precise client-side protection against DOM-based Cross-Site Scripting", + "3203": "The Long \"Taile\" of Typosquatting Domain Names The Long \"Taile\" of Typosquatting Domain Names", + "3204": "Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM", + "3205": "A Bayesian Approach to Privacy Enforcement in Smartphones A Bayesian Approach to Privacy Enforcement in Smartphones", + "3206": "Scheduler-based Defenses against Cross-VM Side-channels Scheduler-based Defenses against Cross-VM Side-channels", + "3207": "Jigsaw: Protecting Resource Access by Inferring Programmer Expectations JIGSAW : Protecting Resource Access by Inferring Programmer Expectations", + "3208": "Towards Detecting Anomalous User Behavior in Online Social Networks Towards Detecting Anomalous User Behavior in Online Social Networks", + "3209": "Local Context in Non-linear Deformation Models for Handwritten Character Recognition", + "3210": "Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data", + "3211": "Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers", + "3212": "Effective Attacks and Provable Defenses for Website Fingerprinting Effective Attacks and Provable Defenses for Website Fingerprinting", + "3213": "On the Feasibility of Large-Scale Infections of iOS Devices On the Feasibility of Large-Scale Infections of iOS Devices", + "3214": "TapDance: End-to-Middle Anticensorship without Flow Blocking TapDance: End-to-Middle Anticensorship without Flow Blocking", + "3215": "Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack", + "3216": "SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities", + "3217": "Privee: An Architecture for Automatically Analyzing Web Privacy Policies Privee: An Architecture for Automatically Analyzing Web Privacy Policies", + "3218": "unknown_3218", + "3219": "Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception", + "3220": "Exploiting Social Context for Review Quality Prediction", + "3221": "Tractable Computational Methods for Finding Nash Equilibria of Perfect-Information Position Auctions", + "3222": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Boxify: Full-fledged App Sandboxing for Stock Android Boxify: Full-fledged App Sandboxing for Stock Android", + "3223": "Trustworthy Whole-System Provenance for the Linux Kernel Trustworthy Whole-System Provenance for the Linux Kernel", + "3224": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Verified Correctness and Security of OpenSSL HMAC Verified correctness and security of OpenSSL HMAC", + "3225": "Meerkat: Detecting Website Defacements through Image-based Object Recognition Meerkat: Detecting Website Defacements through Image-based Object Recognition", + "3226": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Faster Secure Computation through Automatic Parallelization Faster Secure Computation through Automatic Parallelization", + "3227": "Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Control-Flow Bending: On the Effectiveness of Control-Flow Integrity", + "3228": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale", + "3229": "Protocol State Fuzzing of TLS Implementations Protocol state fuzzing of TLS implementations", + "3230": "How the ELF Ruined Christmas How the ELF Ruined Christmas", + "3231": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX M 2 R: Enabling Stronger Privacy in MapReduce Computation M 2 R: Enabling Stronger Privacy in MapReduce Computation", + "3232": "ST-HEC: Reliable and Scalable Software for Linear Algebra Computations on High End Computers", + "3233": "The Pythia PRF Service The Pythia PRF Service", + "3234": "Anatomization and Protection of Mobile Apps' Location Privacy Threats Anatomization and Protection of Mobile Apps' Location Privacy Threats", + "3235": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Bohatei: Flexible and Elastic DDoS Defense Bohatei: Flexible and Elastic DDoS Defense", + "3236": "LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors", + "3237": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS", + "3238": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence", + "3239": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches", + "3240": "GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies", + "3241": "Automatic Generation of Data-Oriented Exploits Automatic Generation of Data-Oriented Exploits", + "3242": "SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps", + "3243": "Avoiding Communication in Sparse Matrix Computations", + "3244": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization", + "3245": "Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation", + "3246": "Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound", + "3247": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services", + "3248": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Type Casting Verification: Stopping an Emerging Attack Vector Type Casting Verification: Stopping an Emerging Attack Vector", + "3249": "Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents", + "3250": "Thermal Covert Channels on Multi-core Platforms Thermal Covert Channels on Multi-core Platforms", + "3251": "Investigating the Computer Security Practices and Needs of Journalists Investigating the Computer Security Practices and Needs of Journalists", + "3252": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX CONIKS: Bringing Key Transparency to End Users CONIKS: Bringing Key Transparency to End Users", + "3253": "PowerSpy: Location Tracking using Mobile Device Power Analysis PowerSpy: Location Tracking using Mobile Device Power Analysis", + "3254": "Optimization of Sparse Matrix-Vector Multiplication on Emerging Multicore Platforms", + "3255": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX UIPicker: User-Input Privacy Identification in Mobile Applications UIPicker: User-Input Privacy Identification in Mobile Applications", + "3256": "WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths", + "3257": "In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services", + "3258": "Phasing: Private Set Intersection using Permutation-based Hashing Phasing: Private Set Intersection using Permutation-based Hashing", + "3259": "Under-Constrained Symbolic Execution: Correctness Checking for Real Code Under-Constrained Symbolic Execution: Correctness Checking for Real Code", + "3260": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Raccoon: Closing Digital Side-Channels through Obfuscated Execution Raccoon: Closing Digital Side-Channels through Obfuscated Execution", + "3261": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge", + "3262": "Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World", + "3263": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Towards Discovering and Understanding Task Hijacking in Android Towards Discovering and Understanding Task Hijacking in Android", + "3264": "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits", + "3265": "Benchmarking Sparse Matrix-Vector Multiply in Five Minutes", + "3266": "Securing Self-Virtualizing Ethernet Devices Securing Self-Virtualizing Ethernet Devices", + "3267": "Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem", + "3268": "EvilCohort: Detecting Communities of Malicious Accounts on Online Services EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services", + "3269": "RAPTOR: Routing Attacks on Privacy in Tor RAPTOR: Routing Attacks on Privacy in Tor", + "3270": "Measuring Real-World Accuracies and Biases in Modeling Password Guessability Measuring Real-World Accuracies and Biases in Modeling Password Guessability", + "3271": "All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS", + "3272": "A Placement Vulnerability Study in Multi-Tenant Public Clouds A Placement Vulnerability Study in Multi-Tenant Public Clouds", + "3273": "EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning", + "3274": "ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities", + "3275": "Android Permissions Remystified: A Field Study on Contextual Integrity Android Permissions Remystified: A Field Study on Contextual Integrity", + "3276": "Implicit and Explicit Optimizations for Stencil Computations", + "3277": "A Measurement Study on Co-residence Threat inside the Cloud A Measurement Study on Co-residence Threat inside the Cloud", + "3278": "SemEval-2019 Task 1: Cross-lingual Semantic Parsing with UCCA", + "3279": "Multi-Label Transfer Learning for Multi-Relational Semantic Similarity", + "3280": "Post-quantum Key Exchange-A New Hope Post-quantum key exchange -a new hope *", + "3281": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries", + "3282": "Defending against Malicious Peripherals with Cinch Defending against malicious peripherals with Cinch", + "3283": "DROWN: Breaking TLS using SSLv2 DROWN: Breaking TLS using SSLv2", + "3284": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis", + "3285": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles", + "3286": "Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants", + "3287": "Stencil Computation Optimization and Auto-tuning on State-of-the-Art Multicore Architectures", + "3288": "Tracing Information Flows Between Ad Exchanges Using Retargeted Ads Tracing Information Flows Between Ad Exchanges Using Retargeted Ads", + "3289": "Egalitarian Computing Egalitarian computing", + "3290": "Off-Path TCP Exploits: Global Rate Limit Considered Dangerous Off-Path TCP Exploits: Global Rate Limit Considered Dangerous", + "3291": "Hidden Voice Commands Hidden Voice Commands", + "3292": "Specification Mining for Intrusion Detection in Networked Control Systems Specification Mining for Intrusion Detection in Networked Control Systems", + "3293": "Fingerprinting Electronic Control Units for Vehicle Intrusion Detection Fingerprinting Electronic Control Units for Vehicle Intrusion Detection", + "3294": "Sanctum: Minimal Hardware Extensions for Strong Software Isolation Sanctum: Minimal Hardware Extensions for Strong Software Isolation", + "3295": "Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks", + "3296": "An Empirical Study of Textual Key-Fingerprint Representations An Empirical Study of Textual Key-Fingerprint Representations", + "3297": "The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO", + "3298": "Localization in Sparse Networks using Sweeps", + "3299": "Thoth: Comprehensive Policy Compliance in Data Retrieval Systems Thoth: Comprehensive Policy Compliance in Data Retrieval Systems", + "3300": "Protecting Privacy of BLE Device Users Protecting Privacy of BLE Device Users", + "3301": "Lock It and Still Lose It-On the (In)Security of Automotive Remote Keyless Entry Systems", + "3302": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage", + "3303": "ZKBoo: Faster Zero-Knowledge for Boolean Circuits ZKBoo: Faster Zero-Knowledge for Boolean Circuits", + "3304": "Undermining Information Hiding (and What to Do about It) Undermining Information Hiding (And What to do About it)", + "3305": "You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors", + "3306": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX k-fingerprinting: A Robust Scalable Website Fingerprinting Technique k-fingerprinting: a Robust Scalable Website Fingerprinting Technique", + "3307": "OblivP2P: An Oblivious Peer-to-Peer Content Sharing System OBLIVP2P: An Oblivious Peer-to-Peer Content Sharing System", + "3308": "UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware", + "3309": "Towards The Web Of Concepts: Extracting Concepts from Large Datasets", + "3310": "Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing", + "3311": "Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services", + "3312": "Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016", + "3313": "ARMageddon: Cache Attacks on Mobile Devices ARMageddon: Cache Attacks on Mobile Devices", + "3314": "What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses", + "3315": "Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks", + "3316": "Practical DIFC Enforcement on Android Practical DIFC Enforcement on Android", + "3317": "Towards Measuring and Mitigating Social Engineering Software Download Attacks Towards Measuring and Mitigating Social Engineering Software Download Attacks", + "3318": "Poking Holes in Information Hiding Poking Holes in Information Hiding", + "3319": "DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks", + "3320": "Evaluating, Combining and Generalizing Recommendations with Prerequisites", + "3321": "A Comprehensive Measurement Study of Domain Generating Malware A Comprehensive Measurement Study of Domain Generating Malware", + "3322": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX fTPM: A Software-Only Implementation of a TPM Chip fTPM: A Software-only Implementation of a TPM Chip", + "3323": "Secure, Precise, and Fast Floating-Point Operations on x86 Processors Secure, Precise, and Fast Floating-Point Operations on x86 Processors", + "3324": "Flip Feng Shui: Hammering a Needle in the Software Stack Flip Feng Shui: Hammering a Needle in the Software Stack", + "3325": "AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels AuthLoop: Practical End-to-End Cryptographic Authentication for Telephony over Voice Channels", + "3326": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution", + "3327": "Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images Screen After Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images", + "3328": "PIkit: A New Kernel-Independent Processor-Interconnect Rootkit PIkit : A New Kernel-Independent Processor-Interconnect Rootkit", + "3329": "Ariadne: A Minimal Approach to State Continuity Ariadne: A Minimal Approach to State Continuity", + "3330": "The Million-Key Question-Investigating the Origins of RSA Public Keys The Million-Key Question -Investigating the Origins of RSA Public Keys", + "3331": "Human-Assisted Graph Search: It's Okay to Ask Questions", + "3332": "The Influence of Neighbourhood and Choice on the Complexity of Finding Pure Nash Equilibria", + "3333": "Simulating the Power Consumption of Large-Scale Sensor Network Applications General Terms", + "3334": "Making USB Great Again with usbfilter Making USB Great Again with USBFILTER", + "3335": "The University of North Carolina at Chapel Hill", + "3336": "Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys", + "3337": "\u00fcberSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor USENIX Association 25th USENIX Security Symposium 87 \u00dcBERSPARK \u2020 : Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor", + "3338": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX zxcvbn: Low-Budget Password Strength Estimation zxcvbn: Low-Budget Password Strength Estimation", + "3339": "Identifying and Characterizing Sybils in the Tor Network Identifying and characterizing Sybils in the Tor network", + "3340": "One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation", + "3341": "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos", + "3342": "APISAn: Sanitizing API Usages through Semantic Cross-Checking APISAN: Sanitizing API Usages through Semantic Cross-checking", + "3343": "All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption", + "3344": "Active Sampling for Entity Matching", + "3345": "The Cut-and-Choose Game and Its Application to Cryptographic Protocols The Cut-and-Choose Game and its Application to Cryptographic Protocols", + "3346": "Understanding the Mirai Botnet Understanding the Mirai Botnet", + "3347": "BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model", + "3348": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment", + "3349": "Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning", + "3350": "Syntia: Synthesizing the Semantics of Obfuscated Code Syntia: Synthesizing the Semantics of Obfuscated Code", + "3351": "Vale: Verifying High-Performance Cryptographic Assembly Code Vale: Verifying High-Performance Cryptographic Assembly Code", + "3352": "CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory", + "3353": "CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition", + "3354": "Adaptive Android Kernel Live Patching Adaptive Android Kernel Live Patching", + "3355": "Optimal Schemes for Robust Web Extraction", + "3356": "A Longitudinal, End-to-End View of the DNSSEC Ecosystem A Longitudinal, End-to-End View of the DNSSEC Ecosystem", + "3357": "Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers", + "3358": "Ensuring Authorized Updates in Multi-user Database-Backed Applications Ensuring Authorized Updates in Multi-user Database-Backed Applications", + "3359": "Constant-Time Callees with Variable-Time Callers Constant-Time Callees with Variable-Time Callers", + "3360": "HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation", + "3361": "AutoLock: Why Cache Attacks on ARM Are Harder Than You Think AutoLock: Why Cache Attacks on ARM Are Harder Than You Think", + "3362": "Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory", + "3363": "Detecting Credential Spearphishing Attacks in Enterprise Settings Detecting Credential Spearphishing Attacks in Enterprise Settings", + "3364": "SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data *", + "3365": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX vTZ: Virtualizing ARM TrustZone vTZ: Virtualizing ARM TrustZone", + "3366": "Recsplorer: Recommendation Algorithms Based on Precedence Mining", + "3367": "Identifier Binding Attacks and Defenses in Software-Defined Networks Identifier Binding Attacks and Defenses in Software-Defined Networks *", + "3368": "Towards Efficient Heap Overflow Discovery Towards Efficient Heap Overflow Discovery", + "3369": "Transcend: Detecting Concept Drift in Malware Classification Models Transcend: Detecting Concept Drift in Malware Classification Models", + "3370": "On the effectiveness of mitigations against floating-point timing channels On the effectiveness of mitigations against floating-point timing channels", + "3371": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Reverse Engineering x86 Processor Microcode Reverse Engineering x86 Processor Microcode", + "3372": "\"I Have No Idea What I'm Doing\" - On the Usability of Deploying HTTPS \"I Have No Idea What I'm Doing\" - On the Usability of Deploying HTTPS", + "3373": "Phoenix: Rebirth of a Cryptographic Password-Hardening Service Phoenix: Rebirth of a Cryptographic Password-Hardening Service", + "3374": "Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers", + "3375": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Hacking in Darkness: Return-oriented Programming against Secure Enclaves Hacking in Darkness: Return-oriented Programming against Secure Enclaves", + "3376": "Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing", + "3377": "CrowdScreen: Algorithms for Filtering Data with Humans", + "3378": "DeTor: Provably Avoiding Geographic Regions in Tor DeTor: Provably Avoiding Geographic Regions in Tor", + "3379": "Measuring the Insecurity of Mobile Deep Links of Android Measuring the Insecurity of Mobile Deep Links of Android", + "3380": "SmartPool: Practical Decentralized Pooled Mining SMARTPOOL: Practical Decentralized Pooled Mining", + "3381": "MPI: Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning MPI: Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning", + "3382": "DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers", + "3383": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX PDF Mirage: Content Masking Attack Against Information-Based Online Services PDF Mirage: Content Masking Attack Against Information-Based Online Services", + "3384": "ROTE: Rollback Protection for Trusted Execution ROTE: Rollback Protection for Trusted Execution", + "3385": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages", + "3386": "When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers", + "3387": "BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking", + "3388": "Answering Queries using Humans, Algorithms and Databases", + "3389": "CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds", + "3390": "Ninja: Towards Transparent Tracing and Debugging on ARM Ninja: Towards Transparent Tracing and Debugging on ARM", + "3391": "TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication", + "3392": "Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities", + "3393": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Global Measurement of DNS Manipulation Global Measurement of DNS Manipulation", + "3394": "AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings", + "3395": "ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service", + "3396": "The Loopix Anonymity System The Loopix Anonymity System", + "3397": "AuthentiCall: Efficient Identity and Content Authentication for Phone Calls AuthentiCall: Efficient Identity and Content Authentication for Phone Calls", + "3398": "BootStomp: On the Security of Bootloaders in Mobile Devices BootStomp: On the Security of Bootloaders in Mobile Devices", + "3399": "Exploiting Domain Structure for Named Entity Recognition", + "3400": "Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies", + "3401": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels", + "3402": "Beauty and the Burst: Remote Identification of Encrypted Video Streams Beauty and the Burst: Remote Identification of Encrypted Video Streams", + "3403": "Same-Origin Policy: Evaluation in Modern Browsers Same-Origin Policy: Evaluation in Modern Browsers", + "3404": "Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions", + "3405": "How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security", + "3406": "USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs", + "3407": "CLKSCREW: Exposing the Perils of Security- Oblivious Energy Management CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management", + "3408": "SmartAuth: User-Centered Authorization for the Internet of Things SmartAuth: User-Centered Authorization for the Internet of Things", + "3409": "Telling Your Secrets Without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution Telling Your Secrets Without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution", + "3410": "Retransmission \u00a1 Repeat: Simple Retransmission Permutation Can Resolve Overlapping Channel Collisions", + "3411": "Loophole: Timing Attacks on Shared Event Loops in Chrome Loophole: Timing Attacks on Shared Event Loops in Chrome", + "3412": "How Double-Fetch Situations turn into Double- Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel", + "3413": "CacheD: Identifying Cache-Based Timing Channels in Production Software CacheD: Identifying Cache-Based Timing Channels in Production Software", + "3414": "Locally Differentially Private Protocols for Frequency Estimation Locally Differentially Private Protocols for Frequency Estimation", + "3415": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts POMP: Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts", + "3416": "Attacking the Brain: Races in the SDN Control Plane Attacking the Brain: Races in the SDN Control Plane", + "3417": "PlatPal: Detecting Malicious Documents with Platform Diversity PLATPAL: Detecting Malicious Documents with Platform Diversity", + "3418": "Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART", + "3419": "Dead Store Elimination (Still) Considered Harmful Dead Store Elimination (Still) Considered Harmful", + "3420": "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX REM: Resource-Efficient Mining for Blockchains REM: Resource-Efficient Mining for Blockchains", + "3421": "A Cross-Collection Mixture Model for Comparative Text Mining", + "3422": "Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed", + "3423": "A Privacy Analysis of Cross-device Tracking A Privacy Analysis of Cross-device Tracking *", + "3424": "Errata Slip Proceedings of the 26th USENIX Security Symposium", + "3425": "Errata Slip Proceedings of the 26th USENIX Security Symposium_3425", + "3426": "Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring", + "3427": "One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA", + "3428": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications", + "3429": "Effective Detection of Multimedia Protocol Tunneling using Machine Learning Effective Detection of Multimedia Protocol Tunneling using Machine Learning", + "3430": "Towards Predicting Efficient and Anonymous Tor Circuits Towards Predicting Efficient and Anonymous Tor Circuits", + "3431": "The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength", + "3432": "Predicting Replicated Database Scalability from Standalone Database Profiling", + "3433": "The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX", + "3434": "Bamboozling Certificate Authorities with BGP Bamboozling Certificate Authorities with BGP", + "3435": "Return Of Bleichenbacher's Oracle Threat (ROBOT) Return Of Bleichenbacher's Oracle Threat (ROBOT)", + "3436": "Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation", + "3437": "Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts * Cornell Tech, IC3 \u2020", + "3438": "Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer", + "3439": "Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes", + "3440": "WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring", + "3441": "Sensitive Information Tracking in Commodity IoT Sensitive Information Tracking in Commodity IoT", + "3442": "Split and Rephrase: Better Evaluation and a Stronger Baseline", + "3443": "Cryptree: A Folder Tree Structure for Cryptographic File Systems", + "3444": "A New Perspective on Implementation by Voting Trees *", + "3445": "We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS", + "3446": "Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets", + "3447": "Modelling and Analysis of a Hierarchy of Distance Bounding Attacks Modelling and Analysis of a Hierarchy of Distance Bounding Attacks", + "3448": "ACES: Automatic Compartments for Embedded Systems ACES: Automatic Compartments for Embedded Systems", + "3449": "Inception: System-Wide Security Testing of Real-World Embedded Systems Software Inception: System-Wide Security Testing of Real-World Embedded Systems Software", + "3450": "A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning", + "3451": "Shielding Software From Privileged Side-Channel Attacks Shielding Software From Privileged Side-Channel Attacks", + "3452": "HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security HEAPHOPPER: Bringing Bounded Model Checking to Heap Implementation Security", + "3453": "The Dangers of Key Reuse: Practical Attacks on IPsec IKE The Dangers of Key Reuse: Practical Attacks on IPsec IKE", + "3454": "Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices", + "3455": "A Blueprint for Constructing Peer-to-Peer Systems Robust to Dynamic Worst-Case Joins and Leaves", + "3456": "Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies", + "3457": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. IMIX: In-Process Memory Isolation EXtension IMIX: In-Process Memory Isolation EXtension", + "3458": "Saql: A Stream-based Query System for Real-Time Abnormal System Behavior Detection SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection", + "3459": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web", + "3460": "Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks", + "3461": "A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping", + "3462": "End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks", + "3463": "Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning", + "3464": "Analysis of Privacy Protections in Fitness Tracking Social Networks -or-You can run, but can you hide? Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?", + "3465": "Rethinking Access Control and Authentication for the Home Internet of Things (IoT) Rethinking Access Control and Authentication for the Home Internet of Things (IoT)", + "3466": "Havelaar: A Robust and Efficient Reputation System for Active Peer-to-Peer Systems", + "3467": "Automatic Heap Layout Manipulation for Exploitation Automatic Heap Layout Manipulation for Exploitation", + "3468": "Dependence-Preserving Data Compaction for Scalable Forensic Analysis Dependence-Preserving Data Compaction for Scalable Forensic Analysis *", + "3469": "End-to-End Measurements of Email Spoofing Attacks End-to-End Measurements of Email Spoofing Attacks", + "3470": "Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking", + "3471": "AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning", + "3472": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. An Empirical Analysis of Anonymity in Zcash An Empirical Analysis of Anonymity in Zcash", + "3473": "The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI", + "3474": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. teether: Gnawing at Ethereum to Automatically Exploit Smart Contracts TEETHER: Gnawing at Ethereum to Automatically Exploit Smart Contracts", + "3475": "Skill Squatting Attacks on Amazon Alexa Skill Squatting Attacks on Amazon Alexa", + "3476": "Simple Password-Hardened Encryption Services Simple Password-Hardened Encryption Services", + "3477": "On the Topologies Formed by Selfish Peers", + "3478": "Meltdown: Reading Kernel Memory from User Space Meltdown: Reading Kernel Memory from User Space", + "3479": "Lancaster A at SemEval-2017 Task 5: Evaluation metrics matter: predicting sentiment from financial news headlines", + "3480": "Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path", + "3481": "Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse", + "3482": "DelegaTEE: Brokered Delegation Using Trusted Execution Environments DELEGATEE: Brokered Delegation Using Trusted Execution Environments", + "3483": "NetHide: Secure and Practical Network Topology Obfuscation NetHide: Secure and Practical Network Topology Obfuscation", + "3484": "Rampart: Protecting Web Applications from CPU- Exhaustion Denial-of-Service Attacks Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks", + "3485": "Understanding the Reproducibility of Crowd- reported Security Vulnerabilities Understanding the Reproducibility of Crowd-reported Security Vulnerabilities", + "3486": "The Secure Socket API: TLS as an Operating System Service The Secure Socket API: TLS as an Operating System Service", + "3487": "MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation", + "3488": "A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn", + "3489": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps", + "3490": "Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels", + "3491": "Debloating Software through Piece-Wise Compilation and Loading Debloating Software through Piece-Wise Compilation and Loading", + "3492": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Schr\u00f6dinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem Schr\u00f6dinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem", + "3493": "FANCI : Feature-based Automated NXDomain Classification and Intelligence FANCI : Feature-based Automated NXDomain Classification and Intelligence", + "3494": "Guarder: A Tunable Secure Allocator GUARDER: A Tunable Secure Allocator", + "3495": "BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid", + "3496": "Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers", + "3497": "The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level", + "3498": "When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks", + "3499": "A Distributed Polylogarithmic Time Algorithm for Self-Stabilizing Skip Graphs *", + "3500": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Security Namespace: Making Linux Security Frameworks Available to Containers", + "3501": "Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems", + "3502": "ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem", + "3503": "Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors", + "3504": "BurnBox: Self-Revocable Encryption in a World Of Compelled Access BurnBox: Self-Revocable Encryption in a World of Compelled Access", + "3505": "Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution", + "3506": "Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think", + "3507": "Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets", + "3508": "Quack: Scalable Remote Measurement of Application-Layer Censorship Quack: Scalable Remote Measurement of Application-Layer Censorship", + "3509": "Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies FP-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies", + "3510": "A Distributed and Oblivious Heap \ud97b\udf59", + "3511": "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", + "3512": "Fast and Service-preserving Recovery from Malware Infections Using CRIU Fast and Service-preserving Recovery from Malware Infections Using CRIU", + "3513": "DATA -Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries DATA -Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries", + "3514": "How Do Tor Users Interact With Onion Services? How Do Tor Users Interact With Onion Services?", + "3515": "Tackling runtime-based obfuscation in Android with Tiro Tackling runtime-based obfuscation in Android with TIRO", + "3516": "DIZK: A Distributed Zero Knowledge Proof System DIZK: A Distributed Zero Knowledge Proof System", + "3517": "FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities", + "3518": "From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild", + "3519": "Vetting Single Sign-On SDK Implementations via Symbolic Reasoning Vetting Single Sign-On SDK Implementations via Symbolic Reasoning", + "3520": "CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition", + "3521": "Combinatorial Agency with Audits", + "3522": "Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces", + "3523": "Qsym : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing", + "3524": "All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems", + "3525": "Precise and Accurate Patch Presence Test for Binaries Precise and Accurate Patch Presence Test for Binaries", + "3526": "The aftermath of a crypto-ransomware attack at a large academic institution The aftermath of a crypto-ransomware attack at a large academic institution", + "3527": "An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications", + "3528": "Erays: Reverse Engineering Ethereum's Opaque Smart Contracts Erays: Reverse Engineering Ethereum's Opaque Smart Contracts", + "3529": "The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends", + "3530": "WAVE: A Decentralized Authorization Framework with Transitive Delegation WAVE: A Decentralized Authorization Framework with Transitive Delegation", + "3531": "Less is More: Quantifying the Security Benefits of Debloating Web Applications Less is More: Quantifying the Security Benefits of Debloating Web Applications", + "3532": "Tight Bounds for Delay-Sensitive Aggregation", + "3533": "CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel", + "3534": "Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers", + "3535": "Grimoire: Synthesizing Structure while Fuzzing GRIMOIRE: Synthesizing Structure while Fuzzing", + "3536": "A Systematic Evaluation of Transient Execution Attacks and Defenses A Systematic Evaluation of Transient Execution Attacks and Defenses", + "3537": "The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links", + "3538": "Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks and Pluribus One Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks", + "3539": "When the Signal is in the Noise: Exploiting Diffix's Sticky Noise When the Signal is in the Noise: Exploiting Diffix's Sticky Noise", + "3540": "AntiFuzz: Impeding Fuzzing Audits of Binary Executables ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables", + "3541": "Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks", + "3542": "Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor", + "3543": "On the Windfall of Friendship: Inoculation Strategies on Social Networks", + "3544": "FuzziFication: Anti-Fuzzing Techniques FUZZIFICATION: Anti-Fuzzing Techniques", + "3545": "Mobile Private Contact Discovery at Scale Mobile Private Contact Discovery at Scale", + "3546": "Origin-sensitive Control Flow Integrity Origin-sensitive Control Flow Integrity", + "3547": "From IP ID to Device ID and KASLR Bypass From IP ID to Device ID and KASLR Bypass *", + "3548": "CANvas: Fast and Inexpensive Automotive Network Mapping CANvas: Fast and Inexpensive Automotive Network Mapping", + "3549": "All Things Considered: An Analysis of IoT Devices on Home Networks All Things Considered: An Analysis of IoT Devices on Home Networks", + "3550": "Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT", + "3551": "No Right to Remain Silent: Isolating Malicious Mixes No Right to Remain Silent: Isolating Malicious Mixes", + "3552": "PAC it up: Towards Pointer Integrity using ARM Pointer Authentication PAC it up: Towards Pointer Integrity using ARM Pointer Authentication *", + "3553": "MOpt: Optimized Mutation Scheduling for Fuzzers MOPT: Optimized Mutation Scheduling for Fuzzers", + "3554": "Laplacian Spectrum Learning", + "3555": "A New Memory Monitoring Scheme for Memory-Aware Scheduling and Partitioning", + "3556": "Bite: Bitcoin Lightweight Client Privacy using Trusted Execution BITE: Bitcoin Lightweight Client Privacy using Trusted Execution", + "3557": "What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete", + "3558": "Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques", + "3559": "EnTrusT: Regulating Sensor Access by Cooperating Programs via Delegation Graphs EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs", + "3560": "HideMyApp: Hiding the Presence of Sensitive Apps on Android HideMyApp : Hiding the Presence of Sensitive Apps on Android", + "3561": "RazoR: A Framework for Post-deployment Software Debloating RAZOR: A Framework for Post-deployment Software Debloating", + "3562": "Site Isolation: Process Separation for Web Sites within the Browser Site Isolation: Process Separation for Web Sites within the Browser", + "3563": "Secure Multi-User Content Sharing for Augmented Reality Applications Secure Multi-User Content Sharing for Augmented Reality Applications", + "3564": "A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape", + "3565": "A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link", + "3566": "Loopy Belief Propagation for Bipartite Maximum Weight b-Matching", + "3567": "The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators", + "3568": "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features", + "3569": "The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts", + "3570": "Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting", + "3571": "ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK) ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)", + "3572": "SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization", + "3573": "Scattercache: Thwarting Cache Attacks via Cache Set Randomization SCATTERCACHE: Thwarting Cache Attacks via Cache Set Randomization", + "3574": "Kepler: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities", + "3575": "ConFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software", + "3576": "Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities", + "3577": "Multi-Task Feature and Kernel Selection for SVMs", + "3578": "All Your Clicks Belong to Me: Investigating Click Interception on the Web All Your Clicks Belong to Me: Investigating Click Interception on the Web", + "3579": "PeX: A Permission Check Analysis Framework for Linux Kernel PeX: A Permission Check Analysis Framework for Linux Kernel", + "3580": "Small World with High Risks: A Study of Security Threats in the npm Ecosystem Small World with High Risks: A Study of Security Threats in the npm Ecosystem", + "3581": "Double Trouble: The Problem of Construal in Semantic Annotation of Adpositions", + "3582": "EmoTag -Towards an Emotion-Based Analysis of Emojis", + "3583": "SECTOR: A Neural Model for Coherent Topic Segmentation and Classification", + "3584": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities", + "3585": "Void: A fast and light voice liveness detection system Void: A fast and light voice liveness detection system", + "3586": "Preech: A System for Privacy-Preserving Speech Transcription Pr\u03b5\u03b5ch: A System for Privacy-Preserving Speech Transcription", + "3587": "\"I am uncomfortable sharing what I can't see\": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications \"I am uncomfortable sharing what I can't see\": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications", + "3588": "Robustness Analysis of Adaptive Chinese Input Methods", + "3589": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with POLICHECK", + "3590": "Human Distinguishable Visual Key Fingerprints Human Distinguishable Visual Key Fingerprints", + "3591": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter Hall Spoofing: A Noninvasive DoS Attack on Grid-Tied Solar Inverter", + "3592": "Automating the Development of Chosen Ciphertext Attacks Automating the Development of Chosen Ciphertext Attacks", + "3593": "McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers", + "3594": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Aurora: Statistical Crash Analysis for Automated Root Cause Explanation AURORA: Statistical Crash Analysis for Automated Root Cause Explanation", + "3595": "Secure Multi-party Computation of Differentially Private Median Secure Multi-party Computation of Differentially Private Median", + "3596": "A different cup of TI? The added value of commercial threat intelligence A different cup of TI? The added value of commercial threat intelligence", + "3597": "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks", + "3598": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Sys: a Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code Sys: a Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code", + "3599": "Using Accessor Variety Features of Source Graphemes in Machine Transliteration of English to Chinese", + "3600": "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web", + "3601": "Exploring Connections Between Active Learning and Model Extraction Exploring Connections Between Active Learning and Model Extraction", + "3602": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search", + "3603": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Muzz: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs", + "3604": "Composition Kills: A Case Study of Email Sender Authentication Composition Kills: A Case Study of Email Sender Authentication", + "3605": "Chaperone: Real-time Locking and Loss Prevention for Smartphones Chaperone: Real-time Locking and Loss Prevention for Smartphones", + "3606": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities", + "3607": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. On Training Robust PDF Malware Classifiers On Training Robust PDF Malware Classifiers", + "3608": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices", + "3609": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware", + "3610": "Multicast Congestion Control with Distrusted Receivers", + "3611": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation", + "3612": "TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves", + "3613": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems", + "3614": "A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters", + "3615": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. BScout: Direct Whole Patch Presence Test for Java Executables BScout: Direct Whole Patch Presence Test for Java Executables", + "3616": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases PHMon: A Programmable Hardware Monitor and Its Security Use Cases", + "3617": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage", + "3618": "HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments HYBCACHE: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments", + "3619": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. CounterFoil: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras", + "3620": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Boxer: Preventing fraud by scanning credit cards Boxer: Preventing fraud by scanning credit cards", + "3621": "Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh Networks", + "3622": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Pixel: Multi-signatures for Consensus Pixel: Multi-signatures for Consensus", + "3623": "DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists", + "3624": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. FirmScope: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware", + "3625": "The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs", + "3626": "Local Model Poisoning Attacks to Byzantine-Robust Federated Learning Local Model Poisoning Attacks to Byzantine-Robust Federated Learning", + "3627": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. P 2 IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling P 2 IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling", + "3628": "Analysis of DTLS Implementations Using Protocol State Fuzzing Analysis of DTLS Implementations Using Protocol State Fuzzing", + "3629": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Datalog Disassembly Datalog Disassembly", + "3630": "EthBMC: A Bounded Model Checker for Smart Contracts ETHBMC: A Bounded Model Checker for Smart Contracts", + "3631": "The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment", + "3632": "A Measurement Study of Multiplicative Overhead Effects in Wireless Networks", + "3633": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. GreyOne: Data Flow Sensitive Fuzzing GREYONE: Data Flow Sensitive Fuzzing", + "3634": "Certified Side Channels Certified Side Channels", + "3635": "Temporal System Call Specialization for Attack Surface Reduction Temporal System Call Specialization for Attack Surface Reduction", + "3636": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols", + "3637": "Zero-delay Lightweight Defenses against Website Fingerprinting Zero-delay Lightweight Defenses against Website Fingerprinting", + "3638": "Pancake: Frequency Smoothing for Encrypted Data Stores PANCAKE: Frequency Smoothing for Encrypted Data Stores", + "3639": "Sparse Coding of Neural Word Embeddings for Multilingual Sequence Labeling", + "3640": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SkillExplorer: Understanding the Behavior of Skills in Large Scale SkillExplorer: Understanding the Behavior of Skills in Large Scale", + "3641": "PartEmu: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation", + "3642": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Data Recovery from \"Scrubbed\" NAND Flash Storage: Need for Analog Sanitization Data Recovery from \"Scrubbed\" NAND Flash Storage: Need for Analog Sanitiza- tion", + "3643": "Assessment of Urban-Scale Wireless Networks with a Small Number of Measurements", + "3644": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. BigMAC: Fine-Grained Policy Analysis of Android Firmware BIGMAC: Fine-Grained Policy Analysis of Android Firmware", + "3645": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Achieving Keyless CDNs with Conclaves Achieving Keyless CDNs with Conclaves", + "3646": "FuzzGen: Automatic Fuzzer Generation FuzzGen: Automatic Fuzzer Generation", + "3647": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. High Accuracy and High Fidelity Extraction of Neural Networks High Accuracy and High Fidelity Extraction of Neural Networks", + "3648": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection", + "3649": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. BlockSci: Design and applications of a blockchain analysis platform BlockSci: Design and applications of a blockchain analysis platform", + "3650": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Programmable In-Network Security for Context-aware BYOD Policies Programmable In-Network Security for Context-aware BYOD Policies", + "3651": "V0LTpwn: Attacking x86 Processor Integrity from Software V0LTpwn: Attacking x86 Processor Integrity from Software", + "3652": "A Polynomial-Time Dynamic Programming Algorithm for Phrase-Based Decoding with a Fixed Distortion Limit", + "3653": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Walking Onions: Scaling Anonymity Networks while Protecting Users Walking Onions: Scaling Anonymity Networks while Protecting Users", + "3654": "Adding Capacity Points to a Wireless Mesh Network Using Local Search", + "3655": "MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs", + "3656": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Security Analysis of Unified Payments Interface and Payment Apps in India Security Analysis of Unified Payments Interface and Payment Apps in India", + "3657": "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer", + "3658": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet", + "3659": "Everything Old is New Again: Binary Security of WebAssembly Everything Old is New Again: Binary Security of WebAssembly", + "3660": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference", + "3661": "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust *", + "3662": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web", + "3663": "Latent Structure Models for Natural Language Processing", + "3664": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. FANS: Fuzzing Android Native System Services via Automated Interface Analysis FANS: Fuzzing Android Native System Services via Automated Interface Analysis", + "3665": "Automatic Generation of Peephole Superoptimizers", + "3666": "The Multi-version and Single-display Strategy in Undo Scheme", + "3667": "VoteAgAin: A scalable coercion-resistant voting system VOTEAGAIN: A scalable coercion-resistant voting system", + "3668": "Stealthy Tracking of Autonomous Vehicles with Cache Side Channels Stealthy Tracking of Autonomous Vehicles with Cache Side Channels", + "3669": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Cardpliance: PCI DSS Compliance of Android Applications Cardpliance: PCI DSS Compliance of Android Applications", + "3670": "Secure parallel computation on national scale volumes of data Secure parallel computation on national scale volumes of data", + "3671": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization", + "3672": "Cached and Confused: Web Cache Deception in the Wild Cached and Confused: Web Cache Deception in the Wild", + "3673": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Delphi: A Cryptographic Inference Service for Neural Networks DELPHI: A Cryptographic Inference Service for Neural Networks", + "3674": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. CopyCat: Controlled Instruction-Level Attacks on Enclaves COPYCAT: Controlled Instruction-Level Attacks on Enclaves", + "3675": "Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis", + "3676": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. TPM-Fail: TPM meets Timing and Lattice Attacks TPM-FAIL: TPM meets Timing and Lattice Attacks", + "3677": "Detecting Attacks in Routers Using Sketches", + "3678": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Retrofitting Fine Grain Isolation in the Firefox Renderer Retrofitting Fine Grain Isolation in the Firefox Renderer", + "3679": "ShadowMove: A Stealthy Lateral Movement Strategy ShadowMove: A Stealthy Lateral Movement Strategy", + "3680": "The Industrial Age of Hacking The Industrial Age of Hacking", + "3681": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise", + "3682": "That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers", + "3683": "PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists PhishTime: Continuous Longitudinal Measurement of the EEectiveness of Anti-phishing Blacklists", + "3684": "Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale Sunrise to Sunset: Analyzing the End-to-end Life Cycle and EEectiveness of Phishing Attacks at Scale", + "3685": "SpecFuzz: Bringing Spectre-type vulnerabilities to the surface SpecFuzz Bringing Spectre-type vulnerabilities to the surface", + "3686": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. ParmeSan: Sanitizer-guided Greybox Fuzzing ParmeSan: Sanitizer-guided Greybox Fuzzing", + "3687": "Scaling Verifiable Computation Using Efficient Set Accumulators Scaling Verifiable Computation Using Efficient Set Accumulators", + "3688": "Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional Links", + "3689": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent", + "3690": "Estonian Electronic Identity Card: Security Flaws in Key Management Estonian Electronic Identity Card: Security Flaws in Key Management", + "3691": "USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation", + "3692": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Visor: Privacy-Preserving Video Analytics as a Cloud Service Visor: Privacy-Preserving Video Analytics as a Cloud Service", + "3693": "Symbolic execution with SymCC: Don't interpret, compile! Symbolic execution with SYMCC: Don't interpret, compile!", + "3694": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Towards HTTPS Everywhere on Android: We Are Not There Yet Towards HTTPS Everywhere on Android: We Are Not There Yet", + "3695": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis", + "3696": "SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants", + "3697": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning", + "3698": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web", + "3699": "unknown_3699", + "3700": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp", + "3701": "Empirical Measurement of Systemic 2FA Usability Empirical Measurement of Systemic 2FA Usability", + "3702": "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets", + "3703": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE Call Me Maybe: Eavesdropping Encrypted LTE Calls With REVOLTE", + "3704": "Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning", + "3705": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Donky: Domain Keys -Efficient In-Process Isolation for RISC-V and x86 Donky: Domain Keys -Efficient In-Process Isolation for RISC-V and x86", + "3706": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients", + "3707": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams", + "3708": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models Fawkes: Protecting Privacy against Unauthorized Deep Learning Models", + "3709": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing", + "3710": "Rethinking Database Algorithms for Phase Change Memory", + "3711": "BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof", + "3712": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints", + "3713": "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections *", + "3714": "Horizontal Privilege Escalation in Trusted Applications Horizontal Privilege Escalation in Trusted Applications", + "3715": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems", + "3716": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures", + "3717": "Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries ARTIFACT EVALUATED PASSED Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries", + "3718": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications", + "3719": "Remote Side-Channel Attacks on Anonymous Transactions Remote Side-Channel Attacks on Anonymous Transactions", + "3720": "Civet: An Efficient Java Partitioning Framework for Hardware Enclaves Civet: An Efficient Java Partitioning Framework for Hardware Enclaves", + "3721": "PR-Join: A Non-Blocking Join Achieving Higher Early Result Rate with Statistical Guarantees", + "3722": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums", + "3723": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. See No Evil: Phishing for Permissions with False Transparency See No Evil: Phishing for Permissions with False Transparency", + "3724": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections", + "3725": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. An Observational Investigation of Reverse Engineers' Processes An Observational Investigation of Reverse Engineers' Processes", + "3726": "Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It", + "3727": "Detecting Stuffing of a User's Credentials at Her Own Accounts Detecting Stuffing of a User's Credentials at Her Own Accounts", + "3728": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data", + "3729": "Big Numbers -Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations Big Numbers -Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations", + "3730": "Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT", + "3731": "Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks Liveness\ud97b\udf59is\ud97b\udf59Not\ud97b\udf59Enough:\ud97b\udf59Enhancing\ud97b\udf59Fingerprint\ud97b\udf59Authentication with\ud97b\udf59Behavioral\ud97b\udf59Biometrics\ud97b\udf59to\ud97b\udf59Defeat\ud97b\udf59Puppet\ud97b\udf59Attacks", + "3732": "Lattice-based Cryptography", + "3733": "MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures", + "3734": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. NetWarden: Mitigating Network Covert Channels while Preserving Performance NetWarden: Mitigating Network Covert Channels while Preserving Performance", + "3735": "SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies", + "3736": "Automatic Hot Patch Generation for Android Kernels Automatic Hot Patch Generation for Android Kernels", + "3737": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures", + "3738": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips", + "3739": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi", + "3740": "Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation", + "3741": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit", + "3742": "Automatic Techniques to Systematically Discover New Heap Exploitation Primitives Automatic Techniques to Systematically Discover New Heap Exploitation Primitives", + "3743": "Multiple-Source Multiple-Sink Maximum Flow in Directed Planar Graphs in Near-Linear Time", + "3744": "TxSpecTor: Uncovering Attacks in Ethereum from Transactions TXSPECTOR: Uncovering Attacks in Ethereum from Transactions", + "3745": "Interpretable Deep Learning under Fire Interpretable Deep Learning under Fire", + "3746": "Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks", + "3747": "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices", + "3748": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems Silhouette: Efficient Protected Shadow Stacks for Embedded Systems", + "3749": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem", + "3750": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines", + "3751": "FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning", + "3752": "Automatically Identifying Complaints in Social Media", + "3753": "What Kind of Language Is Hard to Language-Model?", + "3754": "Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures", + "3755": "Proceedings of the 29th USENIX Security Symposium Errata Slip #3", + "3756": "An Off-Chip Attack on Hardware Enclaves via the Memory Bus", + "3757": "Evaluating Performance and Energy in File System Server Workloads", + "3758": "The Language of Legal and Illegal Activity on the Darknet", + "3759": "Prophecy: Using History for High-Throughput Fault Tolerance", + "3760": "AccuRate: Constellation Based Rate Estimation in Wireless Networks", + "3761": "A Systematic Approach to System State Restoration during Storage Controller Micro-Recovery", + "3762": "Veracity: Practical Secure Network Coordinates via Vote-based Agreements", + "3763": "Analyzing Linguistic Differences between Owner and Staff Attributed Tweets", + "3764": "Virtual Putty: Reshaping the Physical Footprint of Virtual Machines", + "3765": "Efficient Algorithms for Analyzing Segmental Duplications, Deletions, and Inversions in Genomes", + "3766": "Extending SSD Lifetimes with Disk-Based Write Caches", + "3767": "Dynamic Resource Allocation for Database Servers Running on Virtual Storage", + "3768": "Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones Ask me again but don't annoy me: Evaluating re-authentication strategies for smartphones", + "3769": "Addressing Physical Safety, Security, and Privacy for People with Visual Impairments Addressing Physical Safety, Security, and Privacy for People with Visual Impairments", + "3770": "An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems", + "3771": "Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours Productive Security: A scalable methodology for analysing employee security behaviours", + "3772": "Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice Why Do They Do What They Do? A Study of What Motivates Users to (Not) Follow Computer Security Advice", + "3773": "How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices", + "3774": "Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices", + "3775": "Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions", + "3776": "Shortest Paths in Directed Planar Graphs with Negative Lengths: a Linear-Space O(n log 2 n)-Time Algorithm", + "3777": "Turning 802.11 Inside-Out *", + "3778": "A Study of Authentication in Daily Life A Study of Authentication in Daily Life", + "3779": "Open access to the Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) is sponsored by USENIX. Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data", + "3780": "Open access to the Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) is sponsored by USENIX. User Attitudes Toward the Inspection of Encrypted Traffic User Attitudes Toward the Inspection of Encrypted Traffic", + "3781": "Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations", + "3782": "Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users", + "3783": "Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites", + "3784": "A Week to Remember: The Impact of Browser Warning Storage Policies A Week to Remember The Impact of Browser Warning Storage Policies", + "3785": "Categorizing and Inferring the Relationship between the Text and Image of Twitter Posts", + "3786": "DigiTally: Piloting Offline Payments for Phones DigiTally: Piloting Offline Payments for Phones", + "3787": "Self-Driving Cars and Data Collection: Privacy Perceptions of Networked Autonomous Vehicles Self-Driving Cars and Data Collection: Privacy Perceptions of Networked Autonomous Vehicles", + "3788": "Speeding Up HMM Decoding and Training by Exploiting Sequence Repetitions", + "3789": "Exploring decision making with Android's runtime permission dialogs using in-context surveys Exploring decision making with Android's runtime permission dialogs using in-context surveys", + "3790": "New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network", + "3791": "Results of the fifth edition of the BioASQ Challenge", + "3792": "A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016 A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016", + "3793": "Privacy Expectations and Preferences in an IoT World Privacy Expectations and Preferences in an IoT World", + "3794": "Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter? Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter?", + "3795": "Counterfactual Data Augmentation for Mitigating Gender Stereotypes in Languages with Rich Morphology", + "3796": "Open access to the Proceedings of the Thirteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture", + "3797": "Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions", + "3798": "Open access to the Proceedings of the Thirteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions", + "3799": "Price Fluctuations: To Buy or to Rent", + "3800": "Diversify to Survive: Making Passwords Stronger with Adaptive Policies Diversify to Survive: Making Passwords Stronger with Adaptive Policies", + "3801": "Open access to the Proceedings of the Thirteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences", + "3802": "End User Security and Privacy Concerns with Smart Homes End User Security & Privacy Concerns with Smart Homes", + "3803": "Errata Slip Proceedings of the 2017 Symposium on Usable Privacy and Security In the paper \"Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications\" by Original text from section 6.3", + "3804": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality", + "3805": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Security in the Software Development Lifecycle Security in the Software Development Lifecycle", + "3806": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. User Behaviors and Attitudes Under Password Expiration Policies User Behaviors and Attitudes Under Password Expiration Policies", + "3807": "Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing", + "3808": "\"We make it a big deal in the company\": Security Mindsets in Organizations that Develop Cryptographic Products \"We make it a big deal in the company\": Security Mindsets in Organizations that Develop Cryptographic Products", + "3809": "\"It's Scary...It's Confusing...It's Dull\": How Cybersecurity Advocates Overcome Negative Perceptions of Security \"It's Scary...It's Confusing...It's Dull\": How Cybersecurity Advocates Overcome Negative Perceptions of Security", + "3810": "Proximity algorithms for nearly-doubling spaces \u22c6", + "3811": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently", + "3812": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data", + "3813": "Online Privacy and Aging of Digital Artifacts Online Privacy and Aging of Digital Artifacts", + "3814": "Deception Task Design in Developer Password Studies: Exploring a Student Sample Deception Task Design in Developer Password Studies: Exploring a Student Sample", + "3815": "Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection", + "3816": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Informal Support Networks: an investigation into Home Data Security Practices Informal Support Networks: an investigation into Home Data Security Practices", + "3817": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. API Blindspots: Why Experienced Developers Write Vulnerable Code API Blindspots: Why Experienced Developers Write Vulnerable Code", + "3818": "Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships", + "3819": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Can Digital Face-Morphs Influence Attitudes and Online Behaviors? Can Digital Face-Morphs Influence Attitudes and Online Behaviors?", + "3820": "The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians", + "3821": "Efficient classification for metric data", + "3822": "\"You don't want to be the next meme\": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography \"You don't want to be the next meme\": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography", + "3823": "A Comparative Usability Study of Key Management in Secure Email A Comparative Usability Study of Key Management in Secure Email", + "3824": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal", + "3825": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios Towards Understanding Why People Do, or Do Not, Shield PIN Entry", + "3826": "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. User Comfort with Android Background Resource Accesses in Different Contexts User Comfort with Android Background Resource Accesses in Different Contexts", + "3827": "When is a Tree Really a Truck? Exploring Mental Models of Encryption When is a Tree Really a Truck? Exploring Mental Models of Encryption", + "3828": "\"I've Got Nothing to Lose\": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach \"I've Got Nothing to Lose\": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach", + "3829": "More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants", + "3830": "\"There is nothing that I need to keep secret\": Sharing Practices and Concerns of Wearable Fitness Data This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. \"There is nothing that I need to keep secret\": Sharing Practices and Concerns of Wearable Fitness Data", + "3831": "A Typology of Perceived Triggers for End-User Security and Privacy Behaviors This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. A Typology of Perceived Triggers for End-User Security and Privacy Behaviors", + "3832": "An optimal dynamic spanner for doubling metric spaces", + "3833": "Personal Information Leakage by Abusing the GDPR \"Right of Access\" This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Personal Information Leakage by Abusing the GDPR \"Right of Access\"", + "3834": "Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites", + "3835": "A Self-Report Measure of End-User Security Attitudes (SA-6) This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. A Self-Report Measure of End-User Security Attitudes (SA-6)", + "3836": "The Effect of Entertainment Media on Mental Models of Computer Security This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security", + "3837": "An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites", + "3838": "Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies", + "3839": "Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage", + "3840": "Keepers of the Machines: Examining How System Administrators Manage Software Updates This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Keepers of the Machines: Examining How System Administrators Manage Software Updates", + "3841": "Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices", + "3842": "Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices", + "3843": "Dictionary Matching and Indexing with Errors and Don't Cares * General Terms", + "3844": "\"We Can't Live Without Them!\" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks \"We Can't Live Without Them!\" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks", + "3845": "From Usability to Secure Computing and Back Again This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. \u2022 Santa Clara, CA, USA From Usability to Secure Computing and Back Again", + "3846": "A Usability Study of Five Two-Factor Authentication Methods This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. A Usability Study of Five Two-Factor Authentication Methods", + "3847": "System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces", + "3848": "Don't Take the Premise for Granted: Mitigating Artifacts in Natural Language Inference", + "3849": "\"You've Got Your Nice List of Bugs, Now What?\" Vulnerability Discovery and Management Processes in the Wild \"You've Got Your Nice List of Bugs, Now What?\" Vulnerability Discovery and Management Processes in the Wild", + "3850": "Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption", + "3851": "An Exploratory Study of Hardware Reverse Engineering -Technical and Cognitive Processes An Exploratory Study of Hardware Reverse Engineering Technical and Cognitive Processes", + "3852": "Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories", + "3853": "Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras", + "3854": "Enabling MAC Protocol Implementations on Software-Defined Radios_3854", + "3855": "How Risky Are Real Users' IFTTT Applets? How Risky Are Real Users' IFTTT Applets?", + "3856": "Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers", + "3857": "Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations", + "3858": "Blind and Human: Exploring More Usable Audio CAPTCHA Designs Blind and Human: Exploring More Usable Audio CAPTCHA Designs", + "3859": "\"You still use the password after all\" - Exploring FIDO2 Security Keys in a Small Company \"You still use the password after all\" - Exploring FIDO2 Security Keys in a Small Company", + "3860": "Usable Sexurity: Studying People's Concerns and Strategies When Sexting Usable Sexurity: Studying People's Concerns and Strategies When Sexting", + "3861": "Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise", + "3862": "Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect", + "3863": "An Empirical Study of Wireless Carrier Authentication for SIM Swaps An Empirical Study of Wireless Carrier Authentication for SIM Swaps", + "3864": "User Mental Models of Cryptocurrency Systems -A Grounded Theory Approach User Mental Models of Cryptocurrency Systems -A Grounded Theory Approach", + "3865": "Toward a Lightweight Model of BGP Safety", + "3866": "Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges", + "3867": "Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures", + "3868": "Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault", + "3869": "An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development", + "3870": "\"I Have a Narrow Thought Process\": Constraints on Explanations Connecting Inferences and Self-Perceptions \"I Have a Narrow Thought Process\": Constraints on Explanations Connecting Inferences and Self-Perceptions", + "3871": "An investigation of phishing awareness and education over time: When and how to best remind users An investigation of phishing awareness and education over time: When and how to best remind users", + "3872": "Open access to the Proceedings of the Sixteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Knock, Knock. Who's There? On the Security of LG's Knock Codes Knock, Knock. Who's There? On the Security of LG's Knock Codes", + "3873": "Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security", + "3874": "From Intent to Action: Nudging Users Towards Secure Mobile Payments From Intent to Action: Nudging Users Towards Secure Mobile Payments", + "3875": "Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators", + "3876": "DONAR: Decentralized Server Selection for Cloud Services", + "3877": "Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites", + "3878": "Enabling Transactional File Access via Lightweight Kernel Extensions", + "3879": "The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations", + "3880": "Striping without Sacrifices: Maintaining POSIX Semantics in a Parallel File System", + "3881": "Secure, Archival Storage with POTSHARDS", + "3882": "Secure Passwords Through Enhanced Hashing", + "3883": "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 43 Flexible, Wide-Area Storage for Distributed Systems with WheelFS", + "3884": "Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing", + "3885": "Automatically Generating Predicates and Solutions for Configuration Troubleshooting", + "3886": "Membrane: Operating System Support for Restartable File Systems", + "3887": "Online Measurement of Large Traffic Aggregates on Commodity Switches_3887", + "3888": "Simultaneously Modeling Semantics and Structure of Threaded Discussions: A Sparse Coding Approach and Its Applications *", + "3889": "vPath: Precise Discovery of Request Processing Paths from Black-Box Observations of Thread and Network Activities", + "3890": "Mochi: Visual Log-Analysis Based Tools for Debugging Hadoop", + "3891": "Sora: High Performance Software Radio Using General Purpose Multi-core Processors", + "3892": "SALSA: Analyzing Logs as StAte Machines 1", + "3893": "Black-Box Performance Control for High-Volume Non-Interactive Systems", + "3894": "Tag-based Information Flow Analysis for Document Classification in Provenance", + "3895": "Hierarchical Models of Provenance", + "3896": "Toward Provenance-Based Security for Configuration Languages", + "3897": "Provenance Support for Rework", + "3898": "Provenance Management in Databases Under Schema Evolution", + "3899": "Frenetic: A Network Programming Language", + "3900": "Experiment Explorer: Lightweight Provenance Search over Metadata", + "3901": "BioLite, a lightweight bioinformatics framework with automated tracking of diagnostics and provenance", + "3902": "It's About the Data: Provenance as a Tool for Assessing Data Fitness", + "3903": "A General-Purpose Provenance Library", + "3904": "Android Provenance: Diagnosing Device Disorders", + "3905": "Provenance for Data Mining", + "3906": "Provenance Analyzer: Exploring Provenance Semantics with Logic Rules", + "3907": "ReproZip: Using Provenance to Support Computational Reproducibility", + "3908": "Using Provenance for Repeatability", + "3909": "D-PROV: Extending the PROV Provenance Model with Workflow Structure", + "3910": "Network-Wide Decision Making: Toward A Wafer-Thin Control Plane", + "3911": "IPAPI: Designing an Improved Provenance API", + "3912": "OPUS: A Lightweight system for Observational Provenance in User Space", + "3913": "Declaratively Processing Provenance Metadata", + "3914": "HadoopProv: Towards Provenance As A First Class Citizen In MapReduce", + "3915": "Supporting Undo and Redo in Scientific Data Analysis", + "3916": "Provenance-Only Integration", + "3917": "Provenance Segmentation", + "3918": "Automatic vs Manual Provenance Abstractions: Mind the Gap Khalid Belhajjame", + "3919": "Towards secure user-space provenance capture", + "3920": "Refining SQL Queries based on Why-Not Polynomials", + "3921": "Collaborative, Privacy-Preserving Data Aggregation at Scale", + "3922": "Composition and Substitution in Provenance and Workflows", + "3923": "From scientific workflow patterns to 5-star linked open data", + "3924": "Scaling SPADE to \"Big Provenance\"", + "3925": "The data, they are a-changin'", + "3926": "Provenance-aware Versioned Dataworkspaces", + "3927": "Quantifying Causal Effects on Query Answering in Databases", + "3928": "Fine-grained provenance for linear algebra operators", + "3929": "Massively Multilingual Transfer for NER", + "3930": "Object Storage on CRAQ High-throughput chain replication for read-mostly workloads", + "3931": "Provenance Artifact Identification in the Atmospheric Composition Processing System (ACPS)", + "3932": "Network Architecture for Joint Failure Recovery and Traffic Engineering", + "3933": "Reinforced Extractive Summarization with Question-Focused Rewards", + "3934": "The Restoration of Early UNIX Artifacts", + "3935": "Improving Scalability and Fault Tolerance in an Application Management Infrastructure", + "3936": "Sybil-Resilient Online Content Voting", + "3937": "Picviz: finding a needle in a haystack", + "3938": "Cosh: clear OS data sharing in an incoherent world", + "3939": "Proactive Energy-Aware Programming with PEEK", + "3940": "On Sockets and System Calls Minimizing Context Switches for the Socket API", + "3941": "From Feast to Famine: Managing mobile network resources across environments and preferences", + "3942": "Fractured Processes: Adaptive, Fine-Grained Process Abstractions", + "3943": "Profiling Network Performance for Multi-Tier Data Center Applications_3943", + "3944": "Working Set Model for Multithreaded Programs", + "3945": "Custos: Increasing Security with Secret Storage as a Service", + "3946": "MLB: A Memory-aware Load Balancing for Mitigating Memory Contention", + "3947": "Crossbow Virtual Wire: Network in a Box", + "3948": "Accelerating Parallel Analysis of Scientific Simulation Data via Zazen", + "3949": "Effects of Data Center Vibration on Compute System Performance", + "3950": "HydraFS: a High-Throughput File System for the HYDRAstor Content-Addressable Storage System", + "3951": "Program Committee Meetings Considered Harmful", + "3952": "Federated Access Control and Workflow Enforcement in Systems Configuration", + "3953": "Reducing Seek Overhead with Application-Directed Prefetching", + "3954": "Availability, Usage, and Deployment Characteristics of the Domain Name System * General Terms Measurement, Reliability", + "3955": "FAWNdamentally Power-efficient Clusters", + "3956": "Softspeak: Making VoIP Play Well in Existing 802.11 Deployments", + "3957": "SRCMap: Energy Proportional Storage using Dynamic Consolidation", + "3958": "Server Workload Analysis for Power Minimization using Consolidation", + "3959": "'Lighter' Can Still Be Dark: Modeling Comparative Color Descriptions", + "3960": "Banal: Because Format Checking Is So Trite", + "3961": "Scalability of the Microsoft Cluster Service", + "3962": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Why Events Are A Bad Idea (for high-concurrency servers)", + "3963": "Cumulus: Filesystem Backup to the Cloud", + "3964": "Cross-Target Stance Classification with Self-Attention Networks", + "3965": "Probabilistic Near-Duplicate Detection Using Simhash", + "3966": "Evaluating the Importance of User-Specific Profiling Evaluating the Importance of User-Specific Profiling", + "3967": "Peloton: Coordinated Resource Management for Sensor Networks", + "3968": "\"I want my money back!\" Limiting Online Password-Guessing Financially", + "3969": "You Want Me To Do What? A Design Study of Two-Factor Authentication Messages", + "3970": "Augmenting Centralized Password Management with Application-Specific Passwords", + "3971": "Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords", + "3972": "Examining Visual-Spatial Paths for Mobile Authentication", + "3973": "Standard Metrics and Scenarios for Usable Authentication", + "3974": "Strengthening Password-based Authentication", + "3975": "Exploring Games for Improved Touchscreen Authentication on Mobile Devices", + "3976": "Multipath Protocol for Delay-Sensitive Traffic", + "3977": "Picking a (Smart)Lock: Locking Relationships on Mobile Devices", + "3978": "Social Authentication for End-to-End Encryption", + "3979": "USENIX Association 7th USENIX Conference on File and Storage Technologies 211 Smoke and Mirrors: Reflecting Files at a Geographically Remote Location Without Loss of Performance", + "3980": "Modeling and Reasoning about DOM Events", + "3981": "Aperator: Making Tweets Enable Actionable Commands on Third Party Web Applications", + "3982": "Poor Man's Social Network: Consistently Trade Freshness For Scalability", + "3983": "Hybrid Cloud Support for Large Scale Analytics and Web Processing", + "3984": "Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications", + "3985": "LIBERATED: A fully in-browser client and server web application debug and test environment", + "3986": "Jigsaw: Efficient, Low-effort Mashup Isolation", + "3987": "CloudNet: Dynamic Pooling of Cloud Resources by Live WAN Migration of Virtual Machines", + "3988": "Using Proxies to Accelerate Cloud Applications", + "3989": "Disambiguating False-Alarm Hashtag Usages in Tweets for Irony Detection", + "3990": "Tolerating latency in replicated state machines through client speculation", + "3991": "PriBots: Conversational Privacy with Chatbots Hamza Harkous", + "3992": "Comics as a Medium for Privacy Notices", + "3993": "Pretraining Sentiment Classifiers with Unlabeled Dialog Data", + "3994": "Constructing and Managing Appliances for Cloud Deployments from Repositories of Reusable Components", + "3995": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection", + "3996": "The Case for Enterprise-Ready Virtual Private Clouds_3996", + "3997": "Under New Management: Practical Attacks on SNMPv3", + "3998": "Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks *", + "3999": "Approximate Initialization of Camera Sensor Networks", + "4000": "Off-Path Attacking the Web", + "4001": "On the fragility and limitations of current Browser-provided Clickjacking protection schemes", + "4002": "Frankenstein: Stitching Malware from Benign Binaries", + "4003": "WAFFle: Fingerprinting Filter Rules of Web Application Firewalls", + "4004": "Web-based Attacks on Host-Proof Encrypted Storage", + "4005": "unknown_4005", + "4006": "Read It Twice! A mass-storage-based TOCTTOU attack", + "4007": "Abusing Notification Services on Smartphones for Phishing and Spamming", + "4008": "Microgadgets: Size Does Matter In Turing-complete Return-oriented Programming", + "4009": "Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android", + "4010": "ANALYSIS AND DISTORTION MODELING OF MPEG-4 FGS", + "4011": "Illuminating the Security Issues Surrounding Lights-Out Server Management", + "4012": "FireDrill: Interactive DNS Rebinding", + "4013": "Subverting BIND's SRTT Algorithm Derandomizing NS Selection", + "4014": "Looking inside the (Drop) box", + "4015": "Leveraging Honest Users: Stealth Command-and-Control of Botnets", + "4016": "Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless", + "4017": "Bluetooth: With Low Energy comes Low Security", + "4018": "\"Weird Machines\" in ELF: A Spotlight on the Underappreciated Metadata", + "4019": "From an IP Address to a Street Address: Using Wireless Signals to Locate a Target", + "4020": "Truncating TLS Connections to Violate Beliefs in Web Applications", + "4021": "Packet-Pair Bandwidth Estimation: Stochastic Analysis of a Single Congested Node", + "4022": "Zippier ZMap: Internet-Wide Scanning at 10 Gbps", + "4023": "Through the Looking-Glass, and What Eve Found There", + "4024": "unknown_4024", + "4025": "Inaudible Sound as a Covert Channel in Mobile Devices", + "4026": "Security Impact of High Resolution Smartphone Cameras", + "4027": "Green Lights Forever: Analyzing the Security of Traffic Infrastructure", + "4028": "Printed Circuit Board Deconstruction Techniques", + "4029": "Tick Tock: Building Browser Red Pills from Timing Side Channels", + "4030": "ATTACKING THE LINUX PRNG ON ANDROID WEAKNESSES IN SEEDING OF ENTROPIC POOLS AND LOW BOOT-TIME ENTROPY", + "4031": "Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks", + "4032": "On Static and Dynamic Partitioning Behavior of Large-Scale Networks", + "4033": "An Experience Report on Extracting and Viewing Memory Events via Wireshark", + "4034": "Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware", + "4035": "Mouse Trap: Exploiting Firmware Updates in USB Peripherals", + "4036": "IPv6 Security: Attacks and Countermeasures in a Nutshell", + "4037": "Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation", + "4038": "P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks", + "4039": "CAIN: Silently Breaking ASLR in the Cloud", + "4040": "Symbolic execution for BIOS security 1", + "4041": "FLEXTLS A Tool for Testing TLS Implementations", + "4042": "Learning Fine-Grained Knowledge about Contingent Relations between Everyday Events", + "4043": "Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks", + "4044": "Fast and Vulnerable: A Story of Telematic Failures", + "4045": "Prying open Pandora's box: KCI attacks against TLS", + "4046": "SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems", + "4047": "How to Break XML Encryption -Automatically *", + "4048": "Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers", + "4049": "IoTPOT: Analysing the Rise of IoT Compromises", + "4050": "Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis", + "4051": "ONE CLASS TO RULE THEM ALL 0-DAY DESERIALIZATION VULNERABILITIES IN ANDROID", + "4052": "Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics", + "4053": "Run-DMA", + "4054": "Single-Hop Probing Asymptotics in Available Bandwidth Estimation: Sample-Path Analysis", + "4055": "Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition *", + "4056": "Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring", + "4057": "RouteDetector: Sensor-based Positioning System that Exploits Spatio-Temporal Regularity of Human Mobility", + "4058": "AVLeak: Fingerprinting Antivirus Emulators Through Black-Box Testing", + "4059": "Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS", + "4060": "A Rising Tide: Design Exploits in Industrial Control Systems", + "4061": "Truck Hacking: An Experimental Analysis of the SAE J1939 Standard", + "4062": "Eavesdropping one-time tokens over magnetic secure transmission in Samsung Pay", + "4063": "Controlling UAVs with Sensor Input Spoofing Attacks", + "4064": "How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors", + "4065": "Multi-Hop Probing Asymptotics in Available Bandwidth Estimation: Stochastic Analysis", + "4066": "How to Break Microsoft Rights Management Services", + "4067": "Non-Deterministic Timers for Hardware Trojan Activation (Or How a Little Randomness Can Go the Wrong Way)", + "4068": "malWASH: Washing malware to evade dynamic analysis", + "4069": "A Security Analysis of an In Vehicle Infotainment and App Platform", + "4070": "This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump", + "4071": "Acceleration Attacks on PBKDF2 Or, what is inside the black-box of oclHashcat?", + "4072": "Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness", + "4073": "Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic", + "4074": "Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems", + "4075": "SoK: XML Parser Vulnerabilities", + "4076": "On Superposition of Heterogeneous Edge Processes in Dynamic Random Graphs", + "4077": "Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures", + "4078": "Abusing Public Third-Party Services for EDoS Attacks", + "4079": "DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work", + "4080": "dr0wned -Cyber-Physical Attack with Additive Manufacturing", + "4081": "One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited", + "4082": "Breaking and Fixing Gridcoin", + "4083": "Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong", + "4084": "Shedding too much Light on a Microcontroller's Firmware Protection", + "4085": "White-Stingray: Evaluating IMSI Catchers Detection Applications", + "4086": "POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection", + "4087": "End-to-End Internet Video Traffic Dynamics: Statistical Study and Analysis", + "4088": "Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing", + "4089": "Shattered Trust: When Replacement Smartphone Components Attack", + "4090": "Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery", + "4091": "Exploitations of Uninitialized Uses on macOS Sierra", + "4092": "Overview of the CL-SciSumm 2016 Shared Task", + "4093": "Security Analysis of eIDAS -The Cross-Country Authentication Scheme in Europe", + "4094": "Physical Adversarial Examples for Object Detectors", + "4095": "Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud", + "4096": "Fishy Faces: Crafting Adversarial Images to Poison Face Authentication", + "4097": "SoK: Make JIT-Spray Great Again", + "4098": "Analysis and Modeling of MPEG-4 and H.264 Multi-Layer Video Traffic", + "4099": "NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages", + "4100": "Spectre Returns! Speculation Attacks using the Return Stack Buffer", + "4101": "Tools for Active and Passive Network Side-Channel Detection for Web Applications", + "4102": "You Snooze, You Lose: Measuring PLC Cycle Times under Attacks", + "4103": "Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming", + "4104": "Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols", + "4105": "Browser history re:visited", + "4106": "Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives", + "4107": "Hitag 2 Hell -Brutally Optimizing Guess-and-Determine Attacks", + "4108": "Bitter Harvest: Systematically Fingerprinting Low-and Medium-interaction Honeypots at Internet Scale", + "4109": "JetMax: Scalable Max-Min Congestion Control for High-Speed Heterogeneous Networks", + "4110": "Next Branch Multicast (NBM) routing protocol", + "4111": "A Feasibility Study of Radio-frequency Retroreflector Attack", + "4112": "How Sharp is SHARP ?", + "4113": "Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO", + "4114": "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing", + "4115": "Two methods for exploiting speculative control flow hijacks", + "4116": "D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation", + "4117": "Automatic Wireless Protocol Reverse Engineering", + "4118": "Taking a Look into Execute-Only Memory", + "4119": "Alternative (ab)uses for HTTP Alternative Services", + "4120": "Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem", + "4121": "DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet", + "4122": "Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment", + "4123": "Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers", + "4124": "AFL ++ : Combining Incremental Steps of Fuzzing Research", + "4125": "ToothPicker: Apple Picking in the iOS Bluetooth Stack", + "4126": "NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit", + "4127": "Office Document Security and Privacy", + "4128": "One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers", + "4129": "Automatic Generation of Compact Printable Shellcodes for x86", + "4130": "When Oblivious is Not: Attacks against OPAM", + "4131": "Bankrupt Covert Channel: Turning Network Predictability into Vulnerability", + "4132": "Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks", + "4133": "BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy", + "4134": "Data-Driven Privacy Indicators", + "4135": "Privacy Wedges: Area-Based Audience Selection for Social Network Posts", + "4136": "Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices *", + "4137": "Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users", + "4138": "Putting Your Passwords on Self Destruct Mode: Beating Password Fatigue", + "4139": "Skills and Characteristics of Successful Cybersecurity Advocates", + "4140": "WorkOut: I/O Workload Outsourcing for Boosting RAID Reconstruction Performance", + "4141": "DRN: A Deep Reinforcement Learning Framework for News Recommendation", + "4142": "Reducing Unwanted Traffic in a Backbone Network", + "4143": "Agnostic Topology-Based Spam Avoidance in Large-Scale Web Crawls", + "4144": "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Towards a Semantic-Aware File Store HotOS IX: The 9th Workshop on Hot Topics in Operating Systems USENIX Association 182", + "4145": "Supporting Demanding Wireless Applications with Frequency-agile Radios", + "4146": "RCB: A Simple and Practical Framework for Real-time Collaborative Browsing", + "4147": "A Thread Performance Comparison: Windows NT and Solaris on A Symmetric Multiprocessor A Thread Performance Comparison: Windows NT and Solaris on A Symmetric Multiprocessor", + "4148": "The Green Switch: Designing for Sustainability in Mobile Computing", + "4149": "Optimizing Cost and Performance in Online Service Provider Networks", + "4150": "End-to-end Data Integrity for File Systems: A ZFS Case Study", + "4151": "Hardware Execution Throttling for Multi-core Resource Management *", + "4152": "BotGraph: Large Scale Spamming Botnet Detection", + "4153": "JustRunIt: Experiment-Based Management of Virtualized Data Centers", + "4154": "Stochastic Analysis of Horizontal IP Scanning", + "4155": "AMP: Program Context Specific Buffer Caching", + "4156": "How do practitioners, PhD students and postdocs in the social sciences assess topic-specific recommendations?", + "4157": "Adaptive Defense Against Various Network Attacks", + "4158": "Forecasting Word Model: Twitter-based Influenza Surveillance and Prediction", + "4159": "Improving historical spelling normalization with bi-directional LSTMs and multi-task learning", + "4160": "Natural Language Processing for Intelligent Access to Scientific Information", + "4161": "Bringing replication and reproduction together with generalisability in NLP: Three reproduction studies for Target Dependent Sentiment Analysis", + "4162": "Extractive Headline Generation Based on Learning to Rank for Community Question Answering", + "4163": "Deep Bayesian Learning and Understanding", + "4164": "Data-Driven Text Simplification", + "4165": "MOAR: A Multi-channel Opportunistic Auto-rate Media Access Protocol for Ad Hoc Networks", + "4166": "Learning Term-weighting Functions for Similarity Measures", + "4167": "Polarity Inducing Latent Semantic Analysis", + "4168": "Multi-Relational Latent Semantic Analysis", + "4169": "Typed Tensor Decomposition of Knowledge Bases for Relation Extraction", + "4170": "Self-disclosure topic model for classifying and analyzing Twitter conversations", + "4171": "WIKIQA: A Challenge Dataset for Open-Domain Question Answering", + "4172": "Mimicking Word Embeddings using Subword RNNs", + "4173": "Predicting Semantic Relations using Global Graph Properties", + "4174": "Policy Shaping and Generalized Update Equations for Semantic Parsing from Denotations", + "4175": "Personalized Machine Translation: Preserving Original Author Traits", + "4176": "Energy-Efficient Gaming on Mobile Devices using Dead Reckoning-based Power Management", + "4177": "Using Word Embedding for Cross-Language Plagiarism Detection", + "4178": "Towards Bootstrapping a Polarity Shifter Lexicon using Linguistic Features", + "4179": "OPT: Oslo-Potsdam-Teesside Pipelining Rules, Rankers, and Classifier Ensembles for Shallow Discourse Parsing", + "4180": "Embedding Words and Senses Together via Joint Knowledge-Enhanced Training", + "4181": "German in Flux: Detecting Metaphoric Change via Word Entropy", + "4182": "Encoding of phonology in a recurrent neural model of grounded speech", + "4183": "Introducing a Lexicon of Verbal Polarity Shifters for English", + "4184": "Association for Computational Linguistics Multiple Word Alignment with Profile Hidden Markov Models", + "4185": "Language identification of names with SVMs", + "4186": "Measuring Word Relatedness Using Heterogeneous Vector Space Models", + "4187": "Oscillations and Buffer Overflows in Video Streaming under Non-Negligible Queuing Delay", + "4188": "Combining Heterogeneous Models for Measuring Relational Similarity", + "4189": "Weak Semi-Markov CRFs for NP Chunking in Informal Text", + "4190": "Question Answering with Knowledge Base, Web and Beyond", + "4191": "Pre-training on High-Resource Speech Recognition Improves Low-Resource Speech-to-Text Translation", + "4192": "Riemannian Normalizing Flow on Variational Wasserstein Autoencoder for Text Modeling", + "4193": "Frowning Frodo, Wincing Leia, and a Seriously Great Friendship: Learning to Classify Emotional Relationships of Fictional Characters", + "4194": "Adversarial Training for Satire Detection: Controlling for Confounding Variables", + "4195": "SEQ 3 : Differentiable Sequence-to-Sequence-to-Sequence Autoencoder for Unsupervised Abstractive Sentence Compression", + "4196": "Integrating Semantic Knowledge to Tackle Zero-shot Text Classification", + "4197": "Cooperative Learning of Disjoint Syntax and Semantics", + "4198": "Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic", + "4199": "A Probabilistic Generative Model of Linguistic Typology", + "4200": "Recursive Subtree Composition in LSTM-Based Dependency Parsing", + "4201": "Cross-lingual CCG Induction", + "4202": "Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems", + "4203": "Something's Brewing! Early Prediction of Controversy-causing Posts from Discussion Features", + "4204": "What makes a good conversation? How controllable attributes affect human judgments", + "4205": "Measuring Immediate Adaptation Performance for Neural Machine Translation", + "4206": "A Crowdsourced Frame Disambiguation Corpus with Ambiguity", + "4207": "Adversarial Category Alignment Network for Cross-domain Sentiment Classification", + "4208": "Guiding Extractive Summarization with Question-Answering Rewards", + "4209": "Enabling High-Performance Internet-Wide Measurements on Windows", + "4210": "Semantically-Aligned Equation Generation for Solving and Reasoning Math Word Problems", + "4211": "Iterative Search for Weakly Supervised Semantic Parsing", + "4212": "GenderQuant: Quantifying Mention-Level Genderedness", + "4213": "Selective Attention for Context-aware Neural Machine Translation", + "4214": "On Evaluation of Adversarial Perturbations for Sequence-to-Sequence Models", + "4215": "Submodular Optimization-based Diverse Paraphrasing and its Effectiveness in Data Augmentation", + "4216": "Structural Neural Encoders for AMR-to-text Generation", + "4217": "Using Natural Language Relations between Answer Choices for Machine Comprehension", + "4218": "The Effect of Translationese in Machine Translation Test Sets", + "4219": "Data Augmentation for Context-Sensitive Neural Lemmatization Using Inflection Tables and Raw Text", + "4220": "Defragmenting DHT-based Distributed File Systems", + "4221": "Recon: Verifying File System Consistency at Runtime", + "4222": "Probing the Need for Visual Context in Multimodal Machine Translation", + "4223": "Practical Semantic Parsing for Spoken Language Understanding", + "4224": "A Case Study on Neural Headline Generation for Editing Support", + "4225": "The Strength of the Weakest Supervision: Topic Classification Using Class Labels", + "4226": "Multimodal Machine Translation with Embedding Prediction", + "4227": "Deep Adversarial Learning for NLP", + "4228": "Deep Learning for Natural Language Inference", + "4229": "Transfer Learning in Natural Language Processing Tutorial", + "4230": "Language Learning and Processing in People and Machines", + "4231": "Applications of Natural Language Processing in Clinical Research and Practice", + "4232": "Pitfalls for ISP-friendly P2P design", + "4233": "How do you pronounce your name? Improving G2P with transliterations", + "4234": "Incremental Syntactic Language Models for Phrase-based Translation", + "4235": "Self-Disclosure and Relationship Strength in Twitter Conversations", + "4236": "A Multi-sentiment-resource Enhanced Attention Network for Sentiment Classification", + "4237": "State-of-the-Art Kernels for Natural Language Processing", + "4238": "Tackling the Story Ending Biases in The Story Cloze Test", + "4239": "A Co-Matching Model for Multi-choice Reading Comprehension", + "4240": "Deep Learning for NLP (without Magic)", + "4241": "Graph-based Semi-Supervised Learning Algorithms for NLP", + "4242": "Question Answering Using Enhanced Lexical Semantic Models", + "4243": "High-Performance Complex Event Processing over Streams", + "4244": "Perplexity on Reduced Corpora", + "4245": "Semantic Parsing for Single-Relation Question Answering", + "4246": "Matrix Factorization with Knowledge Graph Propagation for Unsupervised Spoken Language Understanding", + "4247": "Semantic Parsing via Staged Query Graph Generation: Question Answering with Knowledge Base", + "4248": "An analysis of the user occupational class through Twitter content", + "4249": "Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogue Systems", + "4250": "Neural AMR: Sequence-to-Sequence Models for Parsing and Generation", + "4251": "Learning attention for historical text normalization by learning to pronounce", + "4252": "Time Expression Analysis and Recognition Using Syntactic Token Types and General Heuristic Rules", + "4253": "Learning bilingual word embeddings with (almost) no bilingual data", + "4254": "A Self-Organizing Flock of Condors", + "4255": "Found in Translation: Reconstructing Phylogenetic Language Trees from Translations", + "4256": "MORSE: Semantic-ally Drive-n MORpheme SEgment-er", + "4257": "Deep Keyphrase Generation", + "4258": "Representations of language in a model of visually grounded speech signal", + "4259": "Learning Discourse-level Diversity for Neural Dialog Models using Conditional Variational Autoencoders", + "4260": "Detect Rumors in Microblog Posts Using Propagation Structure via Kernel Learning", + "4261": "Beyond Binary Labels: Political Ideology Prediction of Twitter Users", + "4262": "Friendships, Rivalries, and Trysts: Characterizing Relations between Ideas in Texts", + "4263": "Get To The Point: Summarization with Pointer-Generator Networks", + "4264": "A Transition-Based Directed Acyclic Graph Parser for UCCA", + "4265": "Abstractions for Network Update Mark Reitblatt", + "4266": "Unifying Text, Metadata, and User Network Representations with a Neural Network for Geolocation Prediction", + "4267": "Search-based Neural Structured Learning for Sequential Question Answering", + "4268": "On the Challenges of Translating NLP Research into Commercial Products", + "4269": "Understanding Task Design Trade-offs in Crowdsourced Paraphrase Collection", + "4270": "Towards String-to-Tree Neural Machine Translation", + "4271": "Attention Strategies for Multi-Source Sequence-to-Sequence Learning", + "4272": "Cardinal Virtues: Extracting Relation Cardinalities from Text", + "4273": "Learning Topic-Sensitive Word Representations", + "4274": "Data Augmentation for Low-Resource Neural Machine Translation", + "4275": "Probabilistic FastText for Multi-Sense Word Embeddings", + "4276": "Graph-Theoretic Analysis of Structured Peer-to-Peer Systems: Routing Distances and Fault Resilience", + "4277": "A La Carte Embedding: Cheap but Effective Induction of Semantic Feature Vectors", + "4278": "Explicit Retrofitting of Distributional Word Vectors", + "4279": "Unsupervised Neural Machine Translation with Weight Sharing", + "4280": "The Best of Both Worlds: Combining Recent Advances in Neural Machine Translation", + "4281": "Ultra-Fine Entity Typing", + "4282": "Improving Knowledge Graph Embedding Using Simple Constraints", + "4283": "Towards Understanding the Geometry of Knowledge Graph Embeddings", + "4284": "A Unified Model for Extractive and Abstractive Summarization using Inconsistency Loss", + "4285": "Retrieve, Rerank and Rewrite: Soft Template Based Neural Summarization", + "4286": "Simple and Effective Text Simplification Using Semantic and Neural Methods", + "4287": "On Zone-Balancing of Peer-to-Peer Networks: Analysis of Random Node Join", + "4288": "Obtaining Reliable Human Ratings of Valence, Arousal, and Dominance for 20,000 English Words", + "4289": "Comprehensive Supersense Disambiguation of English Prepositions and Possessives", + "4290": "Neural Argument Generation Augmented with Externally Retrieved Evidence", + "4291": "A Stylometric Inquiry into Hyperpartisan and Fake News", + "4292": "Coarse-to-Fine Decoding for Neural Semantic Parsing", + "4293": "Confidence Modeling for Neural Semantic Parsing", + "4294": "Sequence-to-Action: End-to-End Semantic Graph Generation for Semantic Parsing", + "4295": "On the Limitations of Unsupervised Bilingual Dictionary Induction", + "4296": "A robust self-learning method for fully unsupervised cross-lingual mappings of word embeddings", + "4297": "A Multi-lingual Multi-task Architecture for Low-resource Sequence Labeling", + "4298": "DSybil: Optimal Sybil-Resistance for Recommendation Systems", + "4299": "Two Methods for Domain Adaptation of Bilingual Tasks: Delightfully Simple and Broadly Applicable", + "4300": "Simple and Effective Multi-Paragraph Reading Comprehension", + "4301": "Semantically Equivalent Adversarial Rules for Debugging NLP Models", + "4302": "Generating Fine-Grained Open Vocabulary Entity Type Descriptions", + "4303": "No Metrics Are Perfect: Adversarial Reward Learning for Visual Storytelling", + "4304": "Bridging Languages through Images with Deep Partial Canonical Correlation Analysis", + "4305": "What Action Causes This? Towards Naive Physical Action-Effect Prediction", + "4306": "Transformation Networks for Target-Oriented Sentiment Classification *", + "4307": "Identifying Transferable Information Across Domains for Cross-domain Sentiment Classification", + "4308": "Unpaired Sentiment-to-Sentiment Translation: A Cycled Reinforcement Learning Approach", + "4309": "Modeling Per-flow Throughput and Capturing Starvation in CSMA Multi-hop Wireless Networks", + "4310": "Discourse Marker Augmented Network with Reinforcement Learning for Natural Language Inference", + "4311": "Working Memory Networks: Augmenting Memory Networks with a Relational Reasoning Module", + "4312": "Reasoning with Sarcasm by Reading In-between", + "4313": "Adversarial Contrastive Estimation", + "4314": "Strong Baselines for Neural Semi-Supervised Learning under Domain Shift", + "4315": "Domain Adaptation with Adversarial Training and Graph Embeddings", + "4316": "TDNN: A Two-stage Deep Neural Network for Prompt-independent Automated Essay Scoring", + "4317": "Unsupervised Discrete Sentence Representation Learning for Interpretable Neural Dialog Generation", + "4318": "Learning to Control the Specificity in Neural Response Generation", + "4319": "Multi-Turn Response Selection for Chatbots with Deep Attention Matching Network", + "4320": "Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks", + "4321": "Taylor's Law for Human Linguistic Sequences", + "4322": "A Framework for Representing Language Acquisition in a Population Setting", + "4323": "Straight to the Tree: Constituency Parsing with Neural Syntactic Distance", + "4324": "Extending a Parser to Distant Domains Using a Few Dozen Partially Annotated Examples", + "4325": "Paraphrase to Explicate: Revealing Implicit Noun-Compound Relations", + "4326": "Searching for the X-Factor: Exploring Corpus Subjectivity for Word Embeddings", + "4327": "A Study of Reuse and Plagiarism in Speech and Natural Language Processing papers", + "4328": "Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings", + "4329": "Forest-Based Neural Machine Translation", + "4330": "Context-Aware Neural Machine Translation Learns Anaphora Resolution", + "4331": "Network-Wide Prediction of BGP Routes", + "4332": "Presence, Routines, and Technology Discrepancy - Information Exchange between Parents and Preschool Teachers", + "4333": "Document Context Neural Machine Translation with Memory Networks", + "4334": "Which Melbourne? Augmenting Geocoding with Maps", + "4335": "A Multi-Axis Annotation Scheme for Event Temporal Relations", + "4336": "Exemplar Encoder-Decoder for Neural Conversation Generation", + "4337": "Are BLEU and Meaning Representation in Opposition?", + "4338": "Automatic Metric Validation for Grammatical Error Correction", + "4339": "The Hitchhiker's Guide to Testing Statistical Significance in Natural Language Processing", + "4340": "Distilling Knowledge for Search-based Structured Prediction", + "4341": "Stack-Pointer Networks for Dependency Parsing", + "4342": "LSTMs Can Learn Syntax-Sensitive Dependencies Well, But Modeling Structure Makes Them Better", + "4343": "Java, Peer-to-Peer, and Accountability: Building Blocks for Distributed Cycle Sharing", + "4344": "Weakly Supervised Semantic Parsing with Abstract Examples", + "4345": "Improving a Neural Semantic Parser by Counterfactual Learning from Human Bandit Feedback", + "4346": "AMR Dependency Parsing with a Typed Semantic Algebra", + "4347": "Sequence-to-sequence Models for Cache Transition Systems", + "4348": "Backpropagating through Structured Argmax using a SPIGOT", + "4349": "Learning How to Actively Learn: A Deep Imitation Learning Approach", + "4350": "Training Classifiers with Natural Language Explanations", + "4351": "Did the Model Understand the Question?", + "4352": "Multi-Passage Machine Reading Comprehension with Cross-Passage Answer Verification", + "4353": "Language Generation via DAG Transduction", + "4354": "On Reshaping of Clustering Coefficients in Degree-Based Topology Generators", + "4355": "A Distributional and Orthographic Aggregation Model for English Derivational Morphology", + "4356": "Deep-speare: A joint neural model of poetic language, meter and rhyme", + "4357": "NeuralREG: An end-to-end approach to referring expression generation", + "4358": "Stock Movement Prediction from Tweets and Historical Prices", + "4359": "Rumor Detection on Twitter with Tree-structured Recursive Neural Networks", + "4360": "Visual Attention Model for Name Tagging in Multimodal Social Media", + "4361": "Semi-supervised User Geolocation via Graph Convolutional Networks", + "4362": "Document Modeling with External Attention for Sentence Extraction", + "4363": "Neural Models for Documents with Metadata", + "4364": "NASH: Toward End-to-End Neural Architecture for Generative Semantic Hashing", + "4365": "Aggregation and Scalable QoS: A Performance Study", + "4366": "Large-Scale QA-SRL Parsing", + "4367": "Syntax for Semantic Role Labeling, To Be, Or Not To Be", + "4368": "Situated Mapping of Sequential Instructions to Actions with Single-step Reward Observation", + "4369": "Marrying Up Regular Expressions with Neural Networks: A Case Study for Spoken Language Understanding", + "4370": "Token-level and sequence-level loss smoothing for RNN language models", + "4371": "Numeracy for Language Models: Evaluating and Improving their Ability to Predict Numbers", + "4372": "To Attend or not to Attend: A Case Study on Syntactic Structures for Semantic Relatedness", + "4373": "What you can cram into a single $&!#* vector: Probing sentence embeddings for linguistic properties", + "4374": "Robust Distant Supervision Relation Extraction via Deep Reinforcement Learning", + "4375": "Interpretable and Compositional Relation Learning by Joint Training with an Autoencoder", + "4376": "The Cutting EDGE of IP Router Configuration", + "4377": "Zero-Shot Transfer Learning for Event Extraction", + "4378": "Recursive Neural Structural Correspondence Network for Cross-domain Aspect and Opinion Co-Extraction", + "4379": "Deep Dyna-Q: Integrating Planning for Task-Completion Dialogue Policy Learning", + "4380": "Learning to Ask Questions in Open-domain Conversational Systems with Typed Decoders", + "4381": "Multimodal Affective Analysis Using Hierarchical Attention Strategy with Word-Level Alignment", + "4382": "Efficient Low-rank Multimodal Fusion with Modality-Specific Factors", + "4383": "Discourse Coherence: Concurrent Explicit and Implicit Relations", + "4384": "Joint Reasoning for Temporal and Causal Relations", + "4385": "Modeling Naive Psychology of Characters in Simple Commonsense Stories", + "4386": "Learning to Ask Good Questions: Ranking Clarification Questions using Neural Expected Value of Perfect Information", + "4387": "Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach Amit Saha Tropos Networks, CA_4387", + "4388": "Let's do it \"again\": A First Computational Approach to Detecting Adverbial Presupposition Triggers", + "4389": "Leveraging distributed representations and lexico-syntactic fixedness for token-level prediction of the idiomaticity of English verb-noun combinations", + "4390": "Using pseudo-senses for improving the extraction of synonyms from word embeddings", + "4391": "Hearst Patterns Revisited: Automatic Hypernym Detection from Large Text Corpora", + "4392": "Jointly Predicting Predicates and Arguments in Neural Semantic Role Labeling", + "4393": "Sparse and Constrained Attention for Neural Machine Translation", + "4394": "Neural Hidden Markov Model for Machine Translation", + "4395": "Bleaching Text: Abstract Features for Cross-lingual Gender Prediction", + "4396": "Orthographic Features for Bilingual Lexicon Induction", + "4397": "Judicious Selection of Training Data in Assisting Language for Multilingual Neural NER", + "4398": "Traffic Engineering With Traditional IP Routing Protocols", + "4399": "Document Embedding Enhanced Event Detection with Hierarchical and Supervised Attention", + "4400": "Learning Matching Models with Weak Supervision for Response Selection in Retrieval-based Chatbots", + "4401": "Large-Scale Multi-Domain Belief Tracking with Knowledge Sharing", + "4402": "Modeling Discourse Cohesion for Discourse Parsing via Memory Network", + "4403": "SciDTB: Discourse Dependency TreeBank for Scientific Abstracts", + "4404": "Predicting accuracy on large datasets from smaller pilot data", + "4405": "The Influence of Context on Sentence Acceptability Judgements", + "4406": "Do Neural Network Cross-Modal Mappings Really Bridge Modalities?", + "4407": "Policy Gradient as a Proxy for Dynamic Oracles in Constituency Parsing", + "4408": "Linear-Time Constituency Parsing with RNNs and Dynamic Programming", + "4409": "Characterizing the Internet Hierarchy from Multiple Vantage Points", + "4410": "Simplified Abugidas", + "4411": "Exploring Semantic Properties of Sentence Embeddings", + "4412": "Scoring Lexical Entailment with a Supervised Directional Similarity Network", + "4413": "Extracting Commonsense Properties from Embeddings with Limited Human Guidance", + "4414": "Breaking NLI Systems with Sentences that Require Simple Lexical Inferences", + "4415": "Adaptive Knowledge Sharing in Multi-Task Learning: Improving Low-Resource Neural Machine Translation", + "4416": "Automatic Estimation of Simultaneous Interpreter Performance", + "4417": "Learning Cross-lingual Distributed Logical Representations for Semantic Parsing", + "4418": "Enhancing Drug-Drug Interaction Extraction from Texts by Molecular Structure Information", + "4419": "diaNED: Time-Aware Named Entity Disambiguation for Diachronic Corpora", + "4420": "Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems", + "4421": "Examining Temporality in Document Classification", + "4422": "Personalized Language Model for Query Auto-Completion", + "4423": "Personalized Review Generation by Expanding Phrases and Attending on Aspect-Aware Representations", + "4424": "Learning Simplifications for Specific Target Audiences", + "4425": "Measuring Service in Multi-Class Networks", + "4426": "TCP-LP: A Distributed Algorithm for Low Priority Data Transfer", + "4427": "Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols", + "4428": "On the Structure of Weakly Acyclic Games", + "4429": "Schedulability Criterion and Performance Analysis of Coordinated Schedulers", + "4430": "DIRC: Increasing Indoor Wireless Capacity Using Directional Antennas", + "4431": "Learning-Based Anomaly Detection in BGP Updates *", + "4432": "Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network", + "4433": "CoolStreaming/DONet: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming", + "4434": "A Measurement Framework for Pin-Pointing Routing Changes", + "4435": "Towards an Internet-Scale XML Dissemination Service", + "4436": "Detectability of Traffic Anomalies in Two Adjacent Networks", + "4437": "Don't Secure Routing Protocols, Secure Data Delivery", + "4438": "The Case for Separating Routing from Routers", + "4439": "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems", + "4440": "Cooperative Strategies and Optimal Scheduling for Tree Networks", + "4441": "TIE Breaking: Tunable Interdomain Egress Selection", + "4442": "Distributed Low-Complexity Maximum-Throughput Scheduling for Wireless Backhaul Networks", + "4443": "Wide-Area Route Control for Distributed Services_4443", + "4444": "Virtually Eliminating Router Bugs", + "4445": "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks", + "4446": "Donnybrook: Enabling Large-Scale, High-Speed, Peer-to-Peer Games", + "4447": "Optimal Additive Composition of Abstraction-based Admissible Heuristics", + "4448": "Planning Games", + "4449": "Structural Patterns of Tractable Sequentially-Optimal Planning", + "4450": "Dytan: A Generic Dynamic Taint Analysis Framework", + "4451": "Factored Planning: How, When, and When Not", + "4452": "Question Answering over Implicitly Structured Web Content", + "4453": "Structural Patterns Heuristics via Fork Decomposition", + "4454": "To Search or to Crawl? Towards a Query Optimizer for Text-Centric Tasks", + "4455": "Improving Web Search Ranking by Incorporating User Behavior Information General Terms", + "4456": "Mining Reference Tables for Automatic Text Segmentation", + "4457": "Querying Text Databases for Efficient Information Extraction", + "4458": "Snowball: Extracting Relations from Large Plain-Text Collections", + "4459": "Extracting Relations from XML Documents", + "4460": "DivRank: the Interplay of Prestige and Diversity in Information Networks", + "4461": "Command-Form Coverage for Testing Database Applications", + "4462": "An Analysis Framework for Search Sequences", + "4463": "Query Suggestion Using Hitting Time", + "4464": "Mining Multi-Faceted Overviews of Arbitrary Topics in a Text Collection", + "4465": "Automatic Web Tagging and Person Tagging Using Language Models", + "4466": "A General Optimization Framework for Smoothing Language Models on Graph Structures", + "4467": "Generating Impact-Based Summaries for Scientific Literature", + "4468": "Topic Modeling with Network Regularization", + "4469": "A Study of Poisson Query Generation Model for Information Retrieval", + "4470": "Topic Sentiment Mixture: Modeling Facets and Opinions in Weblogs", + "4471": "Generating Semantic Annotations for Frequent Patterns with Context Analysis", + "4472": "Preventing SQL Injection Attacks Using AMNESIA", + "4473": "Discovering Evolutionary Theme Patterns from Text -An Exploration of Temporal Text Mining", + "4474": "Time-Dependent Semantic Similarity Measure of Queries Using Historical Click-Through Data *", + "4475": "Context-Sensitive Information Retrieval Using Implicit Feedback", + "4476": "Question Answering Passage Retrieval Using Dependency Relations", + "4477": "Unsupervised Learning of Soft Patterns for Generating Definitions from Online News", + "4478": "Hierarchical Indexing and Flexible Element Retrieval for Structured Document", + "4479": "Probabilistic Query Expansion using Query Logs", + "4480": "Two senses of \"work\"", + "4481": "Towards Estimating the Number of Distinct Value Combinations for a Set of Attributes Keywords relational database, cardinality estimation", + "4482": "Improving Online Gaming Quality using Detour Paths", + "4483": "A Classification of SQL Injection Attacks and Countermeasures", + "4484": "Optimal Scalable Video Multiplexing in Mobile Broadcast Networks", + "4485": "Analysis of Peer-Assisted Video-on-Demand Systems with Scalable Video Streams", + "4486": "End-to-End Secure Delivery of Scalable Video Streams", + "4487": "Bounding Switching Delay in Mobile TV Broadcast Networks", + "4488": "Cross-layer Optimization of Video Streaming in Single-Hop Wireless Networks", + "4489": "Energy Optimization in Mobile TV Broadcast Networks", + "4490": "Optimal Partitioning of Fine-Grained Scalable Video Streams", + "4491": "Optimal bit allocation for fine-grained scalable video sequences in distributed streaming environments", + "4492": "A Framework for Cost-Effective Peer-to-Peer Content Distribution", + "4493": "A Note on First-order Logic and Security Protocols", + "4494": "MonDe: Safe Updating through Monitored Deployment of New Component Versions", + "4495": "NoSQ : Store-Load Communication without a Store Queue", + "4496": "Formal Verification and its Impact on the Snooping versus Directory Protocol Debate", + "4497": "Verifying Safety of a Token Coherence Implementation by Parametric Compositional Refinement \ud97b\udf59", + "4498": "Using Destination-Set Prediction to Improve the Latency/Bandwidth Tradeoff in Shared-Memory Multiprocessors", + "4499": "unknown_4499", + "4500": "Towards Formal Verification of Memory Properties using Separation Logic *", + "4501": "Correctly Implementing Value Prediction in Microprocessors that Support Multithreading or Multiprocessing", + "4502": "Evaluating Non-deterministic Multi-threaded Commercial Workloads", + "4503": "The Complexity of Predicting Atomicity Violations \ud97b\udf59", + "4504": "Checking the Consistency of Collaboration and Class Diagrams using PVS", + "4505": "Applying Classification Techniques to Remotely-Collected Program Execution Data", + "4506": "Interface Abstraction for Compositional Verification", + "4507": "Compositional Verification of Secure Applet Interactions", + "4508": "Dynamic Deadlock Analysis of Multi-Threaded Programs", + "4509": "A Lattice Theory for Solving Games of Imperfect Information", + "4510": "Systematic Implementation of Real-Time Models", + "4511": "Combinations of theories and the Bernays-Sch\u00f6nfinkel-Ramsey class", + "4512": "INVISIFENCE: Performance-Transparent Memory Ordering in Conventional Multiprocessors", + "4513": "Token Tenure: PATCHing Token Counting Using Directory-Based Cache Coherence", + "4514": "Computer Systems", + "4515": "Rethinking Networking Architectures for Cognitive Control", + "4516": "Combining Static Analysis and Runtime Monitoring to Counter SQL-Injection Attacks", + "4517": "Sound and Complete Landmarks for And/Or Graphs", + "4518": "A Stochastic Local Search Approach to Vertex Cover", + "4519": "Modeling Intra-class Variation for Nonideal Iris Recognition", + "4520": "PARALLEL AND DISTRIBUTED AUDIO CONCEALMENT USING NONLOCAL SPARSE REPRESENTATIONS", + "4521": "PATCH-BASED IMAGE INTERPOLATION: ALGORITHMS AND APPLICATIONS", + "4522": "Sketch Recognizers from the End-User's, the Designer's, and the Programmer's Perspective", + "4523": "Marketing for participation: How can Electronic Dissertation Services win authors?", + "4524": "Study on contexts in tracking usage and attention metadata in the field of multilingual Technology Enhanced Learning", + "4525": "Interaction among agents that plan", + "4526": "Motivations as an abstraction of meta-level reasoning", + "4527": "Grokking Software Architecture", + "4528": "Acting on Norm Constrained Plans", + "4529": "Composing high-level plans for declarative agent programming", + "4530": "Motivations and declarative goals as cornerstones of autonomy", + "4531": "Motivations and Goal-Directed Autonomy", + "4532": "Declarative Goals in Motivated Agent Architectures A report submitted for transfer from MPhil to PhD", + "4533": "Understanding and Supporting Volunteer Contributors: The Case of Metadata and Document Servers", + "4534": "Bounded repairability for regular tree languages", + "4535": "On the use of guards for logics with data", + "4536": "Detailed Simulation of Large-Scale Wireless Networks", + "4537": "Scalable and Efficient Parallel and Distributed Simulation of Complex, Dynamic and Mobile Systems", + "4538": "Are Automated Debugging Techniques Actually Helping Programmers?", + "4539": "Bidding Clubs: Institutionalized Collusion in Auctions", + "4540": "Design and Simulation of a Migration-based Architecture for Massively Populated Internet Games", + "4541": "Continuous Inference of Psychological Stress from Sensory Measurements Collected in the Natural Environment", + "4542": "A Worst-Case Comparison between Temporal Difference and Residual Gradient with Linear Function Approximation", + "4543": "PAC Model-Free Reinforcement Learning", + "4544": "unknown_4544", + "4545": "Noncanonical LALR(1) Parsing *", + "4546": "Hybrid Transitive-Trust Mechanisms", + "4547": "Dynamic Service Discovery and Management in Task Computing", + "4548": "DIMPLE: DynamIc Membership ProtocoL for Epidemic protocols", + "4549": "Sink Tree-Based Bandwidth Allocation for Scalable QoS Flow Set-Up", + "4550": "Effective Memory Protection Using Dynamic Tainting", + "4551": "MuON: Epidemic Based Mutual Anonymity", + "4552": "A Fault-tolerant Routing Strategy for Fibonacci-class Cubes", + "4553": "A Knowledge-based Approach to Citation Extraction", + "4554": "On the e-Negotiation of Unmatched Logrolling Views", + "4555": "Integrating Genetic Algorithms with Conditional Random Fields to Enhance Question Informer Prediction", + "4556": "An Integrated Knowledge-based and Machine Learning Approach for Chinese Question Classification", + "4557": "Multiple Preprocessing for Systematic SAT Solvers", + "4558": "Location Privacy Preservation in Collaborative Spectrum Sensing", + "4559": "Modeling Semantic Cognition as Logical Dimensionality Reduction", + "4560": "Finding Small Changes using Sensor Networks", + "4561": "Improving Test Case Generation for Web Applications Using Automated Interface Discovery", + "4562": "An Entropy-based Objective Evaluation Method for Image Segmentation", + "4563": "MULTI-LEVEL MEMORY PREFETCHING FOR MEDIA AND STREAM PROCESSING", + "4564": "Cache Write Policy for Streaming Output Data", + "4565": "Parallel Media Processors for the Billion-Transistor Era", + "4566": "Header for SPIE use Understanding multimedia application characteristics for designing programmable media processors", + "4567": "Color Gamut Matching for Tiled Display Walls", + "4568": "A Co-evaluation Framework for Improving Segmentation Evaluation", + "4569": "The Role of Network Processors in Active Networks \ud97b\udf59", + "4570": "Adaptive End-to-End Quality-of-Service Guarantees in IP Networks using an Active Networking Approach", + "4571": "Algorithmic Models for Sensor Networks *", + "4572": "Relevance Feedback Based on Parameter Estimation of Target Distribution", + "4573": "Analyzing Rule-Based Behavioral Semantics of Visual Modeling Languages with Maude", + "4574": "Monadic Datalog Containment", + "4575": "API Blender: A Uniform Interface to Social Platform APIs", + "4576": "Deriving Dynamics of Web Pages: A Survey *", + "4577": "Archiving Data Objects using Web Feeds *", + "4578": "XML WAREHOUSING MEETS SOCIOLOGY W3C Member -Semantic Web BP", + "4579": "Optimal Top-k Generation of Attribute Combinations based on Ranked Lists", + "4580": "SYSTRAN Translation Stylesheets: Machine Translation driven by XSLT", + "4581": "Using Taxonomies for Content-based Routing with Ants *", + "4582": "Ant Algorithms for Search in Unstructured Peer-to-Peer Networks *", + "4583": "DDoS Vulnerability Analysis of Bittorrent Protocol", + "4584": "The ERC Webdam on Foundations of Web Data Management *", + "4585": "Finding Optimal Probabilistic Generators for XML Collections", + "4586": "Representing and Operating with Model Differences", + "4587": "May All Your Wishes Come True: A Study of Wishes and How to Recognize Them", + "4588": "Aggregate Queries for Discrete and Continuous Probabilistic XML *", + "4589": "Agr\u00e9gation de documents XML probabilistes *", + "4590": "Knowledge Discovery over the Deep Web, Semantic Web and XML", + "4591": "On the Complexity of Managing Probabilistic XML Data", + "4592": "Querying and Updating Probabilistic Information in XML", + "4593": "Identifying Websites with Flow Simulation", + "4594": "Efficient Search in Large Textual Collections with Redundancy", + "4595": "Phoenix++: Modular MapReduce for Shared-Memory Systems", + "4596": "EigenBench: A Simple Exploration Tool for Orthogonal TM Characteristics", + "4597": "Making Nested Parallel Transactions Practical using Lightweight Hardware Support General Terms", + "4598": "Evaluating Bufferless Flow Control for On-Chip Networks", + "4599": "Flexible Architectural Support for Fine-Grain Scheduling", + "4600": "Future Scaling of Processor-Memory Interfaces", + "4601": "Phoenix Rebirth: Scalable MapReduce on a Large-Scale Shared-Memory System", + "4602": "Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications", + "4603": "Fast Memory Snapshot for Concurrent Programming without Synchronization", + "4604": "Feedback-Directed Barrier Optimization in a Strongly Isolated STM", + "4605": "PREDICTING LINKS AND LINK CHANGE IN FRIENDS NETWORKS: SUPERVISED TIME SERIES LEARNING WITH IMBALANCED DATA", + "4606": "Thread-Safe Dynamic Binary Translation using Transactional Memory", + "4607": "JouleSort: A Balanced Energy-Efficiency Benchmark", + "4608": "An Effective Hybrid Transactional Memory System with Strong Isolation Guarantees", + "4609": "ATLAS: A Chip-Multiprocessor with Transactional Memory Support", + "4610": "Transactional Collection Classes", + "4611": "Evaluating MapReduce for Multi-core and Multiprocessor Systems", + "4612": "A Scalable, Non-blocking Approach to Transactional Memory", + "4613": "From Chaos to QoS: Case Studies in CMP Resource Management", + "4614": "Tradeoffs in Transactional Memory Virtualization", + "4615": "Architectural Semantics for Practical Transactional Memory", + "4616": "Text Extraction from the Web via Text-to-Tag Ratio", + "4617": "Deconstructing Hardware Architectures for Security", + "4618": "Full-System Power Analysis and Modeling for Server Environments", + "4619": "The ATOMO\u03a3 Transactional Programming Language", + "4620": "Parallelizing SPECjbb2000 with Transactional Memory", + "4621": "Early Release: Friend or Foe?", + "4622": "The Software Stack for Transactional Memory Challenges and Opportunities", + "4623": "Decoupling Datacenter Studies from Access to Large-Scale Applications: A Modeling Approach for Storage Workloads", + "4624": "The Common Case Transactional Behavior of Multithreaded Programs", + "4625": "Transactional Execution of Java Programs", + "4626": "Characterization of TCC on Chip-Multiprocessors", + "4627": "LogSig: Generating System Events from Raw Textual Logs", + "4628": "Improving Instruction Delivery with a Block-Aware ISA", + "4629": "TAPE: A Transactional Application Profiling Environment", + "4630": "Transactional Memory Coherence and Consistency", + "4631": "Overcoming the Limitations of Conventional Vector Processors", + "4632": "Hot topic session: How to solve the current memory access and data transfer bottlenecks: at the processor architecture or at the compiler level?", + "4633": "Evaluation of Existing Architectures in IRAM Systems", + "4634": "BooM: A Decision Procedure for Boolean Matching with Abstraction and Dynamic Learning", + "4635": "Interpolating Functions from Large Boolean Relations", + "4636": "Quantier Elimination via Functional Composition", + "4637": "A High Throughput String Matching Architecture for Intrusion Detection and Prevention", + "4638": "MovStream: An Efficient Algorithm for Monitoring Clusters Evolving in Data Streams \uf02a", + "4639": "Automated Preservation: The Case of Digital Raw Photographs", + "4640": "Control Objectives for DP: Digital Preservation as an Integrated Part of IT Governance", + "4641": "Preservation Decisions: Terms and Conditions Apply Challenges, Misperceptions and Lessons Learned in Preservation Planning", + "4642": "Integrating Meta-Path Selection with User-Guided Object Clustering in Heterogeneous Information Networks *", + "4643": "Ranking-Based Clustering of Heterogeneous Information Networks with Star Network Schema * General Terms Algorithms", + "4644": "RankClus: Integrating Clustering with Ranking for Heterogeneous Information Network Analysis *", + "4645": "An Unsupervised Framework for Extracting and Normalizing Product Attributes from Multiple Web Sites", + "4646": "Event Identification in Social Media", + "4647": "Tuning Schema Matching Software using Synthetic Scenarios", + "4648": "Toward Entity Retrieval over Structured and Text Data", + "4649": "Productivity of Stream Definitions", + "4650": "Estimating Bidders' Valuation Distributions in Online Auctions", + "4651": "On Approximating Minimum Infrequent and Maximum Frequent Sets", + "4652": "Ranking Refinement and Its Application to Information Retrieval", + "4653": "Generalized Maximum Margin Clustering and Unsupervised Kernel Learning", + "4654": "Towards Effective Partition Management for Large Graphs", + "4655": "Fast Mining and Forecasting of Complex Time-Stamped Events", + "4656": "Searching Substructures with Superimposed Distance *", + "4657": "Theoretical Justification of Popular Link Prediction Heuristics", + "4658": "Quicklink Selection for Navigational Query Results", + "4659": "Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint", + "4660": "Fast Hydraulic Erosion Simulation and Visualization on GPU", + "4661": "Black-Box Reductions for Cost-Sharing Mechanism Design", + "4662": "Stream Monitoring under the Time Warping Distance", + "4663": "BRAID: Stream Mining through Group Lag Correlations", + "4664": "Comparison of Variational Bayes and Gibbs Sampling in Reconstruction of Missing Values with Probabilistic Principal Component Analysis", + "4665": "Design Principles for Tamper-Resistant Smartcard Processors", + "4666": "Beyond Loose LP-relaxations: Optimizing MRFs by Repairing Cycles", + "4667": "Training an Active Random Field for Real-Time Image Denoising", + "4668": "Fall 2003 CS263 Course Project", + "4669": "A Typed Interrupt Calculus", + "4670": "From OO to FPGA: Fitting Round Objects into Square Hardware?", + "4671": "Tracking the Evolution of Feature Oriented Product Lines", + "4672": "Optimal Power-Down Strategies", + "4673": "Feature Refactoring a Multi-Representation Program into a Product Line", + "4674": "Education", + "4675": "The TEXTURE Benchmark: Measuring Performance of Text Queries on a Relational DBMS", + "4676": "On Monitoring the top-k Unsafe Places", + "4677": "Progressive Computation of The Min-Dist Optimal-Location Query", + "4678": "Refreshing the Sky: The Compressed Skycube with Efficient Support for Frequent Updates", + "4679": "Finding Fastest Paths on A Road Network with Speed Patterns", + "4680": "Continuous Reverse Nearest Neighbor Monitoring", + "4681": "On Computing Top-t Most Influential Spatial Sites", + "4682": "The Optimal-Location Query", + "4683": "Correlation Clustering: Maximizing Agreements via Semidefinite Programming", + "4684": "Close Pair Queries in Moving Object Databases", + "4685": "A Novel Improvement to the R*-tree Spatial Index using Gain/Loss Metrics", + "4686": "Efficient Aggregation over Objects with Extent", + "4687": "Facetedpedia: Dynamic Generation of Query-Dependent Faceted Interfaces for Wikipedia", + "4688": "Temporal Aggregation over Data Streams using Multiple Granularities", + "4689": "Efficient Complex Query Support for Multiversion XML Documents", + "4690": "Advanced Database Aggregation Query Processing", + "4691": "Disk Scrubbing in Large Archival Storage Systems", + "4692": "Supporting Ranking and Clustering as Generalized Order-By and Group-By * General Terms", + "4693": "Enterprise Information Extraction: Recent Developments and Open Challenges", + "4694": "Facility Location with Service Installation Costs", + "4695": "Regular Expression Learning for Information Extraction", + "4696": "A Combination of Trie-trees and Inverted Files for the Indexing of Set-valued Attributes", + "4697": "Composing XSL Transformations with XML Publishing Views", + "4698": "unknown_4698", + "4699": "SATzilla: An Algorithm Portfolio for SAT *", + "4700": "Stepwise Randomized Combinatorial Auctions Achieve Revenue Monotonicity", + "4701": "Dynamic Index Coding for Wireless Broadcast Networks", + "4702": "Negative evidences and co-occurrences in image retrieval: the benefit of PCA and whitening", + "4703": "Generating Mathematical Word Problems", + "4704": "Statistical Phrase-Based Translation", + "4705": "Risk-Averse Stochastic Optimization: Probabilistically-Constrained Models and Algorithms for Black-Box Distributions", + "4706": "Toward Integrating Word Sense and Entity Disambiguation into Statistical Machine Translation", + "4707": "Design and Evaluation of a Versatile and Efficient Receiver-Initiated Link Layer for Low-Power Wireless", + "4708": "Putting the Software Radio on a Low-Calorie Diet", + "4709": "Robust Location Distinction using Temporal Link Signatures", + "4710": "Understanding and Mitigating the Impact of RF Interference on 802.11 Networks", + "4711": "User-Level Secure Deletion on Log-structured File Systems", + "4712": "Automated Configuration of Mixed Integer Programming Solvers", + "4713": "Load Balanced Short Path Routing in Wireless Networks", + "4714": "Tradeoffs between Stretch Factor and Load Balancing Ratio in Routing on Growth Restricted Graphs", + "4715": "Double Rulings for Information Brokerage in Sensor Networks", + "4716": "Matrix-Vector Multiplication in Sub-Quadratic Time (Some Preprocessing Required)", + "4717": "Boundary Recognition in Sensor Networks by Topological Methods", + "4718": "Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor Networks", + "4719": "Scalable Data Aggregation for Dynamic Events in Sensor Networks *", + "4720": "Alleviating MAC Layer Self-Contention in Ad-hoc Networks", + "4721": "The Laplace transform on time scales revisited \u2729", + "4722": "Should one compute the Temporal Difference fix point or minimize the Bellman Residual ? The unified oblique projection view", + "4723": "Least-Squares \u03bb Policy Iteration: Bias-Variance Trade-off in Control Problems", + "4724": "Sum of Us: Strategyproof Selection from the Selectors", + "4725": "Tag-based Social Interest Discovery", + "4726": "A Neural Network Classifier for Junk E-Mail", + "4727": "Parallelizing Time With Polynomial Circuits", + "4728": "Application Track", + "4729": "Performance Models for Evaluation and Automatic Tuning of Symmetric Sparse Matrix-Vector Multiply", + "4730": "When Cache Blocking of Sparse Matrix Vector Multiply Works and Why", + "4731": "A Design Methodology for Domain-Optimized Power-Efficient Supercomputing", + "4732": "Minimizing Communication in Sparse Matrix Solvers", + "4733": "Auto-tuning the 27-point Stencil for Multicore", + "4734": "Synthesizing View Definitions from Data *", + "4735": "Distributed Computation of the Mode", + "4736": "An Algorithm for Multi-Unit Combinatorial Auctions", + "4737": "Algorithmic Issues in DNA Barcoding Problems (Bhaskar DasGupta, Ming-Yang Kao", + "4738": "Constructivist Approach To Information Security Awareness In The Middle East", + "4739": "Improving Index Performance through Prefetching", + "4740": "Bucket Game with Applications to Set Multicover and Dynamic Page Migration \ud97b\udf59", + "4741": "RFDump: An Architecture for Monitoring the Wireless Ether", + "4742": "BGP Safety with Spurious Updates", + "4743": "On Delay-Independent Diagonal Stability of Max-Min Congestion Control", + "4744": "Using Forgetful Routing to Control BGP Table Size", + "4745": "In-Degree Dynamics of Large-Scale P2P Systems", + "4746": "On Estimating Tight-Link Bandwidth Characteristics over Multi-Hop Paths", + "4747": "Increase-Decrease Congestion Control for Real-time Streaming: Scalability", + "4748": "Run the GAMUT: A Comprehensive Approach to Evaluating Game-Theoretic Algorithms", + "4749": "Improved Inapproximability Results for Counting Independent Sets in the Hard-Core Model", + "4750": "Wealth-Based Evolution Model for the Internet AS-Level Topology", + "4751": "Understanding Disconnection and Stabilization of Chord", + "4752": "Scalable Flow-Based Networking with DIFANE", + "4753": "PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control", + "4754": "Characterizing Tight-Link Bandwidth of Multi-Hop Paths Using Probing Response Curves", + "4755": "OpenFlow-Based Server Load Balancing Gone Wild_4755", + "4756": "How DNS Misnaming Distorts Internet Topology Mapping", + "4757": "Analysis of Rate-Distortion Functions and Congestion Control in Scalable Internet Video Streaming", + "4758": "Evaluating the Potential of Bandwidth Estimators", + "4759": "unknown_4759", + "4760": "On the Structure of Industrial SAT Instances", + "4761": "Computational Risk Management for Building Highly Reliable Network Services", + "4762": "AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing *", + "4763": "A Performance Study of Deployment Factors in Wireless Mesh Networks", + "4764": "Efficient Pattern Matching over Event Streams *", + "4765": "A Stochastic Model of TCP/IP with Stationary Random Losses", + "4766": "An Empirical Study of Memory Sharing in Virtual Machines_4766", + "4767": "Design and Implementation of a Routing Control Platform", + "4768": "Stealth Probing: Efficient Data-Plane Security for IP Routing", + "4769": "In VINI Veritas: Realistic and Controlled Network Experimentation", + "4770": "Toward Learning Based Web Query Processing", + "4771": "Hash, Don't Cache: Fast Packet Forwarding for Enterprise Edge Routers", + "4772": "Solving (Weighted) Partial MaxSAT through Satisfiability Testing", + "4773": "Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination", + "4774": "Efficient Memory Integrity Verification and Encryption for Secure Processors", + "4775": "Improving Wireless Privacy with an Identifier-Free Link Layer Protocol", + "4776": "From One to Many: Planning for Loosely Coupled Multi-Agent Systems", + "4777": "Fast Probabilistic Planning Through Weighted Model Counting", + "4778": "Extracting synonymous gene and protein terms from biological literature", + "4779": "Structural-Pattern Databases", + "4780": "Promotion Analysis in Multi-Dimensional Space", + "4781": "Entropy of Search Logs: How Hard is Search? With Personalization? With Backoff?", + "4782": "Automatic Labeling of Multinomial Topic Models", + "4783": "Approximation Algorithms for Single-minded Envy-free Profit-maximization Problems with Limited Supply", + "4784": "Cost-Optimal Planning with Landmarks", + "4785": "Active Feedback -UIUC TREC-2003 HARD Experiments", + "4786": "Consistency Maintenance Based on the Mark & Retrace Technique in Groupware Systems *", + "4787": "Generic Soft Pattern Models for Definitional Question Answering", + "4788": "User Browsing Graph: Structure, Evolution and Application 1", + "4789": "FGS+: OPTIMIZING THE JOINT SNR-TEMPORAL VIDEO QUALITY IN MPEG-4 FINE GRAINED SCALABLE CODING", + "4790": "Columbia University TRECVID-2005 Video Search and High-Level Feature Extraction", + "4791": "Live Peer-to-Peer Streaming with Scalable Video Coding and Networking Coding", + "4792": "Randomized k-Coverage Algorithms For Dense Sensor Networks", + "4793": "PROMISE: Peer-to-Peer Media Streaming Using CollectCast", + "4794": "The Effectiveness of Stackelberg Strategies and Tolls for Network Congestion Games *", + "4795": "Ten male colleagues took part in our lab-study about mobile texting", + "4796": "Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study \ud97b\udf59", + "4797": "unknown_4797", + "4798": "DCV: A Causality Detection Approach for Large-scale Dynamic Collaboration Environments *", + "4799": "Token Coherence: Decoupling Performance and Correctness", + "4800": "Specification-Driven Development of an Executable Metamodel in Eiffel", + "4801": "Proof General: A Generic Tool for Proof Development", + "4802": "Another type system for in-place update", + "4803": "Checking Absence of Illicit Applet Interactions: A Case Study", + "4804": "Provably Correct Runtime Monitoring \ud97b\udf59", + "4805": "Approximation algorithms for prize collecting forest problems with submodular penalty functions", + "4806": "RETCON: Transactional Repair without Replay", + "4807": "The Joy of Forgetting: Faster Anytime Search via Restarting", + "4808": "Preferred Operators and Deferred Evaluation in Satisficing Planning", + "4809": "On the Importance of Source Classification in Wyner-Ziv Video Coding", + "4810": "MATRIX: Maintenance-Oriented Testing Requirements Identifier and Examiner", + "4811": "Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing", + "4812": "Norm-based behaviour modification in BDI agents", + "4813": "Electronic contracting in aircraft aftercare: A case study", + "4814": "Using constraints for Norm-aware BDI Agents", + "4815": "STORIES in time: a graph-based interface for news tracking and discovery", + "4816": "The Effectiveness of Lloyd-type Methods for the k-Means Problem", + "4817": "Leveraging New Plans in AgentSpeak(PL)", + "4818": "Simulation of Scale-Free Networks", + "4819": "An Adaptive Load Balancing Middleware for Distributed Simulation", + "4820": "Efficient Value-Function Approximation via Online Linear Regression", + "4821": "Lazy Approximation for Solving Continuous Finite-Horizon MDPs", + "4822": "Bridging Different Generation of Web via Exploiting Semantic Social Web Blog Portal", + "4823": "InsECTJ: A Generic Instrumentation Framework for Collecting Dynamic Information within Eclipse", + "4824": "Hybrid images", + "4825": "DESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH", + "4826": "A Reliable Connection Migration Mechanism for Synchronous Transient Communication in Mobile Codes", + "4827": "Approximation Algorithms for Graph Homomorphism Problems", + "4828": "A Watermarking Infrastructure for Enterprise Document Management", + "4829": "Question Classification in English-Chinese Cross-Language Question Answering: An Integrated Genetic Algorithm and Machine Learning Approach", + "4830": "Datagridflows: Managing Long-Run Processes on Datagrids", + "4831": "A HIERARCHICAL IMAGE SEGMENTATION ALGORITHM", + "4832": "MULTI-LEVEL CACHE HIERARCHY EVALUATION FOR PROGRAMMABLE MEDIA PROCESSORS", + "4833": "Closed-Loop Congestion Control for Mixed Responsive and Non-Responsive Traffic", + "4834": "Automatic extraction of synonyms in a dictionary", + "4835": "Selective Capture and Replay of Program Executions", + "4836": "Masters Internship Report Extraction of information in large graphs; Automatic search for synonyms", + "4837": "Integration of SYSTRAN MT systems in an open workow Mats Attn\u00e4s", + "4838": "Truthful and Near-Optimal Mechanism Design via Linear Programming *", + "4839": "Updating Probabilistic XML *", + "4840": "Corroboration de vues discordantes fond\u00e9e sur la confiance *", + "4841": "On the Complexity of Deriving Schema Mappings from Database Instances", + "4842": "Formalizing ODP Computational Viewpoint Specifications in Maude", + "4843": "Using UML and Maude for Writing and Reasoning about ODP Policies", + "4844": "The ZCache: Decoupling Ways and Associativity", + "4845": "Implementing and Evaluating Nested Parallel Transactions in Software Transactional Memory", + "4846": "Implementing and Evaluating a Model Checker for Transactional Memory Systems", + "4847": "Program Slicing", + "4848": "On the Energy (In)efficiency of Hadoop Clusters", + "4849": "Operating System Transactions", + "4850": "Decoupling Dynamic Information Flow Tracking with a Dedicated Coprocessor", + "4851": "A Memory System Design Framework: Creating Smart Memories", + "4852": "A Low Power Front-End for Embedded Processors Using a Block-Aware Instruction Set", + "4853": "Raksha: A Flexible Information Flow Architecture for Software Security", + "4854": "Vector Lane Threading", + "4855": "Building and Using the ATLAS Transactional Memory System", + "4856": "\ufffd\ufffd \ufffd\ufffd", + "4857": "Towards Completely Automatic Decoder Synthesis", + "4858": "Vantage: Scalable and Efficient Fine-Grain Cache Partitioning", + "4859": "unknown_4859", + "4860": "Laminar: Practical Fine-Grained Decentralized Information Flow Control", + "4861": "Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation", + "4862": "PathSim: Meta Path-Based Top-K Similarity Search in Heterogeneous Information Networks", + "4863": "Autocannibalistic and Anyspace Indexing Algorithms with Applications to Sensor Data Mining", + "4864": "Semi-Supervised Time Series Classification", + "4865": "Indexing Multi-Dimensional Time-Series with Support for Multiple Distance Measures", + "4866": "Traffic Shaping to Optimize Ad Delivery", + "4867": "Rise and Fall Patterns of Information Diffusion: Model and Implications", + "4868": "Generating Succinct Titles for Web URLs", + "4869": "F4: Large-Scale Automated Forecasting Using Fractals", + "4870": "FTW: Fast Similarity Search under the Time Warping Distance", + "4871": "Operating Systems Should Provide Transactions", + "4872": "Data Association for Topic Intensity Tracking", + "4873": "Speech-Assisted Radiology System for Retrieval, Reporting and Annotation", + "4874": "Deep Learning Made Easier by Linear Transformations in Perceptrons", + "4875": "An Asymmetric Security Mechanism for Navigation Signals", + "4876": "Quantifying Maintainability in Feature Oriented Product Lines", + "4877": "Improving the R*-tree with Outlier Handling Techniques *", + "4878": "Online Event-driven Subsequence Matching over Financial Data Streams_4878", + "4879": "On Spatial-Range Closest-Pair Query", + "4880": "A Rank-Rewrite Framework for Summarizing XML Documents", + "4881": "Cross-Fertilizing Deep Web Analysis and Ontology Enrichment", + "4882": "Dealing with the Deep Web and all its Quirks", + "4883": "Maximum Benefit from a Minimal HTM", + "4884": "Understanding Sources of Inefficiency in General-Purpose Chips", + "4885": "SLICE: A Novel Method to Find Local Linear Correlations by Constructing Hyperplanes\uf02a", + "4886": "Dune: Safe User-level Access to Privileged CPU Features_4886", + "4887": "Comparing Memory Systems for Chip Multiprocessors", + "4888": "Simultaneously Improving Code Size, Performance, and Energy in Embedded Processors", + "4889": "Autonomic Power Management Schemes for Internet Servers and Data Centers", + "4890": "Heuristics for Profile-driven Method-level Speculative Parallelization", + "4891": "Vector Vs. Superscalar and VLIW Architectures for Embedded Multimedia Benchmarks", + "4892": "To SAT or Not to SAT: Ashenhurst Decomposition in a Large Scale", + "4893": "A language of patterns for subterm selection", + "4894": "PTask: Operating System Abstractions To Manage GPUs as Compute Devices", + "4895": "Network Design for Information Networks", + "4896": "LP-based Approximation Algorithms for Capacitated Facility Location *", + "4897": "AN EFFICIENT NOMINAL UNIFICATION ALGORITHM", + "4898": "Mechanism Design Over Discrete Domains", + "4899": "Boolean Tensor Factorizations", + "4900": "Considerations for Mondriaan-like Systems", + "4901": "Dependence-Aware Transactional Memory for Increased Concurrency", + "4902": "TxLinux: Using and Managing Hardware Transactional Memory in an Operating System", + "4903": "Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection", + "4904": "BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection", + "4905": "Privacy-Preserving Remote Diagnostics", + "4906": "Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems", + "4907": "Performance Pathologies in Hardware Transactional Memory", + "4908": "Forwardflow: A Scalable Core for Power-Constrained CMPs", + "4909": "Preparing for the Accreditation Visit", + "4910": "Valuation Uncertainty and Imperfect Introspection in Second-Price Auctions", + "4911": "A Combinatorial Group Testing Method for FPGA Fault Location", + "4912": "A Device-Controlled Dynamic Configuration Framework Supporting Heterogeneous Resource Management", + "4913": "Collaborative Expert Portfolio Management", + "4914": "THE KNOWLEDGE-GRADIENT STOPPING RULE FOR RANKING AND SELECTION", + "4915": "Construction Locale de Sous-Graphes Couvrants Peu Denses \u2020", + "4916": "Solving Difficult HTM Problems Without Difficult Hardware", + "4917": "Data-Centric Reconfiguration with Network-Attached Disks", + "4918": "Partial Snapshot Objects Hagit Attiya Technion Rachid Guerraoui EPFL", + "4919": "Mean Field Inference in Dependency Networks: An Empirical Study", + "4920": "Good Word Attacks on Statistical Spam Filters", + "4921": "Troubleshooting Chronic Conditions in Large IP Networks", + "4922": "Behavioral Game Theoretic Models: A Bayesian Framework For Parameter Analysis", + "4923": "On the Characteristics and Origins of Internet Flow Rates", + "4924": "Pretty Good Packet Authentication", + "4925": "Application-Specific Customization of Soft Processor Microarchitecture General Terms", + "4926": "The Microarchitecture of FPGA-Based Soft Processors", + "4927": "MetaTM/TxLinux: Transactional Memory For An Operating System", + "4928": "Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication", + "4929": "Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks", + "4930": "Demo: Snowcat5 -Networking in Snow", + "4931": "Reducing the Availability Management Overheads of Federated Content Sharing Systems", + "4932": "Two-Level Processor-Sharing Scheduling Disciplines: Mean Delay Analysis", + "4933": "Games for Extracting Randomness", + "4934": "Addressing Strategic Behavior in a Deployed Microeconomic Resource Allocator", + "4935": "Micropayments Revisited", + "4936": "Improved File Synchronization Techniques for Maintaining Large Replicated Collections over Slow Networks", + "4937": "Efficient Multiple-Click Models in Web Search", + "4938": "The Linux Kernel: A Challenging Workload for Transactional Memory", + "4939": "Highly Scalable Genotype Phasing by Entropy Minimization", + "4940": "GIMscan: A New Statistical Method for Analyzing Whole-Genome Array CGH Data", + "4941": "Power Efficient Range Assignment in Ad-hoc Wireless Networks", + "4942": "Practical Approximation Algorithms for Separable Packing Linear Programs ?", + "4943": "Highly Scalable Algorithms for Robust String Barcoding \ud97b\udf59", + "4944": "On Abstraction and Informatics", + "4945": "unknown_4945", + "4946": "Performance Implications of Communication Mechanisms in All-Software Global Address Space Systems", + "4947": "Unraveling Unstructured Process Models", + "4948": "Silk Server -Adding missing Links while consuming Linked Data", + "4949": "Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection", + "4950": "Civitas: Toward a Secure Voting System", + "4951": "Discovering and Ranking Web Services with BASIL: A Personalized Approach with Biased Focus", + "4952": "Using First-Order Logic to Reason about Policies", + "4953": "Power and Bandwidth Allocation in Cooperative Dirty Paper Coding", + "4954": "Factorized Normalized Maximum Likelihood Criterion for Learning Bayesian Network Structures", + "4955": "The Dynamics of Viral Marketing *", + "4956": "Patterns of Influence in a Recommendation Network", + "4957": "Realistic, Mathematically Tractable Graph Generation and Evolution, Using Kronecker Multiplication", + "4958": "Hydra: Automatically Configuring Algorithms for Portfolio-Based Selection", + "4959": "Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations", + "4960": "Mondrian Memory Protection", + "4961": "Block-based Web Search", + "4962": "RDMA Capable iWARP over Datagrams", + "4963": "Hybrid Parallel Programming with MPI and Unified Parallel C *", + "4964": "Evaluation of ConnectX Virtual Protocol Interconnect for Data Centers", + "4965": "Asymmetric Interactions in Symmetric Multi-core Systems: Analysis, Enhancements and Evaluation", + "4966": "Are Nonblocking Networks Really Needed for High-End-Computing Workloads?", + "4967": "DMA-Assisted, Intranode Communication in GPU Accelerated Systems", + "4968": "Semantics-based Distributed I/O with the ParaMEDIC Framework *", + "4969": "High Performance User Level Sockets over Gigabit Ethernet", + "4970": "TriopusNet: Automating Wireless Sensor Network Deployment and Replacement in Pipeline Monitoring", + "4971": "Cloaking Malware with the Trusted Platform Module_4971", + "4972": "Channel Allocation in 802.11-based Mesh Networks", + "4973": "Performance Debugging in Data Centers: Doing More with Less 1", + "4974": "PRESTO: Feedback-driven Data Management in Sensor Networks", + "4975": "Memory Buddies: Exploiting Page Sharing for Smart Colocation in Virtualized Data Centers", + "4976": "OASIS: Online Active SemI-Supervised Learning", + "4977": "Cognitive Models of Test-Item Effects in Human Category Learning", + "4978": "Unlabeled data: Now it helps, now it doesn't", + "4979": "Humans Perform Semi-Supervised Classification Too *", + "4980": "A Probabilistic Latent Variable Model for Acoustic Modeling", + "4981": "Learning to Rank with Partially-Labeled Data", + "4982": "WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios", + "4983": "Inapproximability of Combinatorial Public Projects", + "4984": "Best-Response Mechanisms_4984" + }, + "initializer_range": 0.02, + "label2id": { + "\"I Have No Idea What I'm Doing\" - On the Usability of Deploying HTTPS \"I Have No Idea What I'm Doing\" - On the Usability of Deploying HTTPS": 3372, + "\"I Have a Narrow Thought Process\": Constraints on Explanations Connecting Inferences and Self-Perceptions \"I Have a Narrow Thought Process\": Constraints on Explanations Connecting Inferences and Self-Perceptions": 3870, + "\"I am uncomfortable sharing what I can't see\": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications \"I am uncomfortable sharing what I can't see\": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications": 3587, + "\"I want my money back!\" Limiting Online Password-Guessing Financially": 3968, + "\"I've Got Nothing to Lose\": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach \"I've Got Nothing to Lose\": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach": 3828, + "\"It's Scary...It's Confusing...It's Dull\": How Cybersecurity Advocates Overcome Negative Perceptions of Security \"It's Scary...It's Confusing...It's Dull\": How Cybersecurity Advocates Overcome Negative Perceptions of Security": 3809, + "\"Simultaneous\" Considered Harmful: Modular Parallelism (deprecating \"locks\", \"semaphores\", serializability, and other sequential thinking)": 2069, + "\"There is nothing that I need to keep secret\": Sharing Practices and Concerns of Wearable Fitness Data This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. \"There is nothing that I need to keep secret\": Sharing Practices and Concerns of Wearable Fitness Data": 3830, + "\"We Can't Live Without Them!\" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks \"We Can't Live Without Them!\" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks": 3844, + "\"We make it a big deal in the company\": Security Mindsets in Organizations that Develop Cryptographic Products \"We make it a big deal in the company\": Security Mindsets in Organizations that Develop Cryptographic Products": 3808, + "\"Weird Machines\" in ELF: A Spotlight on the Underappreciated Metadata": 4018, + "\"You don't want to be the next meme\": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography \"You don't want to be the next meme\": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography": 3822, + "\"You still use the password after all\" - Exploring FIDO2 Security Keys in a Small Company \"You still use the password after all\" - Exploring FIDO2 Security Keys in a Small Company": 3859, + "\"You've Got Your Nice List of Bugs, Now What?\" Vulnerability Discovery and Management Processes in the Wild \"You've Got Your Nice List of Bugs, Now What?\" Vulnerability Discovery and Management Processes in the Wild": 3849, + "'Lighter' Can Still Be Dark: Modeling Comparative Color Descriptions": 3959, + "*-Box: Towards Reliability and Consistency in Dropbox-like File Synchronization Services": 2123, + "1,001 New Features for Statistical Machine Translation *": 2688, + "802.11 User Fingerprinting": 64, + "99 Deduplication Problems": 2172, + "A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping": 3461, + "A Bayesian Approach to Privacy Enforcement in Smartphones A Bayesian Approach to Privacy Enforcement in Smartphones": 3205, + "A Bayesian Approach to Unsupervised Semantic Role Induction": 2899, + "A Bayesian Method for Auditing Elections": 3101, + "A Bestiary of Blocking The Motivations and Modes behind Website Unavailability": 1709, + "A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link": 3565, + "A Black-Box Approach for Estimating Utilization of Polled IO Network Functions": 1923, + "A Blueprint for Constructing Peer-to-Peer Systems Robust to Dynamic Worst-Case Joins and Leaves": 3455, + "A Case Study on Neural Headline Generation for Editing Support": 4224, + "A Case for Battery Charging-Aware Power Management and Deferrable Task Scheduling in Smartphones": 2101, + "A Case for Biased Programming in Flash": 2219, + "A Case for Ending Monolithic Apps for Connected Devices": 2059, + "A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases": 2058, + "A Case for NUMA-aware Contention Management on Multicore Systems": 282, + "A Case for Packing and Indexing in Cloud File Systems": 1907, + "A Case for Parallelizing Web Pages": 2078, + "A Case for Performance-Centric Network Allocation": 1809, + "A Case for Virtualizing the Electric Utility in Cloud Data Centers Position paper": 1829, + "A Centralized Failure Handler for File Systems": 3089, + "A Classification of SQL Injection Attacks and Countermeasures": 4483, + "A Clean-Slate Look at Disk Scrubbing": 2906, + "A Cloud Gaming Framework for Dynamic Graphical Rendering Towards Achieving Distributed Game Engines": 1939, + "A Cloud-based Content Gathering Network": 1878, + "A Cloud-native Architecture for Replicated Data Services": 1948, + "A Co-Matching Model for Multi-choice Reading Comprehension": 4239, + "A Co-evaluation Framework for Improving Segmentation Evaluation": 4568, + "A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable": 704, + "A Combination of Trie-trees and Inverted Files for the Indexing of Set-valued Attributes": 4696, + "A Combinatorial Group Testing Method for FPGA Fault Location": 4911, + "A Common Substrate for Cluster Computing": 1785, + "A Comparative Experimental Study of Parallel File Systems for Large-Scale Data Processing": 3114, + "A Comparative Usability Study of Key Management in Secure Email A Comparative Usability Study of Key Management in Secure Email": 3823, + "A Comparison of Communication Mechanisms in Vehicular Edge Computing": 2016, + "A Comprehensive Analysis of Superpage Management Mechanisms and Policies A Comprehensive Analysis of Superpage Management Mechanisms and Policies": 1279, + "A Comprehensive Measurement Study of Domain Generating Malware A Comprehensive Measurement Study of Domain Generating Malware": 3321, + "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web": 3698, + "A Comprehensive Resource Management Solution for Web-based Systems A Comprehensive Resource Management Solution for Web-based Systems": 2325, + "A Comprehensive Study of DNS-over-HTTPS Downgrade Attack": 1727, + "A Conceptual Model and Predicate Language for Data Selection and Projection Based on Provenance": 778, + "A Control Theoretic Approach to Analyzing Peer-to-Peer Searching": 1652, + "A Critical Analysis of the Council of Europe Recommendations on e-voting": 2463, + "A Cross-Collection Mixture Model for Comparative Text Mining": 3421, + "A Crowd-Annotated Spanish Corpus for Humor Analysis": 1375, + "A Crowdsourced Frame Disambiguation Corpus with Ambiguity": 4206, + "A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure": 1711, + "A Cuckoo's Egg in the Malware Nest On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks": 285, + "A Cybersecurity Test and Evaluation Facility for the Next Generation Air Transportation System (NextGen)": 1382, + "A DNS Reflection Method for Global Traffic Management": 446, + "A DSL Approach to Reconcile Equivalent Divergent Program Executions A DSL Approach to Reconcile Equivalent Divergent Program Executions": 1034, + "A Data-Driven Reflection on 36 Years of Security and Privacy Research": 1407, + "A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems": 1822, + "A Decentralized Blockchain with High Throughput and Fast Confirmation A Decentralized Blockchain with High Throughput and Fast Confirmation": 1232, + "A Decision-Analytic Approach for P2P Cooperation Policy Setting": 689, + "A Deep Dive into DNS Query Failures A Deep Dive into DNS Query Failures": 1267, + "A Dependency-to-String Model for Chinese-Japanese SMT System": 1301, + "A Design Methodology for Domain-Optimized Power-Efficient Supercomputing": 4731, + "A Design for Comprehensive Kernel Instrumentation": 382, + "A Device-Controlled Dynamic Configuration Framework Supporting Heterogeneous Resource Management": 4912, + "A Discriminative Model for Semantics-to-String Translation": 2304, + "A Distributed Polylogarithmic Time Algorithm for Self-Stabilizing Skip Graphs *": 3499, + "A Distributed Reputation Approach to Cooperative Internet Routing Protection": 56, + "A Distributed and Oblivious Heap \ud97b\udf59": 3510, + "A Distributional and Orthographic Aggregation Model for English Derivational Morphology": 4355, + "A DoS-Resilient Information System for Dynamic Data Management *": 28, + "A Double-Edged Sword: Security Threats and Opportunities in One-Sided Network Communication": 1930, + "A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL": 117, + "A Factory of Comparable Corpora from Wikipedia": 2459, + "A Fault-tolerant Routing Strategy for Fibonacci-class Cubes": 4552, + "A Feasibility Study of Radio-frequency Retroreflector Attack": 4111, + "A Fine-Grained Workflow Model with Provenance-Aware Security Views": 261, + "A First Look at Problems in the Cloud": 270, + "A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters": 3614, + "A Formal Foundation for XrML *": 1665, + "A Framework for Cost-Effective Peer-to-Peer Content Distribution": 4492, + "A Framework for Incorporating General Domain Knowledge into Latent Dirichlet Allocation using First-Order Logic": 2643, + "A Framework for Monitoring Agent-Based Normative Systems": 104, + "A Framework for Policies over Provenance": 305, + "A Framework for Representing Language Acquisition in a Population Setting": 4322, + "A Framework for Thermal and Performance Management": 2452, + "A Full GPU Virtualization Solution with Mediated Pass-Through A Full GPU Virtualization Solution with Mediated Pass-Through": 885, + "A General Optimization Framework for Smoothing Language Models on Graph Structures": 4466, + "A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT) A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT)": 985, + "A General-Purpose Provenance Library": 3903, + "A Geometric Model for On-line Social Networks *": 286, + "A HIERARCHICAL IMAGE SEGMENTATION ALGORITHM": 4831, + "A Hierarchical Pitman-Yor Process HMM for Unsupervised Part of Speech Induction": 2887, + "A High Coverage Method for Automatic False Friends Detection for Spanish and Portuguese": 1353, + "A High Throughput String Matching Architecture for Intrusion Detection and Prevention": 4637, + "A Highly Immersive Approach to Teaching Reverse Engineering": 3099, + "A Hybrid Touch Interface for Pr\u00eatPr\u00eat\u00e0 Voter": 1456, + "A Joint Model for Chinese Microblog Sentiment Analysis": 2485, + "A Joint Model of Text and Aspect Ratings for Sentiment Summarization": 2943, + "A Knowledge-based Approach to Citation Extraction": 4553, + "A La Carte Embedding: Cheap but Effective Induction of Semantic Feature Vectors": 4277, + "A Large-Scale Analysis of the Security of Embedded Firmwares A Large-Scale Analysis of the Security of Embedded Firmwares": 3161, + "A Large-Scale Empirical Analysis of Chinese Web Passwords A Large-Scale Empirical Analysis of Chinese Web Passwords": 3185, + "A Latent Variable Model of Synchronous Parsing for Syntactic and Semantic Dependencies": 9, + "A Lattice Theory for Solving Games of Imperfect Information": 4509, + "A Longitudinal, End-to-End View of the DNSSEC Ecosystem A Longitudinal, End-to-End View of the DNSSEC Ecosystem": 3356, + "A Low Power Front-End for Embedded Processors Using a Block-Aware Instruction Set": 4852, + "A Measurement Framework for Pin-Pointing Routing Changes": 4434, + "A Measurement Study of Multiplicative Overhead Effects in Wireless Networks": 3632, + "A Measurement Study on Co-residence Threat inside the Cloud A Measurement Study on Co-residence Threat inside the Cloud": 3277, + "A Memory System Design Framework: Creating Smart Memories": 4851, + "A Method to Build and Analyze Scientific Workflows from Provenance through Process Mining": 740, + "A Metric for the Evaluation and Comparison of Keylogger Performance": 1368, + "A Middleware for Gossip Protocols": 335, + "A Model-Based Approach for Integrating Third Party Systems with Web Applications": 124, + "A Model-Based Namespace Metadata Benchmark for HDFS A Model-Based Namespace Metadata Benchmark for HDFS": 2305, + "A Model-based Approach to Self-Protection in SCADA Systems": 1664, + "A Modular Voting Architecture (\"Frogs\")": 1288, + "A Modular and Efficient Past State System for Berkeley DB A Modular and Efficient Past State System for Berkeley DB *": 880, + "A Multi-Agent Learning Approach to Online Distributed Resource Allocation": 2499, + "A Multi-Axis Annotation Scheme for Event Temporal Relations": 4335, + "A Multi-level Fidelity Microgrid Testbed Model for Cybersecurity Experimentation": 1406, + "A Multi-lingual Multi-task Architecture for Low-resource Sequence Labeling": 4297, + "A Multi-sentiment-resource Enhanced Attention Network for Sentiment Classification": 4236, + "A NICE Way to Test OpenFlow Applications": 2490, + "A Neural Network Classifier for Junk E-Mail": 4726, + "A New Heuristic for Rectilinear Steiner Trees I o n I . M andoiu \ud97b\udf59 Vijay V . V azirani \ud97b\udf59": 1410, + "A New LSM-style Garbage Collection Scheme for ZNS SSDs": 2251, + "A New Memory Monitoring Scheme for Memory-Aware Scheduling and Partitioning": 3555, + "A New Perspective on Implementation by Voting Trees *": 3444, + "A Note on First-order Logic and Security Protocols": 4493, + "A Novel Improvement to the R*-tree Spatial Index using Gain/Loss Metrics": 4685, + "A Parallel Page Cache: IOPS and Caching for Multicore Systems": 2107, + "A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage": 3082, + "A Performance Study of Deployment Factors in Wireless Mesh Networks": 4763, + "A Physical Resource Management Approach to Minimizing FPGA Partial Reconfiguration Overhead": 199, + "A Placement Vulnerability Study in Multi-Tenant Public Clouds A Placement Vulnerability Study in Multi-Tenant Public Clouds": 3272, + "A Pluralist Approach to Interdomain Communication Security": 69, + "A Polynomial-Time Algorithm for Action-Graph Games": 2444, + "A Polynomial-Time Dynamic Programming Algorithm for Phrase-Based Decoding with a Fixed Distortion Limit": 3652, + "A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud": 591, + "A Precise Memory Model for Low-Level Bounded Model Checking": 658, + "A Precise and Efficient Evaluation of the Proximity between Web Clients and their Local DNS Servers": 788, + "A Preliminary Analysis of TCP Performance in an Enterprise Network": 573, + "A Privacy Analysis of Cross-device Tracking A Privacy Analysis of Cross-device Tracking *": 3423, + "A Privacy-Preserving Deep Learning Approach for Face Recognition with Edge Computing": 1978, + "A Probabilistic Approach to Spatiotemporal Theme Pattern Mining on Weblogs": 78, + "A Probabilistic Clustering-Projection Model for Discrete Data": 1843, + "A Probabilistic Generative Model of Linguistic Typology": 4199, + "A Probabilistic Latent Variable Model for Acoustic Modeling": 4980, + "A Radio Multiplexing Architecture for High Throughput Point to Multipoint Wireless Networks": 12, + "A Rank-Rewrite Framework for Summarizing XML Documents": 4880, + "A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility *": 513, + "A Reliable Connection Migration Mechanism for Synchronous Transient Communication in Mobile Codes": 4826, + "A Retargetable System-Level DBT Hypervisor A Retargetable System-Level DBT Hypervisor": 1191, + "A Rising Tide Lifts All Boats: How Memory Error Prediction and Prevention Can Help with Virtualized System Longevity": 364, + "A Rising Tide: Design Exploits in Industrial Control Systems": 4060, + "A Scalable Multi-User Uplink for Wi-Fi A Scalable Multi-User Uplink for Wi-Fi": 2651, + "A Scalable Server for 3D Metaverses": 819, + "A Scalable, Non-blocking Approach to Transactional Memory": 4612, + "A Scheduling Framework that Makes any Disk Schedulers Non-work-conserving solely based on Request Characteristics": 728, + "A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016 A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016": 3792, + "A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed": 1341, + "A Secure Cloud with Minimal Provider Trust *": 1913, + "A Security Analysis of an In Vehicle Infotainment and App Platform": 4069, + "A Self-Configurable Geo-Replicated Cloud Storage System A Self-Configurable Geo-Replicated Cloud Storage System": 2938, + "A Self-Organizing Flock of Condors": 4254, + "A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn": 3488, + "A Self-Report Measure of End-User Security Attitudes (SA-6) This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. A Self-Report Measure of End-User Security Attitudes (SA-6)": 3835, + "A Semantic Framework for Data Analysis in Networked Systems *": 697, + "A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning": 3450, + "A Service Adaptation Middleware for Delay Tolerant Network based on HTTP Simple Queue Service": 2872, + "A Session-Based Search Engine": 82, + "A Side-channel Attack on HotSpot Heap Management": 1918, + "A Simple, Pipelined Algorithm for Large, Irregular All-gather Problems \u22c6": 2065, + "A Simulation Result of Replicating Data with Another Layout for Reducing Media Exchange of Cold Storage": 2160, + "A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster": 2122, + "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols": 3636, + "A Statistical Analysis of Disclosed Storage Security Breaches": 1732, + "A Stochastic Local Search Approach to Vertex Cover": 4518, + "A Stochastic Model of TCP/IP with Stationary Random Losses": 4765, + "A Study of Authentication in Daily Life A Study of Authentication in Daily Life": 3778, + "A Study of Hardware Assisted IP over InfiniBand and its Impact on Enterprise Data Center Performance": 1976, + "A Study of Linux File System Evolution": 1480, + "A Study of Poisson Query Generation Model for Information Retrieval": 4469, + "A Study of Practical Deduplication": 550, + "A Study of Reuse and Plagiarism in Speech and Natural Language Processing papers": 4327, + "A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape": 3564, + "A Stylometric Inquiry into Hyperpartisan and Fake News": 4291, + "A Systematic Approach to System State Restoration during Storage Controller Micro-Recovery": 3761, + "A Systematic Evaluation of Transient Execution Attacks and Defenses A Systematic Evaluation of Transient Execution Attacks and Defenses": 3536, + "A Systematic Process-Model-Based Approach for Synthesizing Attacks and Evaluating Them": 1457, + "A TCP with Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses": 30, + "A Tale of Two Abstractions: The Case for Object Space": 2230, + "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web": 3600, + "A Template Library to Integrate Thread Scheduling and Locality Management for NUMA Multiprocessors": 2066, + "A Thread Performance Comparison: Windows NT and Solaris on A Symmetric Multiprocessor A Thread Performance Comparison: Windows NT and Solaris on A Symmetric Multiprocessor": 4147, + "A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment": 116, + "A Tool for Constructing Syntax-Directed Editors": 2699, + "A Tool for Teaching Reverse Engineering": 784, + "A Transition-Based Directed Acyclic Graph Parser for UCCA": 4264, + "A Transparently-Scalable Metadata Service for the Ursa Minor Storage System": 657, + "A Typed Interrupt Calculus": 4669, + "A Typology of Perceived Triggers for End-User Security and Privacy Behaviors This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. A Typology of Perceived Triggers for End-User Security and Privacy Behaviors": 3831, + "A Unified Model for Extractive and Abstractive Summarization using Inconsistency Loss": 4284, + "A Unifying Approach to the Exploitation of File Semantics in Distributed File Systems": 1751, + "A Usability Study of Five Two-Factor Authentication Methods This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. A Usability Study of Five Two-Factor Authentication Methods": 3846, + "A Watermarking Infrastructure for Enterprise Document Management": 4828, + "A Way Forward: Enabling Operating System Innovation in the Cloud": 1827, + "A Week to Remember: The Impact of Browser Warning Storage Policies A Week to Remember The Impact of Browser Warning Storage Policies": 3784, + "A Worst-Case Comparison between Temporal Difference and Residual Gradient with Linear Function Approximation": 4542, + "A different cup of TI? The added value of commercial threat intelligence A different cup of TI? The added value of commercial threat intelligence": 3596, + "A file system for safely interacting with untrusted USB flash drives": 2276, + "A graph model of data and workflow provenance": 1311, + "A graphical representation for identifier structure in logs": 612, + "A language of patterns for subterm selection": 4893, + "A new Distributed Security Model for Linux Clusters": 3086, + "A parallel collection of clinical trials in Portuguese and English": 1902, + "A robust self-learning method for fully unsupervised cross-lingual mappings of word embeddings": 4296, + "A survey of system configuration tools": 358, + "A sustainable model for ICT capacity building in developing countries": 2406, + "AC-Key: Adaptive Caching for LSM-based Key-Value Stores AC-Key: Adaptive Caching for LSM-based Key-Value Stores": 1262, + "ACBiMA: Advanced Chinese Bi-Character Word Morphological Analyzer": 2638, + "ACES: Automatic Compartments for Embedded Systems ACES: Automatic Compartments for Embedded Systems": 3448, + "ADsafety Type-Based Verification of JavaScript Sandboxing": 596, + "AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing *": 4762, + "AFL ++ : Combining Incremental Steps of Fuzzing Research": 4124, + "AGILE: Adaptive Indexing for Context-Aware Information Filters": 219, + "AGILE: elastic distributed resource scaling for Infrastructure-as-a-Service": 2291, + "AI4DL: Mining Behaviors of Deep Learning Workloads for Resource Management": 1937, + "ALERT: Accurate Learning for Energy and Timeliness ALERT: Accurate Learning for Energy and Timeliness": 1259, + "AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation": 1397, + "AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks": 126, + "AMP: Program Context Specific Buffer Caching": 4155, + "AMR Dependency Parsing with a Typed Semantic Algebra": 4346, + "AN EFFICIENT NOMINAL UNIFICATION ALGORITHM": 4897, + "ANALYSIS AND DISTORTION MODELING OF MPEG-4 FGS": 4010, + "AONT-RS: Blending Security and Performance in Dispersed Storage Systems": 622, + "API Blender: A Uniform Interface to Social Platform APIs": 4575, + "APISAn: Sanitizing API Usages through Semantic Cross-Checking APISAN: Sanitizing API Usages through Semantic Cross-checking": 3342, + "APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences": 1429, + "ARMageddon: Cache Attacks on Mobile Devices ARMageddon: Cache Attacks on Mobile Devices": 3313, + "ARPE: A tool to build equation models of computing systems": 1656, + "ASAP: Fast, Approximate Graph Pattern Mining at Scale ASAP: Fast, Approximate Graph Pattern Mining at Scale": 3045, + "ASM: A Programmable Interface for Extending Android Security ASM: A Programmable Interface for Extending Android Security": 3172, + "ASPIRE: Iterative Specification Synthesis for Security": 2045, + "ATLAS: A Chip-Multiprocessor with Transactional Memory Support": 4609, + "ATTACKING THE LINUX PRNG ON ANDROID WEAKNESSES IN SEEDING OF ENTROPIC POOLS AND LOW BOOT-TIME ENTROPY": 4030, + "ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem": 3502, + "AUTOPLACER: Scalable Self-Tuning Data Placement in Distributed Key-value Stores": 2292, + "AVLeak: Fingerprinting Antivirus Emulators Through Black-Box Testing": 4058, + "AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings": 3394, + "Abstractions for Network Update Mark Reitblatt": 4265, + "Abstractions for Usable Information Flow Control in Aeolus": 808, + "Abusing Notification Services on Smartphones for Phishing and Spamming": 4007, + "Abusing Public Third-Party Services for EDoS Attacks": 4078, + "Accelerating Complex Data Transfer for Cluster Computing": 1866, + "Accelerating Deep Learning Inference via Freezing": 1926, + "Accelerating External Sorting via On-the-fly Data Merge in Active SSDs": 2127, + "Accelerating Large Scale Deep Learning Inference through DeepCPU at Microsoft Accelerating Large Scale Deep Learning Inference through DeepCPU at Microsoft": 2893, + "Accelerating Leukocyte Tracking using CUDA: A Case Study in Leveraging Manycore Coprocessors": 139, + "Accelerating PageRank using Partition-Centric Processing Accelerating PageRank using Partition-Centric Processing": 1092, + "Accelerating Parallel Analysis of Scientific Simulation Data via Zazen": 3948, + "Accelerating Rule-matching Systems with Learned Rankers Accelerating Rule-matching Systems with Learned Rankers": 1171, + "Accelerating The Cloud with Heterogeneous Computing": 672, + "Acceleration Attacks on PBKDF2 Or, what is inside the black-box of oclHashcat?": 4071, + "Access Control and Replication Protocols in \"Home\" Environments": 2113, + "Accessible Polling Places for the Visually Impaired: A Compilation of Survey Results": 595, + "Acclaim: Adaptive Memory Reclaim to Improve User Experience in Android Systems Acclaim: Adaptive Memory Reclaim to Improve User Experience in Android Systems": 1236, + "Accordion: Multi-Scale Recipes for Adaptive Detection of Duplication": 2144, + "Accountable Virtual Machines": 425, + "Accountable Virtual Machines_887": 887, + "Accountings of Relationships": 1767, + "AccuRate: Constellation Based Rate Estimation in Wireless Networks": 3760, + "Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors": 2092, + "Accurate Estimation of Gene Expression Levels from DGE Sequencing Data": 1466, + "Accurate Latency-based Congestion Feedback for Datacenters Accurate Latency-based Congestion Feedback for Datacenters": 914, + "Accurate Timeout Detection Despite Arbitrary Processing Delays Accurate Timeout Detection Despite Arbitrary Processing Delays": 1100, + "Achieving 10Gbps line-rate key-value stores with FPGAs": 1812, + "Acquisition of Translation Lexicons for Historically Unwritten Languages via Bridging Loanwords": 2148, + "Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices": 3454, + "Acting on Norm Constrained Plans": 4528, + "Active Control of Memory for Java Virtual Machines and Applications Active Control of Memory for Java Virtual Machines and Applications": 2308, + "Active Feedback -UIUC TREC-2003 HARD Experiments": 4785, + "Active Feedback in Ad Hoc Information Retrieval": 81, + "Active Learning with the CyberCIEGE Video Game": 680, + "Active Quorum Systems": 273, + "Active Sampling for Entity Matching": 3344, + "Ad Hoc Synchronization Considered Harmful": 727, + "Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens": 3167, + "Adapting RAID Methods for Use in Object Storage Systems": 1296, + "Adapting Social Spam Infrastructure for Political Censorship": 2381, + "Adaptive Android Kernel Live Patching Adaptive Android Kernel Live Patching": 3354, + "Adaptive Control of Apache Web Server": 1660, + "Adaptive Defense Against Various Network Attacks": 4157, + "Adaptive End-to-End Quality-of-Service Guarantees in IP Networks using an Active Networking Approach": 4570, + "Adaptive Knowledge Sharing in Multi-Task Learning: Improving Low-Resource Neural Machine Translation": 4415, + "Adaptive Memory System over Ethernet": 674, + "Adaptive Performance-Aware Distributed Memory Caching": 2289, + "Adaptive Placement for In-memory Storage Functions Adaptive Placement for In-memory Storage Functions": 1208, + "Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance": 667, + "Adaptive XML Storage or The Importance of Being Lazy": 224, + "Adaptive, Model-driven Autoscaling for Cloud Applications Adaptive, Model-driven Autoscaling for Cloud Applications": 2312, + "Adaptively Compressing IoT Data on the Resource-constrained Edge": 2017, + "Adaptively Parallelizing Distributed Range Queries": 1333, + "Adblocking and Counter-Blocking: A Slice of the Arms Race": 1697, + "Adding Capacity Points to a Wireless Mesh Network Using Local Search": 3654, + "AddressSanitizer: A Fast Address Sanity Checker": 840, + "Addressing Physical Safety, Security, and Privacy for People with Visual Impairments Addressing Physical Safety, Security, and Privacy for People with Visual Impairments": 3769, + "Addressing Strategic Behavior in a Deployed Microeconomic Resource Allocator": 4934, + "Addressing the Dark Side of Vision Research: Storage": 2185, + "Advanced Database Aggregation Query Processing": 4690, + "Advanced Flow-control Mechanisms for the Sockets Direct Protocol over InfiniBand *": 2109, + "Adversarial Category Alignment Network for Cross-domain Sentiment Classification": 4207, + "Adversarial Contrastive Estimation": 4313, + "Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong": 4083, + "Adversarial Training for Satire Detection: Controlling for Confounding Variables": 4194, + "Aggregate Queries for Discrete and Continuous Probabilistic XML *": 4588, + "Aggregation and Scalable QoS: A Performance Study": 4365, + "Agnostic Topology-Based Spam Avoidance in Large-Scale Web Crawls": 4143, + "Agr\u00e9gation de documents XML probabilistes *": 4589, + "Aiding the Detection of Fake Accounts in Large Scale Social Online Services": 2506, + "Airavat: Security and Privacy for MapReduce": 99, + "Airavat: Security and Privacy for MapReduce_3103": 3103, + "AjaxTracker: Active Measurement System for High-Fidelity Characterization of AJAX Applications": 508, + "Albis: High-Performance File Format for Big Data Systems Albis: High-Performance File Format for Big Data Systems": 1116, + "Algorithmic Issues in DNA Barcoding Problems (Bhaskar DasGupta, Ming-Yang Kao": 4737, + "Algorithmic Models for Sensor Networks *": 4571, + "All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications": 2962, + "All Things Considered: An Analysis of IoT Devices on Home Networks All Things Considered: An Analysis of IoT Devices on Home Networks": 3549, + "All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS": 3271, + "All Your Clicks Belong to Me: Investigating Click Interception on the Web All Your Clicks Belong to Me: Investigating Click Interception on the Web": 3578, + "All Your Droid Are Belong To Us: A Survey of Current Android Attacks": 695, + "All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems": 3524, + "All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption": 3343, + "All about Eve: Execute-Verify Replication for Multi-Core Servers": 2925, + "Alleviating Garbage Collection Interference Through Spatial Separation in All Flash Arrays Alleviating Garbage Collection Interference through Spatial Separation in All Flash Arrays *": 1162, + "Alleviating MAC Layer Self-Contention in Ad-hoc Networks": 4720, + "Almost ASAP Semantics: from Timed Models to Timed Implementations": 98, + "Alpha Coverage: Bounding the Interconnection Gap for Vehicular Internet Access": 3021, + "Alpine: A User-Level Infrastructure for Network Protocol Development": 1449, + "Alternative (ab)uses for HTTP Alternative Services": 4119, + "AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets *": 731, + "An Adaptive Link Layer for Range Diversity in Multi-radio Mobile Sensor Networks": 2510, + "An Adaptive Load Balancing Middleware for Distributed Simulation": 4819, + "An Algorithm for Multi-Unit Combinatorial Auctions": 4736, + "An Analysis Framework for Search Sequences": 4462, + "An Analysis of HIPAA Breach Data": 1770, + "An Analysis of Linux Scalability to Many Cores": 287, + "An Analysis of Long Lines in Richland County, South Carolina": 2347, + "An Analysis of Network Configuration Artifacts": 3083, + "An Analysis of Power Consumption in a Smartphone": 312, + "An Analysis of Write-in Marks on Optical Scan Ballots": 460, + "An Approach to Sensor Correlation": 141, + "An Architecture for Developing Behavioral History": 768, + "An Asymmetric Security Mechanism for Navigation Signals": 4875, + "An Awkward Disparity between BLEU / RIBES Scores and Human Judgements in Machine Translation": 1436, + "An Edge Datastore Architecture For Latency-Critical Distributed Machine Vision Applications": 1980, + "An Edge-based Framework for Cooperation in Internet of Things Applications": 1996, + "An Effective Hybrid Transactional Memory System with Strong Isolation Guarantees": 4608, + "An Efficient Algorithm for the Exact Analysis of Multiclass Queueing Networks with Large Population Sizes": 1109, + "An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message": 1716, + "An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites": 3837, + "An Empirical Study of File-System Fragmentation in Mobile Storage Systems": 2163, + "An Empirical Study of Memory Sharing in Virtual Machines": 825, + "An Empirical Study of Memory Sharing in Virtual Machines_4766": 4766, + "An Empirical Study of Textual Key-Fingerprint Representations An Empirical Study of Textual Key-Fingerprint Representations": 3296, + "An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications": 3527, + "An Empirical Study of Wireless Carrier Authentication for SIM Swaps An Empirical Study of Wireless Carrier Authentication for SIM Swaps": 3863, + "An Enterprise Dynamic Thresholding System An Enterprise Dynamic Thresholding System": 2322, + "An Entropy-based Objective Evaluation Method for Image Segmentation": 4562, + "An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development": 3869, + "An Evaluation of Different Page Allocation Strategies on High-Speed SSDs": 2114, + "An Evaluation of Per-Chip Nonuniform Frequency Scaling on Multicores *": 745, + "An Evaluation of Web Acceleration Techniques for the Developing World *": 2874, + "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem": 3749, + "An Evolutionary Study of Linux Memory Management for Fun and Profit An Evolutionary Study of Linux Memory Management for Fun and Profit": 963, + "An Experience Report on Extracting and Viewing Memory Events via Wireshark": 4033, + "An Experiment on Bare-Metal BigData Provisioning": 1872, + "An Experimentation and Analytics Framework for Large-Scale AI Operations Platforms An Experimentation and Analytics Framework for Large-Scale AI Operations Platforms": 2902, + "An Exploratory Study of Hardware Reverse Engineering -Technical and Cognitive Processes An Exploratory Study of Hardware Reverse Engineering Technical and Cognitive Processes": 3851, + "An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems": 3770, + "An Industrial Robot System Based on Edge Computing: An Early Experience": 1972, + "An Industrial-Scale Software Defined Internet Exchange Point An Industrial-Scale Software Defined Internet Exchange Point": 2652, + "An Inequality on the Edge Lengths of Triangular Meshes *": 37, + "An Integrated Knowledge-based and Machine Learning Approach for Chinese Question Classification": 4556, + "An Internet-Wide View of Internet-Wide Scanning An Internet-Wide View of Internet-Wide Scanning": 3168, + "An Off-Chip Attack on Hardware Enclaves via the Memory Bus": 3756, + "An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education": 214, + "An Operating System for the Home": 2498, + "An Optimization Case in Support of Next Generation NFV Deployment": 1835, + "An Unsupervised Framework for Extracting and Normalizing Product Attributes from Multiple Web Sites": 4645, + "An analysis of automatic image filtering on WeChat Moments": 1705, + "An analysis of the user occupational class through Twitter content": 4248, + "An investigation of phishing awareness and education over time: When and how to best remind users An investigation of phishing awareness and education over time: When and how to best remind users": 3871, + "An optimal dynamic spanner for doubling metric spaces": 3832, + "Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education": 790, + "Analysis and Modeling of MPEG-4 and H.264 Multi-Layer Video Traffic": 4098, + "Analysis of DTLS Implementations Using Protocol State Fuzzing Analysis of DTLS Implementations Using Protocol State Fuzzing": 3628, + "Analysis of Incomplete Data and an Intrinsic-Dimension Helly Theorem": 3076, + "Analysis of Large-Scale Multi-Tenant GPU Clusters for DNN Training Workloads Analysis of Large-Scale Multi-Tenant GPU Clusters for DNN Training Workloads": 1159, + "Analysis of Peer-Assisted Video-on-Demand Systems with Scalable Video Streams": 4485, + "Analysis of Privacy Protections in Fitness Tracking Social Networks -or-You can run, but can you hide? Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?": 3464, + "Analysis of Rate-Distortion Functions and Congestion Control in Scalable Internet Video Streaming": 4757, + "Analytical Cache Models with Applications to Cache Partitioning": 51, + "Analyzing China's Blocking of Unpublished Tor Bridges": 1703, + "Analyzing Compute vs. Storage Tradeoff for Video-aware Storage Efficiency": 2118, + "Analyzing Cooperative Containment of Fast Scanning Worms": 2360, + "Analyzing Linguistic Differences between Owner and Staff Attributed Tweets": 3763, + "Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack": 1345, + "Analyzing Rule-Based Behavioral Semantics of Visual Modeling Languages with Maude": 4573, + "Analyzing Web Logs to Detect User-Visible Failures": 512, + "Analyzing and Minimizing the Impact of Opportunity Cost in QoS-aware Job Scheduling *": 2121, + "Analyzing the Impact of GDPR on Storage Systems": 2243, + "Analyzing the Impact of Supporting Out-of-Order Communication on In-order Performance with iWARP": 206, + "Anatomization and Protection of Mobile Apps' Location Privacy Threats Anatomization and Protection of Mobile Apps' Location Privacy Threats": 3234, + "Andbot: Towards Advanced Mobile Botnets": 726, + "Android Permissions Remystified: A Field Study on Contextual Integrity Android Permissions Remystified: A Field Study on Contextual Integrity": 3275, + "Android Provenance: Diagnosing Device Disorders": 3904, + "Annotation, Modelling and Analysis of Fine-Grained Emotions on a Stance and Sentiment Detection Corpus": 1723, + "AnonRep: Towards Tracking-Resistant Anonymous Reputation AnonRep: Towards Tracking-Resistant Anonymous Reputation": 2690, + "Anonymity Loves Company: Usability and the Network Effect": 167, + "Another type system for in-place update": 4802, + "Answering Queries using Humans, Algorithms and Databases": 3388, + "Ant Algorithms for Search in Unstructured Peer-to-Peer Networks *": 4582, + "Antfarm: Efficient Content Distribution with Managed Swarms": 3079, + "AntiFuzz: Impeding Fuzzing Audits of Binary Executables ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables": 3540, + "Anycast as a Load Balancing feature": 711, + "Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies": 1202, + "Aperator: Making Tweets Enable Actionable Commands on Third Party Web Applications": 3981, + "Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems": 603, + "Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing": 2942, + "App-Bisect: Autonomous Healing for Microservice-based Apps": 1846, + "AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring": 818, + "Application Memory Isolation on Ultra-Low-Power MCUs Application Memory Isolation on Ultra-Low-Power MCUs": 1075, + "Application Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach": 2294, + "Application Track": 4728, + "Application-Defined Decentralized Access Control Application-Defined Decentralized Access Control": 890, + "Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software": 229, + "Application-Specific Customization of Soft Processor Microarchitecture General Terms": 4925, + "Applications of Natural Language Processing in Clinical Research and Practice": 4231, + "Applying Classification Techniques to Remotely-Collected Program Execution Data": 4505, + "Applying Hardware Transactional Memory for Concurrency-Bug Failure Recovery in Production Runs Applying Hardware Transactional Memory for Concurrency-Bug Failure Recovery in Production Runs": 1067, + "Applying a Reusable Election Threat Model at the County Level": 503, + "Approximate Factoring for A * Search": 7, + "Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing": 4811, + "Approximate Initialization of Camera Sensor Networks": 3999, + "Approximate NN Queries on Streams with Guaranteed Error/performance Bounds": 1654, + "Approximate XML Query Answers": 242, + "Approximation Algorithms for Graph Homomorphism Problems": 4827, + "Approximation Algorithms for Single-minded Envy-free Profit-maximization Problems with Limited Supply": 4783, + "Approximation algorithms for prize collecting forest problems with submodular penalty functions": 4805, + "Apps with Hardware: Enabling Run-time Architectural Customization in Smart Phones Apps with Hardware: Enabling Run-time Architectural Customization in Smart Phones": 958, + "Arc-Hybrid Non-Projective Dependency Parsing with a Static-Dynamic Oracle": 1469, + "Architectural Semantics for Practical Transactional Memory": 4615, + "Architecture for Caching Responses with Multiple Dynamic Dependencies in Multi-Tier Data-Centers over InfiniBand": 207, + "Archiving Data Objects using Web Feeds *": 4577, + "Are Automated Debugging Techniques Actually Helping Programmers?": 4538, + "Are BLEU and Meaning Representation in Opposition?": 4337, + "Are FPGAs Suitable for Edge Computing?": 1971, + "Are Nonblocking Networks Really Needed for High-End-Computing Workloads?": 4966, + "Are Text-Only Data Formats Safe? Or, Use This L A T E X Class File to Pwn Your Computer": 322, + "Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware": 4034, + "Area Reclamation Strategies and Metrics for SRAM-Based Reconfigurable Devices": 266, + "Ariadne: A Minimal Approach to State Continuity Ariadne: A Minimal Approach to State Continuity": 3329, + "Arrakis: The Operating System is the Control Plane Arrakis: The Operating System is the Control Plane": 2961, + "Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones Ask me again but don't annoy me: Evaluating re-authentication strategies for smartphones": 3768, + "Assert(!Defined(Sequential I/O))": 2128, + "Assessment of Urban-Scale Wireless Networks with a Small Number of Measurements": 3643, + "Association for Computational Linguistics Multiple Word Alignment with Profile Hidden Markov Models": 4184, + "Asymmetric Interactions in Symmetric Multi-core Systems: Analysis, Enhancements and Evaluation": 4965, + "Asynchronous I/O Stack: A Low-latency Kernel I/O Stack for Ultra-Low Latency SSDs Asynchronous I/O Stack: A Low-latency Kernel I/O Stack for Ultra-Low Latency SSDs": 1169, + "Attacking Cryptographic Schemes Based on \"Perturbation Polynomials\"": 1188, + "Attacking the Brain: Races in the SDN Control Plane Attacking the Brain: Races in the SDN Control Plane": 3416, + "Attention Strategies for Multi-Source Sequence-to-Sequence Learning": 4271, + "AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning": 3471, + "Audit Mechanisms for Privacy Protection in Healthcare Environments": 1289, + "Auditing a DRE-Based Election in South Carolina": 295, + "Augmenting Centralized Password Management with Application-Specific Passwords": 3970, + "Austere Flash Caching with Deduplication and Compression Austere Flash Caching with Deduplication and Compression": 1260, + "AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels AuthLoop: Practical End-to-End Cryptographic Authentication for Telephony over Voice Channels": 3325, + "AuthentiCall: Efficient Identity and Content Authentication for Phone Calls AuthentiCall: Efficient Identity and Content Authentication for Phone Calls": 3397, + "Authentication Codes": 345, + "Authenticity, Ethicality, and Motivation: A Formal Evaluation of a 10-week Computer Security Alternate Reality Game for CS Undergraduates": 804, + "Auto Content Moderation in C2C e-Commerce Auto Content Moderation in C2C e-Commerce": 2903, + "Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message Detection": 467, + "Auto-sizing for Stream Processing Applications at LinkedIn": 1950, + "Auto-tuning the 27-point Stencil for Multicore": 4733, + "AutoLock: Why Cache Attacks on ARM Are Harder Than You Think AutoLock: Why Cache Attacks on ARM Are Harder Than You Think": 3361, + "AutoSSD: an Autonomic SSD Architecture AutoSSD: an Autonomic SSD Architecture": 1088, + "AutoSys: The Design and Operation of Learning-Augmented Systems AutoSys: The Design and Operation of Learning-Augmented Systems": 1235, + "Autocannibalistic and Anyspace Indexing Algorithms with Applications to Sensor Data Mining": 4863, + "Automated Attack Discovery in Data Plane Systems": 1413, + "Automated Concurrency-Bug Fixing": 2912, + "Automated Configuration of Mixed Integer Programming Solvers": 4712, + "Automated Experiment-Driven Management of (Database) Systems": 1280, + "Automated Hardware Synthesis from Formal Specification using SAT solvers": 932, + "Automated Planning for Configuration Changes": 435, + "Automated Preservation: The Case of Digital Raw Photographs": 4639, + "Automated and Scalable QoS Control for Network Convergence": 486, + "Automated diagnosis without predictability is a recipe for failure": 1797, + "Automatic Estimation of Simultaneous Interpreter Performance": 4416, + "Automatic Extraction of Parallel Speech Corpora from Dubbed Movies": 2036, + "Automatic Generation of Compact Printable Shellcodes for x86": 4129, + "Automatic Generation of Data-Oriented Exploits Automatic Generation of Data-Oriented Exploits": 3241, + "Automatic Generation of Peephole Superoptimizers": 3665, + "Automatic Heap Layout Manipulation for Exploitation Automatic Heap Layout Manipulation for Exploitation": 3467, + "Automatic Hot Patch Generation for Android Kernels Automatic Hot Patch Generation for Android Kernels": 3736, + "Automatic Labeling of Multinomial Topic Models": 4782, + "Automatic Metric Validation for Grammatical Error Correction": 4338, + "Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability": 1959, + "Automatic Physical Database Tuning: A Relaxation-based Approach": 250, + "Automatic Problem Generation for Capture-the-Flag Competitions": 213, + "Automatic Techniques to Systematically Discover New Heap Exploitation Primitives Automatic Techniques to Systematically Discover New Heap Exploitation Primitives": 3742, + "Automatic Undo for Cloud Management via AI Planning": 1962, + "Automatic Web Tagging and Person Tagging Using Language Models": 4465, + "Automatic Wireless Protocol Reverse Engineering": 4117, + "Automatic Wrapper Induction from Hidden-Web Sources with Domain Knowledge": 123, + "Automatic and Dynamic Configuration of Data Compression for Web Servers Automatic and Dynamic Configuration of Data Compression for Web Servers": 2436, + "Automatic extraction of synonyms in a dictionary": 4834, + "Automatic vs Manual Provenance Abstractions: Mind the Gap Khalid Belhajjame": 3918, + "Automatically Detecting Vulnerable Websites Before They Turn Malicious Automatically Detecting Vulnerable Websites Before They Turn Malicious": 3201, + "Automatically Generating Predicates and Solutions for Configuration Troubleshooting": 3885, + "Automatically Generating a Large, Culture-Specific Blocklist for China": 1704, + "Automatically Identifying Complaints in Social Media": 3752, + "Automatically Inferring Quantified Loop Invariants by Algorithmic Learning from Simple Templates": 172, + "Automating Context-Based Access Pattern Hint Injection for System Performance and Swap Storage Durability": 2241, + "Automating Network Monitoring on Experimental Testbeds": 403, + "Automating Voting Terminal Event Log Analysis": 775, + "Automating configuration troubleshooting with dynamic information flow analysis": 249, + "Automating the Choice of Consistency Levels in Replicated Systems Automating the choice of consistency levels in replicated systems": 872, + "Automating the Development of Chosen Ciphertext Attacks Automating the Development of Chosen Ciphertext Attacks": 3592, + "Autonomic Management of Dynamically Partially Reconfigurable FPGA Architectures using Discrete Control": 2282, + "Autonomic Power Management Schemes for Internet Servers and Data Centers": 4889, + "Autonomous FPGA Fault Handling through Competitive Runtime Reconfiguration": 244, + "Autonomous storage management for personal devices with PodBase": 601, + "Availability, Usage, and Deployment Characteristics of the Domain Name System * General Terms Measurement, Reliability": 3954, + "Avoiding Communication in Sparse Matrix Computations": 3243, + "Avoiding the Streetlight Effect: I/O Workload Analysis with SSDs in Mind": 2178, + "Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing": 3807, + "Axis-Based Virtual Coordinate Assignment Protocol and Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks": 35, + "BARNS: Towards Building Backup and Recovery for NoSQL Databases": 2188, + "BASIL: Automated IO Load Balancing Across Storage Devices": 1741, + "BASTION: A Security Enforcement Network Stack for Container Networks BASTION: A Security Enforcement Network Stack for Container Networks": 1241, + "BDUOL: Double Updating Online Learning on a Fixed Budget": 79, + "BGP Safety with Spurious Updates": 4742, + "BIBIM: A Prototype Multi-Partition Aware Heterogeneous New Memory": 2210, + "BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks": 883, + "BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model": 3347, + "BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy": 4133, + "BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization": 1400, + "BOTMAGNIFIER: Locating Spambots on the Internet": 668, + "BRAID: Stream Mining through Group Lag Correlations": 4663, + "BRAVO-Biased Locking for Reader-Writer Locks BRAVO -Biased Locking for Reader-Writer Locks": 1138, + "BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes": 1458, + "BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations": 43, + "Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques": 3558, + "Backpropagating through Structured Argmax using a SPIGOT": 4348, + "Balancing CPU and Network in the Cell Distributed B-Tree Store Balancing CPU and Network in the Cell Distributed B-Tree Store": 973, + "Balancing Gossip Exchanges in Networks with Firewalls *": 509, + "Ballot Permutations in Pr\u00eatPr\u00eat\u00e0 Voter": 3104, + "Bamboozling Certificate Authorities with BGP Bamboozling Certificate Authorities with BGP": 3434, + "Banal: Because Format Checking Is So Trite": 3960, + "Bank of Communications": 1128, + "Bankrupt Covert Channel: Turning Network Predictability into Vulnerability": 4131, + "BareCloud: Bare-metal Analysis-based Evasive Malware Detection BareCloud: Bare-metal Analysis-based Evasive Malware Detection": 3178, + "BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning": 1270, + "Bayesian Combinatorial Auctions": 666, + "Bayllocator: A proactive system to predict server utilization and dynamically allocate memory resources using Bayesian networks and ballooning": 2419, + "Bazaar: Strengthening user reputations in online marketplaces": 602, + "Be Conservative: Enhancing Failure Diagnosis with Proactive Logging": 2913, + "Beam: Ending Monolithic Applications for Connected Devices Beam: Ending Monolithic Applications for Connected Devices": 980, + "BeamSpy: Enabling Robust 60 GHz Links Under Blockage BeamSpy: Enabling Robust 60 GHz Links Under Blockage": 2681, + "Beating Burnashev in delay with noisy feedback": 1610, + "Beauty and the Burst: Remote Identification of Encrypted Video Streams Beauty and the Burst: Remote Identification of Encrypted Video Streams": 3402, + "Beehive: Erasure Codes for Fixing Multiple Failures in Distributed Storage Systems": 2145, + "Behavior-Based Problem Localization for Parallel File Systems": 475, + "Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces": 3078, + "Behavioral Game Theoretic Models: A Bayesian Framework For Parameter Analysis": 4922, + "Belief in Information Flow": 184, + "Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users": 4137, + "BenchLab: An Open Testbed for Realistic Benchmarking of Web Applications": 314, + "Benchmarking Sparse Matrix-Vector Multiply in Five Minutes": 3265, + "Benchmarking in The Dark: On the Absence of Comprehensive Edge Datasets": 2014, + "Benchmarking the Performance of Storage Systems that expose SPARQL Endpoints": 1532, + "BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof": 3711, + "Best Practices for the Care and Feeding of a Program Committee, and Other Thoughts on Conference Organization": 1440, + "Best We Forget: Expressive Freedom and the Right to be Forgotten": 1701, + "Best-Response Mechanisms": 1, + "Best-Response Mechanisms_4984": 4984, + "Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse": 3481, + "Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications": 935, + "Beyond Binary Labels: Political Ideology Prediction of Twitter Users": 4261, + "Beyond Disk Imaging for Preserving User State in Network Testbeds": 1351, + "Beyond Equilibrium: Predicting Human Behavior in Normal-Form Games": 1666, + "Beyond Loose LP-relaxations: Optimizing MRFs by Repairing Cycles": 4666, + "Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols": 375, + "Beyond Storage APIs: Provable Semantics for Storage Stacks": 2041, + "Beyond the Best: Real-Time Non-Invasive Collection of BGP Messages": 696, + "Bibliometrics, Information Retrieval and Natural Language Processing: Natural Synergies to Support Digital Library Research": 892, + "Bidding Clubs: Institutionalized Collusion in Auctions": 4539, + "Big Data Analytics over Encrypted Datasets with Seabed Big Data Analytics over Encrypted Datasets with Seabed": 3008, + "Big Numbers -Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations Big Numbers -Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations": 3729, + "Big data gets bigger: what about data cleaning as a storage service?": 2182, + "Bimodal Content Defined Chunking for Backup Streams": 2373, + "BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking": 3387, + "BioLite, a lightweight bioinformatics framework with automated tracking of diagnostics and provenance": 3901, + "Bipartite Index Coding": 2788, + "Bistro: Scheduling Data-Parallel Jobs Against Live Production Systems Bistro: Scheduling Data-Parallel Jobs Against Live Production Systems": 901, + "BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing": 1816, + "Bite: Bitcoin Lightweight Client Privacy using Trusted Execution BITE: Bitcoin Lightweight Client Privacy using Trusted Execution": 3556, + "Bitter Harvest: Systematically Fingerprinting Low-and Medium-interaction Honeypots at Internet Scale": 4108, + "Black-Box Performance Control for High-Volume Non-Interactive Systems": 3893, + "Black-Box Problem Diagnosis in Parallel File Systems": 2362, + "Black-Box Reductions for Cost-Sharing Mechanism Design": 4661, + "BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid": 3495, + "Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components": 3169, + "Bleaching Text: Abstract Features for Cross-lingual Gender Prediction": 4395, + "Blind and Human: Exploring More Usable Audio CAPTCHA Designs Blind and Human: Exploring More Usable Audio CAPTCHA Designs": 3858, + "Blindfold: A System to \"See No Evil\" in Content Discovery": 593, + "Block Management in Solid-State Devices": 3094, + "Block-based Web Search": 4961, + "Block-level RAID is dead": 243, + "Bluetooth: With Low Energy comes Low Security": 4017, + "Bobtail: Avoiding Long Tails in the Cloud": 2552, + "Body Area Network Security: Robust Key Establishment Using Human Body Channel": 1763, + "Bohr: Similarity Aware Geo-distributed Data Analytics": 1883, + "Bolt: Data Management for Connected Homes Bolt: Data management for connected homes": 2571, + "Bolt: Faster Reconfiguration in Operating Systems Bolt: Faster Reconfiguration in Operating Systems": 927, + "BooM: A Decision Procedure for Boolean Matching with Abstraction and Dynamic Learning": 4634, + "Boolean Tensor Factorizations": 4899, + "Boosting GPU Virtualization Performance with Hybrid Shadow Page Tables Boosting GPU Virtualization Performance with Hybrid Shadow Page Tables": 900, + "Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling": 11, + "BootStomp: On the Security of Bootloaders in Mobile Devices BootStomp: On the Security of Bootloaders in Mobile Devices": 3398, + "Bootstrapping Semantic Analyzers from Non-Contradictory Texts": 2921, + "BotGraph: Large Scale Spamming Botnet Detection": 4152, + "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation": 44, + "BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection": 4904, + "BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic": 136, + "Bound Analysis of Closed Queueing Networks with Workload Burstiness": 1065, + "Boundary Recognition in Sensor Networks by Topological Methods": 4717, + "Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study \ud97b\udf59": 4796, + "Bounded repairability for regular tree languages": 4534, + "Bounding Switching Delay in Mobile TV Broadcast Networks": 4487, + "Brahmastra: Driving Apps to Test the Security of Third-Party Components Brahmastra: Driving Apps to Test the Security of Third-Party Components": 3155, + "Branching vs. Linear Time: Semantical Perspective Version 1.2 \u22c6": 1310, + "Breaking Apart the VFS for Managing File Systems": 2214, + "Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android": 4009, + "Breaking NLI Systems with Sentences that Require Simple Lexical Inferences": 4414, + "Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks": 3746, + "Breaking and Fixing Gridcoin": 4082, + "Bridging Different Generation of Web via Exploiting Semantic Social Web Blog Portal": 4822, + "Bridging Languages through Images with Deep Partial Canonical Correlation Analysis": 4304, + "Bridging Missing Gaps in Evaluating DDoS Research": 1427, + "Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems *": 1360, + "Bridging the Edge-Cloud Barrier for Real-time Advanced Vision Analytics": 1931, + "Bridging the Gap between Legacy Services and Web Services": 865, + "Bringing Provenance to its Full Potential using Causal Reasoning": 548, + "Bringing Up Cielo: Experiences with a Cray XE6 System or, Getting Started with Your New 140k Processor System": 530, + "Bringing replication and reproduction together with generalisability in NLP: Three reproduction studies for Target Dependent Sentiment Analysis": 4161, + "Broom: sweeping out Garbage Collection from Big Data systems": 2047, + "Browser history re:visited": 4105, + "Bucket Game with Applications to Set Multicover and Dynamic Page Migration \ud97b\udf59": 4740, + "BugBox : A Vulnerability Corpus for PHP Web Applications": 1359, + "Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code": 94, + "Build It Break It: Measuring and Comparing Development Security": 1381, + "Building Access Oblivious Storage Cloud for Enterprise": 2031, + "Building Algorithmically Nonstop Fault Tolerant MPI Programs": 2355, + "Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts": 1681, + "Building Extensible Networks with Rule-Based Forwarding": 598, + "Building Software Environments for Research Computing Clusters Building Software Environments for Research Computing Clusters": 2425, + "Building Workload-Independent Storage with VT-Trees": 1471, + "Building a Scalable Multimedia Search Engine Using Infiniband": 1817, + "Building a power-proportional software router": 809, + "Building a protocol validator for Business to Business Communications": 2422, + "Building and Using the ATLAS Transactional Memory System": 4855, + "Building the Network Infrastructure for the International Mathematics Olympiad": 2420, + "Bunker: A Privacy-Oriented Platform for Network Tracing": 2472, + "Bunshin: Compositing Security Mechanisms through Diversification BUNSHIN: Compositing Security Mechanisms through Diversification": 1049, + "BurnBox: Self-Revocable Encryption in a World Of Compelled Access BurnBox: Self-Revocable Encryption in a World of Compelled Access": 3504, + "Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns": 3164, + "Buzzenger: Asynchronous (Time-Sliced) Missed Call Duration Messaging": 2868, + "Bypassing Internet Censorship for News Broadcasters": 476, + "Bypassing Races in Live Applications with Execution Filters": 722, + "Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance": 1719, + "ByteWeight: Learning to Recognize Functions in Binary Code BYTEWEIGHT: Learning to Recognize Functions in Binary Code": 3152, + "C-DEM: A Multi-Modal Query System for Drosophila Embryo Databases": 1355, + "CA-NFS: A Congestion-Aware Network File System": 1286, + "CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems CAB-FUZZ: Practical Concolic Testing Techniques for COTS Operating Systems": 1017, + "CAERUS: Chronoscopic Assessment Engine for Recovering Undocumented Specifications": 1415, + "CAFTL: A Content-Aware Flash Translation Layer Enhancing the Lifespan of Flash Memory based Solid State Drives": 325, + "CAIN: Silently Breaking ASLR in the Cloud": 4039, + "CANvas: Fast and Inexpensive Automotive Network Mapping CANvas: Fast and Inexpensive Automotive Network Mapping": 3548, + "CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory": 3352, + "CC-Log: Drastically Reducing Storage Requirements for Robots Using Classification and Compression": 2184, + "CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition": 3353, + "CDE: Run Any Linux Application On-Demand Without Installation": 416, + "CDE: Using System Call Interposition to Automatically Create Portable Software Packages": 417, + "CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal": 917, + "CGraph: A Correlations-aware Approach for Efficient Concurrent Iterative Graph Processing CGraph: A Correlations-aware Approach for Efficient Concurrent Iterative Graph Processing": 1127, + "CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds": 3389, + "CIMDIFF: Advanced difference tracking tool for CIM compliant devices": 3102, + "CLIC: CLient-Informed Caching for Storage Servers": 2440, + "CLKSCREW: Exposing the Perils of Security- Oblivious Energy Management CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management": 3407, + "CLUEBOX: A Performance Log Analyzer for Automated Troubleshooting": 3107, + "COLOCATION GAMES And Their Application to Distributed Resource Management": 2445, + "CONCURRIT: Testing Concurrent Programs with Programmable State-Space Exploration": 2068, + "COPE: Traffic Engineering in Dynamic Networks": 654, + "CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel": 3533, + "CTF: State-of-the-Art and Building the Next Generation": 796, + "Cache Modeling and Optimization using Miniature Simulations Cache Modeling and Optimization using Miniature Simulations": 1045, + "Cache Placement in Sensor Networks Under Update Cost Constraint": 108, + "Cache Write Policy for Streaming Output Data": 4564, + "Cache-Oblivious Simulation of Parallel Programs": 344, + "CacheCloud: Towards Speed-of-light Datacenter Communication": 1919, + "CacheD: Identifying Cache-Based Timing Channels in Production Software CacheD: Identifying Cache-Based Timing Channels in Production Software": 3413, + "Cached and Confused: Web Cache Deception in the Wild Cached and Confused: Web Cache Deception in the Wild": 3672, + "Caching Doesn't Improve Mobile Web Performance (Much) Caching Doesn't Improve Mobile Web Performance (Much)": 942, + "Caching in the Multiverse": 2227, + "Caching or Not: Rethinking Virtual File System for Non-Volatile Main Memory": 2216, + "Callinicos: Robust Transactional Storage for Distributed Data Structures Callinicos: Robust Transactional Storage for Distributed Data Structures": 975, + "Callisto-RTS: Fine-Grain Parallel Loops Callisto-RTS : Fine-Grain Parallel Loops": 905, + "Camdoop: Exploiting In-network Aggregation for Big Data Applications": 2493, + "Can Applications Recover from fsync Failures? Can Applications Recover from fsync Failures?": 1248, + "Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage": 1324, + "Can Data Center Become Water Self-Sufficient? *": 2100, + "Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?": 1386, + "Can We Store the Whole World's Data in DNA Storage?": 2263, + "Can the Production Network Be the Testbed?": 649, + "Can't We All Get Along? Redesigning Protection Storage for Modern Workloads Can't We All Get Along? Redesigning Protection Storage for Modern Workloads": 1053, + "Canopus: Enabling Extreme-Scale Data Analytics on Big HPC Storage via Progressive Refactoring": 2192, + "Capacity Forecasting in a Backup Storage Environment": 316, + "Capo: Recapitulating Storage for Virtual Desktops": 645, + "Capture, conversion, and analysis of an intense NFS workload": 772, + "Capturing and Enhancing In Situ System Observability for Failure Detection Capturing and Enhancing In Situ System Observability for Failure Detection": 3042, + "CarMap: Fast 3D Feature Map Updates for Automobiles This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) CarMap: Fast 3D Feature Map Updates for Automobiles": 2826, + "Cardinal Pill Testing of System Virtual Machines Cardinal Pill Testing of System Virtual Machines": 3199, + "Cardinal Virtues: Extracting Relation Cardinalities from Text": 4272, + "Carnegie Mellon's CyDAT Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics": 1437, + "Carousel: Scalable Logging for Intrusion Prevention Systems": 2374, + "Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics": 4052, + "Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance": 1687, + "Categorizing and Inferring the Relationship between the Text and Image of Twitter Posts": 3785, + "Causality-Based Versioning": 2483, + "Cavs: An Efficient Runtime System for Dynamic Neural Networks Cavs: An Efficient Runtime System for Dynamic Neural Networks": 1121, + "Censors' Delay in Blocking Circumvention Proxies": 1695, + "Census: Location-Aware Membership Management for Large-Scale Distributed Systems": 1338, + "Centrifuge: Integrated Lease Management and Partitioning for Cloud Services": 757, + "CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels": 2991, + "Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites": 3834, + "Certified Side Channels Certified Side Channels": 3634, + "Chaffing and Winnowing: Confidentiality without Encryption": 1255, + "Challenges Towards Production-Ready Explainable Machine Learning Challenges Towards Production-Ready Explainable Machine Learning": 2904, + "Challenges and Experiences with MLOps for Performance Diagnostics in Hybrid-Cloud Enterprise Software Deployments Challenges and Experiences with MLOps for Performance Diagnostics in Hybrid-Cloud Enterprise Software Deployments": 2895, + "Challenges for Provenance in Cloud Computing": 220, + "Challenges in Access Right Assignment for Secure Home Networks *": 485, + "Challenges in Experimenting with Botnet Detection Systems": 252, + "Challenges in managing implicit and abstract provenance data: experiences with ProvManager": 540, + "Challenges to Adopting Stronger Consistency at Scale": 2040, + "Challenges to Error Diagnosis in Hadoop Ecosystems USENIX Association 27th Large Installation System Administration Conference 145 Challenges to Error Diagnosis in Hadoop Ecosystems": 2428, + "Channel Allocation in 802.11-based Mesh Networks": 4972, + "Chaperone: Real-time Locking and Loss Prevention for Smartphones Chaperone: Real-time Locking and Loss Prevention for Smartphones": 3605, + "Chappie Swarm: Persona-Driven Web Corpus Generation": 1387, + "Chapter 11 FLUID MODEL OF AN INTERNET ROUTER UNDER THE MIMD CONTROL SCHEME": 1133, + "Characterization of Incremental Data Changes for Efficient Data Protection": 853, + "Characterization of TCC on Chip-Multiprocessors": 4626, + "Characterizing Database User's Access Patterns": 319, + "Characterizing Storage Workloads with Counter Stacks Characterizing Storage Workloads with Counter Stacks": 2969, + "Characterizing Tight-Link Bandwidth of Multi-Hop Paths Using Probing Response Curves": 4754, + "Characterizing the Impact of Geometric Properties of Word Embeddings on Task Performance": 814, + "Characterizing the Internet Hierarchy from Multiple Vantage Points": 4409, + "Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems": 3501, + "Chatty Tenants and the Cloud Network Sharing Problem": 2537, + "Cheap and Available State Machine Replication Cheap and Available State Machine Replication": 981, + "Cheap and Large CAMs for High Performance Data-Intensive Networked Systems": 770, + "CheckFence: Checking Consistency of Concurrent Data Types on Relaxed Memory Models *": 92, + "Checking Absence of Illicit Applet Interactions: A Case Study": 4803, + "Checking the Consistency of Collaboration and Class Diagrams using PVS": 4504, + "Chinese-to-Japanese Patent Machine Translation based on Syntactic Pre-ordering for WAT 2015": 1129, + "Chipping Away at Censorship Firewalls with User-Generated Content": 301, + "Chukwa: A system for reliable large-scale log collection": 611, + "ChunkStash: Speeding up Inline Storage Deduplication using Flash Memory": 356, + "CiAO: An Aspect-Oriented Operating-System Family for Resource-Constrained Embedded Systems *": 2442, + "Cicada: Introducing Predictive Guarantees for Cloud Networks": 1823, + "CiteSeer x : a Cloud Perspective": 679, + "Civet: An Efficient Java Partitioning Framework for Hardware Enclaves Civet: An Efficient Java Partitioning Framework for Hardware Enclaves": 3720, + "Civitas: Toward a Secure Voting System": 4950, + "Classification of UDP Traffic for DDoS Detection": 2383, + "CleanOS: Limiting Mobile Data Exposure with Idle Eviction": 2926, + "ClickNF: a Modular Stack for Custom Network Functions ClickNF: a Modular Stack for Custom Network Functions": 1071, + "ClickOS and the Art of Network Function Virtualization ClickOS and the Art of Network Function Virtualization": 2583, + "Cloaking Malware with the Trusted Platform Module": 369, + "Cloaking Malware with the Trusted Platform Module_4971": 4971, + "Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless": 4016, + "Close Pair Queries in Moving Object Databases": 4684, + "Closed-Loop Congestion Control for Mixed Responsive and Non-Responsive Traffic": 4833, + "Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs": 1080, + "Cloud Spot Markets are Not Sustainable: The Case for Transient Guarantees": 1870, + "Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems": 817, + "Cloud analytics: Do we really need to reinvent the storage stack?": 771, + "Cloud-Native File Systems": 1898, + "Cloud-Scale Resource Management: Challenges and Techniques": 412, + "CloudCmp: Shopping for a Cloud Made Easy": 514, + "CloudNet: Dynamic Pooling of Cloud Resources by Live WAN Migration of Virtual Machines": 3987, + "CloudPowerCap: Integrating Power Budget and Resource Management across a Virtualized Server Cluster CloudPowerCap: Integrating Power Budget and Resource Management across a Virtualized Server Cluster": 2311, + "CloudSense: Continuous Fine-Grain Cloud Monitoring With Compressive Sensing": 495, + "CloudViews: Communal Data Sharing in Public Clouds": 1734, + "Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents": 3249, + "Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites": 3877, + "Cluster-Based Delta Compression of a Collection of Files": 1332, + "ClusterOn: Building Highly Configurable and Reusable Clustered Data Services using Simple Data Nodes": 2156, + "Clustering Potential Phishing Websites Using DeepMD5": 2385, + "Clustering Query Refinements by User Intent": 2999, + "Cntr: Lightweight OS Containers CNTR: Lightweight OS Containers": 1115, + "Co-Training as a Human Collaboration Policy": 2521, + "Co-evolving Tracing and Fault Injection with Box of Pain": 1922, + "CoRD: A Collaborative Framework for Distributed Data Race Detection": 1960, + "CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves": 1182, + "Coarse-to-Fine Decoding for Neural Semantic Parsing": 4292, + "Coarse-to-Fine Syntactic Machine Translation using Language Projections": 2854, + "Cobra: Toward Concurrent Ballot Authorization for Internet Voting": 1459, + "Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition *": 4055, + "Coccinelle: 10 Years of Automated Evolution in the Linux Kernel Coccinelle: 10 Years of Automated Evolution in the Linux Kernel": 1093, + "Code-Pointer Integrity Code-Pointer Integrity": 2952, + "CodePlugin: Plugging Deduplication into Erasure Coding for Cloud Storage": 1852, + "Coercion-Resistant Electronic Elections with Write-In Candidates": 1460, + "Cognitive Models of Test-Item Effects in Human Category Learning": 4977, + "Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval": 1172, + "Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core Sharing Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core Sharing": 982, + "Collaborative Expert Portfolio Management": 4913, + "Collaborative Learning on the Edges: A Case Study on Connected Vehicles": 1997, + "Collaborative Ordinal Regression": 1832, + "Collaborative Red Teaming for Anonymity System Evaluation": 1342, + "Collaborative, Privacy-Preserving Data Aggregation at Scale": 3921, + "Collecting Provenance via the Xen Hypervisor": 533, + "Collection-focused Parallelism": 2080, + "Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives": 751, + "Collusion-resilient Credit-based Reputations for Peer-to-peer Content Distribution": 683, + "Colocation Demand Response: Why Do I Turn Off My Servers? Colocation Demand Response: Why Do I Turn Off My Servers?": 2324, + "Color Gamut Matching for Tiled Display Walls": 4567, + "Columbia University TRECVID-2005 Video Search and High-Level Feature Extraction": 4790, + "Combinations of theories and the Bernays-Sch\u00f6nfinkel-Ramsey class": 4511, + "Combinatorial Agency with Audits": 3521, + "Combining Heterogeneous Models for Measuring Relational Similarity": 4188, + "Combining Static Analysis and Runtime Monitoring to Counter SQL-Injection Attacks": 4516, + "Comet: An active distributed key-value store": 396, + "Comics as a Medium for Privacy Notices": 3992, + "Command-Form Coverage for Testing Database Applications": 4461, + "CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition": 3520, + "Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices": 3842, + "Communication Analysis of Parallel 3D FFT for Flat Cartesian Meshes on Large Blue Gene Systems \u22c6": 2021, + "Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks": 1417, + "Comparing BitTorrent Clients in the Wild: The Case of Download Speed": 451, + "Comparing Memory Systems for Chip Multiprocessors": 4887, + "Comparison of Internet Traffic Classification Tools": 2776, + "Comparison of Variational Bayes and Gibbs Sampling in Reconstruction of Missing Values with Probabilistic Principal Component Analysis": 4664, + "Comparison of bandwidth-sharing policies in a linear network": 171, + "Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception": 3219, + "Compiling Abstract Specifications into Concrete Systems-Bringing Order to the Cloud Compiling Abstract Specifications into Concrete Systems -Bringing Order to the Cloud": 2434, + "Compiling Path Queries Compiling Path Queries": 2673, + "Compiling X10 to Java": 510, + "Completion Time Minimization and Robust Power Control in Wireless Packet Networks": 192, + "Composable Reliability for Asynchronous Systems": 824, + "Composing Software-Defined Networks": 2546, + "Composing XSL Transformations with XML Publishing Views": 4697, + "Composing high-level plans for declarative agent programming": 4529, + "Composition Kills: A Case Study of Email Sender Authentication Composition Kills: A Case Study of Email Sender Authentication": 3604, + "Composition and Substitution in Provenance and Workflows": 3922, + "Compositional Verification of Secure Applet Interactions": 4507, + "CompoundFS: Compounding I/O Operations in Firmware File Systems": 2269, + "Comprehensive Supersense Disambiguation of English Prepositions and Possessives": 4289, + "Compression and SSD: Where and How?": 2336, + "Computational Risk Management for Building Highly Reliable Network Services": 4761, + "Compute Globally, Act Locally: Protecting Federated Systems from Systemic Threats": 1967, + "Computer Meteorology: Monitoring Compute Clouds": 2439, + "Computer Systems": 4514, + "Computer security clinical trials: Lessons learned from a 4-month pilot study": 1371, + "Computing Nash Equilibria of Action-Graph Games": 3110, + "Computing Pure Strategy Nash Equilibria in Compact Symmetric Games": 1777, + "Computing the Margin of Victory in IRV Elections": 536, + "ConFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software": 3575, + "Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring": 339, + "Concurrency Attacks": 2074, + "Concurrent Deletion in a Distributed Content-Addressable Storage System with Global Deduplication": 1482, + "Conducting an Ethical Study of Web Traffic": 1348, + "Conficker and Beyond: A Large-Scale Empirical Study": 22, + "Confidence Modeling for Neural Semantic Parsing": 4293, + "Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks": 2732, + "Configtron: Tackling network diversity with heterogeneous configurations": 1885, + "Configuration Management for Mac OS X, It's just Unix Right?": 263, + "Consensus-based Evaluation for Fault Isolation and On-line Evolutionary Regeneration": 233, + "Considerations for Mondriaan-like Systems": 4900, + "Consistency Maintenance Based on the Mark & Retrace Technique in Groupware Systems *": 4786, + "Consistent Improvement in Translation Quality of Chinese-Japanese Technical Texts by Adding Additional Quasi-parallel Training Data": 2736, + "Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory": 694, + "Consolidating Concurrency Control and Consensus for Commits under Conflicts Consolidating Concurrency Control and Consensus for Commits under Conflicts": 3005, + "Constant-Time Callees with Variable-Time Callers Constant-Time Callees with Variable-Time Callers": 3359, + "Constrained Data-Driven Parallelism": 2083, + "Constructing and Managing Appliances for Cloud Deployments from Repositories of Reusable Components": 3994, + "Construction Locale de Sous-Graphes Couvrants Peu Denses \u2020": 4915, + "Constructivist Approach To Information Security Awareness In The Middle East": 4738, + "Contact Sensing for Parts Localization: Sensor Design and Experiments": 168, + "Content Pricing in Peer-to-Peer Networks": 586, + "Content-aware Load Balancing for Distributed Backup": 363, + "Context-Aware Neural Machine Translation Learns Anaphora Resolution": 4330, + "Context-Sensitive Information Retrieval Using Implicit Feedback": 4475, + "Context-based Online Configuration-Error Detection": 735, + "Continuous Inference of Psychological Stress from Sensory Measurements Collected in the Natural Environment": 4541, + "Continuous Intersection Joins Over Moving Objects": 187, + "Continuous Reverse Nearest Neighbor Monitoring": 4680, + "Contracts: Practical Contribution Incentives for P2P Live Streaming": 743, + "Contracts: Practical Contribution Incentives for P2P Live Streaming_3080": 3080, + "Control Objectives for DP: Digital Preservation as an Integrated Part of IT Governance": 4640, + "Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Control-Flow Bending: On the Effectiveness of Control-Flow Integrity": 3227, + "Controlling File System Write Ordering": 1312, + "Controlling UAVs with Sensor Input Spoofing Attacks": 4063, + "Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds": 2129, + "CoolStreaming/DONet: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming": 4433, + "Cooperative Learning of Disjoint Syntax and Semantics": 4197, + "Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies": 3838, + "Cooperative Strategies and Optimal Scheduling for Tree Networks": 4440, + "Coordinated and Efficient Huge Page Management with Ingens Coordinated and Efficient Huge Page Management with Ingens": 2997, + "Coordinating Liquid and Free Air Cooling with Workload Allocation for Data Center Power Minimization Coordinating Liquid and Free Air Cooling with Workload Allocation for Data Center Power Minimization": 2320, + "Coriolis: Scalable VM Clustering in Clouds": 2283, + "Correcting for Missing Data in Information Cascades": 137, + "Correctly Implementing Value Prediction in Microprocessors that Support Multithreading or Multiprocessing": 4501, + "Correctness Proofs for Device Drivers in Embedded Systems": 367, + "Correlation Clustering: Maximizing Agreements via Semidefinite Programming": 4683, + "Corroborating Information from Disagreeing Views *": 121, + "Corroboration de vues discordantes fond\u00e9e sur la confiance *": 4840, + "Cosh: clear OS data sharing in an incoherent world": 3938, + "Cost-Aware Live Migration of Services in the Cloud": 291, + "Cost-Based Labeling of Groups of Mass Spectra X-XXXXX-XX-X/XX/XX ...$5.00": 340, + "Cost-Optimal Planning with Landmarks": 4784, + "Cost-Sharing Approximations for h +": 80, + "Cost-effective Hardware Accelerator Recommendation for Edge Computing *": 2027, + "Cost-effective Outbreak Detection in Networks Natalie Glance": 194, + "Could cloud storage be disrupted in the next decade?": 2250, + "Counterexample-Guided Abstraction Refinement for PLCs": 279, + "Counterfactual Data Augmentation for Mitigating Gender Stereotypes in Languages with Rich Morphology": 3795, + "Couture: Tailoring STT-MRAM for Persistent Main Memory": 2340, + "CrashMonkey: A Framework to Systematically Test File-System Crash Consistency": 2195, + "Creating the Knowledge about IT Events": 262, + "Crime and Punishment for Cognitive Radios": 1621, + "Crom: Faster Web Browsing Using Speculative Execution": 2470, + "Cross-Fertilizing Deep Web Analysis and Ontology Enrichment": 4881, + "Cross-Target Stance Classification with Self-Attention Networks": 3964, + "Cross-dataset Time Series Anomaly Detection for Cloud Systems Cross-dataset Time Series Anomaly Detection for Cloud Systems": 1205, + "Cross-domain Collaboration Recommendation": 197, + "Cross-layer Optimization of Video Streaming in Single-Hop Wireless Networks": 4488, + "Cross-lingual CCG Induction": 4201, + "Crossbow Virtual Wire: Network in a Box": 3947, + "CrowdScreen: Algorithms for Filtering Data with Humans": 3377, + "Cryptree: A Folder Tree Structure for Cryptographic File Systems": 3443, + "Cumulus: Filesystem Backup to the Cloud": 3963, + "Curvature-Based Computation of Antipodal Grasps": 1032, + "Customizable and Extensible Deployment for Mobile/Cloud Applications Customizable and Extensible Deployment for Mobile/Cloud Applications": 2974, + "Customizing Progressive JPEG for Efficient Image Storage": 2202, + "Custos: Increasing Security with Secret Storage as a Service": 3945, + "Cutting MapReduce Cost with Spot Market": 522, + "Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations": 1396, + "Cyber Physical System Challenges for Human-in-the-Loop Control": 1659, + "Cybercasing the Joint: On the Privacy Implications of Geo-Tagging": 390, + "D-PROV: Extending the PROV Provenance Model with Workflow Structure": 3909, + "D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation": 4116, + "DACSA: A Decoupled Architecture for Cloud Security Analysis": 1369, + "DADI: Block-Level Image Service for Agile and Elastic Application Deployment DADI Block-Level Image Service for Agile and Elastic Application Deployment": 1234, + "DAL: A Locality-Optimizing Distributed Shared Memory System": 1886, + "DAPA: Diagnosing Application Performance Anomalies for Virtualized Infrastructures": 2035, + "DATA -Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries DATA -Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries": 3513, + "DATA PARALLEL FPGA WORKLOADS: SOFTWARE VERSUS HARDWARE": 943, + "DBTaint: Cross-Application Information Flow Tracking via Databases *": 354, + "DCCast: Efficient Point to Multipoint Transfers Across Datacenters": 1889, + "DCV: A Causality Detection Approach for Large-scale Dynamic Collaboration Environments *": 4798, + "DDoS Vulnerability Analysis of Bittorrent Protocol": 4583, + "DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work": 4079, + "DEFCON: High-Performance Event Processing with Information Security": 552, + "DEFINED: Deterministic Execution for Interactive Control-Plane Debugging": 852, + "DESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH": 4825, + "DEW: Distributed Experiment Workflows": 1402, + "DFS: A File System for Virtualized Flash Storage": 2356, + "DIADS: Addressing the \"My-Problem-or-Yours\" Syndrome with Integrated SAN and Database Diagnosis": 1281, + "DIMPLE: DynamIc Membership ProtocoL for Epidemic protocols": 4548, + "DIRC: Increasing Indoor Wireless Capacity Using Directional Antennas": 4430, + "DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements": 423, + "DIZK: A Distributed Zero Knowledge Proof System DIZK: A Distributed Zero Knowledge Proof System": 3516, + "DJoin: Differentially Private Join Queries over Distributed Databases": 2922, + "DLSpec: A Deep Learning Task Exchange Specification DLSpec: A Deep Learning Task Exchange Specification": 2897, + "DLion: Decentralized Distributed Deep Learning in Micro-Clouds": 1924, + "DMA-Assisted, Intranode Communication in GPU Accelerated Systems": 4967, + "DNS Prefetching and Its Privacy Implications: When Good Things Go Bad": 493, + "DNS-sly: Avoiding Censorship through Network Complexity": 1693, + "DONAR: Decentralized Server Selection for Cloud Services": 3876, + "DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services DQBarge: Improving data-quality tradeoffs in large-scale Internet services": 2984, + "DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers": 3382, + "DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks": 3319, + "DREAM: Data Representation Aware of Damage to Extend the Lifetime of MLC NAND Flash Memory": 2223, + "DRN: A Deep Reinforcement Learning Framework for News Recommendation": 4141, + "DROWN: Breaking TLS using SSLv2 DROWN: Breaking TLS using SSLv2": 3283, + "DSAC: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules DSAC: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules": 1058, + "DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse": 3197, + "DSybil: Optimal Sybil-Resistance for Recommendation Systems": 4298, + "DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet": 4121, + "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space": 562, + "DarkNOC: Dashboard for Honeypot Management": 662, + "Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed": 1306, + "Dasu: Pushing Experiments to the Internet's Edge": 2526, + "Data Association for Topic Intensity Tracking": 4872, + "Data Augmentation for Context-Sensitive Neural Lemmatization Using Inflection Tables and Raw Text": 4219, + "Data Augmentation for Low-Resource Neural Machine Translation": 4274, + "Data Domain Cloud Tier: Backup here, backup there, deduplicated everywhere! Data Domain Cloud Tier: Backup here, backup there, deduplicated everywhere!": 1139, + "Data Integration with Dependent Sources": 999, + "Data Swapping: Variations on a Theme by Dalenius and Reiss": 353, + "Data-Centric Reconfiguration with Network-Attached Disks": 4917, + "Data-Driven Privacy Indicators": 4134, + "Data-Driven Text Simplification": 4164, + "DataFog: Towards a Holistic Data Management Platform for the IoT Age at the Network Edge": 1974, + "Datagridflows: Managing Long-Run Processes on Datagrids": 4830, + "DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists": 3623, + "Daydream: Accurately Estimating the Efficacy of Optimizations for DNN Training Daydream: Accurately Estimating the Efficacy of Optimizations for DNN Training": 1278, + "Dayu: Fast and Low-interference Data Recovery in Very-large Storage Systems Dayu: Fast and Low-interference Data Recovery in Very-large Storage Systems": 1197, + "DeCaf: Iterative Collaborative Processing over the Edge": 1995, + "DeTor: Provably Avoiding Geographic Regions in Tor DeTor: Provably Avoiding Geographic Regions in Tor": 3378, + "Dead Store Elimination (Still) Considered Harmful Dead Store Elimination (Still) Considered Harmful": 3419, + "Dealing with the Deep Web and all its Quirks": 4882, + "Debloating Software through Piece-Wise Compilation and Loading Debloating Software through Piece-Wise Compilation and Loading": 3491, + "Debug Determinism: The Sweet Spot for Replay-Based Debugging": 738, + "Decaf: Moving Device Drivers to a Modern Language": 3095, + "Decentralized Deduplication in SAN Cluster File Systems": 1330, + "Deception Task Design in Developer Password Studies: Exploring a Student Sample Deception Task Design in Developer Password Studies: Exploring a Student Sample": 3814, + "Decimeter-Level Localization with a Single WiFi Access Point Decimeter-Level Localization with a Single WiFi Access Point": 2684, + "DeclStore: Layering is for the Faint of Heart": 2200, + "Declarative Goals in Motivated Agent Architectures A report submitted for transfer from MPhil to PhD": 4532, + "Declaratively Processing Provenance Metadata": 3913, + "Deconstructing Hardware Architectures for Security": 4617, + "Deconstructing RDMA-enabled Distributed Transactions: Hybrid is Better! Deconstructing RDMA-enabled Distributed Transactions: Hybrid is Better!": 3068, + "Decoupling Cores, Kernels, and Operating Systems Decoupling Cores, Kernels, and Operating Systems": 2972, + "Decoupling Datacenter Studies from Access to Large-Scale Applications: A Modeling Approach for Storage Workloads": 4623, + "Decoupling Dynamic Information Flow Tracking with a Dedicated Coprocessor": 4850, + "Deduplicating Compressed Contents in Cloud Storage Environment": 2179, + "Deep Adversarial Learning for NLP": 4227, + "Deep Bayesian Learning and Understanding": 4163, + "Deep Dyna-Q: Integrating Planning for Task-Completion Dialogue Policy Learning": 4379, + "Deep Investigation of Cross-Language Plagiarism Detection Methods": 2218, + "Deep Keyphrase Generation": 4257, + "Deep Learning Inference Service at Microsoft Deep Learning Inference Service at Microsoft": 2890, + "Deep Learning Made Easier by Linear Transformations in Perceptrons": 4874, + "Deep Learning for NLP (without Magic)": 4240, + "Deep Learning for Natural Language Inference": 4228, + "Deep-speare: A joint neural model of poetic language, meter and rhyme": 4356, + "DeepCPU: Serving RNN-based Deep Learning Models 10x Faster DeepCPU: Serving RNN-based Deep Learning Models 10x Faster": 1126, + "Default-all is dangerous!": 394, + "Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs": 144, + "Defending against Malicious Peripherals with Cinch Defending against malicious peripherals with Cinch": 3282, + "Defragmenting DHT-based Distributed File Systems": 4220, + "Delayed Stability and Performance of Distributed Congestion Control": 59, + "DelegaTEE: Brokered Delegation Using Trusted Execution Environments DELEGATEE: Brokered Delegation Using Trusted Execution Environments": 3482, + "Delta Compressed and Deduplicated Storage Using Stream-Informed Locality": 2106, + "Delving into Internet Streaming Media Delivery: A Quality and Resource Utilization Perspective": 3121, + "Demand Based Hierarchical QoS Using Storage Resource Pools": 831, + "Demand Response of Data Centers: A Real-time Pricing Game between Utilities in Smart Grid": 1669, + "Demo: Snowcat5 -Networking in Snow": 4930, + "Demystifying Page Load Performance with WProf": 2533, + "DenseFS: A Cache-Compact Filesystem": 2217, + "Dependence-Aware Transactional Memory for Increased Concurrency": 4901, + "Dependence-Preserving Data Compaction for Scalable Forensic Analysis Dependence-Preserving Data Compaction for Scalable Forensic Analysis *": 3468, + "Depletable Storage Systems": 605, + "Deploying IPv6 in the Google Enterprise Network. Lessons learned": 254, + "Depot: Cloud storage with minimal trust": 537, + "Derandomized Constructions of k-Wise (Almost) Independent Permutations *": 175, + "Deriving Dynamics of Web Pages: A Survey *": 4576, + "Deriving Invariants by Algorithmic Learning, Decision Procedures, and Predicate Abstraction": 1177, + "Deriving Private Information from Randomized Data": 359, + "Design Guidelines for High Performance RDMA Systems Design Guidelines for High Performance RDMA Systems": 966, + "Design Principles for Tamper-Resistant Smartcard Processors": 4665, + "Design and Evaluation of a Versatile and Efficient Receiver-Initiated Link Layer for Low-Power Wireless": 4707, + "Design and Evaluation of a new MAC Protocol for Long-Distance 802.11 Mesh Networks * braman AT iitk DOT ac DOT in chebrolu AT iitk DOT ac DOT in": 2410, + "Design and Implementation of a Consolidated Middlebox Architecture": 2515, + "Design and Implementation of a High-Performance Distributed Web Crawler": 1344, + "Design and Implementation of a Routing Control Platform": 4767, + "Design and Implementation of an Embedded Python Run-Time System": 836, + "Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions": 222, + "Design and Implementation of the CCC Parallel Programming Language": 2710, + "Design and Simulation of a Migration-based Architecture for Massively Populated Internet Games": 4540, + "Design and implementation of TCP data probes for reliable and metric-rich network path monitoring": 2447, + "Design patterns for container-based distributed systems": 1857, + "Designing Energy Efficient Communication Runtime Systems for Data Centric Programming Models": 202, + "Designing a Storage Software Stack for Accelerators": 2249, + "Designing an Efficient Replicated Log Store with Consensus Protocol": 1920, + "Designing an Ontology-based Intelligent Tutoring Agent with Instant Messaging": 115, + "Desperately Seeking ... Optimal Multi-Tier Cache Configurations": 2252, + "Detailed Simulation of Large-Scale Wireless Networks": 4536, + "Detect Rumors in Microblog Posts Using Propagation Structure via Kernel Learning": 4260, + "Detectability of Traffic Anomalies in Two Adjacent Networks": 4436, + "Detecting Attacks in Routers Using Sketches": 3677, + "Detecting Covert Timing Channels with Time-Deterministic Replay Detecting Covert Timing Channels with Time-Deterministic Replay": 2944, + "Detecting Credential Spearphishing Attacks in Enterprise Settings Detecting Credential Spearphishing Attacks in Enterprise Settings": 3363, + "Detecting Feature Eligibility Illusions in Enterprise AI Autopilots": 2896, + "Detecting Malicious Web Links and Identifying Their Attack Types": 334, + "Detecting Malware Domains at the Upper DNS Hierarchy": 241, + "Detecting Research Topics via the Correlation between Graphs and Texts": 2998, + "Detecting Spam in VoIP Networks": 1433, + "Detecting Stuffing of a User's Credentials at Her Own Accounts Detecting Stuffing of a User's Credentials at Her Own Accounts": 3727, + "Detecting Voter Fraud in an Electronic Voting Context: An Analysis of the Unlimited Reelection Vote in Venezuela": 2398, + "Detecting and Defending Against Third-Party Tracking on the Web": 2500, + "Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter": 1722, + "Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling": 371, + "Determinism Is Overrated: What Really Makes Multithreaded Programs Hard to Get Right and What Can Be Done about It?": 2089, + "Deterministic Process Groups in dOS": 272, + "Developing Security Reputation Metrics for Hosting Providers (Step Right Up! Metrics Galore! )": 1380, + "Development of Peer Instruction Questions for Cybersecurity Education": 782, + "Development of a System Framework for Implementation of an Enhanced Role- Based Access Control Model to Support Collaborative Processes": 1760, + "Devices-as-Services: Rethinking Scalable Service Architectures for the Internet of Things": 1988, + "Dewdrop: An Energy-Aware Runtime for Computational RFID": 296, + "Diagnosing Performance Overheads in the Xen Virtual Machine Environment Diagnosing Performance Overheads in the Xen Virtual Machine Environment Work done during internship at HP Labs and then at EPFL. General Terms": 138, + "Diagnosing performance changes by comparing request flows": 634, + "Dialog Management for Rapid-Prototyping of Speech-Based Training Agents Dialog Management for Rapid-Prototyping of Speech-Based Training Agents": 288, + "Diamonds are forever, files are not * \"Reducing Storage Management Costs via Informed User-Based Poli- cies,\" in Mass": 1322, + "Dictionary Matching and Indexing with Errors and Don't Cares * General Terms": 3843, + "Did the Model Understand the Question?": 4351, + "DieHarder: Securing the Heap *": 578, + "Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks General Terms": 13, + "Differential Privacy Under Fire": 424, + "Differential Privacy Under Fire_876": 876, + "Differentiating Cache Files for Fine-grain Management to Improve Mobile Performance and Lifetime": 2264, + "Diffusion dynamics of games on online social networks": 709, + "DigiTally: Piloting Offline Payments for Phones DigiTally: Piloting Offline Payments for Phones": 3786, + "Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities": 3392, + "Direct Addressed Caches for Reduced Power Consumption": 135, + "Dirty Jobs: The Role of Freelance Labor in Web Service Abuse": 557, + "Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores": 1257, + "Disaggregation and the Application": 1935, + "Disambiguating False-Alarm Hashtag Usages in Tweets for Irony Detection": 3989, + "Discourse Coherence: Concurrent Explicit and Implicit Relations": 4383, + "Discourse Marker Augmented Network with Reinforcement Learning for Natural Language Inference": 4310, + "Discovering Evolutionary Theme Patterns from Text -An Exploration of Temporal Text Mining": 4473, + "Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation": 3436, + "Discovering and Ranking Web Services with BASIL: A Personalized Approach with Biased Focus": 4951, + "Discrete Control for the Internet of Things and Smart Environments": 1662, + "Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters": 1791, + "Discriminatory Processor Sharing Revisited": 1076, + "Disdat: Bundle Data Management for Machine Learning Pipelines Disdat: Bundle Data Management for Machine Learning Pipelines": 2892, + "Disk Drive Workload Captured in Logs Collected During the Field Return Incoming Test": 3100, + "Disk Scrubbing in Large Archival Storage Systems": 4691, + "Dissecting Video Server Selection Strategies in the YouTube CDN": 1588, + "Distance Matters: Geo-social Metrics for Online Social Networks": 637, + "Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh Networks": 3621, + "Distilling Knowledge for Search-based Structured Prediction": 4340, + "Distributed Computation of the Mode": 4735, + "Distributed I/O with ParaMEDIC: Experiences with a Worldwide Supercomputer *": 2087, + "Distributed Low-Complexity Maximum-Throughput Scheduling for Wireless Backhaul Networks": 4442, + "Distributed Proximity Maintenance in Ad Hoc Mobile Networks": 17, + "Distributed Query Sampling: A Quality-Conscious Approach *": 186, + "Distributed Systems Meet Economics: Pricing in the Cloud": 705, + "Distributing Deep Neural Networks with Containerized Partitions at the Edge": 2006, + "Distributing the Data Plane for Remote Storage Access": 2049, + "DivRank: the Interplay of Prestige and Diversity in Information Networks": 4460, + "Diversify to Survive: Making Passwords Stronger with Adaptive Policies Diversify to Survive: Making Passwords Stronger with Adaptive Policies": 3800, + "Do Neural Network Cross-Modal Mappings Really Bridge Modalities?": 4406, + "Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption": 3850, + "Do We Need a Crystal Ball for Task Migration?": 2075, + "Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection": 538, + "Do malware reports expedite cleanup? An experimental study": 1350, + "Document Context Neural Machine Translation with Memory Networks": 4333, + "Document Embedding Enhanced Event Detection with Hierarchical and Supervised Attention": 4399, + "Document Modeling with External Attention for Sentence Extraction": 4362, + "Dolly: Virtualization-driven Database Provisioning for the Cloud": 2421, + "Domain Adaptation by Constraining Inter-Domain Variability of Latent Feature Representation": 2910, + "Domain Adaptation with Adversarial Training and Graph Embeddings": 4315, + "Dominant Resource Fairness: Fair Allocation of Multiple Resource Types": 397, + "Dominant-Strategy Auction Design for Agents with Uncertain, Private Values": 149, + "Don't Let RAID Raid the Lifetime of Your SSD Array": 2120, + "Don't Lose Sleep Over Availability: The GreenUp Decentralized Wakeup Service": 2511, + "Don't Love Thy Nearest Neighbor": 531, + "Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications": 3984, + "Don't Secure Routing Protocols, Secure Data Delivery": 4437, + "Don't Take the Premise for Granted: Mitigating Artifacts in Natural Language Inference": 3848, + "Don't Thrash: How to Cache your Hash on Flash": 269, + "Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip": 717, + "Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling": 1015, + "Don't share, Don't lock: Large-scale Software Connection Tracking with Krononat Don't share, Don't lock: Large-scale Software Connection Tracking with Krononat": 1056, + "Don't stack your Log on my Log": 2335, + "Donnybrook: Enabling Large-Scale, High-Speed, Peer-to-Peer Games": 4446, + "Double Rulings for Information Brokerage in Sensor Networks": 4715, + "Double Trouble: The Problem of Construal in Semantic Annotation of Adpositions": 3581, + "Dr. Multicast: Rx for Data Center Communication Scalability": 75, + "Driving Cache Replacement with ML-based LeCaR": 2215, + "Drivolution: Rethinking the Database Driver Lifecycle": 2466, + "DryadInc: Reusing work in large-scale computations": 3085, + "Dune: Safe User-level Access to Privileged CPU Features": 2916, + "Dune: Safe User-level Access to Privileged CPU Features_4886": 4886, + "DupHunter: Flexible High-Performance Deduplication for Docker Registries DupHunter: Flexible High-Performance Deduplication for Docker Registries": 1274, + "Durability Semantics for Lock-based Multithreaded Programs": 2082, + "DynaMix: Dynamic Mobile Device Integration for Efficient Cross-device Resource Sharing DynaMix: Dynamic Mobile Device Integration for Efficient Cross-device Resource Sharing": 1063, + "Dynacache: Dynamic Cloud Caching": 1838, + "Dynamic Cache Partitioning for Simultaneous Multithreading Systems": 125, + "Dynamic Deadlock Analysis of Multi-Threaded Programs": 4508, + "Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data": 3210, + "Dynamic Index Coding for Wireless Broadcast Networks": 4701, + "Dynamic Internet Congestion with Bursts \ud97b\udf59": 29, + "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems": 4439, + "Dynamic Load Balancing in Ceph": 2478, + "Dynamic Optimization and Learning for Renewal Systems": 181, + "Dynamic Provenance for SPARQL Updates using Named Graphs": 427, + "Dynamic Query Re-Planning using QOOP Dynamic Query Re-Planning Using QOOP": 3056, + "Dynamic Reconfiguration of Primary/Backup Clusters": 847, + "Dynamic Resource Allocation for Database Servers Running on Virtual Storage": 3767, + "Dynamic Resource Allocation for Spot Markets in Clouds": 742, + "Dynamic Service Discovery and Management in Task Computing": 4547, + "Dynamic Time-Variant Connection Management for PGAS Models on InfiniBand": 2244, + "Dynamic Virtual Machine Scheduling in Clouds for Architectural Shared Resources": 1787, + "Dynamic Voting Schemes to Enhance Evolutionary Repair In Reconfigurable Logic Devices": 221, + "Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc Networks": 36, + "Dytan: A Generic Dynamic Taint Analysis Framework": 4450, + "E-Team: Practical Energy Accounting for Multi-Core Systems E-Team: Practical Energy Accounting for Multi-Core Systems": 1037, + "E-Voting and Forensics: Prying Open the Black Box": 1298, + "E-cubed: End-to-End Energy Management of Virtual Desktop Infrastructure with Guaranteed Performance": 1668, + "E3: Energy-Efficient Microservices on SmartNIC-Accelerated Servers E3: Energy-Efficient Microservices on SmartNIC-Accelerated Servers": 1174, + "EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning": 3273, + "EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding EC-Cache: Load-balanced, Low-latency Cluster Caching with Online Erasure Coding": 3012, + "ECOS: Practical Mobile Application Offloading for Enterprises": 2037, + "EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments": 1363, + "ELF: Efficient Lightweight Fast Stream Processing at Scale ELF: Efficient Lightweight Fast Stream Processing at Scale": 866, + "ENVI: Elastic resource flexing for Network function VIrtualization": 1879, + "EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs": 1079, + "ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK) ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)": 3571, + "EROFS: A Compression-friendly Readonly File System for Resource-scarce Devices EROFS: A Compression-friendly Readonly File System for Resource-scarce Devices": 1145, + "EVA: A Framework for Network Analysis and Risk Assessment": 1431, + "EVE: Verifying Correct Execution of Cloud-Hosted Web Applications": 458, + "Early Detection of Configuration Errors to Reduce Failure Damage Early Detection of Configuration Errors to Reduce Failure Damage": 3022, + "Early Release: Friend or Foe?": 4621, + "Earp: Principled Storage, Sharing, and Protection for Mobile Apps Earp: Principled Storage, Sharing, and Protection for Mobile Apps": 2689, + "Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic": 4073, + "Eavesdropping one-time tokens over magnetic secure transmission in Samsung Pay": 4062, + "EbbRT: A Framework for Building Per-Application Library Operating Systems EbbRT: A Framework for Building Per-Application Library Operating Systems": 3013, + "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit": 3741, + "Edelta: A Word-Enlarging Based Fast Delta Compression Approach": 2150, + "EdgEWisE: A Better Stream Processing Engine for the Edge EDGEWISE: A Better Stream Processing Engine for the Edge": 1143, + "Edge Computing Resource Management System: a Critical Building Block! Initiating the debate via OpenStack": 1973, + "Edge-based Transcoding for Adaptive Live Video Streaming": 1990, + "EdgeBalance: Model-Based Load Balancing for Network Edge Data Planes": 2026, + "EdgeCons: Achieving Efficient Consensus in Edge Computing Networks": 1975, + "Editorial for the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL) at JCDL 2016": 940, + "Education": 4674, + "Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels": 3490, + "Effective Attacks and Provable Defenses for Website Fingerprinting Effective Attacks and Provable Defenses for Website Fingerprinting": 3212, + "Effective Data-Race Detection for the Kernel": 373, + "Effective Detection of Multimedia Protocol Tunneling using Machine Learning Effective Detection of Multimedia Protocol Tunneling using Machine Learning": 3429, + "Effective Digital Forensics Research is Investigator-Centric": 701, + "Effective Entropy: Security-Centric Metric for Memory Randomization Techniques": 1370, + "Effective Memory Protection Using Dynamic Tainting": 4550, + "Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers": 1132, + "Effective Straggler Mitigation: Attack of the Clones": 2545, + "Effectively Mitigating I/O Inactivity in vCPU Scheduling Effectively Mitigating I/O Inactivity in vCPU Scheduling": 1082, + "Effectively Prefetching Remote Memory with Leap Effectively Prefetching Remote Memory with Leap": 1240, + "Effects of Data Center Vibration on Compute System Performance": 3949, + "Efficient Aggregation over Objects with Extent": 4686, + "Efficient Algorithms for Analyzing Segmental Duplications, Deletions, and Inversions in Genomes": 3765, + "Efficient Algorithms for Renewable Energy Allocation to Delay Tolerant Consumers": 2810, + "Efficient Collective Operations using Remote Memory Operations on VIA-Based Clusters": 2209, + "Efficient Complex Query Support for Multiversion XML Documents": 4689, + "Efficient Disk Space Management for Virtual Machines": 1747, + "Efficient Intranode Communication in GPU-Accelerated Systems": 2220, + "Efficient Low-rank Multimodal Fusion with Modality-Specific Factors": 4382, + "Efficient Memory Integrity Verification and Encryption for Secure Processors": 4774, + "Efficient Memory Mapped File I/O for In-Memory File Systems": 2180, + "Efficient Miss Ratio Curve Computation for Heterogeneous Content Popularity Efficient Miss Ratio Curve Computation for Heterogeneous Content Popularity": 1212, + "Efficient Multidimensional Blocking for Link Discovery without losing Recall": 1510, + "Efficient Multiple-Click Models in Web Search": 4937, + "Efficient Multithreaded Context ID Allocation in MPI": 1998, + "Efficient Object Storage Journaling in a Distributed Parallel File System": 2907, + "Efficient Pattern Matching over Event Streams *": 4764, + "Efficient QoS for Multi-Tiered Storage Systems": 2105, + "Efficient Query Computing for Uncertain Possibilistic Databases with Provenance": 692, + "Efficient Receipt-Free Ballot Casting Resistant to Covert Channels": 755, + "Efficient Search in Large Textual Collections with Redundancy": 4594, + "Efficient System-Enforced Deterministic Parallelism": 251, + "Efficient Tracing of Cold Code via Bias-Free Sampling Efficient Tracing of Cold Code via Bias-Free Sampling": 869, + "Efficient Value-Function Approximation via Online Linear Regression": 4820, + "Efficient Weight Learning for Markov Logic Networks": 588, + "Efficient and Scalable Paravirtual I/O System": 850, + "Efficient classification for metric data": 3821, + "Efficient patch-based auditing for web application vulnerabilities": 2918, + "Efficiently Delivering Online Services over Integrated Infrastructure Efficiently Delivering Online Services over Integrated Infrastructure": 2671, + "Egalitarian Computing Egalitarian computing": 3289, + "Eidetic Systems Eidetic Systems": 2947, + "EigenBench: A Simple Exploration Tool for Orthogonal TM Characteristics": 4596, + "Eigenvoice Speaker Adaptation via Composite Kernel PCA": 3098, + "ElCached: Elastic Multi-Level Key-Value Cache": 2339, + "ElasTraS: An Elastic Transactional Data Store in the Cloud": 1434, + "Elastic Memory Management for Cloud Data Analytics Elastic Memory Management for Cloud Data Analytics": 1046, + "Elastic Memory: Bring Elasticity Back to In-Memory Big Data Analytics": 2050, + "ElasticBF: Elastic Bloom Filter with Hotness Awareness for Boosting Read Performance in Large Key-Value Stores ElasticBF: Elastic Bloom Filter with Hotness Awareness for Boosting Read Performance in Large Key-Value Stores": 1170, + "ElasticBF: Fine-grained and Elastic Bloom Filter Towards Efficient Read for LSM-tree-based KV Stores": 2224, + "ElasticTree: Saving Energy in Data Center Networks": 1782, + "Elasticity in Cloud Computing: What It Is, and What It Is Not": 2287, + "Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios": 756, + "Electronic Prescription for Controlled Substances: A Cybersecurity Perspective": 1780, + "Electronic contracting in aircraft aftercare: A case study": 4813, + "Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads Using Simultaneous Multithreading Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads using Simultaneous Multithreading": 946, + "Email Data Cleaning": 158, + "Embark: Securely Outsourcing Middleboxes to the Cloud Embark: Securely Outsourcing Middleboxes to the Cloud": 2662, + "Embassies: Radically Refactoring the Web": 2556, + "Embedded Firmware Diversity for Smart Electric Meters": 546, + "Embedding Words and Senses Together via Joint Knowledge-Enhanced Training": 4180, + "EmoTag -Towards an Emotion-Based Analysis of Emojis": 3582, + "Empirical Evaluation of Latency-sensitive Application Performance in the Cloud": 52, + "Empirical Measurement of Systemic 2FA Usability Empirical Measurement of Systemic 2FA Usability": 3701, + "Empirical Study of Power Consumption of x86-64 Instruction Decoder": 1335, + "Empirical Virtual Machine Models for Performance Guarantees": 686, + "Empirically Testing Decision Making in TAC SCM": 1444, + "Emulating Goliath Storage Systems with David": 225, + "EnTrusT: Regulating Sensor Access by Cooperating Programs via Delegation Graphs EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs": 3559, + "Enabling Automated, Rich, and Versatile Data Management for Android Apps with BlueMountain": 2139, + "Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting Environments Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting Environments": 2595, + "Enabling Concurrent Multithreaded MPI Communication on Multicore Petascale Systems": 1954, + "Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System": 1599, + "Enabling Consolidation and Scaling Down to Provide Power Management for Cloud Computing": 582, + "Enabling Contribution Awareness in an Overlay Broadcasting System": 183, + "Enabling ECN in Multi-Service Multi-Queue Data Centers Enabling ECN in Multi-Service Multi-Queue Data Centers": 2640, + "Enabling Fast, Noncontiguous GPU Data Movement in Hybrid MPI+GPU Environments": 1876, + "Enabling Flow-level Latency Measurements across Routers in Data Centers": 655, + "Enabling High-Performance Internet-Wide Measurements on Windows": 4209, + "Enabling MAC Protocol Implementations on Software-Defined Radios": 2875, + "Enabling MAC Protocol Implementations on Software-Defined Radios_3854": 3854, + "Enabling NVM for Data-Intensive Scientific Services": 2337, + "Enabling NVMe WRR support in Linux Block Layer": 2186, + "Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking": 3470, + "Enabling Robust Information Accountability in E-healthcare Systems *": 1772, + "Enabling Scalable Social Group Analytics via Hypergraph Analysis Systems": 1842, + "Enabling Security in Cloud Storage SLAs with CloudProof": 597, + "Enabling Topological Flexibility for Data Centers Using OmniSwitch": 1851, + "Enabling Transactional File Access via Lightweight Kernel Extensions": 3878, + "Encoding of phonology in a recurrent neural model of grounded speech": 4182, + "End User Security and Privacy Concerns with Smart Homes End User Security & Privacy Concerns with Smart Homes": 3802, + "End the Senseless Killing: Improving Memory Management for Mobile Operating Systems End the Senseless Killing: Improving Memory Management for Mobile Operating Systems": 1231, + "End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks": 3462, + "End-to-End Internet Video Traffic Dynamics: Statistical Study and Analysis": 4087, + "End-to-End Measurements of Email Spoofing Attacks End-to-End Measurements of Email Spoofing Attacks": 3469, + "End-to-End Secure Delivery of Scalable Video Streams": 4486, + "End-to-end Data Integrity for File Systems: A ZFS Case Study": 4150, + "End-to-end Performance Isolation Through Virtual Datacenters End-to-end Performance Isolation through Virtual Datacenters": 2937, + "EndRE: An End-System Redundancy Elimination Service for Enterprises": 759, + "Energy Attack on Server Systems": 720, + "Energy Discounted Computing on Multicore Smartphones Energy Discounted Computing on Multicore Smartphones": 948, + "Energy Efficient Soft Real-Time Computing through Cross-Layer Predictive Control": 1663, + "Energy Optimization in Mobile TV Broadcast Networks": 4489, + "Energy efficiency of mobile clients in cloud computing": 551, + "Energy-Efficient Gaming on Mobile Devices using Dead Reckoning-based Power Management": 4176, + "Enforcing Context-Aware BYOD Policies with In-Network Security": 1912, + "Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM": 3204, + "Enforcing Murphy's Law for Advance Identification of Run-time Failures *": 834, + "Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags": 2570, + "Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015": 217, + "Engineering Record And Replay For Deployability Engineering Record And Replay For Deployability": 1030, + "Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing": 3310, + "Enhancing Drug-Drug Interaction Extraction from Texts by Molecular Structure Information": 4418, + "Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage": 3839, + "Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect": 3862, + "Ensuring Authorized Updates in Multi-user Database-Backed Applications Ensuring Authorized Updates in Multi-user Database-Backed Applications": 3358, + "Ensuring Connectivity via Data Plane Mechanisms": 2551, + "Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts * Cornell Tech, IC3 \u2020": 3437, + "Enterprise Information Extraction: Recent Developments and Open Challenges": 4693, + "Entropy of Search Logs: How Hard is Search? With Personalization? With Backoff?": 4781, + "Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint": 4659, + "Epsilon: A Visible Light Based Positioning System Epsilon: A Visible Light Based Positioning System": 2579, + "EqualChance: Addressing Intra-set Write Variation to Increase Lifetime of Non-volatile Caches": 2331, + "Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality": 956, + "Erasure Code with Shingled Local Parity Groups for Efficient Recovery from Multiple Disk Failures": 1966, + "Erasure Coding & Read/Write Separation in Flash Storage": 2334, + "Erasure Coding in Windows Azure Storage": 820, + "Erays: Reverse Engineering Ethereum's Opaque Smart Contracts Erays: Reverse Engineering Ethereum's Opaque Smart Contracts": 3528, + "Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics": 2685, + "Errata Slip": 1522, + "Errata Slip Proceedings of the 2017 Symposium on Usable Privacy and Security In the paper \"Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications\" by Original text from section 6.3": 3803, + "Errata Slip Proceedings of the 26th USENIX Security Symposium": 3424, + "Errata Slip Proceedings of the 26th USENIX Security Symposium_3425": 3425, + "Error Log Processing for Accurate Failure Prediction": 3105, + "Estimating Bidders' Valuation Distributions in Online Auctions": 4650, + "Estimating Environmental Costs": 1337, + "Estimating Peer Similarity using Distance of Shared Files": 647, + "Estimating the Margin of Victory for Instant-Runoff Voting": 313, + "Estimation of alternative splicing isoform frequencies from RNA-Seq data \u22c6": 1455, + "Estonian Electronic Identity Card: Security Flaws in Key Management Estonian Electronic Identity Card: Security Flaws in Key Management": 3690, + "Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels": 2911, + "EthBMC: A Bounded Model Checker for Smart Contracts ETHBMC: A Bounded Model Checker for Smart Contracts": 3630, + "Europa: Efficient User Mode Packet Forwarding in Network Virtualization": 515, + "EvFS: User-level, Event-Driven File System for Non-Volatile Memory": 2248, + "Evading Cellular Data Monitoring with Human Movement Networks": 253, + "Evaluating Bufferless Flow Control for On-Chip Networks": 4598, + "Evaluating File System Reliability on Solid State Drives Evaluating File System Reliability on Solid State Drives": 1156, + "Evaluating Legal Argument Instruction with Graphical Representations using LARGO": 488, + "Evaluating Malware Mitigation by Android Market Operators": 1383, + "Evaluating MapReduce for Multi-core and Multiprocessor Systems": 4611, + "Evaluating Neural Machine Translation in English-Japanese Task": 1570, + "Evaluating Non-deterministic Multi-threaded Commercial Workloads": 4502, + "Evaluating Performance and Energy in File System Server Workloads": 3757, + "Evaluating SFI for a CISC Architecture": 2461, + "Evaluating text coherence based on semantic similarity graph": 2418, + "Evaluating the Importance of User-Specific Profiling Evaluating the Importance of User-Specific Profiling": 3966, + "Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking": 1414, + "Evaluating the Performance Limitations of MPMD Communication": 777, + "Evaluating the Potential of Bandwidth Estimators": 4758, + "Evaluating, Combining and Generalizing Recommendations with Prerequisites": 3320, + "Evaluation of Authentication Signaling Loads in 3GPP LTE/SAE Networks": 1477, + "Evaluation of Codes with Inherent Double Replication for Hadoop": 2126, + "Evaluation of ConnectX Virtual Protocol Interconnect for Data Centers": 4964, + "Evaluation of Existing Architectures in IRAM Systems": 4633, + "Evaluation via Negativa of Chinese Word Segmentation for Information Retrieval *": 31, + "Event Identification in Social Media": 4646, + "Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China": 1691, + "Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting": 2352, + "Everyone Loves File: File Storage Service (FSS) in Oracle Cloud Infrastructure Everyone Loves File: File Storage Service (FSS) in Oracle Cloud Infrastructure": 1167, + "Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting": 3570, + "Everything Old is New Again: Binary Security of WebAssembly Everything Old is New Again: Binary Security of WebAssembly": 3659, + "Everything you always wanted to know about multicore graph processing but were afraid to ask Everything you always wanted to know about multicore graph processing but were afraid to ask": 1027, + "EvilCohort: Detecting Communities of Malicious Accounts on Online Services EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services": 3268, + "Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems": 2593, + "Examining Temporality in Document Classification": 4421, + "Examining Visual-Spatial Paths for Mobile Authentication": 3972, + "Exception-Less System Calls for Event-Driven Servers": 660, + "Execution Templates: Caching Control Plane Decisions for Strong Scaling of Data Analytics Execution Templates: Caching Control Plane Decisions for Strong Scaling of Data Analytics": 1028, + "Exemplar Encoder-Decoder for Neural Conversation Generation": 4336, + "Exertion-based billing for cloud storage access": 698, + "Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Exit from Hell? Reducing the Impact of Amplification DDoS Attacks": 3181, + "Exo-clones: Better Container Runtime Image Management across the Clouds": 2174, + "Expanding Rural Cellular Networks with Virtual Coverage": 2535, + "Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques": 1420, + "Expediting GA-Based Evolution Using Group Testing Techniques for Reconfigurable Hardware 1": 188, + "Experience with Rules-Based Programming for Distributed, Concurrent, Fault-Tolerant Code Experience with Rules-Based Programming for Distributed, Concurrent, Fault-Tolerant Code": 933, + "Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise *": 715, + "Experiences from a Decade of TinyOS Development": 2924, + "Experiences on a Design Approach for Interactive Web Applications": 496, + "Experiences with CoralCDN: A Five-Year Operational View": 1731, + "Experiences with Eucalyptus: Deploying an Open Source Cloud": 290, + "Experiences with Honey-Patching in Active Cyber Security Education": 1373, + "Experiences with Tracing Causality in Networked Services": 389, + "Experiences with practice-focused undergraduate security education": 378, + "ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation": 264, + "Experiment Explorer: Lightweight Provenance Search over Metadata": 3900, + "Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware": 368, + "Experimental Study of Fuzzy Hashing in Malware Clustering Analysis": 1378, + "Experiments in the Wild: Public Evaluation of Off-Screen Visualizations in the Android Market": 91, + "Explicit Retrofitting of Distributional Word Vectors": 4278, + "Exploitations of Uninitialized Uses on macOS Sierra": 4091, + "Exploiting Bounded Staleness to Speed Up Big Data Analytics Exploiting bounded staleness to speed up Big Data analytics": 860, + "Exploiting Content Localities for Efficient Search in P2P Systems \ud97b\udf59": 3143, + "Exploiting Domain Structure for Named Entity Recognition": 3399, + "Exploiting Half-wits: Smarter Storage for Low-Power Devices": 631, + "Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2": 1795, + "Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency": 3132, + "Exploiting MISD Performance Opportunities in Multi-core Systems": 292, + "Exploiting Peak Device Throughput from Random Access Workload": 2104, + "Exploiting Processor Heterogeneity for Interactive Services": 2295, + "Exploiting Query History for Document Ranking in Interactive Information Retrieval": 83, + "Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand": 2299, + "Exploiting Social Context for Review Quality Prediction": 3220, + "Exploiting Structured Ontology to Organize Scattered Online Opinions": 21, + "Exploiting Temporal Diversity of Water Efficiency to Make Data Center Less \"Thirsty\" Exploiting Temporal Diversity of Water Efficiency to Make Data Center Less \"Thirsty\"": 2315, + "Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers": 4123, + "Exploiting the hard-working DWARF: Trojan and Exploit Techniques With No Native Executable Code": 580, + "Exploring Connections Between Active Learning and Model Extraction Exploring Connections Between Active Learning and Model Extraction": 3601, + "Exploring Content Models for Multi-Document Summarization": 5, + "Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard": 2668, + "Exploring Games for Improved Touchscreen Authentication on Mobile Devices": 3975, + "Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices": 3841, + "Exploring Semantic Properties of Sentence Embeddings": 4411, + "Exploring Social Tagging Graph for Web Object Classification *": 74, + "Exploring System Challenges of Ultra-Low Latency Solid State Drives": 2206, + "Exploring User Mental Models of End-to-End Encrypted Communication Tools": 1702, + "Exploring decision making with Android's runtime permission dialogs using in-context surveys Exploring decision making with Android's runtime permission dialogs using in-context surveys": 3789, + "Exploring the Hidden Dimension in Graph Processing Exploring the Hidden Dimension in Graph Processing": 3024, + "Exploring the Relationship Between Web Application Development Tools and Security": 387, + "Exploring the Use of Synthetic Gradients for Distributed Deep Learning across Cloud and Edge Resources": 1989, + "Exposing iClass Key Diversification": 393, + "Exposing privacy concerns in mHealth": 3090, + "Exposing the Lack of Privacy in File Hosting Services": 576, + "Extended Abstract: Image Matching for Branding Phishing Kit Images": 2394, + "Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries": 635, + "Extending Logic Programs with Description Logic Expressions for the Semantic Web": 2654, + "Extending MPI to Accelerators": 2233, + "Extending SSD Lifetimes with Disk-Based Write Caches": 3766, + "Extending a Parser to Distant Domains Using a Few Dozen Partially Annotated Examples": 4324, + "Extending the Lifetime of Flash-based Storage through Reducing Write Amplification from File Systems": 1464, + "Extensible and Scalable Network Monitoring Using OpenSAFE": 259, + "Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies": 3400, + "Extension Framework for File Systems in User space Extension Framework for File Systems in User space": 1135, + "Extracting Commonsense Properties from Embeddings with Limited Human Guidance": 4413, + "Extracting More Concurrency from Distributed Transactions Extracting More Concurrency from Distributed Transactions": 2957, + "Extracting Relations from XML Documents": 4459, + "Extracting Semantic Networks from Text Via Relational Clustering": 388, + "Extracting synonymous gene and protein terms from biological literature": 4778, + "Extractive Headline Generation Based on Learning to Rank for Community Question Answering": 4162, + "EyeQ: Practical Network Performance Isolation at the Edge": 2544, + "EyeQ: Practical Network Performance Isolation for the Multi-tenant Cloud": 1794, + "Eyo: Device-Transparent Personal Storage": 664, + "F10: A Fault-Tolerant Engineered Network": 2541, + "F4: Large-Scale Automated Forecasting Using Fractals": 4869, + "FANCI : Feature-based Automated NXDomain Classification and Intelligence FANCI : Feature-based Automated NXDomain Classification and Intelligence": 3493, + "FARMER: Finding Interesting Rule Groups in Microarray Datasets": 376, + "FAST: Quick Application Launch on Solid-State Drives": 463, + "FATE and DESTINI: A Framework for Cloud Recovery Testing": 414, + "FAWNdamentally Power-efficient Clusters": 3955, + "FERRET: Fall-back to LTE Microservices for Low Latency Data Access": 2023, + "FGS+: OPTIMIZING THE JOINT SNR-TEMPORAL VIDEO QUALITY IN MPEG-4 FINE GRAINED SCALABLE CODING": 4789, + "FLAME: A Flow-Level Anomaly Modeling Engine": 1307, + "FLEXTLS A Tool for Testing TLS Implementations": 4041, + "FLICK: Developing and Running Application- Specific Network Services FLICK: Developing and Running Application-Specific Network Services": 989, + "FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road": 732, + "FLP Semantics Without Circular Justifications for General Logic Programs": 2765, + "FPGA Self-Repair using an Organic Embedded System Architecture": 143, + "FRAPpuccino: Fault-detection through Runtime Analysis of Provenance": 1881, + "FTW: Fast Similarity Search under the Time Warping Distance": 4870, + "FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities": 3517, + "FVD: a High-Performance Virtual Machine Image Format for Cloud": 675, + "FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs FaSST: Fast, Scalable and Simple Distributed Transactions with Two-sided (RDMA) Datagram RPCs": 2996, + "Faasm: Lightweight Isolation for Efficient Stateful Serverless Computing FAASM: Lightweight Isolation for Efficient Stateful Serverless Computing": 1252, + "Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search": 1689, + "Facetedpedia: Dynamic Generation of Query-Dependent Faceted Interfaces for Wikipedia": 4687, + "Facility Location with Service Installation Costs": 4694, + "Factored Planning: How, When, and When Not": 4451, + "Factorized Normalized Maximum Likelihood Criterion for Learning Bayesian Network Structures": 4954, + "Failure Sketches: A Better Way to Debug": 2051, + "Fair Resource Allocation in Consolidated Flash Systems": 2234, + "Fair-EDF: A Latency Fairness Framework for Shared Storage Systems": 2242, + "Falcon: Scaling IO Performance in Multi-SSD Volumes Falcon: Scaling IO Performance in Multi-SSD Volumes": 1018, + "Fall 2003 CS263 Course Project": 4668, + "Fast Accurate Computation of Large-Scale IP Traffic Matrices from Link Loads": 677, + "Fast Computation of Database Operations using Graphics Processors": 379, + "Fast Databases with Fast Durability and Recovery Through Multicore Parallelism Fast Databases with Fast Durability and Recovery Through Multicore Parallelism": 2978, + "Fast Deterministic Distributed Algorithms for Sparse Spanners": 521, + "Fast Discrete Fourier Spectra Attacks on Stream Ciphers": 987, + "Fast Hydraulic Erosion Simulation and Visualization on GPU": 4660, + "Fast Memory Snapshot for Concurrent Programming without Synchronization": 4603, + "Fast Mining and Forecasting of Complex Time-Stamped Events": 4655, + "Fast Probabilistic Planning Through Weighted Model Counting": 4777, + "Fast Software Cache Design for Network Appliances Fast Software Cache Design for Network Appliances": 1276, + "Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data Centers Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data Centers": 990, + "Fast and Concurrent RDF Queries using RDMA-assisted GPU Graph Exploration Fast and Concurrent RDF Queries using RDMA-assisted GPU Graph Exploration": 1119, + "Fast and Concurrent RDF Queries with RDMA- Based Distributed Graph Exploration Fast and Concurrent RDF Queries with RDMA-based Distributed Graph Exploration": 3015, + "Fast and Efficient Container Startup at the Edge via Dependency Scheduling": 2011, + "Fast and Secure Laptop Backups with Encrypted De-duplication": 236, + "Fast and Service-preserving Recovery from Malware Infections Using CRIU Fast and Service-preserving Recovery from Malware Infections Using CRIU": 3512, + "Fast and Vulnerable: A Story of Telematic Failures": 4044, + "Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks": 3315, + "FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication": 945, + "FastScale: Accelerate RAID Scaling by Minimizing Data Migration": 749, + "FastTrack: Foreground App-Aware I/O Management for Improving User Experience of Android Smartphones FastTrack: Foreground App-Aware I/O Management for Improving User Experience of Android Smartphones": 1074, + "Faster Private Set Intersection Based on OT Extension Faster Private Set Intersection based on OT Extension": 3195, + "Faster Secure Two-Party Computation Using Garbled Circuits": 441, + "Fault Isolation and Quick Recovery in Isolation File Systems": 2119, + "Fault Tolerance and the Five-Second Rule": 2044, + "Fault-Tolerance in the Borealis Distributed Stream Processing System": 380, + "Fault-Tolerance, Fast and Slow: Exploiting Failure Asynchrony in Distributed Systems Fault-Tolerance, Fast and Slow: Exploiting Failure Asynchrony in Distributed Systems": 3028, + "Fault-Tolerant Communication Runtime Support for Data-Centric Programming Models": 201, + "Featherweight Firefox Formalizing the Core of a Web Browser": 283, + "Feature Refactoring a Multi-Representation Program into a Product Line": 4673, + "Federated Access Control and Workflow Enforcement in Systems Configuration": 3952, + "Feedback-Directed Barrier Optimization in a Strongly Isolated STM": 4604, + "Feeding the Pelican: using archival hard drives for cold storage racks": 2157, + "Fence: Protecting Device Availability With Uniform Resource Control Fence: Protecting Device Availability With Uniform Resource Control": 919, + "Fewer Cores, More Hertz: Leveraging High-Frequency Cores in the OS Scheduler for Improved Application Performance Fewer Cores, More Hertz: Leveraging High-Frequency Cores in the OS Scheduler for Improved Application Performance": 1223, + "Fido: Fast Inter-Virtual-Machine Communication for Enterprise Appliances": 1313, + "File Systems as Processes": 2240, + "Filesystem Aging: It's more Usage than Fullness": 2235, + "Finding Bottleneck in Machine Learning Model Life Cycle Finding Bottleneck in Machine Learning Model Life Cycle": 2900, + "Finding Concurrency Errors in Sequential Code -OS-level, In-vivo Model Checking of Process Races": 500, + "Finding Consistency in an Inconsistent World: Towards Deep Semantic Understanding of Scale-out Distributed Databases": 2158, + "Finding Crash-Consistency Bugs with Bounded Black-Box Crash Testing Finding Crash-Consistency Bugs with Bounded Black-Box Crash Testing": 3057, + "Finding Fastest Paths on A Road Network with Speed Patterns": 4679, + "Finding Optimal Probabilistic Generators for XML Collections": 4585, + "Finding Small Changes using Sensor Networks": 4560, + "Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network": 4432, + "Finding a needle in Haystack: Facebook's photo storage": 265, + "Finding soon-to-fail disks in a haystack": 2111, + "Finding the Balance Between Guidance and Independence in Cybersecurity Exercises": 787, + "Fine Grain Provenance Using Temporal Databases": 395, + "Fine-Grain Performance Scaling of Soft Vector Processors": 910, + "Fine-Grained Censorship Mapping Information Sources, Legality and Ethics": 719, + "Fine-Grained Isolation for Scalable, Dynamic, Multi-tenant Edge Clouds Fine-Grained Isolation for Scalable, Dynamic, Multi-tenant Edge Clouds": 1249, + "Fine-grained access-control for the Puppet configuration language": 691, + "Fine-grained consistency for geo-replicated systems Fine-grained consistency for geo-replicated systems": 1095, + "Fine-grained provenance for linear algebra operators": 3928, + "FineStream: Fine-Grained Window-Based Stream Processing on CPU-GPU Integrated Architectures FineStream: Fine-Grained Window-Based Stream Processing on CPU-GPU Integrated Architectures": 1271, + "Fingerprinting Electronic Control Units for Vehicle Intrusion Detection Fingerprinting Electronic Control Units for Vehicle Intrusion Detection": 3293, + "FireDrill: Interactive DNS Rebinding": 4012, + "Firefly: Untethered Multi-user VR for Commodity Mobile Devices Firefly: Untethered Multi-user VR for Commodity Mobile Devices": 1238, + "First Step Towards Automatic Correction of Firewall Policy Faults": 323, + "Fishy Faces: Crafting Adversarial Images to Poison Face Authentication": 4096, + "Fitting Square Pegs Through Round Pipes Unordered Delivery Wire-Compatible with TCP and TLS": 2509, + "Five Centuries of Monarchy in Korea: Mining the Text of the Annals of the Joseon Dynasty": 2301, + "Five incidents, one theme: Twitter spam as a weapon to drown voices of protest": 1684, + "Flare: Optimizing Apache Spark with Native Compilation for Scale-Up Architectures and Medium-Size Data Flare: Optimizing Apache Spark with Native Compilation for Scale-Up Architectures and Medium-Size Data": 3039, + "FlashVM: Virtual Memory Management on Flash": 636, + "Flashshare: Punching Through Server Storage Stack from Kernel to Firmware for Ultra-Low Latency SSDs FLASHSHARE: Punching Through Server Storage Stack from Kernel to Firmware for Ultra-Low Latency SSDs": 3072, + "FlexECC: Partially Relaxing ECC of MLC SSD for Better Cache Performance FlexECC: Partially Relaxing ECC of MLC SSD for Better Cache Performance": 867, + "FlexFS: A Flexible Flash File System for MLC NAND Flash Memory": 2376, + "FlexGroup Volumes: A Distributed WAFL File System FlexGroup Volumes: A Distributed WAFL File System": 1161, + "FlexNIC: Rethinking Network DMA": 2052, + "FlexSC: Flexible System Call Scheduling with Exception-Less System Calls": 661, + "FlexServe: Deployment of PyTorch Models as Flexible REST Endpoints FlexServe: Deployment of PyTorch Models as Flexible REST Endpoints": 2905, + "FlexiCache: A Flexible Interface for Customizing Linux File System Buffer Cache Replacement Policies": 2371, + "Flexible Architectural Support for Fine-Grain Scheduling": 4599, + "Flip Feng Shui: Hammering a Needle in the Software Stack Flip Feng Shui: Hammering a Needle in the Software Stack": 3324, + "Floorplan Evaluation with Timing-Driven Global Wireplanning, Pin Assignment, and Buffer/Wire Sizing \u00a3": 1421, + "Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack": 3215, + "Focus Replay Debugging Effort on the Control Plane": 231, + "Focus: Querying Large Video Datasets with Low Latency and Low Cost Focus: Querying Large Video Datasets with Low Latency and Low Cost": 3041, + "Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions": 3775, + "For Extreme Parallelism, Your OS Is Sooooo Last-Millennium *": 2072, + "Forecasting Word Model: Twitter-based Influenza Surveillance and Prediction": 4158, + "Forensic Triage for Mobile Phones with DEC0DE": 700, + "Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution": 3505, + "Forest-Based Neural Machine Translation": 4329, + "Forest-to-String SMT for Asian Language Translation: NAIST at WAT 2014": 2867, + "Formal Verification and its Impact on the Snooping versus Directory Protocol Debate": 4496, + "Formalising the Swedish Constructicon in Grammatical Framework": 2465, + "Formalizing ODP Computational Viewpoint Specifications in Maude": 4842, + "Forwardflow: A Scalable Core for Power-Constrained CMPs": 4908, + "Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records *": 618, + "Found in Translation: Reconstructing Phylogenetic Language Trees from Translations": 4255, + "Four Week Summer Program in Cyber Security for High School Students: Practice and Experience Report": 1364, + "Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies FP-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies": 3509, + "Fractured Processes: Adaptive, Fine-Grained Process Abstractions": 3942, + "Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments": 400, + "Frame Rules from Answer Types for Code Pointers": 366, + "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets": 3702, + "Frankenstein: Stitching Malware from Benign Binaries": 4002, + "Free Lunch: Exploiting Renewable Energy For Computing": 228, + "Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers": 3496, + "Frenetic: A Network Programming Language": 3899, + "Fresnel: A Browser-Independent Presentation Vocabulary for RDF": 1554, + "Friendships, Rivalries, and Trysts: Characterizing Relations between Ideas in Texts": 4262, + "From Chaos to QoS: Case Studies in CMP Resource Management": 4613, + "From Feast to Famine: Managing mobile network resources across environments and preferences": 3941, + "From Helios to Zeus": 2351, + "From IP ID to Device ID and KASLR Bypass From IP ID to Device ID and KASLR Bypass *": 3547, + "From Intent to Action: Nudging Users Towards Secure Mobile Payments From Intent to Action: Nudging Users Towards Secure Mobile Payments": 3874, + "From JVM to FPGA: Bridging Abstraction Hierarchy via Optimized Deep Pipelining": 1900, + "From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers": 1142, + "From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud": 2062, + "From OO to FPGA: Fitting Round Objects into Square Hardware?": 4670, + "From One to Many: Planning for Loosely Coupled Multi-Agent Systems": 4776, + "From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild": 3518, + "From Russia With Crypto: A Political History of Telegram 1": 1707, + "From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware": 3115, + "From Usability to Secure Computing and Back Again This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. \u2022 Santa Clara, CA, USA From Usability to Secure Computing and Back Again": 3845, + "From an IP Address to a Street Address: Using Wireless Signals to Locate a Target": 4019, + "From scientific workflow patterns to 5-star linked open data": 3923, + "From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television": 3192, + "From the Outside Looking In: Probing Web APIs to Build Detailed Workload Profiles": 1667, + "Frowning Frodo, Wincing Leia, and a Seriously Great Friendship: Learning to Classify Emotional Relationships of Fictional Characters": 4193, + "FuZZan: Efficient Sanitizer Metadata Design for Fuzzing FuZZan: Efficient Sanitizer Metadata Design for Fuzzing": 1227, + "Full-System Power Analysis and Modeling for Server Environments": 4618, + "Future Scaling of Processor-Memory Interfaces": 4600, + "FuzzGen: Automatic Fuzzer Generation FuzzGen: Automatic Fuzzer Generation": 3646, + "FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning": 3751, + "FuzziFication: Anti-Fuzzing Techniques FUZZIFICATION: Anti-Fuzzing Techniques": 3544, + "Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis": 4050, + "Fuzzy Joins Using MapReduce": 185, + "G 2 : A Graph Processing System for Diagnosing Distributed Systems": 418, + "GAIA: An OS Page Cache for Heterogeneous Systems GAIA: An OS Page Cache for Heterogeneous Systems": 1136, + "GASPP: A GPU-Accelerated Stateful Packet Processing Framework GASPP: A GPU-Accelerated Stateful Packet Processing Framework": 886, + "GIMscan: A New Statistical Method for Analyzing Whole-Genome Array CGH Data": 4940, + "GPU Taint Tracking GPU Taint Tracking": 1012, + "GPUnet: Networking Abstractions for GPU Programs GPUnet: Networking Abstractions for GPU Programs": 2951, + "GPUvm: Why Not Virtualizing GPUs at the Hypervisor? GPUvm: Why Not Virtualizing GPUs at the Hypervisor?": 884, + "GRIN: Utilizing the Empty Half of Full Bisection Networks": 1793, + "GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies": 3240, + "GUESSING PREFERENCES: A NEW APPROACH TO MULTI-ATTRIBUTE RANKING AND SELECTION": 443, + "GULFSTREAM: Staged Static Analysis for Streaming JavaScript Applications": 408, + "Galaxy: A Network Emulation Framework for Cybersecurity": 1403, + "Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers": 3374, + "Games for Extracting Randomness": 4933, + "Gandiva: Introspective Cluster Scheduling for Deep Learning Gandiva: Introspective Cluster Scheduling for Deep Learning": 3069, + "Garaph: Efficient GPU-accelerated Graph Processing on a Single Machine with Balanced Replication Garaph: Efficient GPU-accelerated Graph Processing on a Single Machine with Balanced Replication": 1026, + "Gatekeeper: Supporting Bandwidth Guarantees for Multi-tenant Datacenter Networks": 626, + "Gdev: First-Class GPU Resource Management in the Operating System": 837, + "GePSeA: A General-Purpose Software Acceleration Framework for Lightweight Task Offloading *": 1987, + "Gecko: A Contention-Oblivious Design for Cloud Storage": 2116, + "GenderQuant: Quantifying Mention-Level Genderedness": 4212, + "Generalized Maximum Margin Clustering and Unsupervised Kernel Learning": 4653, + "Generating Fine-Grained Open Vocabulary Entity Type Descriptions": 4302, + "Generating Impact-Based Summaries for Scientific Literature": 4467, + "Generating Mathematical Word Problems": 4703, + "Generating Realistic Datasets for Deduplication Analysis": 811, + "Generating Realistic Impressions for File-System Benchmarking": 762, + "Generating Realistic Impressions for File-System Benchmarking_763": 763, + "Generating Semantic Annotations for Frequent Patterns with Context Analysis": 4471, + "Generating Succinct Titles for Web URLs": 4868, + "Generation of Conformance Test Suites for Compositions of Web Services Using Model Checking": 299, + "Generic Soft Pattern Models for Definitional Question Answering": 4787, + "Genotype Error Detection using Hidden Markov Models of Haplotype Diversity": 1388, + "Geriatrix: Aging what you see and what you don't see. A file system aging approach for modern storage systems Geriatrix: Aging what you see and what you don't see A file system aging approach for modern storage systems": 1083, + "German in Flux: Detecting Metaphoric Change via Word Entropy": 4181, + "Get To The Point: Summarization with Pointer-Generator Networks": 4263, + "Getting Back Up: Understanding How Enterprise Data Backups Fail Getting Back Up: Understanding How Enterprise Data Backups Fail": 952, + "Getting It Together: Enabling Multi-organization Provenance Exchange": 230, + "Getting to Elastic: Adapting a Legacy Vertical Application Environment for Scalability": 646, + "Getting to the Root of Concurrent Binary Search Tree Performance Getting to the Root of Concurrent Binary Search Tree Performance": 1057, + "GhostPost: Seamless Restoration of Censored Social Media Posts": 1694, + "Ginseng: Market-Driven LLC Allocation Ginseng : Market-Driven LLC Allocation": 960, + "Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition": 806, + "Giza: Erasure Coding Objects across Global Data Centers Giza: Erasure Coding Objects across Global Data Centers": 1001, + "Glacier: Highly durable, decentralized storage despite massive correlated failures *": 160, + "Glamdring: Automatic Application Partitioning for Intel SGX Glamdring: Automatic Application Partitioning for Intel SGX": 1024, + "Glasnost: Enabling End Users to Detect Traffic Differentiation Massimiliano Marcon Ratul Mahajan": 1438, + "Gleaner: Mitigating the Blocked-Waiter Wakeup Problem for Virtualized Multicore Applications Gleaner: Mitigating the Blocked-Waiter Wakeup Problem for Virtualized Multicore Applications": 861, + "Good Word Attacks on Statistical Spam Filters": 4920, + "Graph Methods for Multilingual FrameNets": 2626, + "Graph-Theoretic Analysis of Structured Peer-to-Peer Systems: Routing Distances and Fault Resilience": 4276, + "Graph-based Semi-Supervised Learning Algorithms for NLP": 4241, + "GraphQ: Graph Query Processing with Abstraction Refinement-Scalable and Programmable Analytics over Very Large Graphs on a Single PC GraphQ: Graph Query Processing with Abstraction Refinement Scalable and Programmable Analytics over Very Large Graphs on a Single PC": 936, + "GraphWalker: An I/O-Efficient and Resource-Friendly Graph Analytic System for Fast and Scalable Random Walks GraphWalker: An I/O-Efficient and Resource-Friendly Graph Analytic System for Fast and Scalable Random Walks": 1261, + "Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX": 1044, + "Graphene: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters G: Packing and Dependency-aware Scheduling for Data-Parallel Clusters": 2990, + "Graphs Are Not Enough: Using Interactive Visual Analytics in Storage Research": 2231, + "Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations": 4959, + "Grasping Curved Objects through Rolling": 1054, + "Graviton: Trusted Execution Environments on GPUs Graviton: Trusted Execution Environments on GPUs": 3066, + "Graviton: Twisting Space and Time to Speed Up CoFlows": 1862, + "Green Enterprise Computing Data: Assumptions and Realities": 2976, + "Green Lights Forever: Analyzing the Security of Traffic Infrastructure": 4027, + "GreenMap: MapReduce with Ultra High Efficiency Power Delivery": 1848, + "Greening the Video Transcoding Service with Low-Cost Hardware Transcoders Greening The Video Transcoding Service With Low-Cost Hardware Transcoders 1": 971, + "GridGraph: Large-Scale Graph Processing on a Single Machine Using 2-Level Hierarchical Partitioning GridGraph: Large-Scale Graph Processing on a Single Machine Using 2-Level Hierarchical Partitioning": 939, + "Grimoire: Synthesizing Structure while Fuzzing GRIMOIRE: Synthesizing Structure while Fuzzing": 3535, + "Grokking Software Architecture": 4527, + "Growing a protocol": 1890, + "GuardRails: A Data-Centric Web Application Security Framework": 300, + "Guarded Modules: Adaptively Extending the VMM's Privilege Into the Guest Guarded Modules: Adaptively Extending the VMM's Privileges Into the Guest": 2314, + "Guarder: A Tunable Secure Allocator GUARDER: A Tunable Secure Allocator": 3494, + "Guiding Extractive Summarization with Question-Answering Rewards": 4208, + "Gyrophone: Recognizing Speech from Gyroscope Signals Gyrophone: Recognizing Speech From Gyroscope Signals": 3190, + "HAI 1.0: HIL-based Augmented ICS Security Dataset": 1428, + "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation": 3611, + "HARDFS: Hardening HDFS with Selective and Lightweight Versioning": 1479, + "HASE: A Hybrid Approach to Selectivity Estimation for Conjunctive Predicates": 84, + "HDDse: Enabling High-Dimensional Disk State Embedding for Generic Failure Detection System of Heterogeneous Disks in Large Data Centers HDDse: Enabling High-Dimensional Disk State Embedding for Generic Failure Detection System of Heterogeneous Disks in Large Data Centers": 1272, + "HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation": 3360, + "HSS: A simple file storage system for web applications": 2407, + "HSTS Supports Targeted Surveillance": 1708, + "HTTPT: A Probe-Resistant Proxy": 1725, + "HYDRAstor: a Scalable Secondary Storage": 1445, + "HadoopProv: Towards Provenance As A First Class Citizen In MapReduce": 3914, + "Hails: Protecting Data Privacy in Untrusted Web Applications": 2930, + "Half Baked: The opportunity to secure cookie-based identifiers from passive surveillance": 1690, + "Hardware Execution Throttling for Multi-core Resource Management *": 4151, + "Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection": 4903, + "Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices": 957, + "Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures": 4077, + "Harmonium: Elastic Cloud Storage via File Motifs": 2136, + "Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication": 1225, + "Hash, Don't Cache: Fast Packet Forwarding for Enterprise Edge Routers": 4771, + "HashCache: Cache Storage for the Next Billion": 1282, + "HashKV: Enabling Efficient Updates in KV Storage via Hashing HashKV: Enabling Efficient Updates in KV Storage via Hashing": 1064, + "Hashing Round-down Prefixes for Rapid Packet Classification": 3084, + "Havelaar: A Robust and Efficient Reputation System for Active Peer-to-Peer Systems": 3466, + "Having your Cake and Eating it too: Routing Security with Privacy Protections": 843, + "Hawk: Hybrid Datacenter Scheduling Hawk: Hybrid Datacenter Scheduling": 896, + "Head-to-TOE Evaluation of High-Performance Sockets over Protocol Offload Engines *": 2143, + "Header Space Analysis: Static Checking For Networks": 2512, + "Header for SPIE use Understanding multimedia application characteristics for designing programmable media processors": 4566, + "Heading Off Correlated Failures through Independence-as-a-Service Heading Off Correlated Failures through Independence-as-a-Service": 2973, + "HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security HEAPHOPPER: Bringing Bounded Model Checking to Heap Implementation Security": 3452, + "Hearst Patterns Revisited: Automatic Hypernym Detection from Large Text Corpora": 4391, + "Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks": 559, + "HeatProbe: A Thermal-based Power Meter for Accounting Disaggregated Electricity Usage": 1110, + "HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows": 1073, + "Hedera: Dynamic Flow Scheduling for Data Center Networks": 766, + "Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks": 4031, + "Hera-JVM: Abstracting Processor Heterogeneity Behind a Virtual Machine": 2464, + "Herbert West -Deanonymizer": 572, + "HetPipe: Enabling Large DNN Training on (Whimpy) Heterogeneous GPU Clusters through Integration of Pipelined Model Parallelism and Data Parallelism HetPipe: Enabling Large DNN Training on (Whimpy) Heterogeneous GPU Clusters through Integration of Pipelined Model Parallelism and Data Parallelism": 1245, + "Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud": 507, + "Heuristics for Profile-driven Method-level Speculative Parallelization": 4890, + "HiKV: A Hybrid Index Key-Value Store for DRAM-NVM Memory Systems HiKV: A Hybrid Index Key-Value Store for DRAM-NVM Memory Systems": 1048, + "HiTune: Dataflow-Based Performance Analysis for Big Data Cloud": 348, + "HiTune: Dataflow-Based Performance Analysis for Big Data Cloud_349": 349, + "Hidden Voice Commands Hidden Voice Commands": 3291, + "HideMyApp: Hiding the Presence of Sensitive Apps on Android HideMyApp : Hiding the Presence of Sensitive Apps on Android": 3560, + "Hierarchical Indexing and Flexible Element Retrieval for Structured Document": 4478, + "Hierarchical Models of Provenance": 3895, + "Hierarchical Spatial Gossip for Multi-Resolution Representations in Sensor Networks": 3032, + "Hierarchically Structured Meta-learning": 2279, + "High Performance Tor Experimentation from the Magic of Dynamic ELFs": 1404, + "High Performance User Level Sockets over Gigabit Ethernet": 4969, + "High Performance Vehicular Connectivity with Opportunistic Erasure Coding": 835, + "High-Performance Complex Event Processing over Streams": 4243, + "High-Resolution Side Channels for Untrusted Operating Systems High-Resolution Side Channels for Untrusted Operating Systems": 1011, + "Highly Auditable Distributed Systems": 1839, + "Highly Scalable Algorithms for Rectilinear and Octilinear Steiner Trees \u00a3": 180, + "Highly Scalable Algorithms for Robust String Barcoding \ud97b\udf59": 4943, + "Highly Scalable Genotype Phasing by Entropy Minimization": 4939, + "Historical Analysis of Exploit Availability Timelines": 1423, + "History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters": 3025, + "History-Independent Cuckoo Hashing": 178, + "Hitag 2 Hell -Brutally Optimizing Guess-and-Determine Attacks": 4107, + "Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries": 1151, + "Home, SafeHome: Ensuring a Safe and Reliable Home Using the Edge": 1984, + "Honey Sheets: What Happens To Leaked Google Spreadsheets?": 1384, + "HoneySpam: Honeypots fighting spam at the source": 774, + "Honeybot, Your Man in the Middle for Automated Social Engineering": 502, + "Horizontal Privilege Escalation in Trusted Applications Horizontal Privilege Escalation in Trusted Applications": 3714, + "Hot topic session: How to solve the current memory access and data transfer bottlenecks: at the processor architecture or at the compiler level?": 4632, + "HotRestore: A Fast Restore System for Virtual Machine Cluster HotRestore: A Fast Restore System for Virtual Machine Cluster": 2430, + "HotSnap: A Hot Distributed Snapshot System For Virtual Machine Cluster HotSnap: A Hot Distributed Snapshot System for Virtual Machine Cluster": 2424, + "How Computers Work: Computational Thinking for Everyone": 1144, + "How DNS Misnaming Distorts Internet Topology Mapping": 4756, + "How Do Tor Users Interact With Onion Services? How Do Tor Users Interact With Onion Services?": 3514, + "How Double-Fetch Situations turn into Double- Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel": 3412, + "How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP": 2494, + "How Not to Bid the Cloud": 1869, + "How Risky Are Real Users' IFTTT Applets? How Risky Are Real Users' IFTTT Applets?": 3855, + "How Sharp is SHARP ?": 4112, + "How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices": 3773, + "How Speedy is SPDY? How speedy is SPDY?": 2592, + "How To Build an Undervoting Machine: Lessons from an Alternative Ballot Design": 2348, + "How do practitioners, PhD students and postdocs in the social sciences assess topic-specific recommendations?": 4156, + "How do you pronounce your name? Improving G2P with transliterations": 4233, + "How the ELF Ruined Christmas How the ELF Ruined Christmas": 3230, + "How the Great Firewall of China is Blocking Tor": 1678, + "How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security": 3405, + "How to Break Microsoft Rights Management Services": 4066, + "How to Break XML Encryption -Automatically *": 4047, + "How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors": 4064, + "How to Teach an Old File System Dog New Object Store Tricks": 2207, + "Hulk: Eliciting Malicious Behavior in Browser Extensions Hulk: Eliciting Malicious Behavior in Browser Extensions": 3174, + "Human Distinguishable Visual Key Fingerprints Human Distinguishable Visual Key Fingerprints": 3590, + "Human-Assisted Graph Search: It's Okay to Ask Questions": 3331, + "Humans Learn Using Manifolds, Reluctantly": 2532, + "Humans Perform Semi-Supervised Classification Too *": 4979, + "Hunting for problems with Artemis": 1339, + "HyFS: A Highly Available Distributed File System": 2448, + "HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments HYBCACHE: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments": 3618, + "Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries ARTIFACT EVALUATED PASSED Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries": 3717, + "Hybrid Cloud Support for Large Scale Analytics and Web Processing": 3983, + "Hybrid Parallel Programming with MPI and Unified Parallel C *": 4963, + "Hybrid Transitive-Trust Mechanisms": 4546, + "Hybrid images": 4824, + "Hydra: Automatically Configuring Algorithms for Portfolio-Based Selection": 4958, + "HydraFS: a High-Throughput File System for the HYDRAstor Content-Addressable Storage System": 3950, + "HydraOne: An Indoor Experimental Research and Education Platform for CAVs": 2003, + "HydraVM: Extracting Parallelism from Legacy Sequential Code Using STM": 2067, + "HyperFlow: A Distributed Control Plane for OpenFlow": 681, + "HyperOptics: A High Throughput and Low Latency Multicast Architecture for Datacenters": 1874, + "Hyperbolic Caching: Flexible Caching for Web Applications Hyperbolic Caching: Flexible Caching for Web Applications": 996, + "Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring": 4056, + "I rate you. You rate me. Should we do so publicly?": 676, + "I/O Deduplication: Utilizing Content Similarity to Improve I/O Performance": 2370, + "I/O Stack Optimization for Smartphones": 851, + "I/O-Efficient Map Overlay and Point Location in Low-Density Subdivisions *": 1765, + "IASO: A Fail-Slow Detection and Mitigation Framework for Distributed Storage Services IASO: A Fail-Slow Detection and Mitigation Framework for Distributed Storage Services": 1183, + "ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource": 1422, + "IDO: Intelligent Data Outsourcing with Improved RAID Reconstruction Performance in Large-Scale Data Centers": 2423, + "INVISIFENCE: Performance-Transparent Memory Ordering in Conventional Multiprocessors": 4512, + "IOPriority: To The Device and Beyond": 2193, + "IPAPI: Designing an Improved Provenance API": 3911, + "IPv6 Security: Attacks and Countermeasures in a Nutshell": 4036, + "ISP-Friendly Peer Matching without ISP Collaboration": 89, + "IVR Junction: Building Scalable and Distributed Voice Forums in the Developing World": 2871, + "Icebergs in the Clouds: the Other Risks of Cloud Computing": 1802, + "Identifier Binding Attacks and Defenses in Software-Defined Networks Identifier Binding Attacks and Defenses in Software-Defined Networks *": 3367, + "Identifying Disinformation Websites Using Infrastructure Features": 1728, + "Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach Amit Saha Tropos Networks, CA": 90, + "Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach Amit Saha Tropos Networks, CA_4387": 4387, + "Identifying Information Disclosure in Web Applications with Retroactive Auditing Identifying information disclosure in web applications with retroactive auditing": 2945, + "Identifying Transferable Information Across Domains for Cross-domain Sentiment Classification": 4307, + "Identifying Trends in Enterprise Data Protection Systems Identifying Trends in Enterprise Data Protection Systems": 893, + "Identifying Websites with Flow Simulation": 4593, + "Identifying and Characterizing Sybils in the Tor Network Identifying and characterizing Sybils in the Tor network": 3339, + "Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities": 3576, + "Illuminating the Security Issues Surrounding Lights-Out Server Management": 4011, + "Immediate Multi-Threaded Dynamic Software Updates Using Stack Reconstruction": 2457, + "Immunizing Encryption Schemes from Decryption Errors": 1199, + "Impact of FEC Overhead on Scalable Video Streaming": 54, + "Impact of High Performance Sockets on Data Intensive Applications": 208, + "Impact of Linguistic Analysis on the Semantic Graph Coverage and Learning of Document Extracts": 195, + "Impact of Network Sharing in Multi-core Architectures *": 2076, + "Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks": 4929, + "Implementing IPv6 for Windows NT Implementing IPv6 for Windows NT": 1441, + "Implementing MPI on Windows: Comparison with Common Approaches on Unix": 1965, + "Implementing Risk-Limiting Post-Election Audits in California": 1753, + "Implementing a Language with Flow-Sensitive and Structural Typing on the JVM": 2754, + "Implementing a Leading Loads Performance Predictor on Commodity Processors Implementing a Leading Loads Performance Predictor on Commodity Processors": 882, + "Implementing and Evaluating Nested Parallel Transactions in Software Transactional Memory": 4845, + "Implementing and Evaluating a Model Checker for Transactional Memory Systems": 4846, + "Implications of Link Range and (In)Stability on Sensor Network Architecture": 2388, + "Implicit and Explicit Optimizations for Stencil Computations": 3276, + "Impression Store: Compressive Sensing-based Storage for Big Data Analytics": 1831, + "Improved File Synchronization Techniques for Maintaining Large Replicated Collections over Slow Networks": 4936, + "Improved Inapproximability Results for Counting Independent Sets in the Hard-Core Model": 4749, + "Improved Support for Machine-Assisted Ballot-Level Audits": 2349, + "Improved Tag Set Design and Multiplexing Algorithms for Universal Arrays \ud97b\udf59": 1399, + "Improving Efficiency and Enhancing Concurrency of Untrusted Storage": 1314, + "Improving File System Performance of Mobile Storage Systems Using a Decoupled Defragmenter Improving File System Performance of Mobile Storage Systems Using a Decoupled Defragmenter": 1009, + "Improving Flash Storage Performance by Caching Address Mapping Table in Host Memory": 2329, + "Improving Helios with Everlasting Privacy Towards the Public": 1454, + "Improving I/O Resource Sharing of Linux Cgroup for NVMe SSDs on Multi-core Systems": 2155, + "Improving Index Performance through Prefetching": 4739, + "Improving Instruction Delivery with a Block-Aware ISA": 4628, + "Improving Integer Security for Systems with KINT": 2935, + "Improving Knowledge Graph Embedding Using Simple Constraints": 4282, + "Improving Meek With Adversarial Techniques": 1715, + "Improving Memory System Performance for Soft Vector Processors": 965, + "Improving Online Gaming Quality using Detour Paths": 4482, + "Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems": 150, + "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features": 3568, + "Improving Scalability and Fault Tolerance in an Application Management Infrastructure": 3935, + "Improving Service Availability of Cloud Systems by Predicting Disk Error Improving Service Availability of Cloud Systems by Predicting Disk Error": 1123, + "Improving Spam Detection Based on Structural Similarity": 1738, + "Improving Test Case Generation for Web Applications Using Automated Interface Discovery": 4561, + "Improving Web Search Ranking by Incorporating User Behavior Information General Terms": 4455, + "Improving Wireless Privacy with an Identifier-Free Link Layer Protocol": 4775, + "Improving a Neural Semantic Parser by Counterfactual Learning from Human Bandit Feedback": 4345, + "Improving availability in distributed systems with failure informers": 2558, + "Improving historical spelling normalization with bi-directional LSTMs and multi-task learning": 4159, + "Improving the R*-tree with Outlier Handling Techniques *": 4877, + "Improving the Security, Transparency and Efficiency of California's 1% Manual Tally Procedures": 1755, + "Improving throughput for small disk requests with proximal I/O": 639, + "Imputation-based local ancestry inference in admixed populations": 1432, + "In Search of I/O-Optimal Recovery from Disk Failures": 481, + "In VINI Veritas: Realistic and Controlled Network Experimentation": 4769, + "In support of workload-aware streaming state management": 2259, + "In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services": 3257, + "In the workshop on Communication Architecture for Clusters (CAC)": 2255, + "In-Degree Dynamics of Large-Scale P2P Systems": 4745, + "In-Flight Mechanics A Software Package Management Conversion Project": 439, + "In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection": 14, + "In-situ MapReduce for Log Processing": 523, + "In-situ MapReduce for Log Processing_524": 524, + "Inapproximability of Combinatorial Public Projects": 4983, + "Inaudible Sound as a Covert Channel in Mobile Devices": 4025, + "Incentive-Compatible Opportunistic Routing for Wireless Networks": 754, + "Incentives for Sharing in Peer-to-Peer Networks": 1111, + "Inception: System-Wide Security Testing of Real-World Embedded Systems Software Inception: System-Wide Security Testing of Real-World Embedded Systems Software": 3449, + "Incorporating Domain Knowledge into Topic Modeling via Dirichlet Forest Priors": 2543, + "Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings": 4328, + "Incorporating Satellite Documents into Co-citation Networks for Scientific Paper Searches": 849, + "Incorporating Site-Level Knowledge for Incremental Crawling of Web Forums: A List-wise Strategy *": 87, + "Incorporating a User Model to Improve Detection of Unhelpful Robot Answers": 499, + "Increase-Decrease Congestion Control for Real-time Streaming: Scalability": 4747, + "Incremental Consistency Guarantees for Replicated Objects Incremental Consistency Guarantees for Replicated Objects": 2992, + "Incremental Syntactic Language Models for Phrase-based Translation": 4234, + "Incremental workflow improvement through analysis of its data provenance": 553, + "Indexing Multi-Dimensional Time-Series with Support for Multiple Distance Measures": 4865, + "Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures": 3867, + "Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing": 3376, + "Inferring Mechanics of Web Censorship Around the World": 1674, + "Inferring Origin Flow Patterns in Wi-Fi with Deep Learning Inferring Origin Flow Patterns in Wi-Fi with Deep Learning": 2313, + "Inferring Social Ties across Heterogeneous Networks": 154, + "Inferring the Network Latency Requirements of Cloud Tenants": 2056, + "Inflight Modifications of Content: Who are the Culprits?": 744, + "Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices *": 4136, + "InfoSec Cinema: Using Films for Information Security Teaching": 798, + "Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure": 1774, + "Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing *": 342, + "Inherently Safe Backup Routing with BGP": 65, + "Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors": 3503, + "Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras": 3853, + "InsECTJ: A Generic Instrumentation Framework for Collecting Dynamic Information within Eclipse": 4823, + "Insider: Designing In-Storage Computing System for Emerging High-Performance Drive INSIDER: Designing In-Storage Computing System for Emerging High-Performance Drive": 1187, + "Insight: In-situ Online Service Failure Path Inference in Production Computing Infrastructures Insight: In-situ Online Service Failure Path Inference in Production Computing Infrastructures": 878, + "Insights from the Inside: A View of Botnet Management from Infiltration": 329, + "Instant OS Updates via Userspace Checkpoint-and-Restart Instant OS Updates via Userspace Checkpoint-and-Restart": 967, + "Integrating Adaptation Mechanisms Using Control Theory Centric Architecture Models: A Case Study Integrating Adaptation Mechanisms Using Control Theory Centric Architecture Models: A Case Study": 2317, + "Integrating Case Frame into Japanese to Chinese Hierarchical Phrase-based Translation Model": 2343, + "Integrating Genetic Algorithms with Conditional Random Fields to Enhance Question Informer Prediction": 4555, + "Integrating Meta-Path Selection with User-Guided Object Clustering in Heterogeneous Information Networks *": 4642, + "Integrating Query Performance Prediction in Term Scoring for Diachronic Thesaurus": 2284, + "Integrating Semantic Knowledge to Tackle Zero-shot Text Classification": 4196, + "Integration of SYSTRAN MT systems in an open workow Mats Attn\u00e4s": 4837, + "IntelliLight: A Reinforcement Learning Approach for Intelligent Traffic Light Control": 2365, + "Intelligent Transport Systems for Indian Cities": 2870, + "Interaction among agents that plan": 4525, + "Interactive Debugging for Big Data Analytics": 1860, + "Interactive Planning-based Cognitive Assistance on the Edge": 2013, + "Interactive Second Language Learning from News Websites": 2197, + "Interdomain Routing as Social Choice": 610, + "Interface Abstraction for Compositional Verification": 4506, + "Interfacing Java to the Virtual Interface Architecture": 161, + "Internet Censorship in Iran: A First Look": 1680, + "Internet Filtering Trends in Western Liberal Democracies": 1309, + "Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016": 3312, + "Internet Measurements and Public Policy: Mind the Gap": 1354, + "Interpolating Functions from Large Boolean Relations": 4635, + "Interpretable Deep Learning under Fire Interpretable Deep Learning under Fire": 3745, + "Interpretable and Compositional Relation Learning by Joint Training with an Autoencoder": 4375, + "Interstate Voter Registration Database Matching: The Oregon-Washington 2008 Pilot Project *": 769, + "Introducing a Lexicon of Verbal Polarity Shifters for English": 4183, + "Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection": 3815, + "Introduction and Overview Building a Wireless Network for a High Density of Users 248 26th Large Installation System Administration Conference (LISA '12) USENIX Association": 2412, + "Introduction to SIGHAN 2015 Bake-off for Chinese Spelling Check": 2567, + "Intrusion Recovery Using Selective Re-execution": 484, + "Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed": 590, + "Investigating the Computer Security Practices and Needs of Journalists Investigating the Computer Security Practices and Needs of Journalists": 3251, + "IoTPOT: Analysing the Rise of IoT Compromises": 4049, + "Ironclad Apps: End-to-End Security via Automated Full-System Verification Ironclad Apps: End-to-End Security via Automated Full-System Verification": 2950, + "Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized Through Software Debloating": 1408, + "Is Linux Kernel Oops Useful or Not?": 1961, + "Is Transactional Programming Actually Easier?": 132, + "Is Your Web Server Suffering from Undue Stress due to Duplicate Requests? Is Your Web Server Suffering from Undue Stress due to Duplicate Requests?": 2306, + "Islands of Near-Perfect Self-Prediction": 1643, + "Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor Networks": 4718, + "IsoStack -Highly Efficient Network Processing on Dedicated Cores": 644, + "Isolated virtualised clusters: testbeds for high-risk security experimentation and training *": 307, + "It's About the Data: Provenance as a Tool for Assessing Data Fitness": 3902, + "It's Not Where Your Data Is, It's How It Got There": 2151, + "It's Time for Low Latency": 627, + "It's Time to Revisit LRU vs. FIFO": 2253, + "Italian for Beginners: The Next Steps for SLO-Based Management *": 258, + "Iterative Search for Weakly Supervised Semantic Parsing": 4211, + "JACKPOT: Online Experimentation of Cloud Microservices": 1951, + "JACKSTRAWS: Picking Command and Control Connections from Bot Traffic": 454, + "JPure: A Modular Purity System for Java": 2743, + "JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications": 616, + "JSZap: Compressing JavaScript Code": 303, + "Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story": 791, + "Java, Peer-to-Peer, and Accountability: Building Blocks for Distributed Cycle Sharing": 4343, + "JavaScript for Extending Low-latency In-memory Key-value Stores": 1896, + "Jellyfish: Networking Data Centers Randomly": 2513, + "JetMax: Scalable Max-Min Congestion Control for High-Speed Heterogeneous Networks": 4109, + "Jigsaw: Efficient, Low-effort Mashup Isolation": 3986, + "Jigsaw: Protecting Resource Access by Inferring Programmer Expectations JIGSAW : Protecting Resource Access by Inferring Programmer Expectations": 3207, + "Joint Energy Management and Resource Allocation in Rechargeable Sensor Networks": 3010, + "Joint Reasoning for Temporal and Causal Relations": 4384, + "Jointly Predicting Predicates and Arguments in Neural Semantic Role Labeling": 4392, + "JouleSort: A Balanced Energy-Efficiency Benchmark": 4607, + "Judicious Selection of Training Data in Assisting Language for Multilingual Neural NER": 4397, + "Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets": 2536, + "JumpSwitches: Restoring the Performance of Indirect Branches In the Era of Spectre JumpSwitches: Restoring the Performance of Indirect Branches In the Era of Spectre": 1130, + "Jumpgate: In-Network Processing as a Service for Data Analytics": 1928, + "Jungle: Towards Dynamically Adjustable Key-Value Store by Combining LSM-Tree and Copy-On-Write B + -Tree": 2229, + "Just-In-Time Analytics on Large File Systems": 445, + "JustRunIt: Experiment-Based Management of Virtualized Data Centers": 4153, + "K-Scope: Online Performance Tracking for Dynamic Cloud Applications": 2303, + "KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes": 1098, + "Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis": 3052, + "Katib: A Distributed General AutoML Platform on Kubernetes Katib: A Distributed General AutoML Platform on Kubernetes": 2894, + "Kawa -Compiling Dynamic Languages to the Java VM": 1305, + "Keepers of the Machines: Examining How System Administrators Manage Software Updates This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Keepers of the Machines: Examining How System Administrators Manage Software Updates": 3840, + "Keepin' It Real: Semi-Supervised Learning with Realistic Tuning": 2554, + "Keeping Track of 70,000+ Servers: The Akamai Query System": 338, + "Kepler: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities": 3574, + "Kernel Regression with Order Preferences *": 2588, + "Kernel-Supported Cost-Effective Audit Logging for Causality Tracking Kernel-Supported Cost-Effective Audit Logging for Causality Tracking": 1099, + "Key Challenges in Defending Against Malicious Socialbots": 2379, + "Kinetic Modeling of Data Eviction in Cache Kinetic Modeling of Data Eviction in Cache": 962, + "King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing": 800, + "KnowOps: Towards an Embedded Knowledge Base for Network Management and Operations": 324, + "Knowledge Discovery over the Deep Web, Semantic Web and XML": 4590, + "KnowledgeNet: Disaggregated and Distributed Training and Serving of Deep Neural Networks KnowledgeNet: Disaggregated and Distributed Training and Serving of Deep Neural Networks": 2881, + "Koi: A Location-Privacy Platform for Smartphone Apps": 2492, + "Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services": 3018, + "KyotoEBMT System Description for the 2nd Workshop on Asian Translation": 1593, + "LAMA: Optimized Locality-aware Memory Allocation for Key-value Cache LAMA: Optimized Locality-aware Memory Allocation for Key-value Cache": 906, + "LAYERED APPROACH TO INTRINSIC EVOLVABLE HARDWARE USING DIRECT BITSTREAM MANIPULATION OF VIRTEX II PRO DEVICES": 166, + "LIBERATED: A fully in-browser client and server web application debug and test environment": 3985, + "LINA: Identifying Comparable Documents from Wikipedia": 2446, + "LOOM: Optimal Aggregation Overlays for In-Memory Big Data Processing *": 1819, + "LOUP: The Principles and Practice of Intra-Domain Route Dissemination": 2528, + "LP-based Approximation Algorithms for Capacitated Facility Location *": 4896, + "LPD: Low Power Display Mechanism for Mobile and Wearable Devices LPD: Low Power Display Mechanism for Mobile and Wearable Devices": 903, + "LSM-trie: An LSM-tree-based Ultra-Large Key-Value Store for Small Data LSM-trie: An LSM-tree-based Ultra-Large Key-Value Store for Small Data": 938, + "LSTMs Can Learn Syntax-Sensitive Dependencies Well, But Modeling Structure Makes Them Better": 4342, + "LXDs: Towards Isolation of Kernel Subsystems LXDs: Towards Isolation of Kernel Subsystems": 1181, + "Labtainers: A Docker-based Framework for Cybersecurity Labs": 794, + "Lamassu: Storage-Efficient Host-Side Encryption Lamassu: Storage-Efficient Host-Side Encryption": 930, + "Laminar: Practical Fine-Grained Decentralized Information Flow Control": 4860, + "Lancaster A at SemEval-2017 Task 5: Evaluation metrics matter: predicting sentiment from financial news headlines": 3479, + "Landmarks Revisited": 101, + "Landmarks, Critical Paths and Abstractions: What's the Difference Anyway?": 76, + "Language Generation via DAG Transduction": 4353, + "Language Identification from Text Using N-gram Based Cumulative Frequency Addition": 20, + "Language Learning and Processing in People and Machines": 4230, + "Language Models for Genomics Information Retrieval: UIUC at TREC 2007 Genomics Track": 24, + "Language identification of names with SVMs": 4185, + "Laplacian Spectrum Learning": 3554, + "Large Pages May Be Harmful on NUMA Systems Large Pages May Be Harmful on NUMA Systems": 863, + "Large-Scale Evaluation of a Vulnerability Analysis Framework": 1367, + "Large-Scale Graph Processing on Emerging Storage Devices This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Large-Scale Graph Processing on Emerging Storage Devices": 1611, + "Large-Scale Multi-Domain Belief Tracking with Knowledge Sharing": 4401, + "Large-Scale QA-SRL Parsing": 4366, + "Large-scale Incremental Data Processing with Change Propagation": 276, + "Latency-Tolerant Software Distributed Shared Memory Latency-Tolerant Software Distributed Shared Memory": 925, + "Latent Structure Models for Natural Language Processing": 3663, + "Lattice-based Cryptography": 3732, + "Lax: Driver Interfaces for Approximate Sensor Device Access": 2060, + "Layering in Provenance Systems": 2482, + "Layout-aware Exhaustive Search": 3092, + "Lazy Analytics: Let Other Queries Do the Work For You": 2161, + "Lazy Approximation for Solving Continuous Finite-Horizon MDPs": 4821, + "Leader or Majority: Why have one when you can have both? Improving Read Scalability in Raft-like consensus protocols": 1877, + "Learning Arithmetic Circuits": 577, + "Learning Cross-lingual Distributed Logical Representations for Semantic Parsing": 4417, + "Learning Discourse-level Diversity for Neural Dialog Models using Conditional Variational Autoencoders": 4259, + "Learning Discriminative Projections for Text Similarity Measures": 3091, + "Learning Fine-Grained Knowledge about Contingent Relations between Everyday Events": 4042, + "Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom": 780, + "Learning How to Actively Learn: A Deep Imitation Learning Approach": 4349, + "Learning Markov Logic Network Structure via Hypergraph Lifting": 377, + "Learning Markov Network Structure with Decision Trees": 566, + "Learning Matching Models with Weak Supervision for Response Selection in Retrieval-based Chatbots": 4400, + "Learning Relaxed Belady for Content Distribution Network Caching This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Learning Relaxed Belady for Content Distribution Network Caching": 2856, + "Learning Simplifications for Specific Target Audiences": 4424, + "Learning Sub-structures of Document Semantic Graphs for Document Summarization": 196, + "Learning Term-weighting Functions for Similarity Measures": 4166, + "Learning Topic-Sensitive Word Representations": 4273, + "Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures": 3754, + "Learning attention for historical text normalization by learning to pronounce": 4251, + "Learning bilingual word embeddings with (almost) no bilingual data": 4253, + "Learning from Bullying Traces in Social Media": 2632, + "Learning from Early Attempts to Measure Information Security Performance": 1347, + "Learning from Multiple Cities: A Meta-Learning Approach for Spatial-Temporal Prediction": 2468, + "Learning spectral graph segmentation": 15, + "Learning the Empirical Hardness of Optimization Problems: The case of combinatorial auctions": 27, + "Learning the Structure of Markov Logic Networks": 410, + "Learning to Ask Good Questions: Ranking Clarification Questions using Neural Expected Value of Perfect Information": 4386, + "Learning to Ask Questions in Open-domain Conversational Systems with Typed Decoders": 4380, + "Learning to Control the Specificity in Neural Response Generation": 4318, + "Learning to Extract Relations from the Web using Minimal Supervision": 2843, + "Learning to Rank with Partially-Labeled Data": 4981, + "Learning to Translate with Source and Target Syntax": 2677, + "Learning with Probabilistic Features for Improved Pipeline Models": 4, + "Learning-Based Anomaly Detection in BGP Updates *": 4431, + "Least-Squares \u03bb Policy Iteration: Bias-Variance Trade-off in Control Problems": 4723, + "LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation": 3062, + "Less is More: Quantifying the Security Benefits of Debloating Web Applications Less is More: Quantifying the Security Benefits of Debloating Web Applications": 3531, + "Less is More: Trading a little Bandwidth for Ultra-Low Latency in the Data Center": 2501, + "Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds": 1411, + "Lessons Learned from the Chameleon Testbed Lessons Learned from the Chameleon Testbed": 1230, + "Lessons Learned in Game Development for Crowdsourced Software Formal Verification": 215, + "Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations": 3857, + "Lessons and Actions: What We Learned from 10K SSD-Related Storage System Failures Lessons and Actions: What We Learned from 10K SSD-Related Storage System Failures": 1200, + "Let's do it \"again\": A First Computational Approach to Detecting Adverbial Presupposition Triggers": 4388, + "Leveraging Cognitive Factors in Securing WWW with CAPTCHA": 628, + "Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery": 4090, + "Leveraging Honest Users: Stealth Command-and-Control of Botnets": 4015, + "Leveraging MPI's One-Sided Communication Interface for Shared-Memory Programming": 1943, + "Leveraging New Plans in AgentSpeak(PL)": 4817, + "Leveraging Progressive Programmability of SLC Flash Pages to Realize Zero-overhead Delta Compression for Metadata Storage": 2153, + "Leveraging Transliterations from Multiple Languages": 3088, + "Leveraging Trusted Computing and Model Checking to Build Dependable Virtual Machines": 1968, + "Leveraging Value Locality in Optimizing NAND Flash-based SSDs": 420, + "Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications": 1815, + "Leveraging distributed representations and lexico-syntactic fixedness for token-level prediction of the idiomaticity of English verb-noun combinations": 4389, + "LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes": 3188, + "Libnvmmio: Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface Libnvmmio: Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface": 1214, + "Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks": 2594, + "Light-Weight Contexts: An OS Abstraction for Safety and Performance Light-weight Contexts: An OS Abstraction for Safety and Performance": 3002, + "Light-weight Contour Tracking in Wireless Sensor Networks": 16, + "LightFlood: an Efficient Flooding Scheme for File Search in Unstructured Peer-to-Peer Systems": 3154, + "Lightweight Application-Level Crash Consistency on Transactional Flash Storage Lightweight Application-Level Crash Consistency on Transactional Flash Storage": 923, + "Lightweight Encryption for Email": 753, + "Lightweight Encryption for Email_1277": 1277, + "Lightweight Preemptible Functions Lightweight Preemptible Functions": 1211, + "Linear Programming Boosting for Uneven Datasets": 888, + "Linear-Time Constituency Parsing with RNNs and Dynamic Programming": 4408, + "Linearizable Quorum Reads in Paxos": 2232, + "Link Lifetimes and Randomized Neighbor Selection in DHTs": 46, + "Link-State Routing With Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering": 57, + "LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors": 3236, + "Liquidity in Credit Networks: A Little Trust Goes a Long Way": 351, + "Live Peer-to-Peer Streaming with Scalable Video Coding and Networking Coding": 4791, + "LiveMicro: An Edge Computing System for Collaborative Telepathology": 2002, + "Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks Liveness\ud97b\udf59is\ud97b\udf59Not\ud97b\udf59Enough:\ud97b\udf59Enhancing\ud97b\udf59Fingerprint\ud97b\udf59Authentication with\ud97b\udf59Behavioral\ud97b\udf59Biometrics\ud97b\udf59to\ud97b\udf59Defeat\ud97b\udf59Puppet\ud97b\udf59Attacks": 3731, + "Load Balanced Short Path Routing in Wireless Networks": 4713, + "Load Balancing in Processor Sharing Systems": 1122, + "Load Balancing of Heterogeneous Workloads in Memcached Clusters": 1671, + "Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph Processing Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph Processing": 984, + "LoadIQ: Learning to Identify Workload Phases from a Live Storage Trace": 2108, + "Local Context in Non-linear Deformation Models for Handwritten Character Recognition": 3209, + "Local Model Poisoning Attacks to Byzantine-Robust Federated Learning Local Model Poisoning Attacks to Byzantine-Robust Federated Learning": 3626, + "Local System Security via SSHD Instrumentation": 308, + "Local-Effect Games": 63, + "Locality-Aware Software Throttling for Sparse Matrix Operation on GPUs Locality-Aware Software Throttling for Sparse Matrix Operation on GPUs": 1066, + "Localization in Sparse Networks using Sweeps": 3298, + "Localization on Curved Objects Using Tactile Information": 1043, + "Locally Differentially Private Protocols for Frequency Estimation Locally Differentially Private Protocols for Frequency Estimation": 3414, + "Location Privacy Preservation in Collaborative Spectrum Sensing": 4558, + "Lock It and Still Lose It-On the (In)Security of Automotive Remote Keyless Entry Systems": 3301, + "Lock-Free Consistency Control for Web 2.0 Applications *": 100, + "Lock-free Concurrent Level Hashing for Persistent Memory Lock-free Concurrent Level Hashing for Persistent Memory": 1213, + "Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path": 1023, + "Log 2 : A Cost-Aware Logging Mechanism for Performance Diagnosis Log 2 : A Cost-Aware Logging Mechanism for Performance Diagnosis": 898, + "Log Analysis and Event Correlation Using Variable Temporal Event Correlator (VTEC)": 494, + "Log-Free Concurrent Data Structures Log-Free Concurrent Data Structures *": 1068, + "Log-Structured Non-Volatile Main Memory Log-Structured Non-Volatile Main Memory": 1013, + "LogSig: Generating System Events from Raw Textual Logs": 4627, + "LogTM-SE: Decoupling Hardware Transactional Memory from Caches": 66, + "LogTM: Log-based Transactional Memory": 77, + "Long-Distance 802.11b Links: Performance Measurements and Experience *": 2377, + "Look Who's Talking: Discovering Dependencies between Virtual Machines Using CPU Utilization": 245, + "Looking inside the (Drop) box": 4014, + "Loophole: Timing Attacks on Shared Event Loops in Chrome Loophole: Timing Attacks on Shared Event Loops in Chrome": 3411, + "Loopy Belief Propagation for Bipartite Maximum Weight b-Matching": 3566, + "Low Cost Working Set Size Tracking *": 747, + "Low-Profile Source-side Deduplication for Virtual Machine Backup": 1856, + "Low-latency Job Scheduling with Preemption for the Development of Deep Learning Low-latency Job Scheduling with Preemption for the Development of Deep Learning": 2891, + "Lower-Bound Constrained Runs in Weighted Timed Automata": 97, + "Lowering the Barriers to Capture The Flag Administration and Participation": 792, + "Lowering the Barriers to Industrial Control System Security with GRFICS": 802, + "Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation": 4037, + "Lube: Mitigating Bottlenecks in Wide Area Data Analytics": 1894, + "Lucky scheduling for energy-efficient heterogeneous multi-core systems": 2093, + "Lumos: Dependency-Driven Disk-based Graph Processing LUMOS: Dependency-Driven Disk-based Graph Processing": 1196, + "Lyrebird -Assigning Meanings to Machines": 337, + "M \u00b3 x: Autonomous Accelerators via Context- Enabled Fast-Path Communication M 3 X: Autonomous Accelerators via Context-Enabled Fast-Path Communication": 1131, + "M: Gaining Command on Geo-Distributed Graph Analytics": 1903, + "MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery": 328, + "MATHEMATICS OF OPERATIONS RESEARCH Approximation Algorithms for Combinatorial Auctions with Complement-Free Bidders": 0, + "MATRIX: Maintenance-Oriented Testing Requirements Identifier and Examiner": 4810, + "MArk: Exploiting Cloud Services for Cost-Effective, SLO-Aware Machine Learning Inference Serving MArk: Exploiting Cloud Services for Cost-Effective, SLO-Aware Machine Learning Inference Serving": 1203, + "MDHIM: A Parallel Key/Value Framework for HPC": 2142, + "MDev-NVMe: A NVMe Storage Virtualization Solution with Mediated Pass-Through MDev-NVMe: A NVMe Storage Virtualization Solution with Mediated Pass-Through": 1105, + "MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate Computing MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate Computing": 941, + "MIMIQ: Masking IPs with Migration in QUIC": 1726, + "MINESTRONE: Testing the SOUP": 1356, + "MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs": 3655, + "MLB: A Memory-aware Load Balancing for Mitigating Memory Contention": 3946, + "MLOp Lifecycle Scheme for Vision-based Inspection Process in Manufacturing MLOp Lifecycle Scheme for Vision-based Inspection Process in Manufacturing": 2889, + "MOAR: A Multi-channel Opportunistic Auto-rate Media Access Protocol for Ad Hoc Networks": 4165, + "MODI: Mobile Deep Inference Made Efficient by Edge Computing": 1979, + "MOMMIE Knows Best: Systematic Optimizations for Verifiable Distributed Algorithms": 539, + "MONKEYSORT": 127, + "MORSE: Semantic-ally Drive-n MORpheme SEgment-er": 4256, + "MOpt: Optimized Mutation Scheduling for Fuzzers MOPT: Optimized Mutation Scheduling for Fuzzers": 3553, + "MPI: Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning MPI: Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning": 3381, + "MPP: Model Performance Predictor MPP: Model Performance Predictor": 2883, + "MTS: Bringing Multi-Tenancy to Virtual Networking MTS: Bringing Multi-Tenancy to Virtual Networking": 1195, + "MULTI-LEVEL CACHE HIERARCHY EVALUATION FOR PROGRAMMABLE MEDIA PROCESSORS": 4832, + "MULTI-LEVEL MEMORY PREFETCHING FOR MEDIA AND STREAM PROCESSING": 4563, + "MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures": 3733, + "Machine-Aware Atomic Broadcast Trees for Multicores Machine-aware Atomic Broadcast Trees for Multicores": 2995, + "Macho: Programming With Man Pages": 341, + "Maelstrom: Mitigating Datacenter-level Disasters by Draining Interdependent Traffic Safely and Efficiently Maelstrom: Mitigating Datacenter-level Disasters by Draining Interdependent Traffic Safely and Efficiently": 3064, + "Maglev: A Fast and Reliable Software Network Load Balancer Maglev: A Fast and Reliable Software Network Load Balancer": 2647, + "Mahimahi: Accurate Record-and-Replay for HTTP Mahimahi: Accurate Record-and-Replay for HTTP": 926, + "Making Argument Systems for Outsourced Computation Practical (Sometimes)": 163, + "Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults": 1329, + "Making Cloud Easy: Design Considerations and First Components of a Distributed Operating System for Cloud": 1905, + "Making Geo-Replicated Systems Fast as Possible, Consistent when Necessary": 2920, + "Making Nested Parallel Transactions Practical using Lightweight Hardware Support General Terms": 4597, + "Making Programs Forget: Enforcing Lifetime For Sensitive Data": 473, + "Making Routers Last Longer with ViAggre": 1284, + "Making State Explicit for Imperative Big Data Processing Making State Explicit for Imperative Big Data Processing": 859, + "Making USB Great Again with usbfilter Making USB Great Again with USBFILTER": 3334, + "Making a Case for Proactive Flow Control in Optical Circuit-Switched Networks": 2032, + "Making the Common Case the Only Case with Anticipatory Memory Allocation": 671, + "Making the Pyramid Technique Robust to Query Types and Workloads": 191, + "Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser": 1390, + "Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think": 3506, + "Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART": 3418, + "Malware Analysis Through High-level Behavior": 1395, + "Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers": 3211, + "Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer": 3438, + "Managing Array of SSDs When the Storage Device is No Longer the Performance Bottleneck": 2189, + "Managing Energy and Server Resources in Hosting Centers": 776, + "Managing Green Datacenters Powered by Hybrid Renewable Energy Systems Managing Green Datacenters Powered by Hybrid Renewable Energy Systems": 2319, + "Managing Large Graphs on Multi-Cores With Graph Awareness": 822, + "Managing Smartphone Testbeds with SmartLab Managing Smartphone Testbeds with SmartLab": 2427, + "Managing State for Ajax-Driven Web Components": 584, + "Managing User Requests with the Grand Unified Task System (GUTS)": 2416, + "Managing Wire Delay in Large Chip-Multiprocessor Caches": 122, + "Mandatory Access Control for the Android Dalvik Virtual Machine": 1452, + "MapReduce Online": 1331, + "Mapping Cross-Cloud Systems: Challenges and Opportunities": 1859, + "Maranello: Practical Partial Packet Recovery for 802.11": 1756, + "Marketing for participation: How can Electronic Dissertation Services win authors?": 4523, + "Marrying Up Regular Expressions with Neural Networks: A Case Study for Spoken Language Understanding": 4369, + "Massively Multilingual Transfer for NER": 3929, + "Massively Parallel Genomic Sequence Search on the Blue Gene/P Architecture": 205, + "Masters Internship Report Extraction of information in large graphs; Automatic search for synonyms": 4836, + "Mathematical Modeling of Competition in Sponsored Search Market": 520, + "Matrix Factorization with Knowledge Graph Propagation for Unsupervised Spoken Language Understanding": 4246, + "Matrix-Vector Multiplication in Sub-Quadratic Time (Some Preprocessing Required)": 4716, + "Matrix: Achieving Predictable Virtual Machine Performance in the Clouds Matrix: Achieving Predictable Virtual Machine Performance in the Clouds": 2309, + "MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with Matrix Container in NVM MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with a Matrix Container in NVM": 1268, + "Matryoshka: Hiding Secret Communication in Plain Sight": 1698, + "Maximizing Efficiency By Trading Storage for Computation \u2020": 752, + "Maximizing the Contact Opportunity for Vehicular Internet Access": 2987, + "Maximum Benefit from a Minimal HTM": 4883, + "May All Your Wishes Come True: A Study of Wishes and How to Recognize Them": 4587, + "McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers": 3593, + "MeCC: Memory Comparison-based Clone Detector *": 1166, + "Mean Field Inference in Dependency Networks: An Empirical Study": 4919, + "Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems": 4420, + "Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks": 4320, + "Measuring Decentralization of Chinese Keyword Censorship via Mobile Games": 1700, + "Measuring I2P Censorship at a Global Scale": 1714, + "Measuring Immediate Adaptation Performance for Neural Machine Translation": 4205, + "Measuring Online Service Availability Using Twitter": 558, + "Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services": 3311, + "Measuring Pay-per-Install: The Commoditization of Malware Distribution": 304, + "Measuring Privacy Threats in China-Wide Mobile Networks": 1712, + "Measuring Real-World Accuracies and Biases in Modeling Password Guessability Measuring Real-World Accuracies and Biases in Modeling Password Guessability": 3270, + "Measuring Service in Multi-Class Networks": 4425, + "Measuring Word Relatedness Using Heterogeneous Vector Space Models": 4186, + "Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade": 511, + "Measuring and Fingerprinting Click-Spam in Ad Networks": 643, + "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines": 3750, + "Measuring the Effectiveness of Embedded Phishing Exercises": 1394, + "Measuring the Insecurity of Mobile Deep Links of Android Measuring the Insecurity of Mobile Deep Links of Android": 3379, + "Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem": 3267, + "Mechanism Design Over Discrete Domains": 4898, + "Mechanisms and Architectures for Tail-Tolerant System Operations in Cloud": 1825, + "Media Access Control Address Spoofing Attacks against Port Security": 297, + "MediaMeter: A Global Monitor for Online News Coverage": 2086, + "Medusa: Managing Concurrency and Communication in Embedded Systems Medusa: Managing Concurrency and Communication in Embedded Systems": 857, + "Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis": 3675, + "Meerkat: Detecting Website Defacements through Image-based Object Recognition Meerkat: Detecting Website Defacements through Image-based Object Recognition": 3225, + "MegaPipe: A New Programming Interface for Scalable Network I/O": 2933, + "Meltdown: Reading Kernel Memory from User Space Meltdown: Reading Kernel Memory from User Space": 3478, + "MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing": 2538, + "MemProf: a Memory Profiler for NUMA Multicore Systems": 826, + "Membrane: Operating System Support for Restartable File Systems": 3886, + "Meme-tracking and the Dynamics of the News Cycle": 1788, + "Memory Buddies: Exploiting Page Sharing for Smart Colocation in Virtualized Data Centers": 4975, + "Memory Performance at Reduced CPU Clock Speeds: An Analysis of Current x86 64 Processors": 2096, + "Memory System Behavior of Java-Based Middleware": 88, + "Memory Throttling on BG/Q: A Case Study with Explicit Hydrodynamics": 2102, + "Memory-Centric Data Storage for Mobile Systems Memory-Centric Data Storage for Mobile Systems": 929, + "Memshare: a Dynamic Multi-tenant Key-value Cache Memshare: a Dynamic Multi-tenant Key-value Cache": 1002, + "Mentoring talent in IT security -A case study": 779, + "Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories": 1019, + "Mercury: Hybrid Centralized and Distributed Scheduling in Large Shared Clusters Mercury: Hybrid Centralized and Distributed Scheduling in Large Shared Clusters": 912, + "Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center": 437, + "MetaSync: File Synchronization Across Multiple Untrusted Storage Services MetaSync: File Synchronization Across Multiple Untrusted Storage Services": 904, + "MetaTM/TxLinux: Transactional Memory For An Operating System": 4927, + "Metadata Considered Harmful ... to Deduplication": 2146, + "Methodically Modeling the Tor Network": 1343, + "Metrics for runtime detection of allocators in binaries": 1389, + "Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks": 3295, + "MicroMon: A Monitoring Framework for Tackling Distributed Heterogeneity": 2261, + "Microgadgets: Size Does Matter In Turing-complete Return-oriented Programming": 4008, + "Micropayments Revisited": 4935, + "Midgress-aware traffic provisioning for content delivery Midgress-aware traffic provisioning for content delivery": 1253, + "Migration, Assignment, and Scheduling of Jobs in Virtualized Environment": 517, + "Mimesis Aegis: A Mimicry Privacy Shield- A System's Approach to Data Privacy on Public Cloud Mimesis Aegis: A Mimicry Privacy Shield A System's Approach to Data Privacy on Public Cloud": 3182, + "Mimicking Word Embeddings using Subword RNNs": 4172, + "Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network": 2682, + "MiniBox: A Two-Way Sandbox for x86 Native Code MiniBox: A Two-Way Sandbox for x86 Native Code": 874, + "Minimizing Communication in Sparse Matrix Solvers": 4732, + "Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks": 200, + "Minimizing Faulty Executions of Distributed Systems Minimizing Faulty Executions of Distributed Systems": 2679, + "Minimizing MPI Resource Contention in Multithreaded Multicore Environments": 203, + "Minimum Expected Distortion in Gaussian Layered Broadcast Coding with Successive Refinement": 1688, + "Minimum Expected Distortion in Gaussian Source Coding with Uncertain Side Information": 1677, + "Mining Multi-Faceted Overviews of Arbitrary Topics in a Text Collection": 4464, + "Mining Reference Tables for Automatic Text Segmentation": 4456, + "Minoan linguistic resources: The Linear A Digital Corpus": 2280, + "Minuet: Rethinking Concurrency Control in Storage Area Networks": 1450, + "Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks": 803, + "Mismatched Memory Management of Android Smartphones": 2238, + "Missive: Fast Application Launch From an Untrusted Buffer Cache Missive: Fast Application Launch From an Untrusted Buffer Cache": 864, + "Mitigating Asymmetric Read and Write Costs in Cuckoo Hashing for Storage Systems Mitigating Asymmetric Read and Write Costs in Cuckoo Hashing for Storage Systems": 1193, + "MixApart: Decoupled Analytics for Shared Storage Systems": 2103, + "Mnikr: Reputation Construction Through Human Trading of Distributed Social Identities": 164, + "Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World": 3262, + "Mobile App Acceleration via Fine-Grain Offloading to the Cloud": 1824, + "Mobile Apps: It's Time to Move Up to CondOS": 336, + "Mobile Computing: Challenges and Opportunities for Autonomy and Feedback": 1658, + "Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach": 1977, + "Mobile Private Contact Discovery at Scale Mobile Private Contact Discovery at Scale": 3545, + "Mobility Changes Everything in Low-Power Wireless Sensornets": 1447, + "Mochi: Visual Log-Analysis Based Tools for Debugging Hadoop": 3890, + "Model Checking a Networked System Without the Network": 409, + "Model-Switching: Dealing with Fluctuating Workloads in Machine-Learning-as-a-Service Systems": 1956, + "Model-based testing without a model: Assessing portability in the Seattle testbed": 311, + "Modeling Discourse Cohesion for Discourse Parsing via Memory Network": 4402, + "Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks": 4043, + "Modeling Intra-class Variation for Nonideal Iris Recognition": 4519, + "Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks": 62, + "Modeling Naive Psychology of Characters in Simple Commonsense Stories": 4385, + "Modeling Online Reviews with Multi-grain Topic Models": 8, + "Modeling Per-flow Throughput and Capturing Starvation in CSMA Multi-hop Wireless Networks": 4309, + "Modeling Query-Based Access to Text Databases": 73, + "Modeling Residual-Geometric Flow Sampling": 49, + "Modeling Semantic Cognition as Logical Dimensionality Reduction": 4559, + "Modeling The Edge: Peer-to-Peer Reincarnated": 2004, + "Modeling and Reasoning about DOM Events": 3980, + "Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators": 48, + "Modelling Protagonist Goals and Desires in First-Person Narrative": 1509, + "Modelling Valence and Arousal in Facebook posts": 950, + "Modelling and Analysis of a Hierarchy of Distance Bounding Attacks Modelling and Analysis of a Hierarchy of Distance Bounding Attacks": 3447, + "Modular Composition of Coordination Services Modular Composition of Coordination Services": 970, + "MonDe: Safe Updating through Monitored Deployment of New Component Versions": 4494, + "Monadic Datalog Containment": 4574, + "Monarch: A Tool to Emulate Transport Protocol Flows over the Internet at Large": 832, + "Mondrian Memory Protection": 4960, + "Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection": 4949, + "Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation": 2453, + "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer": 3657, + "MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation": 3487, + "More IOPS for Less: Exploiting Burstable Storage in Public Clouds": 1946, + "More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants": 3829, + "Morpheus: Towards Automated SLOs for Enterprise Clusters Morpheus: Towards Automated SLOs for Enterprise Clusters": 2994, + "Mosh: An Interactive Remote Shell for Mobile Clients": 838, + "Motivations and Goal-Directed Autonomy": 4531, + "Motivations and declarative goals as cornerstones of autonomy": 4530, + "Motivations as an abstraction of meta-level reasoning": 4526, + "Mouse Trap: Exploiting Firmware Updates in USB Peripherals": 4035, + "MovStream: An Efficient Algorithm for Monitoring Clusters Evolving in Data Streams \uf02a": 4638, + "Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine": 673, + "MrLazy: Lazy Runtime Label Propagation for MapReduce": 1814, + "MuON: Epidemic Based Mutual Anonymity": 4551, + "Mugshot: Deterministic Capture and Replay for JavaScript Applications": 2471, + "Multi-Hop Probing Asymptotics in Available Bandwidth Estimation: Stochastic Analysis": 4065, + "Multi-Hypervisor Virtual Machines: Enabling an Ecosystem of Hypervisor-level Services Multi-hypervisor Virtual Machines: Enabling an Ecosystem of Hypervisor-level Services": 1006, + "Multi-Label Informed Latent Semantic Indexing": 1854, + "Multi-Label Transfer Learning for Multi-Relational Semantic Similarity": 3279, + "Multi-Output Regularized Projection": 1865, + "Multi-Passage Machine Reading Comprehension with Cross-Passage Answer Verification": 4352, + "Multi-Project Reticle Design and Wafer Dicing under Uncertain Demand *": 1366, + "Multi-Queue Fair Queuing Multi-Queue Fair Queueing": 1150, + "Multi-Relational Latent Semantic Analysis": 4168, + "Multi-Task Feature and Kernel Selection for SVMs": 3577, + "Multi-Turn Response Selection for Chatbots with Deep Attention Matching Network": 4319, + "Multi-core and Network Aware MPI Topology Functions": 1899, + "Multi-structured redundancy": 2117, + "Multi-user Data Sharing in Radar Sensor Networks Keywords": 2443, + "MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption": 1706, + "Multicast Congestion Control with Distrusted Receivers": 3610, + "Multicore OS benchmarks: we can do better": 497, + "Multidisciplinary Experiential Learning for Holistic Cy- bersecurity Education, Research and Evaluation": 218, + "Multimodal Affective Analysis Using Hierarchical Attention Strategy with Word-Level Alignment": 4381, + "Multimodal Machine Translation with Embedding Prediction": 4226, + "Multipath Protocol for Delay-Sensitive Traffic": 3976, + "Multipath Transport for Virtual Private Networks": 1393, + "Multiple Aggregations Over Data Streams": 190, + "Multiple Aggregations Over Data Streams_565": 565, + "Multiple Preprocessing for Systematic SAT Solvers": 4557, + "Multiple-Source Multiple-Sink Maximum Flow in Directed Planar Graphs in Near-Linear Time": 3743, + "Multitenancy for Fast and Programmable Networks in the Cloud": 1953, + "N-best Reranking by Multitask Learning": 2621, + "NASH: Toward End-to-End Neural Architecture for Generative Semantic Hashing": 4364, + "NAVER Machine Translation System for WAT 2015": 1483, + "NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages": 4099, + "NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit": 4126, + "NICA: An Infrastructure for Inline Acceleration of Network Applications NICA: An Infrastructure for Inline Acceleration of Network Applications": 1141, + "NICT at WAT 2015": 1606, + "NVM Compression -Hybrid Flash-Aware Application Level Compression": 2330, + "NVMKV: A Scalable and Lightweight Flash Aware Key-Value Store": 2134, + "NVMKV: A Scalable, Lightweight, FTL-aware Key-Value Store NVMKV: A Scalable, Lightweight, FTL-aware Key-Value Store": 920, + "NVMOVE: Helping Programmers Move to Byte-Based Persistence": 2338, + "NVMeDirect: A User-space I/O Framework for Application-specific Optimization on NVMe SSDs": 2166, + "NaaS: Network-as-a-Service in the Cloud": 2033, + "NanoLog: A Nanosecond Scale Logging System NanoLog: A Nanosecond Scale Logging System": 1125, + "Natively Supporting True One-sided Communication in MPI on Multi-core Systems with InfiniBand *": 204, + "Natural Language Processing for Intelligent Access to Scientific Information": 4160, + "Navigating the Visual Fog: Analyzing and Managing Visual Data from Edge to Cloud": 1985, + "Nebulas: Using Distributed Voluntary Resources to Build Clouds": 1320, + "Need for a Deeper Cross-Layer Optimization for Dense NAND SSD to Improve Read Performance of Big Data Applications: A Case for Melded Pages": 2258, + "Negative evidences and co-occurrences in image retrieval: the benefit of PCA and whitening": 4702, + "Neighbor-Specific BGP: More Flexible Routing Policies While Improving Global Stability": 173, + "Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications": 4602, + "Nested QoS: Providing Flexible Performance in Shared IO Environment": 703, + "NetHide: Secure and Practical Network Topology Obfuscation NetHide: Secure and Practical Network Topology Obfuscation": 3483, + "NetKernel: Making Network Stack Part of the Virtualized Infrastructure NetKernel: Making Network Stack Part of the Virtualized Infrastructure": 1242, + "NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge": 760, + "NetReview: Detecting when interdomain routing goes wrong": 899, + "NetReview: Detecting when interdomain routing goes wrong_1750": 1750, + "NetWarden: Mitigating Network Covert Channels without Performance Loss": 1933, + "Network Architecture for Joint Failure Recovery and Traffic Engineering": 3932, + "Network Design for Information Networks": 4895, + "Network Interface Cards as First-Class Citizens *": 2332, + "Network-Wide Decision Making: Toward A Wafer-Thin Control Plane": 3910, + "Network-Wide Prediction of BGP Routes": 4331, + "NeuGraph: Parallel Deep Neural Network Computation on Large Graphs NeuGraph: Parallel Deep Neural Network Computation on Large Graphs": 1176, + "NeuOS: A Latency-Predictable Multi-Dimensional Optimization Framework for DNN-driven Autonomous Systems NeuOS: A Latency-Predictable Multi-Dimensional Optimization Framework for DNN-driven Autonomous Systems": 1207, + "Neural AMR: Sequence-to-Sequence Models for Parsing and Generation": 4250, + "Neural Argument Generation Augmented with Externally Retrieved Evidence": 4290, + "Neural Hidden Markov Model for Machine Translation": 4394, + "Neural Models for Documents with Metadata": 4363, + "Neural Question Answering at BioASQ 5B": 3030, + "Neural Reranking Improves Subjective Quality of Machine Translation: NAIST at WAT2015": 1673, + "Neural Trees: Using Neural Networks as an Alternative to Binary Comparison in Classical Search Trees": 2270, + "NeuralREG: An end-to-end approach to referring expression generation": 4357, + "Neuroimage Data Sets: Rethinking Privacy Policies": 1769, + "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks": 3116, + "Neutrality in Future Public Clouds: Implications and Challenges *": 1864, + "Neutrino: Revisiting Memory Caching for Iterative Data Analytics": 2177, + "Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport": 3173, + "New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network": 3790, + "New Ternary and Quaternary Sequences with Two-Level Autocorrelation": 976, + "News clustering approach based on discourse text structure": 2181, + "Next Branch Multicast (NBM) routing protocol": 4110, + "NightWatch: Integrating Lightweight and Transparent Cache Pollution Control into Dynamic Memory Allocation Systems NightWatch: Integrating Lightweight and Transparent Cache Pollution Control into Dynamic Memory Allocation Systems": 902, + "Ninja: Towards Transparent Tracing and Debugging on ARM Ninja: Towards Transparent Tracing and Debugging on ARM": 3390, + "Nitro: A Capacity-Optimized SSD Cache for Primary Storage Nitro: A Capacity-Optimized SSD Cache for Primary Storage": 873, + "No Metrics Are Perfect: Adversarial Reward Learning for Visual Storytelling": 4303, + "No Plan Survives Contact: Experience with Cybercrime Measurement": 471, + "No Reservations: A First Look at Amazon's Reserved Instance Marketplace": 1934, + "No Right to Remain Silent: Isolating Malicious Mixes No Right to Remain Silent: Isolating Malicious Mixes": 3551, + "NoSQ : Store-Load Communication without a Store Queue": 4495, + "NodeFinder: Scalable Search over Highly Dynamic Geo-distributed State": 1897, + "Non-Data-Communication Overheads in MPI: Analysis on Blue Gene/P": 2043, + "Non-Deterministic Timers for Hardware Trojan Activation (Or How a Little Randomness Can Go the Wrong Way)": 4067, + "Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle Non-intrusive Performance Profiling for Entire Software Stacks based on the Flow Reconstruction Principle": 3026, + "Non-Linear Compression: Gzip Me Not!": 2115, + "Non-deterministic parallelism considered useful": 569, + "Non-tree Routing for Reliability and Yield Improvement \u00a3": 1377, + "Non-volatile memory through customized key-value stores": 2169, + "Noncanonical LALR(1) Parsing *": 4545, + "Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS": 4059, + "Noncollective Communicator Creation in MPI \ud97b\udf59": 1887, + "Nonlinear Relational Markov Networks with an Application to the Game of Go": 3187, + "Nonuniformly Communicating Noncontiguous Data: A Case Study with PETSc and MPI * \u2020": 2132, + "Noria: dynamic, partially-stateful data-flow for high-performance web applications Noria: dynamic, partially-stateful data-flow for high-performance web applications": 3040, + "Norm-based behaviour modification in BDI agents": 4812, + "North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms": 1806, + "Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code": 1158, + "Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation": 3245, + "Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks": 1744, + "Novel Address Mappings for Shingled Write Disks": 2124, + "Now Do Voters Notice Review Screen Anomalies? A Look at Voting System Usability": 1315, + "Numeracy for Language Models: Evaluating and Improving their Ability to Predict Numbers": 4371, + "OASIS: Online Active SemI-Supervised Learning": 4976, + "OCTANE: Open Car Testbed And Network Experiments Bringing Cyber-Physical Security Research to Researchers and Students": 1357, + "ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval": 1210, + "OFRewind: Enabling Record and Replay Troubleshooting for Networks": 723, + "ON SEQUENTIALLY NORMALIZED MAXIMUM LIKELIHOOD MODELS": 1699, + "ONE CLASS TO RULE THEM ALL 0-DAY DESERIALIZATION VULNERABILITIES IN ANDROID": 4051, + "OPT: Oslo-Potsdam-Teesside Pipelining Rules, Rankers, and Classifier Ensembles for Shallow Discourse Parsing": 4179, + "OPTR: Order-Preserving Translation and Recovery Design for SSDs with a Standard Block Device Interface OPTR: Order-Preserving Translation and Recovery Design for SSDs with a Standard Block Device Interface": 1137, + "OPUS: A Lightweight system for Observational Provenance in User Space": 3912, + "ORDER: Object centRic DEterministic Replay for Java": 730, + "ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service": 3395, + "OSA: An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility": 2514, + "OSCA: An Online-Model Based Cache Allocation Scheme in Cloud Block Storage Systems OSCA: An Online-Model Based Cache Allocation Scheme in Cloud Block Storage Systems": 1273, + "OSv-Optimizing the Operating System for Virtual Machines OS v -Optimizing the Operating System for Virtual Machines": 870, + "Object Storage on CRAQ High-throughput chain replication for read-mostly workloads": 3930, + "OblivP2P: An Oblivious Peer-to-Peer Content Sharing System OBLIVP2P: An Oblivious Peer-to-Peer Content Sharing System": 3307, + "Observations on Emerging Threats": 2378, + "Observing Pose and Motion through Contact": 169, + "Obtaining Reliable Human Ratings of Valence, Arousal, and Dominance for 20,000 English Words": 4288, + "Obtaining SMT dictionaries for related languages": 2458, + "Octopus: an RDMA-enabled Distributed Persistent Memory File System Octopus: an RDMA-enabled Distributed Persistent Memory File System": 1025, + "Off-Path Attacking the Web": 4000, + "Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets": 3446, + "Off-Path TCP Exploits: Global Rate Limit Considered Dangerous Off-Path TCP Exploits: Global Rate Limit Considered Dangerous": 3290, + "Office Document Security and Privacy": 4127, + "Offload Annotations: Bringing Heterogeneous Computing to Existing Libraries and Workloads Offload Annotations: Bringing Heterogeneous Computing to Existing Libraries and Workloads": 1269, + "Oh Flow, Are Thou Happy? TCP sendbuffer advertising for make benefit of clouds and tenants": 1836, + "Okeanos: Wasteless Journaling for Fast and Reliable Multistream Storage": 430, + "On Abstraction and Informatics": 4944, + "On Approximating Minimum Infrequent and Maximum Frequent Sets": 4651, + "On Auditing Elections When Precincts Have Different Sizes": 807, + "On Computing Top-t Most Influential Spatial Sites": 4681, + "On Delay-Independent Diagonal Stability of Max-Min Congestion Control": 4743, + "On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence": 1425, + "On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World": 1401, + "On Dynamic Malware Payloads Aimed at Programmable Logic Controllers": 545, + "On Estimating Tight-Link Bandwidth Characteristics over Multi-Hop Paths": 4746, + "On Evaluation of Adversarial Perturbations for Sequence-to-Sequence Models": 4214, + "On Fault Tolerance, Locality, and Optimality in Locally Repairable Codes On Fault Tolerance, Locality, and Optimality in Locally Repairable Codes": 1091, + "On Information-Maximization Clustering: Tuning Parameter Selection and Analytic Solution": 19, + "On Lifetime-Based Node Failure and Stochastic Resilience of Decentralized Peer-to-Peer Networks": 61, + "On Monitoring the top-k Unsafe Places": 4676, + "On Node Isolation under Churn in Unstructured P2P Networks with Heavy-Tailed Lifetimes": 45, + "On Reshaping of Clustering Coefficients in Degree-Based Topology Generators": 4354, + "On Self Adaptive Routing in Dynamic Environments * -An Evaluation and Design Using a Simple, Probabilistic Scheme": 26, + "On Selfish Routing in Internet-Like Environments": 153, + "On Smart Query Routing: For Distributed Graph Querying with Decoupled Storage On Smart Query Routing: For Distributed Graph Querying with Decoupled Storage": 1086, + "On Sockets and System Calls Minimizing Context Switches for the Socket API": 3940, + "On Spatial-Range Closest-Pair Query": 4879, + "On Static and Dynamic Partitioning Behavior of Large-Scale Networks": 4032, + "On Subliminal Channels in Encrypt-on-Cast Voting Systems": 1672, + "On Superposition of Heterogeneous Edge Processes in Dynamic Random Graphs": 4076, + "On The [Ir]relevance of Network Performance for Data Processing": 1871, + "On XACML's Adequacy to Specify and to Enforce HIPAA": 1768, + "On Zone-Balancing of Peer-to-Peer Networks: Analysis of Random Node Join": 4287, + "On the Benefit of Virtualization: Strategies for Flexible Server Allocation": 246, + "On the Challenges of Translating NLP Research into Commercial Products": 4268, + "On the Characteristics and Origins of Internet Flow Rates": 4923, + "On the Complexity of Deriving Schema Mappings from Database Instances": 4841, + "On the Complexity of Managing Probabilistic XML Data": 4591, + "On the Constancy of Internet Path Properties": 688, + "On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned": 633, + "On the Effective Prevention of TLS Man-in-the- Middle Attacks in Web Applications On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications": 3175, + "On the Effects of Registrar-level Intervention": 518, + "On the Energy (In)efficiency of Hadoop Clusters": 4848, + "On the Feasibility of Data Loss Insurance for Personal Cloud Storage": 2133, + "On the Feasibility of Large-Scale Infections of iOS Devices On the Feasibility of Large-Scale Infections of iOS Devices": 3213, + "On the Hardness and Existence of Quasi-Strict Equilibria": 2777, + "On the Hardness of Being Truthful": 2333, + "On the Impact of Garbage Collection on flash-based SSD Endurance": 2341, + "On the Impact of Isolation Costs on Locality-aware Cloud Scheduling": 1938, + "On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention": 1713, + "On the Importance of Evaluating Storage Systems' $Costs": 2130, + "On the Importance of Source Classification in Wyner-Ziv Video Coding": 4809, + "On the Limitations of Provenance for Queries With Difference *": 235, + "On the Limitations of Unsupervised Bilingual Dictionary Induction": 4295, + "On the Non-Suitability of Non-Volatility": 2138, + "On the Notion of Pseudo-Free Groups": 1233, + "On the Potential of Proactive Domain Blacklisting": 384, + "On the Potential of Structure-free Data Aggregation in Sensor Networks": 3087, + "On the Practical Computational Power of Finite Precision RNNs for Language Recognition": 793, + "On the Practical Exploitability of Dual EC in TLS Implementations On the Practical Exploitability of Dual EC in TLS Implementations": 3159, + "On the Provision of Prioritization and Soft QoS in Dynamically Reconfigurable Shared Data-Centers over InfiniBand": 2165, + "On the Security of Election Audits with Low Entropy Randomness": 3097, + "On the Stability of a Market-Oriented Cloud Computing Model with Time-Varying Workloads": 1655, + "On the Structure of Industrial SAT Instances": 4760, + "On the Structure of Weakly Acyclic Games": 4428, + "On the Topologies Formed by Selfish Peers": 3477, + "On the Use and Performance of Content Distribution Networks": 699, + "On the Use of Abstract Workflows to Capture Scientific Process Provenance": 3081, + "On the Windfall of Friendship: Inoculation Strategies on Social Networks": 3543, + "On the design of security games: from frustrating to engaging learning": 785, + "On the diversity of cluster workloads and its impact on research results On the diversity of cluster workloads and its impact on research results": 1055, + "On the e-Negotiation of Unmatched Logrolling Views": 4554, + "On the effectiveness of mitigations against floating-point timing channels On the effectiveness of mitigations against floating-point timing channels": 3370, + "On the fragility and limitations of current Browser-provided Clickjacking protection schemes": 4001, + "On the non-optimality of the FB discipline within the service time distribution class IMRL": 170, + "On the use of guards for logics with data": 4535, + "On-demand, Spot, or Both: Dynamic Resource Allocation for Executing Batch Jobs in the Cloud On-demand, Spot, or Both: Dynamic Resource Allocation for Executing Batch Jobs in the Cloud": 2323, + "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users": 504, + "One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation": 3340, + "One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited": 4081, + "One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers": 4128, + "One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA": 3427, + "One-way indexing for plausible deniability in censorship resistant storage": 1679, + "OneOS: IoT Platform based on POSIX and Actors": 1994, + "Online Event-driven Subsequence Matching over Financial Data Streams": 583, + "Online Event-driven Subsequence Matching over Financial Data Streams_4878": 4878, + "Online Graph Planarisation for Synchronous Parsing of Semantic and Syntactic Dependencies": 2932, + "Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications": 665, + "Online Measurement of Large Traffic Aggregates on Commodity Switches": 465, + "Online Measurement of Large Traffic Aggregates on Commodity Switches_3887": 3887, + "Online Privacy and Aging of Digital Artifacts Online Privacy and Aging of Digital Artifacts": 3813, + "Online Resource Management for Data Center with Energy Capping": 1657, + "Online migration for geo-distributed storage systems": 682, + "Ontology Evolution Analysis with OWL-MeT": 277, + "Onyx: A Protoype Phase Change Memory Storage Array": 227, + "Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Wormhole: Reliable Pub-Sub to Support Geo-replicated Internet Services Wormhole: Reliable Pub-Sub to support Geo-replicated Internet Services": 2630, + "Open Cirrus TM Cloud Computing Testbed: Federated Data Centers for Open Source Systems and Services Research": 1316, + "Open Infrastructure for Edge: A Distributed Ledger Outlook": 2005, + "Open access to the Proceedings of USENIX ATC '14: 2014 USENIX Annual Technical Conference is sponsored by USENIX. Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information": 862, + "Open access to the Proceedings of USENIX ATC '14: 2014 USENIX Annual Technical Conference is sponsored by USENIX. Flash on Rails: Consistent Flash Performance through Redundancy Flash on Rails: Consistent Flash Performance through Redundancy": 881, + "Open access to the Proceedings of USENIX ATC '14: 2014 USENIX Annual Technical Conference is sponsored by USENIX. ShuffleWatcher: Shuffle-aware Scheduling in Multi-tenant MapReduce Clusters ShuffleWatcher: Shuffle-aware Scheduling in Multi-tenant MapReduce Clusters*": 856, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX 3D Tracking via Body Radio Reflections 3D Tracking via Body Radio Reflections": 2559, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Adtributor: Revenue Debugging in Advertising Systems Adtributor: Revenue Debugging in Advertising Systems": 2562, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area Aggregation and Degradation in JetStream: Streaming analytics in the wide area": 2589, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Building Web Applications on Top of Encrypted Data Using Mylar Building web applications on top of encrypted data using Mylar": 2587, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Circuit Switching Under the Radar with REACToR Circuit Switching Under the Radar with REACToR": 2582, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps": 2581, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Easy Freshness with Pequod Cache Joins Easy Freshness with Pequod Cache Joins": 2575, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX FaRM: Fast Remote Memory FaRM: Fast Remote Memory": 2569, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Full Duplex MIMO Radios Full Duplex MIMO Radios": 2563, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX GRASS: Trimming Stragglers in Approximation Analytics GRASS: Trimming Stragglers in Approximation Analytics": 2560, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX High Throughput Data Center Topology Design High Throughput Data Center Topology Design": 2591, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks": 2572, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX MICA: A Holistic Approach to Fast In-Memory Key-Value Storage MICA: A Holistic Approach to Fast In-Memory Key-Value Storage": 2580, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX NetCheck: Network Diagnoses from Blackbox Traces NetCheck: Network Diagnoses from Blackbox Traces": 2596, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms NetVM: High Performance and Flexible Networking using Virtualization on Commodity Platforms": 2573, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Network Virtualization in Multi-tenant Datacenters Network Virtualization in Multi-tenant Datacenters": 2576, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Operational Experiences with Disk Imaging in a Multi-Tenant Datacenter Operational Experiences with Disk Imaging in a Multi-Tenant Datacenter USENIX Symposium on Networked Systems Design and Implementation-Operational Systems Track": 2561, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX PHY Covert Channels: Can you see the Idles? PHY Covert Channels: Can you see the Idles?": 2578, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX Recursively Cautious Congestion Control Recursively Cautious Congestion Control": 2585, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX SENIC: Scalable NIC for End-Host Rate Limiting SENIC: Scalable NIC for End-Host Rate Limiting": 2590, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX cTPM: A Cloud TPM for Cross-Device Trusted Applications cTPM: A Cloud TPM for Cross-Device Trusted Applications": 2565, + "Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14) is sponsored by USENIX ipShield: A Framework For Enforcing Context-Aware Privacy ipShield: A Framework For Enforcing Context-Aware Privacy": 2564, + "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. GraphX: Graph Processing in a Distributed Dataflow Framework GraphX: Graph Processing in a Distributed Dataflow Framework": 2949, + "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency": 2941, + "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Jitk: A Trustworthy In-Kernel Interpreter Infrastructure Jitk: A Trustworthy In-Kernel Interpreter Infrastructure": 2968, + "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Phase Reconciliation for Contended In-Memory Transactions Phase Reconciliation for Contended In-Memory Transactions": 2960, + "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems Simple Testing Can Prevent Most Critical Failures An Analysis of Production Failures in Distributed Data-intensive Systems": 2971, + "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. f4: Facebook's Warm BLOB Storage System f4: Facebook's Warm BLOB Storage System": 2959, + "Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. lprof: A Non-intrusive Request Flow Profiler for Distributed Systems lprof : A Non-intrusive Request Flow Profiler for Distributed Systems": 2975, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Altruistic Scheduling in Multi-Resource Clusters Altruistic Scheduling in Multi-Resource Clusters": 2989, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Clarinet: WAN-Aware Optimization for Analytics Queries CLARINET: WAN-Aware Optimization for Analytics Queries": 3019, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Correlated Crash Vulnerabilities Correlated Crash Vulnerabilities": 2981, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications Diamond: Automating Data Management and Storage for Wide-area, Reactive Applications": 3023, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Don't Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems Understand and Eliminate JVM Warm-up Overhead in Data-parallel Systems": 3001, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Firmament: Fast, Centralized Cluster Scheduling at Scale Firmament: fast, centralized cluster scheduling at scale": 2988, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Gemini: A Computation-Centric Distributed Graph Processing System Gemini: A Computation-Centric Distributed Graph Processing System": 3027, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Intermittent Computation without Hardware Support or Programmer Intervention Intermittent Computation without Hardware Support or Programmer Intervention": 3017, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. JetStream: Cluster-Scale Parallelization of Information Flow Queries JetStream: Cluster-scale parallelization of information flow queries": 3011, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Just say NO to Paxos Overhead: Replacing Consensus with Network Ordering Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering": 3000, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. NetBricks: Taking the V out of NFV NetBricks: Taking the V out of NFV": 3007, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Network Requirements for Resource Disaggregation Network Requirements for Resource Disaggregation": 2986, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. RE X : A Development Platform and Online Learning Approach for Runtime Emergent Software Systems RE X : A Development Platform and Online Learning Approach for Runtime Emergent Software Systems": 3009, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Shuffler: Fast and Deployable Continuous Code Re-Randomization Shuffler: Fast and Deployable Continuous Code Re-Randomization": 3020, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Simplifying Datacenter Network Debugging with PathDump Simplifying Datacenter Network Debugging with PathDump": 3016, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Slicer: Auto-Sharding for Datacenter Applications Slicer: Auto-Sharding for Datacenter Applications": 2980, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. XFT: Practical Fault Tolerance beyond Crashes XFT: Practical Fault Tolerance Beyond Crashes": 3003, + "Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Yak: A High-Performance Big-Data-Friendly Garbage Collector Yak: A High-Performance Big-Data-Friendly Garbage Collector": 3006, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. BUZZ: Testing Context-Dependent Policies in Stateful Networks BUZZ: Testing Context-Dependent Policies in Stateful Networks": 2650, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Be Fast, Cheap and in Control with SwitchKV This paper is included in the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16). Be Fast, Cheap and in Control with SwitchKV": 2669, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Bitcoin-NG: A Scalable Blockchain Protocol This paper is included in the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16). Bitcoin-NG: A Scalable Blockchain Protocol *": 2649, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/khandelwal USENIX Association 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) 485 BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores": 2660, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. CFA: A Practical Prediction System for Video QoE Optimization CFA: A Practical Prediction System for Video QoE Optimization": 2657, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Cliffhanger: Scaling Performance Cliffs in Web Memory Caches Cliffhanger: Scaling Performance Cliffs in Web Memory Caches": 2644, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Consensus in a Box: Inexpensive Coordination in Hardware Consensus in a Box: Inexpensive Coordination in Hardware": 2656, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. DFC: Accelerating String Pattern Matching for Network Applications DFC: Accelerating String Pattern Matching for Network Applications": 2641, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space": 2645, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Diplomat: Using Delegations to Protect Community Repositories Diplomat: Using Delegations to Protect Community Repositories": 2661, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. FairRide: Near-Optimal, Fair Cache Sharing FairRide: Near-Optimal, Fair Cache Sharing": 2675, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. FlowRadar: A Better NetFlow for Data Centers FlowRadar: A Better NetFlow for Data Centers": 2667, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. HUG: Multi-Resource Fairness for Correlated and Elastic Demands HUG: Multi-Resource Fairness for Correlated and Elastic Demands": 2642, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Ripple II: Faster Communication through Physical Vibration USENIX Association 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) 671 Ripple II: Faster Communication through Physical Vibration": 2678, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. Social Hash: An Assignment Framework for Optimizing Distributed Systems Operations on Social Networks Social Hash: an Assignment Framework for Optimizing Distributed Systems Operations on Social Networks": 2680, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. VAST: A Unified Platform for Interactive Network Forensics VAST: A Unified Platform for Interactive Network Forensics": 2683, + "Open access to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX. iCellular: Device-Customized Cellular Network Access on Commodity Smartphones iCellular: Device-Customized Cellular Network Access on Commodity Smartphones": 2664, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. An Analysis of Network-Partitioning Failures in Cloud Systems An Analysis of Network-Partitioning Failures in Cloud Systems": 3029, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Arachne: Core-Aware Thread Management Arachne: Core-Aware Thread Management": 3059, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Differential Energy Profiling: Energy Optimization via Diffing Similar Apps Differential Energy Profiling: Energy Optimization via Diffing Similar Apps": 3046, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Floem: A Programming System for NIC-Accelerated Network Applications Floem: A Programming System for NIC-Accelerated Network Applications": 3058, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Neural Adaptive Content-aware Internet Video Delivery Neural Adaptive Content-aware Internet Video Delivery": 3071, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Obladi: Oblivious Serializable Transactions in the Cloud Obladi: Oblivious Serializable Transactions in the Cloud": 3036, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. REPT: Reverse Debugging of Failures in Deployed Software REPT: Reverse Debugging of Failures in Deployed Software": 3037, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Sledgehammer: Cluster-Fueled Debugging Sledgehammer: Cluster-fueled debugging": 3060, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. wPerf: Generic Off-CPU Analysis to Identify Bottleneck Waiting Events wPerf: Generic Off-CPU Analysis to Identify Bottleneck Waiting Events": 3073, + "Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. \u00b5Tune: Auto-Tuned Threading for OLDI Microservices \u00b5Tune: Auto-Tuned Threading for OLDI Microservices": 3063, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. 007: Democratically Finding the Cause of Packet Drops This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). 007: Democratically Finding The Cause of Packet Drops": 2739, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Andromeda: Performance, Isolation, and Velocity at Scale in Cloud Network Virtualization This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Andromeda: Performance, Isolation, and Velocity at Scale in Cloud Network Virtualization": 2746, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Approximating Fair Queueing on Reconfigurable Switches This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Approximating Fair Queueing on Reconfigurable Switches": 2767, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Deepview: Virtual Disk Failure Diagnosis and Pattern Detection for Azure This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Deepview: Virtual Disk Failure Diagnosis and Pattern Detection for Azure": 2774, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Distributed Network Monitoring and Debugging with SwitchPointer This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Distributed Network Monitoring and Debugging with SwitchPointer": 2768, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. G-NET: Effective GPU Sharing in NFV Systems This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). G-NET: Effective GPU Sharing in NFV Systems": 2773, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Inaudible Voice Commands: The Long-Range Attack and Defense This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Inaudible Voice Commands: The Long-Range Attack and Defense": 2766, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Iron: Isolating Network-based CPU in Container Environments This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Iron: Isolating Network-based CPU in Container Environments": 2757, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. LHD: Improving Cache Hit Rate by Maximizing Hit Density This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). LHD: Improving Cache Hit Rate by Maximizing Hit Density": 2740, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Larry: Practical Network Reconfigurability in the Data Center This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Larry: Practical Network Reconfigurability in the Data Center": 2744, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. LiveTag: Sensing Human-Object Interaction through Passive Chipless WiFi Tags This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). LiveTag: Sensing Human-Object Interaction Through Passive Chipless WiFi Tags": 2751, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Metron: NFV Service Chains at the True Speed of the Underlying Hardware This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Metron: NFV Service Chains at the True Speed of the Underlying Hardware": 2756, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Multi-Path Transport for RDMA in Datacenters This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Multi-Path Transport for RDMA in Datacenters": 2759, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Net2Text: Query-Guided Summarization of Network Forwarding Behaviors This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Net2Text: Query-Guided Summarization of Network Forwarding Behaviors": 2741, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. NetChain: Scale-Free Sub-RTT Coordination This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18)": 2755, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Odin: Microsoft's Scalable Fault-Tolerant CDN Measurement System This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Odin: Microsoft's Scalable Fault-Tolerant CDN Measurement System": 2742, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PASTE: A Network Programming Interface for Non-Volatile Main Memory This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). PASTE: A Network Programming Interface for Non-Volatile Main Memory": 2753, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PCC Vivace: Online-Learning Congestion Control This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18)": 2747, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PLOVER: Fast, Multi-core Scalable Virtual Machine Fault-tolerance This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). PLOVER: Fast, Multi-core Scalable Virtual Machine Fault-tolerance": 2771, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. PowerMan: An Out-of-Band Management Network for Datacenters Using Power Line Communication This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). PowerMan: An Out-of-Band Management Network for Datacenters using Power Line Communication": 2745, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. ResQ: Enabling SLOs in Network Function Virtualization This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). ResQ: Enabling SLOs in Network Function Virtualization": 2770, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Salsify: Low-Latency Network Video through Tighter Integration between a Video Codec and a Transport Protocol This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Salsify: Low-Latency Network Video Through Tighter Integration Between a Video Codec and a Transport Protocol": 2750, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Semi-Oblivious Traffic Engineering: The Road Not Taken This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Semi-Oblivious Traffic Engineering: The Road Not Taken": 2758, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. SnailTrail: Generalizing Critical Paths for Online Analysis of Distributed Dataflows This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). SnailTrail: Generalizing Critical Paths for Online Analysis of Distributed Dataflows *": 2752, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Stroboscope: Declarative Network Monitoring on a Budget This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Stroboscope: Declarative Network Monitoring on a Budget": 2769, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Vesper: Measuring Time-to-Interactivity for Web Pages This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Vesper: Measuring Time-to-Interactivity for Web Pages": 2762, + "Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. zkLedger: Privacy-Preserving Auditing for Distributed Ledgers This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). zkLedger: Privacy-Preserving Auditing for Distributed Ledgers": 2761, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Cluster storage systems gotta have HeART: improving storage efficiency by exploiting disk-reliability heterogeneity This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Cluster storage systems gotta have HeART: improving storage efficiency by exploiting disk-reliability heterogeneity": 1615, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Design Tradeoffs for SSD Reliability This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Design Tradeoffs for SSD Reliability": 1618, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by DistCache: Provable Load Balancing for Large- Scale Storage Systems with Distributed Caching This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). DistCache: Provable Load Balancing for Large-Scale Storage Systems with Distributed Caching": 1624, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques": 1633, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Fully Automatic Stream Management for Multi-Streamed SSDs Using Program Contexts This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Fully Automatic Stream Management for Multi-Streamed SSDs Using Program Contexts": 1619, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction": 1629, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by GraphOne: A Data Store for Real-time Analytics on Evolving Graphs This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). GRAPHONE: A Data Store for Real-time Analytics on Evolving Graphs": 1622, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by INSTalytics: Cluster Filesystem Co-design for Big-data Analytics This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). INSTalytics: Cluster Filesystem Co-design for Big-data Analytics": 1626, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems": 1623, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Optimizing Systems for Byte-Addressable NVM by Reducing Bit Flipping This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Optimizing Systems for Byte-Addressable NVM by Reducing Bit Flipping": 1607, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Orion: A Distributed File System for Non-Volatile Main Memory and RDMA-Capable Networks This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Orion: A Distributed File System for Non-Volatile Main Memories and RDMA-Capable Networks": 1628, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Pay Migration Tax to Homeland: Anchor-based Scalable Reference Counting for Multicores This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Pay Migration Tax to Homeland: Anchor-based Scalable Reference Counting for Multicores": 1614, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Reaping the performance of fast NVM storage with uDepot This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Reaping the performance of fast NVM storage with uDepot": 1620, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by SLM-DB: Single-Level Key-Value Store with Persistent Memory This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). SLM-DB: Single-Level Key-Value Store with Persistent Memory": 1616, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by ScaleCheck: A Single-Machine Approach for Discovering Scalability Bugs in Large Distributed Systems This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). ScaleCheck: A Single-Machine Approach for Discovering Scalability Bugs in Large Distributed Systems": 1627, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Software Wear Management for Persistent Memories This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Software Wear Management for Persistent Memories": 1612, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Storage Gardening: Using a Virtualization Layer for Efficient Defragmentation in the WAFL File System This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Storage Gardening: Using a Virtualization Layer for Efficient Defragmentation in the WAFL File System": 1617, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Write-Optimized Dynamic Hashing for Persistent Memory This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Write-Optimized Dynamic Hashing for Persistent Memory": 1625, + "Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Ziggurat: A Tiered File System for Non-Volatile Main Memories and Disks This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Ziggurat: A Tiered File System for Non-Volatile Main Memories and Disks": 1631, + "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. Blockstack: A Global Naming and Storage System Secured by Blockchains Blockstack: A Global Naming and Storage System Secured by Blockchains": 951, + "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. Horton Tables: Fast Hash Tables for In-Memory Data-Intensive Computing Horton Tables: Fast Hash Tables for In-Memory Data-Intensive Computing": 955, + "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. Multicore Locks: The Case Is Not Closed Yet Multicore Locks: The Case is not Closed Yet": 961, + "Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16) is sponsored by USENIX. gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory Space gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory Space": 988, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness": 3119, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX An Empirical Study of Vulnerability Rewards Programs An Empirical Study of Vulnerability Rewards Programs": 3128, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Control Flow Integrity for COTS Binaries Control Flow Integrity for COTS Binaries *": 3148, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations Dowsing for overflows: A guided fuzzer to find buffer boundary violations": 3130, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX DupLESS: Server-Aided Encryption for Deduplicated Storage DupLESS: Server-Aided Encryption for Deduplicated Storage": 3122, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers": 3133, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Eradicating DNS Rebinding with the Extended Same-Origin Policy Eradicating DNS Rebinding with the Extended Same-Origin Policy": 3134, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates": 3136, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization": 3145, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution": 3126, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies": 3124, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Impression Fraud in On-line Advertising via Pay-Per-View Networks Impression Fraud in Online Advertising via Pay-Per-View Networks": 3140, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Language-based Defenses against Untrusted Browser Origins": 3123, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks": 3129, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis MetaSymploit: Day-One Defense Against Script-based Attacks with Security-Enhanced Symbolic Analysis": 3142, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX On the Security of Picture Gesture Authentication On the Security of Picture Gesture Authentication": 3149, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX On the Security of RC4 in TLS On the Security of RC4 in TLS 1": 3120, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation PCF: A Portable Circuit Format For Scalable Two-Party Secure Computation": 3135, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Practical Comprehensive Bounds on Surreptitious Communication Over DNS Practical Comprehensive Bounds on Surreptitious Communication Over DNS": 3138, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Sancus: Low-cost trustworthy extensible networked devices with a zero-software Trusted Computing Base": 3137, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Secure Outsourced Garbled Circuit Evaluation for Mobile Devices": 3125, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation": 3131, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Securing Embedded User Interfaces: Android and Beyond Securing Embedded User Interfaces: Android and Beyond": 3139, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services Steal This Movie -Automatically Bypassing DRM Protection in Streaming Media Services": 3146, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors": 3147, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions": 3150, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse": 3141, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX You Are How You Click: Clickstream Analysis for Sybil Detection You are How You Click: Clickstream Analysis for Sybil Detection": 3144, + "Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX ZMap: Fast Internet-wide Scanning and Its Security Applications ZMap: Fast Internet-Wide Scanning and its Security Applications": 3127, + "Open access to the Proceedings of the 23rd USENIX Security Symposium is sponsored by USENIX iSeeYou: Disabling the MacBook Webcam Indicator LED USENIX Association 23rd USENIX Security Symposium 337 i \u0131SeeYou: Disabling the MacBook Webcam Indicator LED": 3157, + "Open access to the Proceedings of the 23rd USENIX Security Symposium is sponsored by USENIX ret2dir: Rethinking Kernel Isolation ret2dir: Rethinking Kernel Isolation": 3177, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS": 3237, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Bohatei: Flexible and Elastic DDoS Defense Bohatei: Flexible and Elastic DDoS Defense": 3235, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge": 3261, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Boxify: Full-fledged App Sandboxing for Stock Android Boxify: Full-fledged App Sandboxing for Stock Android": 3222, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX CONIKS: Bringing Key Transparency to End Users CONIKS: Bringing Key Transparency to End Users": 3252, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches": 3239, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services": 3247, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Faster Secure Computation through Automatic Parallelization Faster Secure Computation through Automatic Parallelization": 3226, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale": 3228, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX M 2 R: Enabling Stronger Privacy in MapReduce Computation M 2 R: Enabling Stronger Privacy in MapReduce Computation": 3231, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence": 3238, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Raccoon: Closing Digital Side-Channels through Obfuscated Execution Raccoon: Closing Digital Side-Channels through Obfuscated Execution": 3260, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization": 3244, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Towards Discovering and Understanding Task Hijacking in Android Towards Discovering and Understanding Task Hijacking in Android": 3263, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Type Casting Verification: Stopping an Emerging Attack Vector Type Casting Verification: Stopping an Emerging Attack Vector": 3248, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX UIPicker: User-Input Privacy Identification in Mobile Applications UIPicker: User-Input Privacy Identification in Mobile Applications": 3255, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Verified Correctness and Security of OpenSSL HMAC Verified correctness and security of OpenSSL HMAC": 3224, + "Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits": 3264, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries": 3281, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage": 3302, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution": 3326, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis": 3284, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles": 3285, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos": 3341, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX fTPM: A Software-Only Implementation of a TPM Chip fTPM: A Software-only Implementation of a TPM Chip": 3322, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX k-fingerprinting: A Robust Scalable Website Fingerprinting Technique k-fingerprinting: a Robust Scalable Website Fingerprinting Technique": 3306, + "Open access to the Proceedings of the 25th USENIX Security Symposium is sponsored by USENIX zxcvbn: Low-Budget Password Strength Estimation zxcvbn: Low-Budget Password Strength Estimation": 3338, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Global Measurement of DNS Manipulation Global Measurement of DNS Manipulation": 3393, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Hacking in Darkness: Return-oriented Programming against Secure Enclaves Hacking in Darkness: Return-oriented Programming against Secure Enclaves": 3375, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX PDF Mirage: Content Masking Attack Against Information-Based Online Services PDF Mirage: Content Masking Attack Against Information-Based Online Services": 3383, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment": 3348, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts POMP: Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts": 3415, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX REM: Resource-Efficient Mining for Blockchains REM: Resource-Efficient Mining for Blockchains": 3420, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Reverse Engineering x86 Processor Microcode Reverse Engineering x86 Processor Microcode": 3371, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages": 3385, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels": 3401, + "Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX vTZ: Virtualizing ARM TrustZone vTZ: Virtualizing ARM TrustZone": 3365, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. An Empirical Analysis of Anonymity in Zcash An Empirical Analysis of Anonymity in Zcash": 3472, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps": 3489, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. IMIX: In-Process Memory Isolation EXtension IMIX: In-Process Memory Isolation EXtension": 3457, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications": 3428, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web": 3459, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Schr\u00f6dinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem Schr\u00f6dinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem": 3492, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Security Namespace: Making Linux Security Frameworks Available to Containers": 3500, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning": 3511, + "Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. teether: Gnawing at Ethereum to Automatically Exploit Smart Contracts TEETHER: Gnawing at Ethereum to Automatically Exploit Smart Contracts": 3474, + "Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT": 3550, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp": 3700, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization": 3671, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise": 3681, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Achieving Keyless CDNs with Conclaves Achieving Keyless CDNs with Conclaves": 3645, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with POLICHECK": 3589, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning": 3697, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints": 3712, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. An Observational Investigation of Reverse Engineers' Processes An Observational Investigation of Reverse Engineers' Processes": 3725, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Aurora: Statistical Crash Analysis for Automated Root Cause Explanation AURORA: Statistical Crash Analysis for Automated Root Cause Explanation": 3594, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. BScout: Direct Whole Patch Presence Test for Java Executables BScout: Direct Whole Patch Presence Test for Java Executables": 3615, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. BigMAC: Fine-Grained Policy Analysis of Android Firmware BIGMAC: Fine-Grained Policy Analysis of Android Firmware": 3644, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. BlockSci: Design and applications of a blockchain analysis platform BlockSci: Design and applications of a blockchain analysis platform": 3649, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Boxer: Preventing fraud by scanning credit cards Boxer: Preventing fraud by scanning credit cards": 3620, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures": 3737, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE Call Me Maybe: Eavesdropping Encrypted LTE Calls With REVOLTE": 3703, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Cardpliance: PCI DSS Compliance of Android Applications Cardpliance: PCI DSS Compliance of Android Applications": 3669, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. CopyCat: Controlled Instruction-Level Attacks on Enclaves COPYCAT: Controlled Instruction-Level Attacks on Enclaves": 3674, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. CounterFoil: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras": 3619, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware": 3609, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Data Recovery from \"Scrubbed\" NAND Flash Storage: Need for Analog Sanitization Data Recovery from \"Scrubbed\" NAND Flash Storage: Need for Analog Sanitiza- tion": 3642, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Datalog Disassembly Datalog Disassembly": 3629, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips": 3738, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Delphi: A Cryptographic Inference Service for Neural Networks DELPHI: A Cryptographic Inference Service for Neural Networks": 3673, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices": 3608, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Donky: Domain Keys -Efficient In-Process Isolation for RISC-V and x86 Donky: Domain Keys -Efficient In-Process Isolation for RISC-V and x86": 3705, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing": 3709, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams": 3707, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet": 3658, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. FANS: Fuzzing Android Native System Services via Automated Interface Analysis FANS: Fuzzing Android Native System Services via Automated Interface Analysis": 3664, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models Fawkes: Protecting Privacy against Unauthorized Deep Learning Models": 3708, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. FirmScope: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware": 3624, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection": 3648, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. GreyOne: Data Flow Sensitive Fuzzing GREYONE: Data Flow Sensitive Fuzzing": 3633, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter Hall Spoofing: A Noninvasive DoS Attack on Grid-Tied Solar Inverter": 3591, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. High Accuracy and High Fidelity Extraction of Neural Networks High Accuracy and High Fidelity Extraction of Neural Networks": 3647, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent": 3689, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities": 3606, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems": 3715, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Muzz: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs": 3603, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities": 3584, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. NetWarden: Mitigating Network Covert Channels while Preserving Performance NetWarden: Mitigating Network Covert Channels while Preserving Performance": 3734, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. On Training Robust PDF Malware Classifiers On Training Robust PDF Malware Classifiers": 3607, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. P 2 IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling P 2 IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling": 3627, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems": 3613, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. ParmeSan: Sanitizer-guided Greybox Fuzzing ParmeSan: Sanitizer-guided Greybox Fuzzing": 3686, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Pixel: Multi-signatures for Consensus Pixel: Multi-signatures for Consensus": 3622, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices": 3747, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Programmable In-Network Security for Context-aware BYOD Policies Programmable In-Network Security for Context-aware BYOD Policies": 3650, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Retrofitting Fine Grain Isolation in the Firefox Renderer Retrofitting Fine Grain Isolation in the Firefox Renderer": 3678, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search": 3602, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage": 3617, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients": 3706, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Security Analysis of Unified Payments Interface and Payment Apps in India Security Analysis of Unified Payments Interface and Payment Apps in India": 3656, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. See No Evil: Phishing for Permissions with False Transparency See No Evil: Phishing for Permissions with False Transparency": 3723, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web": 3662, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. SkillExplorer: Understanding the Behavior of Skills in Large Scale SkillExplorer: Understanding the Behavior of Skills in Large Scale": 3640, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference": 3660, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Sys: a Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code Sys: a Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code": 3598, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. TPM-Fail: TPM meets Timing and Lattice Attacks TPM-FAIL: TPM meets Timing and Lattice Attacks": 3676, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums": 3722, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections": 3724, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Towards HTTPS Everywhere on Android: We Are Not There Yet Towards HTTPS Everywhere on Android: We Are Not There Yet": 3694, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures": 3716, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Visor: Privacy-Preserving Video Analytics as a Cloud Service Visor: Privacy-Preserving Video Analytics as a Cloud Service": 3692, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Walking Onions: Scaling Anonymity Networks while Protecting Users Walking Onions: Scaling Anonymity Networks while Protecting Users": 3653, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data": 3728, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis": 3695, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi": 3739, + "Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications": 3718, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. API Blindspots: Why Experienced Developers Write Vulnerable Code API Blindspots: Why Experienced Developers Write Vulnerable Code": 3817, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal": 3824, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Can Digital Face-Morphs Influence Attitudes and Online Behaviors? Can Digital Face-Morphs Influence Attitudes and Online Behaviors?": 3819, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data": 3812, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality": 3804, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Informal Support Networks: an investigation into Home Data Security Practices Informal Support Networks: an investigation into Home Data Security Practices": 3816, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently": 3811, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios Towards Understanding Why People Do, or Do Not, Shield PIN Entry": 3825, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Security in the Software Development Lifecycle Security in the Software Development Lifecycle": 3805, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. User Behaviors and Attitudes Under Password Expiration Policies User Behaviors and Attitudes Under Password Expiration Policies": 3806, + "Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. User Comfort with Android Background Resource Accesses in Different Contexts User Comfort with Android Background Resource Accesses in Different Contexts": 3826, + "Open access to the Proceedings of the Sixteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Knock, Knock. Who's There? On the Security of LG's Knock Codes Knock, Knock. Who's There? On the Security of LG's Knock Codes": 3872, + "Open access to the Proceedings of the Thirteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions": 3798, + "Open access to the Proceedings of the Thirteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences": 3801, + "Open access to the Proceedings of the Thirteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture": 3796, + "Open access to the Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) is sponsored by USENIX. Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data": 3779, + "Open access to the Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) is sponsored by USENIX. User Attitudes Toward the Inspection of Encrypted Traffic User Attitudes Toward the Inspection of Encrypted Traffic": 3780, + "OpenExpress: Fully Hardware Automated Open Research Framework for Future Fast NVMe Devices OpenExpress: Fully Hardware Automated Open Research Framework for Future Fast NVMe Devices": 1229, + "OpenFlow-Based Server Load Balancing Gone Wild": 706, + "OpenFlow-Based Server Load Balancing Gone Wild_4755": 4755, + "Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia": 1717, + "Opening Up Black Box Networks with CloudTalk": 1792, + "Openly Addressable Device Tiers": 2190, + "Operating System Implications of Fast, Cheap, Non-Volatile Memory": 257, + "Operating System Support for NVM+DRAM Hybrid Main Memory": 2475, + "Operating System Transactions": 4849, + "Operating Systems Should Manage Accelerators": 2073, + "Operating Systems Should Provide Transactions": 4871, + "Operator-Assisted Tabulation of Optical Scan Ballots": 1461, + "Opinion Integration Through Semi-supervised Topic Modeling": 23, + "Opportune Job Shredding: An Effective Approach for Scheduling Parameter Sweep Applications": 2198, + "Opportunistic Media Access for Multirate Ad Hoc Networks *": 70, + "Opportunities and Challenges Of Machine Learning Accelerators In Production": 2878, + "Optimal Additive Composition of Abstraction-based Admissible Heuristics": 4447, + "Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity": 2832, + "Optimal Capacity Sharing of Networks with Multiple Overlays": 621, + "Optimal Gradient Clock Synchronization in Dynamic Networks": 148, + "Optimal Parsing Strategies for Linear Context-Free Rewriting Systems": 2954, + "Optimal Partitioning of Fine-Grained Scalable Video Streams": 4490, + "Optimal Power-Down Strategies": 4672, + "Optimal Pricing in a Free Market Wireless Network": 2821, + "Optimal Scalable Video Multiplexing in Mobile Broadcast Networks": 4484, + "Optimal Schemes for Robust Web Extraction": 3355, + "Optimal Top-k Generation of Attribute Combinations based on Ranked Lists": 4579, + "Optimal bit allocation for fine-grained scalable video sequences in distributed streaming environments": 4491, + "Optimistic Replication for Internet Data Services": 854, + "Optimization of Sparse Matrix-Vector Multiplication on Emerging Multicore Platforms": 3254, + "Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants": 3286, + "Optimized Query Execution in Large Search Engines with Global Page Ordering": 1221, + "Optimizing CNN Model Inference on CPUs Optimizing CNN Model Inference on CPUs": 1175, + "Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic": 4198, + "Optimizing Cost and Performance in Online Service Provider Networks": 4149, + "Optimizing Data Partitioning for Data-Parallel Computing": 479, + "Optimizing Data Shuffling in Data-Parallel Computation by Understanding User-Defined Functions": 2516, + "Optimizing Flash-based Key-value Cache Systems": 2171, + "Optimizing Memory-mapped I/O for Fast Storage Devices Optimizing Memory-mapped I/O for Fast Storage Devices": 1243, + "Optimizing Network Performance in Distributed Machine Learning": 1845, + "Optimizing Seed Selection for Fuzzing Optimizing Seed Selection for Fuzzing": 3196, + "Optimizing VM Checkpointing for Restore Performance in VMware ESXi": 855, + "Optimizing the Design and Implementation of the Linux ARM Hypervisor Optimizing the Design and Implementation of the Linux ARM Hypervisor": 1003, + "Optimizing the TLB Shootdown Algorithm with Page Access Tracking Optimizing the TLB Shootdown Algorithm with Page Access Tracking": 993, + "OptimusClOud: Heterogeneous Configuration Optimization for Distributed Databases in the Cloud OPTIMUSCLOUD: Heterogeneous Configuration Optimization for Distributed Databases in the Cloud": 1239, + "Orca: Differential Bug Localization in Large-Scale Services Orca: Differential Bug Localization in Large-Scale Services": 3033, + "Orchestrating the Deployment of Computations in the Cloud with Conductor": 2491, + "Origin-sensitive Control Flow Integrity Origin-sensitive Control Flow Integrity": 3546, + "Orion: Shortest Path Estimation for Large Social Graphs": 748, + "Orthographic Features for Bilingual Lexicon Induction": 4396, + "Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers": 3357, + "Oscillations and Buffer Overflows in Video Streaming under Non-Negligible Queuing Delay": 4187, + "Oscillatory Neural Network for Image Segmentation with Biased Competition for Attention": 3198, + "Outsourcing the Decryption of ABE Ciphertexts": 407, + "Outtweeting the Twitterers -Predicting Information Cascades in Microblogs": 392, + "Overcoming Challenges of Maturity": 1297, + "Overcoming the Limitations of Conventional Vector Processors": 4631, + "Overview of the 1st Workshop on Asian Translation": 2909, + "Overview of the 2nd Workshop on Asian Translation": 1783, + "Overview of the CL-SciSumm 2016 Shared Task": 4092, + "Overview of the NLP-TEA 2015 Shared Task for Chinese Grammatical Error Diagnosis": 2203, + "Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing": 3151, + "P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks": 4038, + "P3: Toward Privacy-Preserving Photo Sharing": 2530, + "P4EC: Enabling Terabit Edge Computing in Enterprise 4G LTE": 2012, + "P4P: Provider Portal for Applications": 765, + "PAC Model-Free Reinforcement Learning": 4543, + "PAC it up: Towards Pointer Integrity using ARM Pointer Authentication PAC it up: Towards Pointer Integrity using ARM Pointer Authentication *": 3552, + "PACMan: Performance Aware Virtual Machine Consolidation": 2296, + "PADS: A Policy Architecture for Distributed Storage Systems": 1290, + "PARALLEL AND DISTRIBUTED AUDIO CONCEALMENT USING NONLOCAL SPARSE REPRESENTATIONS": 4520, + "PARIX: Speculative Partial Writes in Erasure-Coded Systems PARIX: Speculative Partial Writes in Erasure-Coded Systems": 1020, + "PATCH-BASED IMAGE INTERPOLATION: ALGORITHMS AND APPLICATIONS": 4521, + "PEDAGOGICAL POSSIBILITIES FOR THE DICE GAME PIG *": 332, + "PERFORMANCE MEASURES FOR RANKING AND SELECTION PROCEDURES": 455, + "PHMon: A Programmable Hardware Monitor and Its Security Use Cases PHMon: A Programmable Hardware Monitor and Its Security Use Cases": 3616, + "PIE in the Sky: Online Passive Interference Estimation for Enterprise WLANs": 652, + "PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control": 4753, + "PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval *": 556, + "PIkit: A New Kernel-Independent Processor-Interconnect Rootkit PIkit : A New Kernel-Independent Processor-Interconnect Rootkit": 3328, + "PMI: A Scalable Parallel Process-Management Interface for Extreme-Scale Systems": 1932, + "POMAC: Properly Offloading Mobile Applications to Clouds": 1820, + "POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection": 4086, + "PR-Join: A Non-Blocking Join Achieving Higher Early Result Rate with Statistical Guarantees": 3721, + "PREDICTING LINKS AND LINK CHANGE IN FRIENDS NETWORKS: SUPERVISED TIME SERIES LEARNING WITH IMBALANCED DATA": 4605, + "PRESTO: Feedback-driven Data Management in Sensor Networks": 4974, + "PRISM: Private Retrieval of the Internet's Sensitive Metadata": 1374, + "PROMISE: Peer-to-Peer Media Streaming Using CollectCast": 4793, + "PROP: a Scalable and Reliable P2P Assisted Proxy Streaming System \u00a3": 18, + "PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs": 3109, + "PTask: Operating System Abstractions To Manage GPUs as Compute Devices": 4894, + "PUBCRAWL: Protecting Users and Businesses from CRAWLers": 3118, + "Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination": 4773, + "Packet-Level Analytics in Software without Compromises": 1911, + "Packet-Pair Bandwidth Estimation: Stochastic Analysis of a Single Congested Node": 4021, + "Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research": 1392, + "Panache: A Parallel File System Cache for Global File Access": 1451, + "Pancake: Frequency Smoothing for Encrypted Data Stores PANCAKE: Frequency Smoothing for Encrypted Data Stores": 3638, + "Panda: A System for Provenance and Data *": 2328, + "Pangolin: A Fault-Tolerant Persistent Memory Programming Library Pangolin: A Fault-Tolerant Persistent Memory Programming Library": 1204, + "Panopticon: Reaping the Benefits of Incremental SDN Deployment in Enterprise Networks Panopticon: Reaping the Benefits of Incremental SDN Deployment in Enterprise Networks": 871, + "Pantheon: the training ground for Internet congestion-control research Pantheon: the training ground for Internet congestion-control research": 1124, + "Paper Rating vs. Paper Ranking": 1439, + "ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash Devices ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash Devices": 947, + "ParaMEDIC: Parallel Metadata Environment for Distributed I/O and Computing (Storage Challenge, Supercomputing 2007)": 2098, + "ParaSwift: File I/O Trace Modeling for the Future ParaSwift: File I/O trace modeling for the future": 2433, + "Paracloud: Bringing Application Insight into Cloud Operations": 1884, + "Parakeet: A Just-In-Time Parallel Accelerator for Python": 2070, + "Parallel Media Processors for the Billion-Transistor Era": 4565, + "Parallel Programming for the Web": 2071, + "Parallel Synchronization-Free Approximate Data Structure Construction": 2085, + "Parallelizable Stack Long Short-Term Memory": 1140, + "Parallelization Primitives for Dynamic Sparse Computations": 2084, + "Parallelization by Simulated Tunneling": 2079, + "Parallelizing SPECjbb2000 with Transactional Memory": 4620, + "Parallelizing Time With Polynomial Circuits": 4727, + "Parametric Optimization of Storage Systems": 2152, + "Paraphrase to Explicate: Revealing Implicit Noun-Compound Relations": 4325, + "Parsimonious Explanations of Change in Hierarchical Data": 32, + "PartEmu: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation": 3641, + "Partial Snapshot Objects Hagit Attiya Technion Rachid Guerraoui EPFL": 4918, + "Participatory Networking": 2039, + "Partisan: Scaling the Distributed Actor Runtime PARTISAN: Scaling the Distributed Actor Runtime": 1179, + "Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions": 2658, + "Password Managers: Attacks and Defenses Password Managers: Attacks and Defenses": 3200, + "Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts *": 3170, + "Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise": 3861, + "Path-Quality Monitoring in the Presence of Adversaries": 60, + "PathSim: Meta Path-Based Top-K Similarity Search in Heterogeneous Information Networks": 4862, + "Pattern Classification using Rectified Nearest Feature Line Segment": 165, + "Patterns of Influence in a Recommendation Network": 4956, + "Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr": 2659, + "Paxos Replicated State Machines as the Basis of a High-Performance Data Store": 284, + "PayWord and MicroMint: Two Simple Micropayment Schemes": 1266, + "Paying Less for More? Combo Plans for Edge-Computing Services": 1981, + "Payment Rules through Discriminant-Based Classifiers": 39, + "PeX: A Permission Check Analysis Framework for Linux Kernel PeX: A Permission Check Analysis Framework for Linux Kernel": 3579, + "Peeking Behind the Curtains of Serverless Platforms Peeking Behind the Curtains of Serverless Platforms": 1118, + "Peeking into Your App without Actually Seeing it: UI State Inference and Novel Android Attacks Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks": 3160, + "Peer Instruction for Digital Forensics": 795, + "Peer-to-Peer Bargaining in Container-Based Datacenters": 385, + "PeerMon: A Peer-to-Peer Network Monitoring System": 575, + "PeerReview: Practical Accountability for Distributed Systems": 810, + "Pegasus: Coordinated Scheduling for Virtualized Accelerator-based Systems": 419, + "Pelican: A Building Block for Exascale Cold Data Storage Pelican: A building block for exascale cold data storage": 2939, + "Peloton: Coordinated Resource Management for Sensor Networks": 3967, + "Peppercoin Micropayments": 176, + "Percentages, Probabilities and Professions of Performance": 1405, + "Percival: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning": 1216, + "Peregreen -modular database for efficient storage of historical time series in cloud environments Peregreen -modular database for efficient storage of historical time series in cloud environments": 1258, + "PerfIso: Performance Isolation for Commercial Latency-Sensitive Services PerfIso: Performance Isolation for Commercial Latency-Sensitive Services C\u02d8 alin Iorgulescu* EPFL": 1081, + "Performance Annotations for Cloud Computing": 1891, + "Performance Characterization of a 10-Gigabit Ethernet TOE *": 2154, + "Performance Debugging in Data Centers: Doing More with Less 1": 4973, + "Performance Evaluation of RDMA over IP: A Case Study with the Ammasso Gigabit Ethernet NIC *": 212, + "Performance Evaluation of Two Allocation Schemes for Combinatorial Group Testing Fault Isolation": 177, + "Performance Implications of Communication Mechanisms in All-Software Global Address Space Systems": 4946, + "Performance Inconsistency in Large Scale Data Processing Clusters": 2300, + "Performance Isolation and Fairness for Multi-Tenant Cloud Storage": 2927, + "Performance Models for Evaluation and Automatic Tuning of Symmetric Sparse Matrix-Vector Multiply": 4729, + "Performance Pathologies in Hardware Transactional Memory": 4907, + "Performance Profiling in a Virtualized Environment": 365, + "Perplexity on Reduced Corpora": 4244, + "Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory": 2194, + "Persistent Security, Privacy, and Governance for Healthcare Information": 1317, + "Persona: A High-Performance Bioinformatics Framework Persona: A High-Performance Bioinformatics Framework": 997, + "Personal Information Leakage by Abusing the GDPR \"Right of Access\" This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Personal Information Leakage by Abusing the GDPR \"Right of Access\"": 3833, + "Personal Social Screen -A Dynamic Privacy Assignment System for Social Sharing in Complex Social Object Networks": 25, + "Personality Driven Differences in Paraphrase Preference": 1746, + "Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions": 2099, + "Personalized Language Model for Query Auto-Completion": 4422, + "Personalized Machine Translation: Preserving Original Author Traits": 4175, + "Personalized Review Generation by Expanding Phrases and Attending on Aspect-Aware Representations": 4423, + "Perspective: Semantic data management for the home": 3106, + "Perspectives on Financial Cryptography": 1244, + "Phasing: Private Set Intersection using Permutation-based Hashing Phasing: Private Set Intersection using Permutation-based Hashing": 3258, + "PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists PhishTime: Continuous Longitudinal Measurement of the EEectiveness of Anti-phishing Blacklists": 3683, + "Phishing Attacks: Learning by Doing": 801, + "Phoenix Rebirth: Scalable MapReduce on a Large-Scale Shared-Memory System": 4601, + "Phoenix++: Modular MapReduce for Shared-Memory Systems": 4595, + "Phoenix: Rebirth of a Cryptographic Password-Hardening Service Phoenix: Rebirth of a Cryptographic Password-Hardening Service": 3373, + "PhyCloak: Obfuscating Sensing from Communication Signals PhyCloak: Obfuscating Sensing from Communication Signals": 2676, + "Physical Adversarial Examples for Object Detectors": 4094, + "Physical Disentanglement in a Container-Based File System Physical Disentanglement in a Container-Based File System": 2955, + "Piccolo: Building Fast, Distributed Programs with Partitioned Tables": 604, + "Picking a (Smart)Lock: Locking Relationships on Mobile Devices": 3977, + "Picviz: finding a needle in a haystack": 3937, + "PinK: High-speed In-storage Key-value Store with Bounded Tails PinK: High-speed In-storage Key-value Store with Bounded Tails": 1226, + "PinPoint: Localizing Interfering Radios": 2534, + "Pisces: A Scalable and Efficient Persistent Transactional Memory Pisces: A Scalable and Efficient Persistent Transactional Memory": 1147, + "Pitfalls for ISP-friendly P2P design": 4232, + "Pixaxe: A Declarative, Client-Focused Web Application Framework": 487, + "Pixelsior: Photo Management as a Platform Service for Mobile Apps": 2162, + "Placement of Virtual Containers on NUMA systems: A Practical and Comprehensive Model Placement of Virtual Containers on NUMA systems: A Practical and Comprehensive Model": 1070, + "Planning Games": 4448, + "PlatPal: Detecting Malicious Documents with Platform Diversity PLATPAL: Detecting Malicious Documents with Platform Diversity": 3417, + "Platinum: A CPU-Efficient Concurrent Garbage Collector for Tail-Reduction of Interactive Services Platinum: A CPU-Efficient Concurrent Garbage Collector for Tail-Reduction of Interactive Services": 1263, + "Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers": 3534, + "Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets": 3507, + "Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT": 3730, + "Plugging Side-Channel Leaks with Timing Information Flow Control": 1805, + "Pocket: Elastic Ephemeral Storage for Serverless Analytics Pocket: Elastic Ephemeral Storage for Serverless Analytics": 3049, + "Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor": 3542, + "Point-based value iteration: An anytime algorithm for POMDPs": 109, + "Poking Holes in Information Hiding Poking Holes in Information Hiding": 3318, + "Polaris: Faster Page Loads Using Fine-grained Dependency Tracking Polaris: Faster Page Loads Using Fine-grained Dependency Tracking": 2674, + "Polarity Inducing Latent Semantic Analysis": 4167, + "Policy Gradient as a Proxy for Dynamic Oracles in Constituency Parsing": 4407, + "Policy Shaping and Generalized Update Equations for Semantic Parsing from Denotations": 4174, + "Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning": 3463, + "Polygraph: System for Dynamic Reduction of False Alerts in Large-Scale IT Service Delivery Environments *": 483, + "Polynomial-time Computation of Exact Correlated Equilibrium in Compact Games": 1999, + "Poor Man's Social Network: Consistently Trade Freshness For Scalability": 3982, + "Popularity Prediction of Facebook Videos for Higher Quality Streaming Popularity Prediction of Facebook Videos for Higher Quality Streaming": 1042, + "Popularity is everything A new approach to protecting passwords from statistical-guessing attacks": 638, + "Poseidon: An Efficient Communication Architecture for Distributed Deep Learning on GPU Clusters Poseidon: An Efficient Communication Architecture for Distributed Deep Learning on GPU Clusters": 1050, + "Posh: A Data-Aware Shell POSH: A Data-Aware Shell": 1247, + "Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords": 3971, + "Post Retraction Citations in Context": 891, + "Post-quantum Key Exchange-A New Hope Post-quantum key exchange -a new hope *": 3280, + "PostMan: Rapidly Mitigating Bursty Traffic by Offloading Packet Processing PostMan: Rapidly Mitigating Bursty Traffic by Offloading Packet Processing": 1160, + "Power Budgeting for Virtualized Data Centers": 516, + "Power Efficient Range Assignment in Ad-hoc Wireless Networks": 4941, + "Power and Bandwidth Allocation in Cooperative Dirty Paper Coding": 4953, + "Power and Performance Analysis of GPU-Accelerated Systems": 2094, + "Power and Performance Characterization of Computational Kernels on the GPU": 1921, + "Power, Energy and Thermal Considerations in SSD-Based I/O Acceleration": 2137, + "Power-Aware Throughput Control for Database Management Systems": 2302, + "Power-law Revisited: A Large Scale Measurement Study of P2P Content Popularity": 350, + "PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs": 2923, + "PowerSpy: Location Tracking using Mobile Device Power Analysis PowerSpy: Location Tracking using Mobile Device Power Analysis": 3253, + "PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations": 1264, + "Practical Always-On Taint Tracking on Mobile Devices": 2057, + "Practical Approximation Algorithms for Separable Packing Linear Programs ?": 4942, + "Practical Confidentiality Preserving Big Data Analysis *": 1828, + "Practical DIFC Enforcement on Android Practical DIFC Enforcement on Android": 3316, + "Practical Erase Suspension for Modern Low-latency SSDs Practical Erase Suspension for Modern Low-latency SSDs": 1164, + "Practical Hardening of Crash-Tolerant Systems": 823, + "Practical Robust Localization over Large-Scale 802.11 Wireless Networks General Terms": 162, + "Practical Semantic Parsing for Spoken Language Understanding": 4223, + "Practical Web-based Delta Synchronization for Cloud Storage Services": 2201, + "Pragh: Locality-preserving Graph Traversal with Split Live Migration Pragh: Locality-preserving Graph Traversal with Split Live Migration": 1198, + "Pre-Select Static Caching and Neighborhood Ordering for BFS-like Algorithms on Disk-based Graph Engines Pre-Select Static Caching and Neighborhood Ordering for BFS-like Algorithms on Disk-based Graph Engines": 1168, + "Pre-training on High-Resource Speech Recognition Improves Low-Resource Speech-to-Text Translation": 4191, + "Precise Client-side Protection against DOM-based Cross-Site Scripting Precise client-side protection against DOM-based Cross-Site Scripting": 3202, + "Precise and Accurate Patch Presence Test for Binaries Precise and Accurate Patch Presence Test for Binaries": 3525, + "Predicate-Argument Structure-based Preordering for Japanese-English Statistical Machine Translation of Scientific Papers": 2835, + "Predicting Accuracy of Extracting Information from Unstructured Text Collections": 72, + "Predicting Computer System Failures Using Support Vector Machines": 1733, + "Predicting Execution Bottlenecks in Map-Reduce Clusters": 1800, + "Predicting Replicated Database Scalability from Standalone Database Profiling": 3432, + "Predicting Semantic Relations using Global Graph Properties": 4173, + "Predicting accuracy on large datasets from smaller pilot data": 4404, + "Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning": 3349, + "Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys": 3336, + "Prediction Promotes Privacy In Dynamic Social Networks": 274, + "Preech: A System for Privacy-Preserving Speech Transcription Pr\u03b5\u03b5ch: A System for Privacy-Preserving Speech Transcription": 3586, + "Preemptive ReduceTask Scheduling for Fair and Fast Job Completion": 2298, + "Preemptive, Low Latency Datacenter Scheduling via Lightweight Virtualization Preemptive, Low Latency Datacenter Scheduling via Lightweight Virtualization": 1000, + "Preferences over Sets": 71, + "Preferred Operators and Deferred Evaluation in Satisficing Planning": 4808, + "Prefetching in Hybrid Main Memory Systems": 2272, + "Preparing for the Accreditation Visit": 4909, + "Presence, Routines, and Technology Discrepancy - Information Exchange between Parents and Preschool Teachers": 4332, + "Preservation Decisions: Terms and Conditions Apply Challenges, Misperceptions and Lessons Learned in Preservation Planning": 4641, + "Pretraining Sentiment Classifiers with Unlabeled Dialog Data": 3993, + "Pretty Good Packet Authentication": 4924, + "Pretzel: Opening the Black Box of Machine Learning Prediction Serving Systems PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems": 3053, + "Preventing Cryptographic Key Leakage in Cloud Virtual Machines Preventing Cryptographic Key Leakage in Cloud Virtual Machines": 3193, + "Preventing SQL Injection Attacks Using AMNESIA": 4472, + "Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector": 2408, + "PriBots: Conversational Privacy with Chatbots Hamza Harkous": 3991, + "Price Fluctuations: To Buy or to Rent": 3799, + "Pricing Games for Hybrid Object Stores in the Cloud: Provider vs. Tenant": 1837, + "Pricing Intra-Datacenter Networks with Over- Committed Bandwidth Guarantee Pricing Intra-Datacenter Networks with Over-Committed Bandwidth Guarantee": 1008, + "Primary Data Deduplication -Large Scale Study and System Design": 833, + "Principal Component Analysis for Sparse High-Dimensional Data": 3176, + "Principled Schedulability Analysis for Distributed Storage Systems using Thread Architecture Models Principled Schedulability Analysis for Distributed Storage Systems using Thread Architecture Models": 3070, + "Printed Circuit Board Deconstruction Techniques": 4028, + "PrivApprox: Privacy-Preserving Stream Analytics PrivApprox: Privacy-Preserving Stream Analytics": 1036, + "Privacy Aspects of Health Related Information Sharing in Online Social Networks": 1781, + "Privacy Expectations and Preferences in an IoT World Privacy Expectations and Preferences in an IoT World": 3793, + "Privacy Leakage in Mobile Online Social Networks": 492, + "Privacy Preserving OLAP": 606, + "Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems": 103, + "Privacy Wedges: Area-Based Audience Selection for Social Network Posts": 4135, + "Privacy and Security Issues in BAT Web Browsers": 1696, + "Privacy-Preserving Applications on Smartphones": 442, + "Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data": 1775, + "Privacy-Preserving Offloading of Mobile App to the Public Cloud": 1840, + "Privacy-Preserving Remote Diagnostics": 4905, + "Privacy-Sensitive VM Retrospection": 623, + "Privad: Practical Privacy in Online Advertising": 411, + "Private Virtual Infrastructure for Cloud Computing": 2372, + "Privee: An Architecture for Automatically Analyzing Web Privacy Policies Privee: An Architecture for Automatically Analyzing Web Privacy Policies": 3217, + "Proactive Energy-Aware Programming with PEEK": 3939, + "Proactive Network Management of IPTV Networks": 656, + "Proactive Re-Optimization": 607, + "Probabilistic FastText for Multi-Sense Word Embeddings": 4275, + "Probabilistic Near-Duplicate Detection Using Simhash": 3965, + "Probabilistic Query Expansion using Query Logs": 4479, + "Probabilistic XML via Markov Chains *": 120, + "Probe, Cluster, and Discover: Focused Extraction of QA-Pagelets from the Deep Web": 1577, + "Probing the Front Lines: Pollworker Perceptions of Security & Privacy": 1453, + "Probing the Need for Visual Context in Multimodal Machine Translation": 4222, + "Proceedings of the 10 th USENIX Security Symposium PDM: A New Strong Password-Based Protocol": 2364, + "Proceedings of the 2 nd Workshop on Parallel and Distributed Computing in Image Processing, Video Processing, and Multimedia (held in conjunction with IPDPS'01) Dynamic Parallel Media Processing Using Speculative Broadcast Loop (SBL)": 118, + "Proceedings of the 29th USENIX Security Symposium Errata Slip #3": 3755, + "Proceedings of the 2nd Workshop on Computational Linguistics and Clinical Psychology: From Linguistic Signal The Role of Personality, Age and Gender in Tweeting about Mental Illnesses": 2639, + "Proceedings of the Special Workshop on Intelligence at the Network Edge": 1304, + "Proceedings of the Special Workshop on Intelligence at the Network Edge Towards a Platform for Intelligent Activity at the Edge": 2908, + "Processing in Storage Class Memory": 2268, + "Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours Productive Security: A scalable methodology for analysing employee security behaviours": 3771, + "Productivity of Stream Definitions": 4649, + "Profiling Network Performance for Multi-Tier Data Center Applications": 734, + "Profiling Network Performance for Multi-Tier Data Center Applications_3943": 3943, + "Profiling and Modeling Resource Usage of Virtualized Applications": 2432, + "Program Committee Meetings Considered Harmful": 3951, + "Program Slicing": 4847, + "Progress of DNS Security Deployment in the Federal Government": 2411, + "Progressive Computation of The Min-Dist Optimal-Location Query": 4677, + "Promotion Analysis in Multi-Dimensional Space": 4780, + "Proof General: A Generic Tool for Proof Development": 4801, + "Property-Based Testing and Verification: a Catalog of Classroom Examples": 1155, + "Prophecy: Using History for High-Throughput Fault Tolerance": 3759, + "Protecting Free and Open Communications on the Internet Against Man-in-the-middle Attacks on Third-party Software: We're FOCI'd": 1676, + "Protecting Privacy of BLE Device Users Protecting Privacy of BLE Device Users": 3300, + "Protecting Users by Confining JavaScript with COWL Protecting Users by Confining JavaScript with COWL": 2966, + "Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records": 1761, + "Protego: Cloud-Scale Multitenant IPsec Gateway Protego: Cloud-Scale Multitenant IPsec Gateway": 1038, + "Proteus: A DLT-Agnostic Emulation and Analysis Framework": 1416, + "Protocol State Fuzzing of TLS Implementations Protocol state fuzzing of TLS implementations": 3229, + "Prototype-Driven Grammar Induction": 2876, + "Prototype-Driven Learning for Sequence Models": 2865, + "Provable Security: How feasible is it?": 489, + "Provably Correct Runtime Monitoring \ud97b\udf59": 4804, + "Provably Good Global Buffering Using an Available Buffer Block Plan": 1499, + "Provably good global buffering by multiterminal multicommodity flow approximation": 182, + "Provenance Analyzer: Exploring Provenance Semantics with Logic Rules": 3906, + "Provenance Artifact Identification in the Atmospheric Composition Processing System (ACPS)": 3931, + "Provenance In Dynamic Data Systems *": 741, + "Provenance Integration Requires Reconciliation": 240, + "Provenance Issues in Platform-as-a-Service Model of Cloud Computing": 1844, + "Provenance Management in Databases Under Schema Evolution": 3898, + "Provenance Needs Incentives for Everyone": 318, + "Provenance Query Patterns for Many-Task Scientific Computing": 391, + "Provenance Segmentation": 3917, + "Provenance Support for Rework": 3897, + "Provenance for Data Mining": 3905, + "Provenance for System Troubleshooting": 326, + "Provenance for the Cloud": 2481, + "Provenance, End-User Trust and Reuse: An Empirical Investigation": 361, + "Provenance-Only Integration": 3916, + "Provenance-aware Versioned Dataworkspaces": 3926, + "Provenance-based Belief": 1323, + "Providing SCADA network data sets for intrusion detection research": 1385, + "Proving confidentiality in a file system using Disksec Proving confidentiality in a file system using DISKSEC": 3044, + "Proving the correct execution of concurrent services in zero-knowledge Proving the correct execution of concurrent services in zero-knowledge": 3061, + "Proximity Detection in Distributed Simulation of Wireless Mobile Systems": 106, + "Proximity algorithms for nearly-doubling spaces \u22c6": 3810, + "Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks": 347, + "Prying open Pandora's box: KCI attacks against TLS": 4045, + "Pr\u00eatPr\u00eat\u00e0 Voter with Confirmation Codes": 629, + "Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols": 4427, + "Public and private BitTorrent communities: A measurement study": 549, + "Publish-Pay-Subscribe Protocol for Payment-driven Edge Computing": 2000, + "Pursue robust indefinite scalability": 223, + "Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic": 1442, + "Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery": 2441, + "Putting BGP on the Right Path: Better Performance via Next-Hop Routing": 444, + "Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness": 4072, + "Putting Out a HIT: Crowdsourcing Malware Installs": 470, + "Putting Your Passwords on Self Destruct Mode: Beating Password Fatigue": 4138, + "Putting the \"Micro\" Back in Microservice Putting the \"Micro\" Back in Microservice": 1059, + "Putting the Software Radio on a Low-Calorie Diet": 4708, + "Pydron: Semi-Automatic Parallelization for Multi-Core and the Cloud Pydron: semi-automatic parallelization for multi-core and the cloud": 2958, + "Pyro: A Spatial-Temporal Big-Data Storage System Pyro: A Spatial-Temporal Big-Data Storage System": 918, + "Pythia: Diagnosing Performance Problems in Wide Area Providers Pythia: Diagnosing Performance Problems in Wide Area Providers": 868, + "Q: Exploit Hardening Made Easy": 641, + "QZFS: QAT Accelerated Compression in File System for Application Agnostic and Cost Efficient Data Storage QZFS: QAT Accelerated Compression in File System for Application Agnostic and Cost Efficient Data Storage": 1153, + "QoPS: A QoS based scheme for Parallel Job Scheduling": 2321, + "QoS-Aware Admission Control in Heterogeneous Datacenters": 2285, + "QoX: Quality of Service and Consumption in the Cloud": 1863, + "Qsym : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing": 3523, + "Quack: Scalable Remote Measurement of Application-Layer Censorship Quack: Scalable Remote Measurement of Application-Layer Censorship": 3508, + "Quality-Aware Segment Transmission Scheduling in Peer-to-Peer Streaming Systems": 85, + "Quantier Elimination via Functional Composition": 4636, + "Quantification of Integrity": 1566, + "Quantifying Causal Effects on Query Answering in Databases": 3927, + "Quantifying Maintainability in Feature Oriented Product Lines": 4876, + "Quantitative Estimation of the Performance Delay with Propagation Effects in Disk Power Savings *": 2097, + "Quartet: Harmonizing task scheduling and caching for cluster computing": 2159, + "Query Processing for High-Volume XML Message Brokering": 67, + "Query Suggestion Using Hitting Time": 4463, + "Query-Sensitive Embeddings": 609, + "Querying Text Databases for Efficient Information Extraction": 4457, + "Querying and Exchanging XML and RDF on the Web": 128, + "Querying and Updating Probabilistic Information in XML": 4592, + "Question Answering Passage Retrieval Using Dependency Relations": 4476, + "Question Answering Using Enhanced Lexical Semantic Models": 4242, + "Question Answering over Implicitly Structured Web Content": 4452, + "Question Answering with Knowledge Base, Web and Beyond": 4190, + "Question Classification in English-Chinese Cross-Language Question Answering: An Integrated Genetic Algorithm and Machine Learning Approach": 4829, + "Quicklink Selection for Navigational Query Results": 4658, + "R2P2: Making RPCs first-class datacenter citizens R2P2: Making RPCs first-class datacenter citizens": 1165, + "RADoN: QoS in storage Networks": 2358, + "RAFI: Risk-Aware Failure Identification to Improve the RAS in Erasure-coded Data Centers RAFI: Risk-Aware Failure Identification to Improve the RAS in Erasure-coded Data Centers": 1069, + "RAMCube: Exploiting Network Proximity for RAM-Based Key-Value Store": 1798, + "RAMP: A Lightweight RDMA Abstraction for Loosely Coupled Applications": 1909, + "RAPTOR: Routing Attacks on Privacy in Tor RAPTOR: Routing Attacks on Privacy in Tor": 3269, + "RBF: A New Storage Structure for Space-Efficient Queries for Multidimensional Metadata in OSS": 2281, + "RC2 -A Living Lab for Cloud Computing": 630, + "RCB: A Simple and Practical Framework for Real-time Collaborative Browsing": 4146, + "RDMA Capable iWARP over Datagrams": 4962, + "RECap: Run-Escape Capsule for On-demand Managed Service Delivery in the Cloud": 1914, + "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks": 3597, + "RETCON: Transactional Repair without Replay": 4806, + "RFDump: An Architecture for Monitoring the Wireless Ether": 4741, + "RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks": 2382, + "RIANN: Real-time Incremental Learning with Approximate Nearest Neighbor on Mobile Devices RIANN: Real-time Incremental Learning with Approximate Nearest Neighbor on Mobile Devices": 2898, + "ROP is Still Dangerous: Breaking Modern Defenses ROP is Still Dangerous: Breaking Modern Defenses": 3158, + "ROSS: A Design of Read-Oriented STT-MRAM Storage for Energy-Efficient Non-Uniform Cache Architecture": 2342, + "ROTE: Rollback Protection for Trusted Execution ROTE: Rollback Protection for Trusted Execution": 3384, + "RPT: Re-architecting Loss Protection for Content-Aware Networks": 2507, + "RStream: Marrying Relational Algebra with Streaming for Efficient Graph Mining on A Single Machine RStream: Marrying Relational Algebra with Streaming for Efficient Graph Mining on A Single Machine *": 3067, + "RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation": 1361, + "Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions": 3797, + "Raksha: A Flexible Information Flow Architecture for Software Security": 4853, + "Rampart: Protecting Web Applications from CPU- Exhaustion Denial-of-Service Attacks Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks": 3484, + "Random Walk Inference and Learning in A Large Scale Knowledge Base": 2110, + "Randomized k-Coverage Algorithms For Dense Sensor Networks": 4792, + "RankClus: Integrating Clustering with Ranking for Heterogeneous Information Network Analysis *": 4644, + "Ranking Refinement and Its Application to Information Retrieval": 4652, + "Ranking-Based Clustering of Heterogeneous Information Networks with Star Network Schema * General Terms Algorithms": 4643, + "RazoR: A Framework for Post-deployment Software Debloating RAZOR: A Framework for Post-deployment Software Debloating": 3561, + "Re-optimizing Data-Parallel Computing": 2503, + "Re-think Data Management Software Design Upon the Arrival of Storage Hardware with Built-in Transparent Compression": 2275, + "Read It Twice! A mass-storage-based TOCTTOU attack": 4006, + "Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces": 3522, + "Real Time Network Policy Checking using Header Space Analysis": 2553, + "Real-Time Scheduling of Skewed MapReduce Jobs in Heterogeneous Environments Real-time Scheduling of Skewed MapReduce Jobs in Heterogeneous Environments": 2327, + "Real-Time User-Centric Management of Time-Intensive Analytics Using Convergence of Local Functions": 2290, + "Real-time Edge Analytics for Cyber Physical Systems using Compression Rates Real-time Edge Analytics for Cyber Physical Systems using Compression Rates": 2316, + "Realistic, Mathematically Tractable Graph Generation and Evolution, Using Kronecker Multiplication": 4957, + "Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges": 3866, + "Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent Realizing the fault-tolerance promise of cloud storage using locks with intent": 3014, + "Realtime High-Speed Network Traffic Monitoring Using ntopng": 2431, + "Reasoning about B+ Trees with Operational Semantics and Separation Logic": 355, + "Reasoning with Sarcasm by Reading In-between": 4312, + "Recommendations for Randomness in the Operating System or, How to Keep Evil Children out of Your Pool and Other Random Facts": 2046, + "Recon: Verifying File System Consistency at Runtime": 4221, + "Reconstructing proprietary video streaming algorithms Reconstructing proprietary video streaming algorithms": 1224, + "Recovering Temporally Rewiring Networks: A Model-based Approach": 179, + "Recsplorer: Recommendation Algorithms Based on Precedence Mining": 3366, + "Recursive Neural Structural Correspondence Network for Cross-domain Aspect and Opinion Co-Extraction": 4378, + "Recursive Random Fields": 599, + "Recursive Subtree Composition in LSTM-Based Dependency Parsing": 4200, + "Redesigning LSMs for Nonvolatile Memory with NoveLSM Redesigning LSMs for Nonvolatile Memory with NoveLSM": 1084, + "Reducing Accidental Complexity in Planning Problems": 105, + "Reducing Garbage Collection Overhead in SSD Based on Workload Prediction": 2247, + "Reducing NVM Writes with Optimized Shadow Paging *": 2208, + "Reducing Seek Overhead with Application-Directed Prefetching": 3953, + "Reducing Unwanted Traffic in a Backbone Network": 4142, + "Reducing the Availability Management Overheads of Federated Content Sharing Systems": 4931, + "Reexamining Direct Cache Access to Optimize I/O Intensive Applications for Multi-hundred-gigabit Networks Reexamining Direct Cache Access to Optimize I/O Intensive Applications for Multi-hundred-gigabit Networks": 1217, + "Reexamining Some Holy Grails of Data Provenance": 402, + "Refactoring human roles solves systems problems": 1448, + "Reference Reconciliation in Complex Information Spaces": 617, + "Refining SQL Queries based on Why-Not Polynomials": 3920, + "Refreshing the Sky: The Compressed Skycube with Efficient Support for Frequent Updates": 4678, + "Regular Expression Learning for Information Extraction": 4695, + "Reinforced Extractive Summarization with Question-Focused Rewards": 3933, + "Reinforcement Learning-Based SLC Cache Technique for Enhancing SSD Write Performance": 2274, + "Reinventing Video Streaming for Distributed Vision Analytics": 1916, + "Relational retrieval using a combination of path-constrained random walks": 1888, + "Relevance Feedback Based on Parameter Estimation of Target Distribution": 4572, + "Reliability Markov models are becoming unreliable (WIP submission)": 1739, + "Reliability and Timeliness Analysis of Fault-tolerant Distributed Publish / Subscribe Systems": 2293, + "Reliable Client Accounting for P2P-Infrastructure Hybrids": 2502, + "Reliable Writeback for Client-side Flash Caches Reliable Writeback for Client-side Flash Caches": 879, + "Reliable and Efficient Programming Abstractions for Wireless Sensor Networks": 2965, + "Remembrance: The Unbearable Sentience of Being Digital": 1710, + "Remote Core Locking: Migrating Critical-Section Execution to Improve the Performance of Multithreaded Applications": 828, + "Remote Side-Channel Attacks on Anonymous Transactions Remote Side-Channel Attacks on Anonymous Transactions": 3719, + "Removing The Costs Of Indirection in Flash-based SSDs with Nameless Writes": 247, + "Repair Pipelining for Erasure-Coded Storage Repair Pipelining for Erasure-Coded Storage": 1022, + "Replex: A Scalable, Highly Available Multi-Index Data Store Replex: A Scalable, Highly Available Multi-Index Data Store": 983, + "Replication-driven Live Reconfiguration for Fast Distributed Transaction Processing Replication-driven Live Reconfiguration for Fast Distributed Transaction Processing": 1047, + "Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers": 3856, + "Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories": 3852, + "Representations of language in a model of visually grounded speech signal": 4258, + "Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)": 1418, + "Representing and Operating with Model Differences": 4586, + "ReproZip: Using Provenance to Support Computational Reproducibility": 3907, + "Reputation in Privacy Enhancing T Reputation in Privacy Enhancing T Reputation in Privacy Enhancing T Reputation in Privacy Enhancing T Reputation in Privacy Enhancing Technologies echnologies echnologies echnologies echnologies An Example: Remailer Networks An Example: Remailer Networks An Example: Remailer Networks An Example: Remailer Networks An Example: Remailer Networks": 1010, + "Request-Oriented Durable Write Caching for Application Performance Request-Oriented Durable Write Caching for Application Performance": 913, + "Requirements of Secure Storage Systems for Healthcare Records": 193, + "Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks": 4132, + "Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing": 2496, + "Resizable, Scalable, Concurrent Hash Tables via Relativistic Programming": 684, + "Resource Efficient Stream Processing Platform with Latency-Aware Scheduling Algorithms": 1945, + "Resource Provisioning of Web Applications in Heterogeneous Clouds": 357, + "Respecting the block interface -computational storage using virtual objects": 2228, + "Response time approximations in fork-join queues": 2375, + "Results of the WMT19 Metrics Shared Task: Segment-Level and Strong MT Systems Pose Big Challenges": 216, + "Results of the fifth edition of the BioASQ Challenge": 3791, + "Rethink the Sync!": 2489, + "Rethinking Access Control and Authentication for the Home Internet of Things (IoT) Rethinking Access Control and Authentication for the Home Internet of Things (IoT)": 3465, + "Rethinking Adaptability in Wide-Area Stream Processing Systems": 1906, + "Rethinking Data Management for Storage-centric Sensor Networks *": 2455, + "Rethinking Database Algorithms for Phase Change Memory": 3710, + "Rethinking Deduplication Scalability": 370, + "Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol": 42, + "Rethinking Isolation Mechanisms for Datacenter Multitenancy": 1941, + "Rethinking Networking Architectures for Cognitive Control": 4515, + "Rethinking Voter Coercion: The Realities Imposed by Technology": 2346, + "Rethinking WOM Codes to Enhance the Lifetime in New SSD Generations": 2257, + "Rethinking the Network Stack for Rack-scale Computers": 1818, + "Retransmission \u00a1 Repeat: Simple Retransmission Permutation Can Resolve Overlapping Channel Collisions": 3410, + "Retrieve, Rerank and Rewrite: Soft Template Based Neural Summarization": 4285, + "Retroactive Detection of Malware With Applications to Mobile Platforms": 457, + "Retrofitted Parallelism Considered Grossly Sub-Optimal": 2064, + "Return Of Bleichenbacher's Oracle Threat (ROBOT) Return Of Bleichenbacher's Oracle Threat (ROBOT)": 3435, + "Retwork: Exploring Reader Network with COTS RFID Systems Retwork: Exploring Reader Network with a COTS RFID System": 1237, + "Reverse Debugging of Kernel Failures in Deployed Systems Reverse Debugging of Kernel Failures in Deployed Systems": 1219, + "Reverse traceroute": 2363, + "Revisiting Concurrency in High-Performance NoSQL Databases": 2226, + "Revisiting MAC Design for an 802.11-based Mesh Network": 2399, + "Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks": 3189, + "Revisiting Software Zero-Copy for Web-caching Applications with Twin Memory Allocation *": 816, + "Revisiting Static Analysis of Android Malware": 1391, + "Revisiting the Storage Stack in Virtualized NAS Environments": 436, + "Rhea: automatic filtering for unstructured cloud storage": 2520, + "Riemannian Normalizing Flow on Variational Wasserstein Autoencoder for Text Modeling": 4192, + "Rise and Fall Patterns of Information Diffusion: Model and Implications": 4867, + "Risk-Averse Stochastic Optimization: Probabilistically-Constrained Models and Algorithms for Black-Box Distributions": 4705, + "Rivet: Browser-agnostic Remote Debugging for Web Applications": 812, + "RobinHood: Tail Latency Aware Caching- Dynamic Reallocation from Cache-Rich to Cache-Poor RobinHood: Tail Latency-Aware Caching - Dynamically Reallocating from Cache-Rich to Cache-Poor": 3031, + "Robust Distant Supervision Relation Extraction via Deep Reinforcement Learning": 4374, + "Robust Location Distinction using Temporal Link Signatures": 4709, + "Robust Unsupervised and Semi-Supervised Methods in Natural Language Processing": 2979, + "Robustness Analysis of Adaptive Chinese Input Methods": 3588, + "Robustness in the Salus scalable block store": 2547, + "Round-trips with meaning stopovers": 2369, + "Route Bazaar: Automatic Interdomain Contract Negotiation": 2042, + "RouteDetector: Sensor-based Positioning System that Exploits Spatio-Temporal Regularity of Human Mobility": 4057, + "Rumor Detection on Twitter with Tree-structured Recursive Neural Networks": 4359, + "Rump File Systems: Kernel Code Reborn": 2361, + "Run the GAMUT: A Comprehensive Approach to Evaluating Game-Theoretic Algorithms": 4748, + "Run-DMA": 4053, + "Running ZooKeeper Coordination Services in Untrusted Clouds": 1963, + "Running mixnet-based elections with Helios": 298, + "Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data": 2993, + "SAABNet: Managing Qualitative Knowledge in Software Architecture Assessment": 2477, + "SALSA: Analyzing Logs as StAte Machines 1": 3892, + "SAND: Towards High-Performance Serverless Computing SAND: Towards High-Performance Serverless Computing": 1052, + "SATenstein: Automatically Building Local Search SAT Solvers From Components": 209, + "SATzilla: An Algorithm Portfolio for SAT *": 4699, + "SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants": 3696, + "SCONE: Secure Linux Containers with Intel SGX SCONE: Secure Linux Containers with Intel SGX": 2983, + "SDDR: Light-Weight, Secure Mobile Encounters SDDR: Light-Weight, Secure Mobile Encounters": 3184, + "SECTOR: A Neural Model for Coherent Topic Segmentation and Classification": 3583, + "SEEdit: SELinux Security Policy Configuration System with Higher Level Language": 2484, + "SEQ 3 : Differentiable Sequence-to-Sequence-to-Sequence Autoencoder for Unsupervised Abstractive Sentence Compression": 4195, + "SEeSAW -Similarity Exploiting Storage for Accelerating Analytics Workflows": 2164, + "SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware SF-TAP: Scalable and Flexible Traffic Analysis Platform running on Commodity Hardware": 2438, + "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust *": 3661, + "SHILL: A Secure Shell Scripting Language SHILL: A Secure Shell Scripting Language": 2956, + "SILK: Preventing Latency Spikes in Log-Structured Merge Key-Value Stores SILK: Preventing Latency Spikes in Log-Structured Merge Key-Value Stores": 1134, + "SIMULATION MODEL CALIBRATION WITH CORRELATED KNOWLEDGE-GRADIENTS": 466, + "SIP CLF: A Common Log Format (CLF) for the Session Initiation Protocol (SIP)": 422, + "SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration": 2948, + "SLAOrchestrator: Reducing the Cost of Performance SLAs for Cloud Data Analytics SLAOrchestrator: Reducing the Cost of Performance SLAs for Cloud Data Analytics": 1103, + "SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data *": 3364, + "SLICE: A Novel Method to Find Local Linear Correlations by Constructing Hyperplanes\uf02a": 4885, + "SLIK: Scalable Low-Latency Indexes for a Key-Value Store SLIK: Scalable Low-Latency Indexes for a Key-Value Store": 968, + "SMARTER: Experiences with Cloud Native on the Edge": 2009, + "SMC: Smart Media Compression for Edge Storage Offloading": 1991, + "SMS of Death: from analyzing to attacking mobile phones on a large scale": 564, + "SOBA: Secrecy-preserving Observable Ballot-level Audit": 268, + "SOCK: Rapid Task Provisioning with Serverless-Optimized Containers SOCK: Rapid Task Provisioning with Serverless-Optimized Containers": 1101, + "SOME NEW DIRECTIONS IN GRAPH-BASED SEMI-SUPERVISED LEARNING": 2566, + "SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies": 2480, + "SPIN: Seamless Operating System Integration of Peer-to-Peer DMA Between SSDs and GPUs SPIN: Seamless Operating System Integration of Peer-to-Peer DMA Between SSDs and GPUs": 995, + "SPINFER: Inferring Semantic Patches for the Linux Kernel SPINFER: Inferring Semantic Patches for the Linux Kernel": 1250, + "SPORC: Group Collaboration using Untrusted Cloud Resources": 383, + "SRCMap: Energy Proportional Storage using Dynamic Consolidation": 3957, + "SSD Characterization: From Energy Consumption's Perspective": 733, + "SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy": 256, + "SSLShader: Cheap SSL Acceleration with Commodity Processors": 459, + "SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities": 3216, + "ST-HEC: Reliable and Scalable Software for Linear Algebra Computations on High End Computers": 3232, + "STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System": 2345, + "STMS: Improving MPTCP Throughput Under Heterogeneous Networks STMS: Improving MPTCP Throughput Under Heterogeneous Networks": 1106, + "STORIES in time: a graph-based interface for news tracking and discovery": 4815, + "STOW: A Spatially and Temporally Optimized Write Caching Algorithm": 1736, + "STRADS-AP: Simplifying Distributed Machine Learning Programming without Introducing a New Programming Model STRADS-AP: Simplifying Distributed Machine Learning Programming without Introducing a New Programming Model": 1163, + "SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps": 3242, + "SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems": 4046, + "SVC: Selector-based View Composition for Web Frameworks": 739, + "SYSTRAN Translation Stylesheets: Machine Translation driven by XSLT": 4580, + "SaFace: Towards Scenario-aware Face Recognition via Edge Computing System": 2028, + "Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET": 721, + "Safe and Automated Live Malware Experimentation on Public Testbeds *": 1362, + "SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization": 3572, + "SafetyNet: Improving the Availability of Shared Memory Multiprocessors with Global Checkpoint/Recovery": 93, + "Saliency-driven Word Alignment Interpretation for Neural Machine Translation": 498, + "Salt: Combining ACID and BASE in a Distributed Database Salt: Combining ACID and BASE in a Distributed Database": 2970, + "Same-Origin Policy: Evaluation in Modern Browsers Same-Origin Policy: Evaluation in Modern Browsers": 3403, + "Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems": 4074, + "Sampling-based Alignment and Hierarchical Sub-sentential Alignment in Chinese-Japanese Translation of Patents": 1206, + "Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions": 978, + "Sanctum: Minimal Hardware Extensions for Strong Software Isolation Sanctum: Minimal Hardware Extensions for Strong Software Isolation": 3294, + "Saql: A Stream-based Query System for Real-Time Abnormal System Behavior Detection SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection": 3458, + "Satellite: Joint Analysis of CDNs and Network-Level Interference Satellite: Joint Analysis of CDNs and Network-Level Interference": 979, + "SatelliteLab: Adding Heterogeneity to Planetary-Scale Network Testbeds": 799, + "Satori: Enlightened page sharing": 2473, + "Saving Cash by Using Less Cache": 1808, + "Say Goodbye to Off-heap Caches! On-heap Caches Using Memory-Mapped I/O": 2262, + "Say Goodbye to Virtualization for a Safer Cloud": 1917, + "Scalability of the Microsoft Cluster Service": 3961, + "Scalability! But at what COST?": 2055, + "Scalable Cloud Security via Asynchronous Virtual Machine Introspection": 1868, + "Scalable Data Aggregation for Dynamic Events in Sensor Networks *": 4719, + "Scalable Flow-Based Networking with DIFANE": 4752, + "Scalable In-Memory Transaction Processing with HTM Scalable In-Memory Transaction Processing with HTM": 986, + "Scalable Modeling of Real Graphs using Kronecker Multiplication": 1799, + "Scalable NUMA-aware Blocking Synchronization Primitives Scalable NUMA-aware Blocking Synchronization Primitives": 1016, + "Scalable Rule Management for Data Centers": 2529, + "Scalable Web Object Inspection and Malfease Collection *": 238, + "Scalable and Efficient Parallel and Distributed Simulation of Complex, Dynamic and Mobile Systems": 4537, + "Scalable and Private Media Consumption with Popcorn Scalable and private media consumption with Popcorn": 2653, + "Scalable and lightweight CTF infrastructures using application containers": 783, + "Scale-out Edge Storage Systems with Embedded Storage Nodes to Get Better Availability and Cost-Efficiency At the Same Time": 2015, + "Scaling Distributed File Systems in Resource-Harvesting Datacenters Scaling Distributed File Systems in Resource-Harvesting Datacenters *": 1029, + "Scaling Distributed Machine Learning with the Parameter Server Scaling Distributed Machine Learning with the Parameter Server": 2953, + "Scaling Guest OS Critical Sections with eCS Scaling Guest OS Critical Sections with eCS": 1085, + "Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow": 1107, + "Scaling Internet Research Publication Processes to Internet scale": 1340, + "Scaling Memcache at Facebook": 2531, + "Scaling SPADE to \"Big Provenance\"": 3924, + "Scaling Security for Big, Parallel File Systems": 2397, + "Scaling Verifiable Computation Using Efficient Set Accumulators Scaling Verifiable Computation Using Efficient Set Accumulators": 3687, + "Scaling on EC2 in a fast-paced environment Practice and Experience Report LISA 11": 294, + "Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability": 648, + "Scaph: Scalable GPU-Accelerated Graph Processing with Value-Driven Differential Scheduling Scaph: Scalable GPU-Accelerated Graph Processing with Value-Driven Differential Scheduling": 1275, + "Scattercache: Thwarting Cache Attacks via Cache Set Randomization SCATTERCACHE: Thwarting Cache Attacks via Cache Set Randomization": 3573, + "Schedulability Criterion and Performance Analysis of Coordinated Schedulers": 4429, + "Scheduler-based Defenses against Cross-VM Side-channels Scheduler-based Defenses against Cross-VM Side-channels": 3206, + "SciDTB: Discourse Dependency TreeBank for Scientific Abstracts": 4403, + "Scoring Lexical Entailment with a Supervised Directional Similarity Network": 4412, + "Scratch & Vote Self-Contained Paper-Based Cryptographic Voting": 1299, + "Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images Screen After Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images": 3327, + "Scripting the cloud with Skywriting": 570, + "Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers": 4048, + "Seagull: Intelligent Cloud Bursting for Enterprise Applications": 844, + "Seamless BGP Migration With Router Grafting": 68, + "Seamless BGP Migration With Router Grafting_2367": 2367, + "Search Combinators": 310, + "Search-based Neural Structured Learning for Sequential Question Answering": 4267, + "Searching Dynamic Point Sets in Spaces with Bounded Doubling Dimension *": 38, + "Searching Substructures with Superimposed Distance *": 4656, + "Searching for Stability in Interdomain Routing": 1222, + "Searching for the X-Factor: Exploring Corpus Subjectivity for Word Embeddings": 4326, + "Seawall: Performance Isolation for Cloud Datacenter Networks": 650, + "SecPM: a Secure and Persistent Memory System for Non-volatile Memory": 2225, + "SecPod: a Framework for Virtualization-based Security Systems SecPod: A Framework for Virtualization-based Security Systems": 937, + "Secure Cloud Computing with a Virtualized Network Infrastructure": 428, + "Secure Data Preservers for Web Services": 472, + "Secure Deduplication of General Computations Secure Deduplication of General Computations": 934, + "Secure In-Band Wireless Pairing": 404, + "Secure Incentivization for Decentralized Content Delivery": 1993, + "Secure Internet Voting on Limited Devices with Anonymized DSA Public Keys": 426, + "Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry Position Paper": 1762, + "Secure Multi-User Content Sharing for Augmented Reality Applications Secure Multi-User Content Sharing for Augmented Reality Applications": 3563, + "Secure Multi-party Computation of Differentially Private Median Secure Multi-party Computation of Differentially Private Median": 3595, + "Secure Passwords Through Enhanced Hashing": 3882, + "Secure Program Execution via Dynamic Information Flow Tracking": 2555, + "Secure and Efficient Application Monitoring and Replication": 944, + "Secure and Efficient Network Access": 1021, + "Secure parallel computation on national scale volumes of data Secure parallel computation on national scale volumes of data": 3670, + "Secure, Archival Storage with POTSHARDS": 3881, + "Secure, Precise, and Fast Floating-Point Operations on x86 Processors Secure, Precise, and Fast Floating-Point Operations on x86 Processors": 3323, + "Secured Routines: Language-based Construction of Trusted Execution Environments Secured Routines: Language-based Construction of Trusted Execution Environments": 1146, + "Securing RDMA for High-Performance Datacenter Storage Systems": 1949, + "Securing Self-Virtualizing Ethernet Devices Securing Self-Virtualizing Ethernet Devices": 3266, + "Security Analysis of a Full-Body Scanner Security Analysis of a Full-Body Scanner": 3191, + "Security Analysis of eIDAS -The Cross-Country Authentication Scheme in Europe": 4093, + "Security Exercises for the Online Classroom with DETER": 592, + "Security Fusion: A New Security Architecture for Resource-Constrained Environments": 571, + "Security Impact of High Resolution Smartphone Cameras": 4026, + "Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems": 1766, + "Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators": 3875, + "See Spot Run: Using Spot Instances for MapReduce Workflows": 331, + "Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed": 3422, + "Seeing stars when there aren't many stars: Graph-based semi-supervised learning for sentiment categorization": 2599, + "Seer: Leveraging Big Data to Navigate The Complexity of Cloud Debugging": 1901, + "SeerSuite: Developing a scalable and reliable application framework for building digital libraries by crawling the web": 678, + "Selecta: Heterogeneous Cloud Storage Configuration for Data Analytics Selecta: Heterogeneous Cloud Storage Configuration for Data Analytics": 1089, + "Selective Attention for Context-aware Neural Machine Translation": 4213, + "Selective Capture and Replay of Program Executions": 4835, + "SelectiveEC: Selective Reconstruction in Erasure-coded Storage Systems": 2273, + "Selectively Taming Background Android Apps to Improve Battery Lifetime Selectively Taming Background Android Apps to Improve Battery Lifetime": 922, + "Self-Checking Fault Detection using Discrepancy Mirrors": 255, + "Self-Disclosure and Relationship Strength in Twitter Conversations": 4235, + "Self-Driving Cars and Data Collection: Privacy Perceptions of Networked Autonomous Vehicles Self-Driving Cars and Data Collection: Privacy Perceptions of Networked Autonomous Vehicles": 3787, + "Self-disclosure topic model for classifying and analyzing Twitter conversations": 4170, + "Self-efficacy in Cybersecurity Tasks and its Relationship with Cybersecurity Competition and Work-related Outcomes": 786, + "SemEval-2019 Task 1: Cross-lingual Semantic Parsing with UCCA": 3278, + "Semantic Parsing for Single-Relation Question Answering": 4245, + "Semantic Parsing via Staged Query Graph Generation: Question Answering with Knowledge Base": 4247, + "Semantic-Driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies": 2222, + "Semantically Equivalent Adversarial Rules for Debugging NLP Models": 4301, + "Semantically-Aligned Equation Generation for Solving and Reasoning Math Word Problems": 4210, + "Semantics of Caching with SPOCA: A Stateless, Proportional, Optimally-Consistent Addressing Algorithm": 320, + "Semantics-based Distributed I/O with the ParaMEDIC Framework *": 4968, + "Semi-Supervised Time Series Classification": 4864, + "Semi-supervised User Geolocation via Graph Convolutional Networks": 4361, + "SemperOS: A Distributed Capability System SemperOS: A Distributed Capability System": 1152, + "Sensitive Information Tracking in Commodity IoT Sensitive Information Tracking in Commodity IoT": 3441, + "Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming": 4103, + "Separating Web Applications from User Data Storage with BSTORE": 317, + "Sequence-to-Action: End-to-End Semantic Graph Generation for Semantic Parsing": 4294, + "Sequence-to-sequence Models for Cache Transition Systems": 4347, + "Sequential Hypothesis Testing under Stochastic Deadlines": 145, + "Serval: An End-Host Stack for Service-Centric Networking": 2505, + "Server Operational Cost Optimization for Cloud Computing Service Providers over a Time Horizon": 608, + "Server Workload Analysis for Power Minimization using Consolidation": 3958, + "Server-Friendly Delta Compression for Efficient Web Access": 174, + "Server-assisted Latency Management for Wide-area Distributed Systems": 845, + "ServerSwitch: A Programmable and High Performance Platform for Data Center Networks": 529, + "Serverless Boom or Bust? An Analysis of Economic Incentives": 1944, + "Serverless Computation with OpenLambda": 1861, + "Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider": 1251, + "Shadow Configuration as a Network Management Primitive": 159, + "Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications": 1379, + "ShadowMove: A Stealthy Lateral Movement Strategy ShadowMove: A Stealthy Lateral Movement Strategy": 3679, + "ShadowNet: A Platform for Rapid and Safe Network Evolution": 1325, + "ShadowStream: Performance Evaluation as a Capability in Production Internet Live Streaming Networks": 710, + "Shape Segmentation and Applications in Sensor Networks": 3043, + "Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships": 3818, + "Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users": 3782, + "Sharing and Caring of Data at the Edge": 2024, + "Sharing, Protection and Compatibility for Reconfigurable Fabric with AmorphoS Sharing, Protection, and Compatibility for Reconfigurable Fabric with AMORPHOS": 3048, + "Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation": 3740, + "Shattered Trust: When Replacement Smartphone Components Attack": 4089, + "Shedding too much Light on a Microcontroller's Firmware Protection": 4084, + "Sherlock Holmes and The Case of the Advanced Persistent Threat": 2386, + "Shielding Applications from an Untrusted Cloud with Haven Shielding applications from an untrusted cloud with Haven": 2940, + "Shielding Software From Privileged Side-Channel Attacks Shielding Software From Privileged Side-Channel Attacks": 3451, + "Shimmy: Shared Memory Channels for High Performance Inter-Container Communication": 1983, + "Shoal: Smart Allocation and Replication of Memory For Parallel Programs Shoal: smart allocation and replication of memory for parallel programs": 909, + "Shooting the moving target: machine learning in cybersecurity Shooting the moving target: machine learning in cybersecurity": 2879, + "Shortest Paths in Directed Planar Graphs with Negative Lengths: a Linear-Space O(n log 2 n)-Time Algorithm": 3776, + "Should Security Researchers Experiment More and Draw More Inferences?": 482, + "Should one compute the Temporal Difference fix point or minimize the Bellman Residual ? The unified oblique projection view": 4722, + "Show Me the Money: Characterizing Spam-advertised Revenue": 469, + "ShuttleDB: Database-Aware Elasticity in the Cloud ShuttleDB: Database-Aware Elasticity in the Cloud": 2307, + "SiLo: A Similarity-Locality based Near-Exact Deduplication Scheme with Low RAM Overhead and High Throughput": 725, + "Sibyl: A Practical Internet Route Oracle Sibyl: A Practical Internet Route Oracle": 2646, + "Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds": 2686, + "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems Silhouette: Efficient Protected Shadow Stacks for Embedded Systems": 3748, + "Silk Server -Adding missing Links while consuming Linked Data": 4948, + "Silver: A scalable, distributed, multi-versioning, Always growing (Ag) File System": 2175, + "SilverLine: Data and Network Isolation for Cloud Services": 567, + "Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation": 4861, + "Similarity Search: A Matching Based Approach": 189, + "Simple Coreference Resolution with Rich Syntactic and Semantic Features": 6, + "Simple Password-Hardened Encryption Services Simple Password-Hardened Encryption Services": 3476, + "Simple and Effective Multi-Paragraph Reading Comprehension": 4300, + "Simple and Effective Text Simplification Using Semantic and Neural Methods": 4286, + "Simplified Abugidas": 4410, + "Simplifying Manageability, Scalability and Host Mobility in Large-Scale Enterprise Networks using VEIL-click": 456, + "Simplifying Software-Defined Network Optimization Using SOL Simplifying Software-Defined Network Optimization Using SOL": 2655, + "Simulating Malicious Insiders in Real Host-Monitored User Data": 1372, + "Simulating the Power Consumption of Large-Scale Sensor Network Applications General Terms": 3333, + "Simulation of Scale-Free Networks": 4818, + "Simultaneously Improving Code Size, Performance, and Energy in Embedded Processors": 4888, + "Simultaneously Modeling Semantics and Structure of Threaded Discussions: A Sparse Coding Approach and Its Applications *": 3888, + "Single-Hop Probing Asymptotics in Available Bandwidth Estimation: Sample-Path Analysis": 4054, + "Sink Tree-Based Bandwidth Allocation for Scalable QoS Flow Set-Up": 4549, + "SinkMiner: Mining Botnet Sinkholes for Fun and Profit": 2392, + "Siphon: Expediting Inter-Datacenter Coflows in Wide-Area Data Analytics Siphon: Expediting Inter-Datacenter Coflows in Wide-Area Data Analytics": 1096, + "Sirius: Distributing and Coordinating Application Reference Data Sirius: Distributing and Coordinating Application Reference Data": 858, + "Site Isolation: Process Separation for Web Sites within the Browser Site Isolation: Process Separation for Web Sites within the Browser": 3562, + "Situated Mapping of Sequential Instructions to Actions with Single-step Reward Observation": 4368, + "Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard": 3171, + "Sketch Recognizers from the End-User's, the Designer's, and the Programmer's Perspective": 4522, + "Sketch-based Change Detection: Methods, Evaluation, and Applications": 152, + "Skill Squatting Attacks on Amazon Alexa Skill Squatting Attacks on Amazon Alexa": 3475, + "Skills and Characteristics of Successful Cybersecurity Advocates": 4139, + "Sleepless in Seattle No Longer": 619, + "SliceTime: A platform for scalable and accurate network emulation": 713, + "Sliding Look-Back Window Assisted Data Chunk Rewriting for Improving Deduplication Restore Performance This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Sliding Look-Back Window Assisted Data Chunk Rewriting for Improving Deduplication Restore Performance": 1608, + "Slipstream: Automatic Interprocess Communication Optimization Slipstream: Automatic Interprocess Communication Optimization": 897, + "Slitheen++: Stealth TLS-based Decoy Routing": 1720, + "SloMo: Downclocking WiFi Communication": 2539, + "Slow Down or Sleep, that is the Question": 506, + "Small World with High Risks: A Study of Security Threats in the npm Ecosystem Small World with High Risks: A Study of Security Threats in the npm Ecosystem": 3580, + "Small is Big: Functionally Partitioned File Caching in Virtualized Environments": 1790, + "SmartAuth: User-Centered Authorization for the Internet of Things SmartAuth: User-Centered Authorization for the Internet of Things": 3408, + "SmartCuckoo: A Fast and Cost-Efficient Hashing Index Scheme for Cloud Storage Systems SmartCuckoo: A Fast and Cost-Efficient Hashing Index Scheme for Cloud Storage Systems": 1040, + "SmartDedup: Optimizing Deduplication for Resource-constrained Devices SmartDedup: Optimizing Deduplication for Resource-constrained Devices": 1201, + "SmartPool: Practical Decentralized Pooled Mining SMARTPOOL: Practical Decentralized Pooled Mining": 3380, + "SmartSwitch: Blurring the Line Between Network Infrastructure & Cloud Applications": 1833, + "SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies": 3735, + "Snowball: Extracting Relations from Large Plain-Text Collections": 4458, + "SoK: Make JIT-Spray Great Again": 4097, + "SoK: XML Parser Vulnerabilities": 4075, + "SoNIC: Precise Realtime Software Access and Control of Wired Networks": 2524, + "Social Action Tracking via Noise Tolerant Time-varying Factor Graphs": 156, + "Social Authentication for End-to-End Encryption": 3978, + "Social Influence Analysis in Large-scale Networks": 157, + "Sockets Direct Procotol over InfiniBand in Clusters: Is it Beneficial? *": 2187, + "Sockets Direct Protocol for Hybrid Network Stacks: A Case Study with iWARP over 10G Ethernet \u22c6": 2010, + "Sockets vs RDMA Interface over 10-Gigabit Networks: An In-depth analysis of the Memory Traffic Bottleneck": 2288, + "Soft Updates Made Simple and Fast on Non-volatile Memory Soft Updates Made Simple and Fast on Non-volatile Memory": 1005, + "SoftFlow: A Middlebox Architecture for Open vSwitch SoftFlow: A Middlebox Architecture for Open vSwitch": 991, + "Softspeak: Making VoIP Play Well in Existing 802.11 Deployments": 3956, + "Software Dataplane Verification Mihai Dobrescu and Katerina Argyraki, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne Software Dataplane Verification": 2568, + "Software Defined Traffic Measurement with OpenSketch": 2519, + "Software Defining System Devices with the 'Banana' Double-Split Driver Model": 1830, + "Software Engagement with Sleeping CPUs": 2063, + "Software Persistent Memory": 846, + "Software Support for Software-Independent Auditing -Short Paper": 1735, + "Software Techniques for Avoiding Hardware Virtualization Exits": 813, + "Solving (Weighted) Partial MaxSAT through Satisfiability Testing": 4772, + "Solving Difficult HTM Problems Without Difficult Hardware": 4916, + "Some Remarks on Factor Graphs": 1632, + "Something's Brewing! Early Prediction of Controversy-causing Posts from Discussion Features": 4203, + "Sophia: Online Reconfiguration of Clustered NoSQL Databases for Time-Varying Workloads SOPHIA: Online Reconfiguration of Clustered NoSQL Databases for Time-Varying Workload": 1178, + "Sora: High Performance Software Radio Using General Purpose Multi-core Processors": 3891, + "Soroban: Attributing Latency in Virtualized Environments": 1847, + "Soteria: Automated IoT Safety and Security Analysis SOTERIA: Automated IoT Safety and Security Analysis": 1062, + "Sound and Complete Landmarks for And/Or Graphs": 4517, + "Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound": 3246, + "Source Phrase Segmentation and Translation for Japanese-English Translation Using Dependency Structure": 1051, + "SpanDex: Secure Password Tracking for Android SpanDex: Secure Password Tracking for Android": 3162, + "SpanFS: A Scalable File System on Fast Storage Devices SpanFS: A Scalable File System on Fast Storage Devices": 911, + "Spanner: Google's Globally-Distributed Database": 2919, + "Spark: Cluster Computing with Working Sets": 737, + "Sparse Coding of Neural Word Embeddings for Multilingual Sequence Labeling": 3639, + "Sparse and Constrained Attention for Neural Machine Translation": 4393, + "Spartan: A Distributed Array Framework with Smart Tiling Spartan: A Distributed Array Framework with Smart Tiling": 907, + "SpecFuzz: Bringing Spectre-type vulnerabilities to the surface SpecFuzz Bringing Spectre-type vulnerabilities to the surface": 3685, + "SpecNet: Spectrum Sensing SansFront\u00ec eres": 453, + "Specialize in Moderation -Building Application-aware Storage Services using FPGAs in the Datacenter": 2237, + "Specification Mining for Intrusion Detection in Networked Control Systems Specification Mining for Intrusion Detection in Networked Control Systems": 3292, + "Specification-Driven Development of an Executable Metamodel in Eiffel": 4800, + "Spectre Returns! Speculation Attacks using the Return Stack Buffer": 4100, + "Speculative Encryption on GPU Applied to Cryptographic File Systems This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Speculative Encryption on GPU Applied to Cryptographic File Systems": 1609, + "Speech-Assisted Radiology System for Retrieval, Reporting and Annotation": 4873, + "Speed-Breaker Early Warning System": 2869, + "Speeding Up HMM Decoding and Training by Exploiting Sequence Repetitions": 3788, + "Speeding up Web Page Loads with Shandian Speeding up Web Page Loads with Shandian": 2687, + "Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions": 3404, + "Spindle: Informed Memory Access Monitoring Spindle: Informed Memory Access Monitoring": 1117, + "Splash: Fast Data Dissemination with Constructive Interference in Wireless Sensor Networks": 2542, + "Splinter: Bare-Metal Extensions for Multi-Tenant Low-Latency Storage Splinter: Bare-Metal Extensions for Multi-Tenant Low-Latency Storage": 3051, + "SplinterDB: Closing the Bandwidth Gap for NVMe Key-Value Stores SplinterDB: Closing the Bandwidth Gap for NVMe Key-Value Stores": 1215, + "Split and Rephrase: Better Evaluation and a Stronger Baseline": 3442, + "Split/Merge: System Support for Elastic Execution in Virtual Middleboxes": 2540, + "SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering Precision SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering Precision": 974, + "SplitKV: Splitting IO Paths for Different Sized Key-Value Items with Advanced Storage Devices": 2254, + "SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks": 526, + "SplitScreen: Enabling Efficient, Distributed Malware Detection": 1319, + "SplitX: Split Guest/Hypervisor Execution on Multi-Core": 501, + "Spool: Reliable Virtualized NVMe Storage Pool in Public Cloud Infrastructure Spool: Reliable Virtualized NVMe Storage Pool in Public Cloud Infrastructure": 1265, + "Spotnik: Designing Distributed Machine Learning for Transient Cloud Resources": 1952, + "Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE": 2928, + "Spyglass: Demand-Provisioned Linux Containers for Private Network Access Spyglass: Demand-Provisioned Linux Containers for Private Network Access": 2437, + "Spying the World from your Laptop \u2212 Identifying and Profiling Content Providers and Big Downloaders in BitTorrent": 505, + "Squeezing out All the Value of Loaded Data: An Out-of-core Graph Processing System with Reduced Disk I/O Squeezing out All the Value of Loaded Data: An Out-of-core Graph Processing System with Reduced Disk I/O": 992, + "StAN: Exploiting Shared Interests without Disclosing Them in Gossip-based Publish/Subscribe *": 542, + "Stable Deterministic Multithreading through Schedule Memoization": 343, + "Stable and Consistent Membership at Scale with Rapid Stable and Consistent Membership at Scale with Rapid": 1108, + "Stack-Pointer Networks for Dependency Parsing": 4341, + "StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs": 949, + "Staging Package Deployment via Repository Management": 594, + "Standard Metrics and Scenarios for Usable Authentication": 3973, + "StarTrack Next Generation: A Scalable Infrastructure for Track-Based Applications": 429, + "Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks *": 3998, + "State-of-the-Art Kernels for Natural Language Processing": 4237, + "Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications": 327, + "Static Detection of Access Control Vulnerabilities in Web Applications": 670, + "Static Detection of Second-Order Vulnerabilities in Web Applications Static Detection of Second-Order Vulnerabilities in Web Applications": 3163, + "Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing": 4088, + "Static Scheduling in Clouds": 434, + "Statistical Debugging using Latent Topic Models *": 2577, + "Statistical Machine Learning Makes Automatic Control Practical for Internet Datacenters": 1303, + "Statistical Phrase-Based Translation": 4704, + "Statistical Predicate Invention": 399, + "Staying in the Middle: Exact and Approximate Medians in R 1 and R 2 for Moving Points *": 3054, + "Stealth Probing: Efficient Data-Plane Security for IP Routing": 4768, + "Stealthy Tracking of Autonomous Vehicles with Cache Side Channels Stealthy Tracking of Autonomous Vehicles with Cache Side Channels": 3668, + "Steel: Simplified Development and Deployment of Edge-Cloud Applications": 1915, + "Stencil Computation Optimization and Auto-tuning on State-of-the-Art Multicore Architectures": 3287, + "Stepwise Randomized Combinatorial Auctions Achieve Revenue Monotonicity": 4700, + "Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection": 3166, + "Stochastic Analysis of Horizontal IP Scanning": 4154, + "Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks": 2518, + "Stock Movement Prediction from Tweets and Historical Prices": 4358, + "Storage Efficiency Opportunities and Analysis for Video Repositories": 2140, + "Storage Performance Isolation: An Investigation of Contemporary I/O Schedulers": 761, + "Storage Workload Isolation via Tier Warming: How Models Can Help Storage Workload Isolation via Tier Warming: How Models Can Help": 2326, + "Storage on Your Smartphone Uses More Energy Than You Think": 2196, + "Store-Edge RippleStream: Versatile Infrastructure for IoT Data Transfer": 1969, + "Storing Trees on Disk Drives": 1295, + "Stout: An Adaptive Interface to Scalable Cloud Storage": 544, + "Straight to the Tree: Constituency Parsing with Neural Syntactic Distance": 4323, + "Strange Bedfellows: Community Identification in BitTorrent": 330, + "Stratum: A Serverless Framework for the Lifecycle Management of Machine Learning-based Data Analytics Tasks Stratum: A Serverless Framework for the Lifecycle Management of Machine Learning-based Data Analytics Tasks": 2880, + "Stratus: Clouds with Microarchitectural Resource Management": 1947, + "Stream Monitoring under the Time Warping Distance": 4662, + "StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone": 1185, + "StreamScope: Continuous Reliable Distributed Processing of Big Data Streams STREAMSCOPE: Continuous Reliable Distributed Processing of Big Data Streams": 2670, + "Streaming Scalable Video over WiMAX Networks": 50, + "Strengthening Password-based Authentication": 3974, + "StripeFinder: Erasure Coding of Small Objects over Key-Value Storage Devices (An Uphill Battle)": 2265, + "Striping without Sacrifices: Maintaining POSIX Semantics in a Parallel File System": 3880, + "StrobeLight: Lightweight Availability Mapping and Anomaly Detection": 2469, + "Strong Baselines for Neural Semi-Supervised Learning under Domain Shift": 4314, + "Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory": 3362, + "Stronger Semantics for Low-Latency Geo-Replicated Storage": 2527, + "Structural Link Analysis from User Profiles and Friends Networks: A Feature Construction Approach": 130, + "Structural Neural Encoders for AMR-to-text Generation": 4216, + "Structural Patterns Heuristics via Fork Decomposition": 4453, + "Structural Patterns of Tractable Sequentially-Optimal Planning": 4449, + "Structural-Pattern Databases": 4779, + "Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems": 2508, + "Structuring Unstructured Peer-to-Peer Networks": 119, + "Students Who Don't Understand Information Flow Should be Eaten: An Experience Paper": 1352, + "Study on contexts in tracking usage and attention metadata in the field of multilingual Technology Enhanced Learning": 4524, + "Style Guide for Voting System Documentation: Why User-Centered Documentation Matters to Voting Security": 1327, + "Submodular Optimization-based Diverse Paraphrasing and its Effectiveness in Data Augmentation": 4215, + "Subscription Dynamics and Competition in Communications Markets": 620, + "Subversive-C: Abusing and Protecting Dynamic Message Dispatch Subversive-C: Abusing and Protecting Dynamic Message Dispatch": 969, + "Subverting BIND's SRTT Algorithm Derandomizing NS Selection": 4013, + "Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture": 3153, + "Sum of Us: Strategyproof Selection from the Selectors": 4724, + "Summarizing and Mining Inverse Distributions on Data Streams via Dynamic Inverse Sampling": 669, + "Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale Sunrise to Sunset: Analyzing the End-to-end Life Cycle and EEectiveness of Phishing Attacks at Scale": 3684, + "Super Solutions for Combinatorial Auctions": 321, + "Supervised Probabilistic Principal Component Analysis": 1821, + "Supporting Demanding Wireless Applications with Frequency-agile Radios": 4145, + "Supporting Distributed Execution of Smartphone Workloads on Loosely Coupled Heterogeneous Processors": 2090, + "Supporting Docker in Emulab-Based Network Testbeds": 1398, + "Supporting Dynamic GPU Computing Result Reuse in the Cloud": 1855, + "Supporting Objects in Run-Time Bytecode Specialization": 95, + "Supporting Ranking and Clustering as Generalized Order-By and Group-By * General Terms": 4692, + "Supporting Security Sensitive Tenants in a Bare-Metal Cloud Supporting Security Sensitive Tenants in a Bare-Metal Cloud * \u2020": 1180, + "Supporting Strong Coherency for Active Caches in Multi-Tier Data-Centers over InfiniBand": 2310, + "Supporting Undo and Redo in Scientific Data Analysis": 3915, + "Supporting Undoability in Systems Operations Supporting Undoability in Systems Operations": 2429, + "Supporting iWARP Compatibility and Features for Regular Network Adapters *": 2266, + "Supporting the Global Arrays PGAS Model Using MPI One-Sided Communication": 211, + "Surviving Peripheral Failures in Embedded Systems Surviving Peripheral Failures in Embedded Systems": 931, + "Surviving congestion in geo-distributed storage systems": 848, + "Suspend-aware Segment Cleaning in Log-structured File System": 2147, + "Sweet Storage SLOs with Frosting": 1801, + "SweynTooth: Unleashing Mayhem over Bluetooth Low Energy SweynTooth: Unleashing Mayhem over Bluetooth Low Energy": 1218, + "Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud": 4095, + "Sybil-Resilient Online Content Voting": 3936, + "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks": 4445, + "SymDrive: Testing Drivers without Devices": 2931, + "Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives": 4106, + "Symbolic execution for BIOS security 1": 4040, + "Symbolic execution with SymCC: Don't interpret, compile! Symbolic execution with SYMCC: Don't interpret, compile!": 3693, + "Symmetries and the Complexity of Pure Nash Equilibrium": 2666, + "Symmetry of Information: A Closer Look": 131, + "Synergy2Cloud: Introducing Cross-Sharing of Application Experiences Into the Cloud Management Cycle": 2030, + "Synergy: A Policy-driven, Trust-aware Information Dissemination Framework": 1743, + "Synoptic: Summarizing System Logs with Refinement": 640, + "Syntax for Semantic Role Labeling, To Be, Or Not To Be": 4367, + "Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Computing Systems": 2022, + "Synthesizing View Definitions from Data *": 4734, + "Syntia: Synthesizing the Semantics of Obfuscated Code Syntia: Synthesizing the Semantics of Obfuscated Code": 3350, + "System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces": 3847, + "System Combination of RBMT plus SPE and Preordering plus SMT": 1737, + "Systematic Implementation of Real-Time Models": 4510, + "Systematically Exploring the Behavior of Control Programs Systematically Exploring the Behavior of Control Programs": 895, + "TAP: Time-aware Provenance for Distributed Systems": 750, + "TAPE: A Transactional Application Profiling Environment": 4629, + "TCP-LP: A Distributed Algorithm for Low Priority Data Transfer": 4426, + "TDNN: A Two-stage Deep Neural Network for Prompt-independent Automated Essay Scoring": 4316, + "TESTREX: a Testbed for Repeatable Exploits": 1365, + "THE ADVANCED COMPUTING SYSTEMS ASSOCIATION Investigations of Power Analysis Attacks on Smartcards": 2467, + "THE KNOWLEDGE-GRADIENT STOPPING RULE FOR RANKING AND SELECTION": 4914, + "TIE Breaking: Tunable Interdomain Egress Selection": 4441, + "TLC: Transmission Line Caches": 140, + "TLM POWER3: Power Estimation Methodology for SystemC TLM 2.0": 921, + "TRESOR Runs Encryption Securely Outside RAM": 563, + "TRIAD: Creating Synergies Between Memory, Disk and Log in Log Structured Key-Value Stores TRIAD: Creating Synergies Between Memory, Disk and Log in Log Structured Key-Value Stores": 994, + "TROPIC: Transactional Resource Orchestration Platform In the Cloud": 841, + "TVM: An Automated End-to-End Optimizing Compiler for Deep Learning TVM: An Automated End-to-End Optimizing Compiler for Deep Learning": 3035, + "Tackling Parallelization Challenges of Kernel Network Stack for Container Overlay Networks": 1927, + "Tackling runtime-based obfuscation in Android with Tiro Tackling runtime-based obfuscation in Android with TIRO": 3515, + "Tackling the Story Ending Biases in The Story Cloze Test": 4238, + "Tag-based Information Flow Analysis for Document Classification in Provenance": 3894, + "Tag-based Social Interest Discovery": 4725, + "Tailwind: Fast and Atomic RDMA-based Replication Tailwind: Fast and Atomic RDMA-based Replication": 1112, + "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones": 372, + "TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection": 33, + "Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices": 1757, + "Taking a Look into Execute-Only Memory": 4118, + "Taking proof-based verified computation a few steps closer to practicality 1": 3117, + "Taming the Computational Complexity of Combinatorial Auctions: Optimal and Approximate Approaches": 2888, + "Taming the Flying Cable Monster: A Topology Design and Optimization Framework for Data-Center Networks": 560, + "Taming the Flying Cable Monster: A Topology Design and Optimization Framework for Data-Center Networks_561": 561, + "Tangram: Bridging Immutable and Mutable Abstractions for Distributed Data Analytics Tangram: Bridging Immutable and Mutable Abstractions for Distributed Data Analytics": 1154, + "TapCon: Practical Third-Party Attestation for the Cloud": 1895, + "TapDance: End-to-Middle Anticensorship without Flow Blocking TapDance: End-to-Middle Anticensorship without Flow Blocking": 3214, + "Taylor's Law for Human Linguistic Sequences": 4321, + "Teaching Computer Science with Cybersecurity Education Built-in": 789, + "Teaching Software Projects at Universities in Tampere": 114, + "Teaching with angr: A Symbolic Execution Curriculum and CTF *": 805, + "TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves": 3612, + "Telepathwords: Preventing Weak Passwords by Reading Users' Minds Telepathwords: preventing weak passwords by reading users' minds": 3179, + "Telex: Anticensorship in the Network Infrastructure": 724, + "Telling Your Secrets Without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution Telling Your Secrets Without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution": 3409, + "Temporal Action-Graph Games: A New Representation for Dynamic Games": 1555, + "Temporal Aggregation over Data Streams using Multiple Granularities": 4688, + "Temporal System Call Specialization for Attack Surface Reduction Temporal System Call Specialization for Attack Surface Reduction": 3635, + "Ten male colleagues took part in our lab-study about mobile texting": 4795, + "Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks": 3541, + "Terra Incognita: On the Practicality of User-Space File Systems": 2149, + "TerseCades: Efficient Data Compression in Stream Processing TerseCades: Efficient Data Compression in Stream Processing": 1104, + "Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection": 953, + "Testing Voters' Understanding of a Security Mechanism used in Verifiable Voting": 2350, + "Text Extraction from the Web via Text-to-Tag Ratio": 4616, + "Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems": 4202, + "That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers": 3682, + "The \"Platform as a Service\" Model for Networking": 480, + "The ACL Anthology: Current State and Future Directions": 1446, + "The ATOMO\u03a3 Transactional Programming Language": 4619, + "The Anatomy of Web Censorship in Pakistan": 1683, + "The Architecture and Implementation of an Extensible Web Crawler": 2278, + "The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts": 3569, + "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections *": 3713, + "The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level": 3497, + "The Battle of the Schedulers: FreeBSD ULE vs. Linux CFS The Battle of the Schedulers: FreeBSD ULE vs. Linux CFS": 1060, + "The Beauty and the Beast: Vulnerabilities in Red Hat's Packages": 2486, + "The Best of Both Worlds: Combining Recent Advances in Neural Machine Translation": 4280, + "The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends": 3529, + "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy": 1321, + "The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness": 528, + "The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI": 3473, + "The Case for Benchmarking Control Operations in Cloud Native Storage": 2267, + "The Case for Byzantine Fault Detection": 821, + "The Case for Determinism on the Edge": 1992, + "The Case for Dual-access File Systems over Object Storage": 2239, + "The Case for Energy-Oriented Partial Desktop Migration": 280, + "The Case for Enterprise-Ready Virtual Private Clouds": 632, + "The Case for Enterprise-Ready Virtual Private Clouds_3996": 3996, + "The Case for Fine-Grained Traffic Engineering in Data Centers": 271, + "The Case for Less Predictable Operating System Behavior": 2061, + "The Case for Power-Agile Computing": 315, + "The Case for Separating Routing from Routers": 4438, + "The Case for System Testing with Swift Hierarchical VM Fork": 1834, + "The Case for Unifying Data Loading in Machine Learning Clusters": 1925, + "The Case for VOS: The Vector Operating System": 693, + "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance": 1721, + "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance_1758": 1758, + "The Challenge of Cloud Control": 1653, + "The Click2NetFPGA Toolchain": 815, + "The Cloud is Not Enough: Saving IoT from the Cloud": 1853, + "The Common Case Transactional Behavior of Multithreaded Programs": 4624, + "The Complexity of Predicting Atomicity Violations \ud97b\udf59": 4503, + "The Cost of Privatization in Software Transactional Memory": 146, + "The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links": 3537, + "The Cut-and-Choose Game and Its Application to Cryptographic Protocols The Cut-and-Choose Game and its Application to Cryptographic Protocols": 3345, + "The Cutting EDGE of IP Router Configuration": 4376, + "The DComp Testbed": 1412, + "The Dangers of Key Reuse: Practical Attacks on IPsec IKE The Dangers of Key Reuse: Practical Attacks on IPsec IKE": 3453, + "The Data Furnace: Heating Up with Cloud Computing": 519, + "The Datacenter Needs an Operating System": 736, + "The Design and Evolution of Live Storage Migration in VMware ESX": 541, + "The Design and Implementation of the Warp Transactional Filesystem The Design and Implementation of the Warp Transactional Filesystem": 2648, + "The Devil is Phishing: Rethinking Web Single Sign-On Systems Security": 2393, + "The Download Estimation Task on KDD Cup 2003": 198, + "The Dynamics of Viral Marketing *": 4955, + "The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance": 797, + "The ERC Webdam on Foundations of Web Data Management *": 4584, + "The Effect of Entertainment Media on Mental Models of Computer Security This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security": 3836, + "The Effect of Translationese in Machine Translation Test Sets": 4218, + "The Effect of the Initial Window Size and Limited Transmit Algorithm on the Transient Behavior of TCP Transfers": 1087, + "The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians": 3820, + "The Effectiveness of Lloyd-type Methods for the k-Means Problem": 4816, + "The Effectiveness of Stackelberg Strategies and Tolls for Network Congestion Games *": 4794, + "The Effects of Restrictions on Number of Connections in OSNs: A Case-Study on Twitter": 398, + "The Emergence of Sparse Spanners and Greedy Well-Separated Pair Decomposition": 3065, + "The Emperor's New Password Manager: Security Analysis of Web-based Password Managers The Emperor's New Password Manager: Security Analysis of Web-based Password Managers": 3186, + "The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO": 3297, + "The Evolution of Storage Service Providers: Techniques and Challenges to Outsourcing Storage": 1754, + "The Forgotten 'Uncore': On the Energy-Efficiency of Heterogeneous Cores": 842, + "The FuzzyLog: A Partially Ordered Shared Log The FuzzyLog: A Partially Ordered Shared Log": 3055, + "The Green Switch: Designing for Sustainability in Mobile Computing": 4148, + "The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX": 3433, + "The HCl Scheduler: Going all-in on Heterogeneity": 1882, + "The Heisenberg Measuring Uncertainty in Lightweight Virtualization Testbeds": 2353, + "The Hitchhiker's Guide to Testing Statistical Significance in Natural Language Processing": 4339, + "The HybrEx Model for Confidentiality and Privacy in Cloud Computing": 491, + "The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment": 3631, + "The Implications of Shared Data Synchronization Techniques on Multi-Core Energy Efficiency": 2095, + "The Importance of Features for Statistical Anomaly Detection": 1841, + "The Industrial Age of Hacking The Industrial Age of Hacking": 3680, + "The Influence of Context on Sentence Acceptability Judgements": 4405, + "The Influence of Neighbourhood and Choice on the Complexity of Finding Pure Nash Equilibria": 3332, + "The Joy of Forgetting: Faster Anytime Search via Restarting": 4807, + "The Knowledge Gradient Policy for Offline Learning with Independent Normal Rewards": 421, + "The Language of Legal and Illegal Activity on the Darknet": 3758, + "The Laplace transform on time scales revisited \u2729": 4721, + "The Linux Kernel: A Challenging Workload for Transactional Memory": 4938, + "The Long \"Taile\" of Typosquatting Domain Names The Long \"Taile\" of Typosquatting Domain Names": 3203, + "The Loopix Anonymity System The Loopix Anonymity System": 3396, + "The Margrave Tool for Firewall Analysis": 574, + "The Microarchitecture of FPGA-Based Soft Processors": 4926, + "The Million-Key Question-Investigating the Origins of RSA Public Keys The Million-Key Question -Investigating the Origins of RSA Public Keys": 3330, + "The Most Dangerous Code in the Browser": 2048, + "The Moving Cloud: Predictive Placement in the Wild": 2873, + "The Multi-streamed Solid-State Drive": 2125, + "The Multi-version and Single-display Strategy in Undo Scheme": 3666, + "The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services The Mystery Machine: End-to-end performance analysis of large-scale Internet services": 2946, + "The Nuts and Bolts of a Forum Spam Automator": 651, + "The Optimal-Location Query": 4682, + "The Ordinal-Recursive Complexity of Timed-Arc Petri Nets, Data Nets, and Other Enriched Nets": 112, + "The Output of a Cache under the Independent Reference Model -Where Did the Locality of Reference Go?": 1729, + "The Personal Cloud -Design, Architecture and Matchmaking Algorithms for Resource Management": 2029, + "The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion": 547, + "The Power of Choice in Data-Aware Cluster Scheduling The Power of Choice in Data-Aware Cluster Scheduling": 2967, + "The Price of Uncertainty": 555, + "The Pythia PRF Service The Pythia PRF Service": 3233, + "The R2R Framework: Publishing and Discovering Mappings on the Web": 1521, + "The RCU-Reader Preemption Problem in VMs The RCU-Reader Preemption Problem in VMs": 1035, + "The RDF Book Mashup: From Web APIs to a Web of Data": 1543, + "The Resource-as-a-Service (RaaS) Cloud": 1796, + "The Restoration of Early UNIX Artifacts": 3934, + "The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength": 3431, + "The Role of Network Processors in Active Networks \ud97b\udf59": 4569, + "The SCADS Director: Scaling a Distributed Storage System Under Stringent Performance Requirements": 685, + "The SNOW Theorem and Latency-Optimal Read-Only Transactions The SNOW Theorem and Latency-Optimal Read-Only Transactions": 3004, + "The Secure Socket API: TLS as an Operating System Service The Secure Socket API: TLS as an Operating System Service": 3486, + "The Seven Sins of Personal-Data Processing Systems under GDPR": 1929, + "The Software Stack for Transactional Memory Challenges and Opportunities": 4622, + "The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet": 1293, + "The Strength of the Weakest Supervision: Topic Classification Using Class Labels": 4225, + "The Structure of Least-Favorable Noise in Gaussian Vector Broadcast Channels": 554, + "The TEXTURE Benchmark: Measuring Performance of Text Queries on a Relational DBMS": 4675, + "The TURBO Diaries: Application-controlled Frequency Scaling Explained The TURBO Diaries: Application-controlled Frequency Scaling Explained": 889, + "The Tail at Scale: How to Predict It?": 1867, + "The TokuFS Streaming File System": 2112, + "The Turtles Project: Design and Implementation of Nested Virtualization": 267, + "The University of North Carolina at Chapel Hill": 3335, + "The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs": 3625, + "The Virtual Power System Testbed and Inter-Testbed Integration": 1292, + "The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations": 3879, + "The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators": 3567, + "The XtreemOS JScheduler: Using Self-Scheduling Techniques in Large Computing Architectures": 1740, + "The ZCache: Decoupling Ways and Associativity": 4844, + "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets": 1334, + "The aftermath of a crypto-ransomware attack at a large academic institution The aftermath of a crypto-ransomware attack at a large academic institution": 3526, + "The benefits and costs of writing a POSIX kernel in a high-level language The benefits and costs of writing a POSIX kernel in a high-level language": 3038, + "The case for networked remote voting precincts": 3108, + "The data, they are a-changin'": 3925, + "The seven deadly sins of cloud computing research": 1807, + "Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters": 2417, + "Theoretical Justification of Popular Link Prediction Heuristics": 4657, + "There Are No Free iPads: An Analysis of Survey Scams as a Business": 2387, + "There's something about MRAI: Timing diversity may exponentially worsen BGP convergence": 53, + "Thermal Covert Channels on Multi-core Platforms Thermal Covert Channels on Multi-core Platforms": 3250, + "This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump": 4070, + "This document is an author-formatted work. The definitive version for citation appears as: \" Triple Modular Redundancy with Standby (TMRSB) SUPPORTING Dynamic RESOURCE Reconfiguration \" accepted to IEEE TRIPLE MODULAR REDUNDANCY WITH STANDBY (TMRSB) SUPPORTING DYNAMIC RESOURCE RECONFIGURATION": 210, + "This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates Mark Gondree Naval Postgraduate School": 1376, + "This paper is included in the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14). Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications": 2584, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces": 1490, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Lifetime Improvement of NAND Flash-based Storage Systems Using Dynamic Program and Erase Scaling Lifetime Improvement of NAND Flash-based Storage Systems Using Dynamic Program and Erase Scaling": 1485, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Balancing Fairness and Efficiency in Tiered Storage Systems with Bottleneck-Aware Allocation Balancing Fairness and Efficiency in Tiered Storage Systems with Bottleneck-Aware Allocation": 1492, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by CRAID: Online RAID Upgrades Using Dynamic Hot Data Reorganization CRAID: Online RAID Upgrades Using Dynamic Hot Data Reorganization": 1491, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Migratory Compression: Coarse-grained Data Reordering to Improve Compressibility Migratory Compression: Coarse-grained Data Reordering to Improve Compressibility": 1489, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Parity Logging with Reserved Space: Towards Efficient Updates and Recovery in Erasure-coded Clustered Storage Parity Logging with Reserved Space: Towards Efficient Updates and Recovery in Erasure-coded Clustered Storage": 1484, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by STAIR Codes: A General Family of Erasure Codes for Tolerating Device and Sector Failures in Practical Storage Systems STAIR Codes: A General Family of Erasure Codes for Tolerating Device and Sector Failures in Practical Storage Systems": 1487, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by SpringFS: Bridging Agility and Performance in Elastic Distributed Storage SpringFS: Bridging Agility and Performance in Elastic Distributed Storage": 1493, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by ViewBox: Integrating Local File Systems with Cloud Storage Services ViewBox: Integrating Local File Systems with Cloud Storage Services": 1494, + "This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by Wear Unleveling: Improving NAND Flash Lifetime by Balancing Page Endurance Wear Unleveling: Improving NAND Flash Lifetime by Balancing Page Endurance": 1486, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure": 2602, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Attaining the Promise and Avoiding the Pitfalls of TCP in the Datacenter Attaining the Promise and Avoiding the Pitfalls of TCP in the Datacenter": 2617, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Beyond Sensing: Multi-GHz Realtime Spectrum Analytics https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/shi USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 159 Beyond Sensing: Multi-GHz Realtime Spectrum Analytics": 2631, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX C3: Cutting Tail Latency in Cloud Data Stores via Adaptive Replica Selection/nsdi15/technical-sessions/presentation/suresh USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 513 C3: Cutting Tail Latency in Cloud Data Stores via Adaptive Replica Selection": 2633, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX C3: Internet-Scale Control Plane for Video Quality Optimization https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/ganjam USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 131 C3: Internet-Scale Control Plane for Video Quality Optimization": 2609, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CellIQ : Real-Time Cellular Network Analytics at Scale CellIQ: Real-Time Cellular Network Analytics at Scale": 2614, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Checking Beliefs in Dynamic Networks Checking Beliefs in Dynamic Networks": 2620, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CoVisor: A Compositional Hypervisor for Software-Defined Networks CoVisor: A Compositional Hypervisor for Software-Defined Networks": 2615, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Compiling Packet Programs to Reconfigurable Switches Compiling Packet Programs to Reconfigurable Switches": 2616, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CosTLO: Cost-Effective Redundancy for Lower Latency Variance on Cloud Storage Services CosTLO: Cost-Effective Redundancy for Lower Latency Variance on Cloud Storage Services": 2635, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX CubicRing: Enabling One-Hop Failure Detection and Recovery for Distributed In-Memory Storage Systems CubicRing: Enabling One-Hop Failure Detection and Recovery for Distributed In-Memory Storage Systems": 2636, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Enforcing Customizable Consistency Properties in Software-Defined Networks Enforcing Customizable Consistency Properties in Software-Defined Networks": 2637, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Explicit Path Control in Commodity Data Centers: Design and Applications Explicit Path Control in Commodity Data Centers: Design and Applications": 2613, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX FastRoute: A Scalable Load-Aware Anycast Routing Architecture for Modern CDNs FastRoute: A Scalable Load-Aware Anycast Routing Architecture for Modern CDNs": 2608, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX FlexRadio: Fully Flexible Radios and Networks FlexRadio: Fully Flexible Radios and Networks": 2605, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Global Analytics in the Face of Bandwidth and Regulatory Constraints Global analytics in the face of bandwidth and regulatory constraints": 2634, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Increasing Datacenter Network Utilisation with GRIN Increasing Datacenter Network Utilisation with GRIN": 2598, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Information-Agnostic Flow Scheduling for Commodity Data Centers Information-Agnostic Flow Scheduling for Commodity Data Centers": 2601, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Jitsu: Just-In-Time Summoning of Unikernels Jitsu: Just-In-Time Summoning of Unikernels": 2623, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Kinetic: Verifiable Dynamic Network Control Kinetic: Verifiable Dynamic Network Control": 2619, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Klotski: Reprioritizing Web Content to Improve User Experience on Mobile Devices KLOTSKI: Reprioritizing Web Content to Improve User Experience on Mobile Devices": 2604, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Making Sense of Performance in Data Analytics Frameworks Making Sense of Performance in Data Analytics Frameworks": 2624, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX ModNet: A Modular Approach to Network Stack Extension ModNet: A modular approach to network stack extension": 2625, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Multi-Person Localization via RF Body Reflections https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/adib USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 279 Multi-Person Localization via RF Body Reflections": 2597, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX PCC: Re-architecting Congestion Control for Consistent High Performance https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/dong USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 395 PCC: Re-architecting Congestion Control for Consistent High Performance": 2607, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Queues Don't Matter When You Can JUMP Them! Queues don't matter when you can JUMP them!": 2611, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Raising the Bar for Using GPUs in Software Packet Processing Raising the Bar for Using GPUs in Software Packet Processing": 2618, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling": 2629, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Ripple: Communicating through Physical Vibration USENIX Association 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) 265 Ripple: Communicating through Physical Vibration": 2628, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Scalable Error Isolation for Distributed Systems Scalable error isolation for distributed systems": 2603, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Securing RFIDs by Randomizing the Modulation and Channel Securing RFIDs by Randomizing the Modulation and Channel": 2612, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Succinct: Enabling Queries on Compressed Data Succinct: Enabling Queries on Compressed Data": 2600, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services": 2622, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX The Design and Implementation of Open vSwitch The Design and Implementation of Open vSwitch": 2627, + "This paper is included in the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). Open Access to the Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15) is sponsored by USENIX Towards Wifi Mobility without Fast Handover Towards WiFi Mobility without Fast Handover": 2606, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX A Practical Implementation of Clustered Fault Tolerant Write Acceleration in a Virtualized Environment A Practical Implementation of Clustered Fault Tolerant Write Acceleration in a Virtualized Environment": 1496, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX A Tale of Two Erasure Codes in HDFS A Tale of Two Erasure Codes in HDFS": 1517, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Analysis of the ECMWF Storage Landscape https://www.usenix.org/conference/fast15/technical-sessions/presentation/grawinkel USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 15 Analysis of the ECMWF Storage Landscape": 1502, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Boosting Quasi-Asynchronous I/O for Better Responsiveness in Mobile Devices Boosting Quasi-Asynchronous I/O for Better Responsiveness in Mobile Devices": 1505, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Chronicle: Capture and Analysis of NFS Workloads at Line Rate Chronicle: Capture and Analysis of NFS Workloads at Line Rate": 1506, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Design Tradeoffs for Data Deduplication Performance in Backup Workloads Design Tradeoffs for Data Deduplication Performance in Backup Workloads": 1498, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Efficient Intra-Operating System Protection Against Harmful DMAs Efficient Intra-Operating System Protection Against Harmful DMAs": 1513, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Efficient MRC Construction with SHARDS USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 95 Efficient MRC Construction with SHARDS": 1516, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX FlashGraph: Processing Billion-Node Graphs on an Array of Commodity SSDs USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 45 FlashGraph: Processing Billion-Node Graphs on an Array of Commodity SSDs": 1520, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage, and Network-bandwidth USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 81 Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage and Network-bandwidth": 1514, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Host-side Filesystem Journaling for Durable Shared Storage Host-side Filesystem Journaling for Durable Shared Storage": 1503, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX How Much Can Data Compressibility Help to Improve NAND Flash Memory Lifetime? How Much Can Data Compressibility Help to Improve NAND Flash Memory Lifetime?": 1511, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX LADS: Optimizing Data Transfers Using Layout-Aware Data Scheduling USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 67 LADS: Optimizing Data Transfers using Layout-Aware Data Scheduling": 1508, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX NV-Tree: Reducing Consistency Cost for NVM-based Single Level Systems NV-Tree: Reducing Consistency Cost for NVM-based Single Level Systems": 1519, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Non-blocking Writes to Files Non-blocking Writes to Files": 1497, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX RAIDShield: Characterizing, Monitoring, and Proactively Protecting Against Disk Failures USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 241 RAIDShield: Characterizing, Monitoring, and Proactively Protecting Against Disk Failures": 1512, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX RIPQ: Advanced Photo Caching on Flash for Facebook USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 373 RIPQ: Advanced Photo Caching on Flash for Facebook": 1515, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Reducing File System Tail Latencies with Chopper Reducing File System Tail Latencies with Chopper": 1504, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Reliable, Consistent, and Efficient Data Sync for Mobile Apps Reliable, Consistent, and Efficient Data Sync for Mobile Apps": 1500, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks": 1501, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Skylight-A Window on Shingled Disk Operation USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 135 Skylight-A Window on Shingled Disk Operation": 1495, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Towards SLO Complying SSDs Through OPS Isolation USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 183 Towards SLO Complying SSDs Through OPS Isolation": 1507, + "This paper is included in the Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST '15). Open access to the Proceedings of the 13th USENIX Conference on File and Storage Technologies is sponsored by USENIX Write Once, Get 50% Free: Saving SSD Erase Costs Using WOM Codes USENIX Association 13th USENIX Conference on File and Storage Technologies (FAST '15) 257 Write Once, Get 50% Free: Saving SSD Erase Costs Using WOM Codes": 1518, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Access Characteristic Guided Read and Write Cost Regulation for Performance Improvement on Flash Memory Access Characteristic Guided Read and Write Cost Regulation for Performance Improvement on Flash Memory": 1535, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Application-Managed Flash Application-Managed Flash": 1533, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX BTrDB: Optimizing Storage System Design for Timeseries Processing BTrDB: Optimizing Storage System Design for Timeseries Processing": 1523, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX CacheDedup: In-line Deduplication for Flash Caching CacheDedup: In-line Deduplication for Flash Caching": 1536, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX CloudCache: On-demand Flash Cache Management for Cloud Computing CloudCache: On-demand Flash Cache Management for Cloud Computing": 1524, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Efficient and Available In-memory KV-Store with Hybrid Erasure Coding and Replication Efficient and Available In-memory KV-Store with Hybrid Erasure Coding and Replication": 1548, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Environmental Conditions and Disk Reliability in Free-cooled Datacenters Environmental Conditions and Disk Reliability in Free-Cooled Datacenters": 1540, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Estimating Unseen Deduplication- from Theory to Practice Estimating Unseen Deduplication -from Theory to Practice": 1529, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Flamingo: Enabling Evolvable HDD-based Near-Line Storage Flamingo: Enabling Evolvable HDD-based Near-Line Storage": 1534, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Flash Reliability in Production: The Expected and the Unexpected Flash Reliability in Production: The Expected and the Unexpected": 1542, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Isotope: Transactional Isolation for Block Storage Isotope: Transactional Isolation for Block Storage": 1544, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Mitigating Sync Amplification for Copy-on-write Virtual Disk Mitigating Sync Amplification for Copy-on-write Virtual Disk": 1525, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories NOVA: A Log-structured File System for Hybrid Volatile/Non-volatile Main Memories": 1546, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Optimizing Every Operation in a Write-optimized File System Optimizing Every Operation in a Write-Optimized File System": 1547, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX OrderMergeDedup: Efficient, Failure-Consistent Deduplication on Flash OrderMergeDedup: Efficient, Failure-Consistent Deduplication on Flash": 1526, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX PCAP: Performance-aware Power Capping for the Disk Drive in the Cloud PCAP: Performance-Aware Power Capping for the Disk Drive in the Cloud": 1531, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Reducing Solid-State Storage Device Write Stress through Opportunistic In-place Delta Compression Reducing Solid-State Storage Device Write Stress Through Opportunistic In-Place Delta Compression": 1550, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Slacker: Fast Distribution with Lazy Docker Containers Slacker: Fast Distribution with Lazy Docker Containers": 1530, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX The Composite-file File System: Decoupling the One-to-One Mapping of Files and Metadata for Better Performance The Composite-file File System: Decoupling the One-to-one Mapping of Files and Metadata for Better Performance": 1549, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX The Devil Is in the Details: Implementing Flash Page Reuse with WOM Codes The Devil is in the Details: Implementing Flash Page Reuse with WOM Codes": 1541, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX The Tail at Store: A Revelation from Millions of Hours of Disk and SSD Deployments The Tail at Store: A Revelation from Millions of Hours of Disk and SSD Deployments": 1528, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Towards Accurate and Fast Evaluation of Multi-Stage Log-structured Designs Towards Accurate and Fast Evaluation of Multi-Stage Log-Structured Designs": 1537, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Uncovering Bugs in Distributed Storage Systems during Testing (Not in Production!) Uncovering Bugs in Distributed Storage Systems during Testing (not in Production!)": 1527, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX Using Hints to Improve Inline Block-layer Deduplication Using Hints to Improve Inline Block-Layer Deduplication": 1539, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX WiscKey: Separating Keys from Values in SSD-conscious Storage WiscKey: Separating Keys from Values in SSD-Conscious Storage": 1538, + "This paper is included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). Open access to the Proceedings of the 14th USENIX Conference on File and Storage Technologies is sponsored by USENIX sRoute: Treating the Storage Stack Like a Network sRoute: Treating the Storage Stack Like a Network": 1545, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). A System to Verify Network Behavior of Known Cryptographic Clients A System to Verify Network Behavior of Known Cryptographic Clients": 2696, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). APUNet: Revitalizing GPU as Packet Processing Accelerator APUNet: Revitalizing GPU as Packet Processing Accelerator": 2702, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). AdaptSize: Orchestrating the Hot Object Memory Cache in a Content Delivery Network AdaptSize: Orchestrating the Hot Object Memory Cache in a Content Delivery Network": 2691, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Automated Bug Removal for Software-Defined Networks Automated Bug Removal for Software-Defined Networks": 2730, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Correct by Construction Networks Using Stepwise Refinement Correct by Construction Networks using Stepwise Refinement": 2722, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Delta-net: Real-time Network Verification Using Atoms Delta-net: Real-time Network Verification Using Atoms": 2704, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch Enabling Wide-spread Communications on Optical Fabric with MegaSwitch": 2695, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads": 2701, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments Enhancing Security and Privacy of Tor's Ecosystem by using Trusted Execution Environments": 2713, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Evaluating the Power of Flexible Packet Processing for Network Resource Allocation Evaluating the Power of Flexible Packet Processing for Network Resource Allocation": 2723, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Facilitating Robust 60 GHz Network Deployment by Sensing Ambient Reflectors Facilitating Robust 60 GHz Network Deployment By Sensing Ambient Reflectors": 2729, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Flowtune: Flowlet Control for Datacenter Networks Flowtune: Flowlet Control for Datacenter Networks": 2719, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching Let it Flow: Resilient Asymmetric Load Balancing with Flowlet Switching": 2724, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Live Video Analytics at Scale with Approximation and Delay-Tolerance Live Video Analytics at Scale with Approximation and Delay-Tolerance": 2733, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Opaque: An Oblivious and Encrypted Distributed Analytics Platform Opaque: An Oblivious and Encrypted Distributed Analytics Platform": 2734, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Clipper: A Low-Latency Online Prediction Serving System Clipper: A Low-Latency Online Prediction Serving System": 2698, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Curator: Self-Managing Storage for Enterprise Clusters Curator: Self-Managing Storage for Enterprise Clusters": 2693, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Decibel: Isolation and Sharing in Disaggregated Rack-Scale Storage Decibel: Isolation and Sharing in Disaggregated Rack-Scale Storage": 2715, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Efficient Memory Disaggregation with InfInIswap Efficient Memory Disaggregation with INFINISWAP": 2703, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. FM Backscatter: Enabling Connected Cities and Smart Fabrics FM Backscatter: Enabling Connected Cities and Smart Fabrics": 2726, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. FarmBeats: An IoT Platform for Data-Driven Agriculture FarmBeats: An IoT Platform for Data-Driven Agriculture": 2725, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. FlexCore: Massively Parallel and Flexible Processing for Large MIMO Access Points FlexCore: Massively Parallel and Flexible Processing for Large MIMO Access Points": 2707, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Flexplane: An Experimentation Platform for Resource Management in Datacenters Flexplane: An Experimentation Platform for Resource Management in Datacenters": 2716, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds": 2706, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. I Can't Believe It's Not Causal! Scalable Causal Consistency with No Slowdown Cascades I Can't Believe It's Not Causal! Scalable Causal Consistency with No Slowdown Cascades": 2714, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Improving User Perceived Page Load Times Using Gaze Improving User Perceived Page Load Time Using Gaze": 2711, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Passive Realtime Datacenter Fault Detection and Localization Passive Realtime Datacenter Fault Detection and Localization": 2720, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. Stateless Network Functions: Breaking the Tight Coupling of State and Processing Stateless Network Functions: Breaking the Tight Coupling of State and Processing": 2709, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. TuX 2 : Distributed Graph Computation for Machine Learning TUX 2 : Distributed Graph Computation for Machine Learning": 2731, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Open access to the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. vCorfu: A Cloud-Scale Object Store on a Shared Log vCorfu: A Cloud-Scale Object Store on a Shared Log": 2728, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Prio: Private, Robust, and Scalable Computation of Aggregate Statistics Prio: Private, Robust, and Scalable Computation of Aggregate Statistics": 2697, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). RAIL: A Case for Redundant Arrays of Inexpensive Links in Data Center Networks RAIL: A Case for Redundant Arrays of Inexpensive Links in Data Center Networks": 2735, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Robust Validation of Network Designs under Uncertain Demands and Failures Robust validation of network designs under uncertain demands and failures": 2694, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). SCL: Simplifying Distributed SDN Control Planes SCL: Simplifying Distributed SDN Control Planes": 2717, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Skip-Correlation for Multi-Power Wireless Carrier Sensing Skip-Correlation for Multi-Power Wireless Carrier Sensing": 2692, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Splinter: Practical Private Queries on Public Data Splinter: Practical Private Queries on Public Data": 2727, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). The Design, Implementation, and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files for a File-Storage Service The Design, Implementation, and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files For a File-Storage Service": 2705, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). VFP: A Virtual Switch Platform for Host SDN in the Public Cloud VFP: A Virtual Switch Platform for Host SDN in the Public Cloud": 2700, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). Verifying Reachability in Networks with Mutable Datapaths Verifying Reachability in Networks with Mutable Datapaths": 2718, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). ViewMap: Sharing Private In-Vehicle Dashcam Videos ViewMap: Sharing Private In-Vehicle Dashcam Videos": 2712, + "This paper is included in the Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes": 2708, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Algorithms and Data Structures for Efficient Free Space Reclamation in WAFL Algorithms and Data Structures for Efficient Free Space Reclamation in WAFL": 1564, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Chronix: Long Term Storage and Retrieval Technology for Anomaly Detection in Operational Data Chronix: Long Term Storage and Retrieval Technology for Anomaly Detection in Operational Data": 1569, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Crystal: Software-Defined Storage for Multi-Tenant Object Stores Crystal: Software-Defined Storage for Multi-tenant Object Stores": 1561, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). DIDACache: A Deep Integration of Device and Application for Flash Based Key-Value Caching DIDACache: A Deep Integration of Device and Application for Flash based Key-value Caching": 1575, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Enlightening the I/O Path: A Holistic Approach for Application Performance Enlightening the I/O Path: A Holistic Approach for Application Performance": 1567, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Evolving Ext4 for Shingled Disks Evolving Ext4 for Shingled Disks": 1551, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Facilitating Magnetic Recording Technology Scaling for Data Center Hard Disk Drives through Filesystem-Level Transparent Local Erasure Coding Facilitating Magnetic Recording Technology Scaling for Data Center Hard Disk Drives through Filesystem-level Transparent Local Erasure Coding": 1571, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases": 1573, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Mirador: An Active Control Plane for Datacenter Storage Mirador: An Active Control Plane for Datacenter Storage": 1578, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Omid, Reloaded: Scalable and Highly-Available Transaction Processing Omid, Reloaded: Scalable and Highly-Available Transaction Processing": 1574, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Application Crash Consistency and Performance with CCFS Application Crash Consistency and Performance with CCFS": 1581, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. File Systems Fated for Senescence? Nonsense, Says Science! File Systems Fated for Senescence? Nonsense, Says Science!": 1557, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. FlashBlox: Achieving Both Performance Isolation and Uniform Lifetime for Virtualized SSDs FlashBlox: Achieving Both Performance Isolation and Uniform Lifetime for Virtualized SSDs": 1580, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Graphene: Fine-Grained IO Management for Graph Computing Graphene: Fine-Grained IO Management for Graph Computing": 1572, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. High Performance Metadata Integrity Protection in the WAFL Copy-on-Write File System High-Performance Metadata Integrity Protection in the WAFL Copy-on-Write File System": 1568, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Knockoff: Cheap Versions in the Cloud Knockoff: Cheap versions in the cloud": 1558, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. LightNVM: The Linux Open-Channel SSD Subsystem LightNVM: The Linux Open-Channel SSD Subsystem": 1552, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. On the Accuracy and Scalability of Intensive I/O Workload Replay On the Accuracy and Scalability of Intensive I/O Workload Replay": 1562, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. On the Performance Variation in Modern Storage Stacks On the Performance Variation in Modern Storage Stacks": 1553, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed Storage Reactions to Single Errors and Corruptions Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed Storage Reactions to Single Errors and Corruptions": 1560, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. SHRD: Improving Spatial Locality in Flash Storage Accesses by Sequentializing in Host and Randomizing in Device SHRD: Improving Spatial Locality in Flash Storage Accesses by Sequentializing in Host and Randomizng in Device": 1565, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. SMaRT: An Approach to Shingled Magnetic Recording Translation SMaRT: An Approach to Shingled Magnetic Recording Translation": 1563, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Tiny-Tail Flash: Near-Perfect Elimination of Garbage Collection Tail Latencies in NAND SSDs Tiny-Tail Flash: Near-Perfect Elimination of Garbage Collection Tail Latencies in NAND SSDs": 1579, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). Open access to the Proceedings of the 15th USENIX Conference on File and Storage Technologies is sponsored by USENIX. vNFS: Maximizing NFS Performance with Compounds and Vectorized I/O vNFS: Maximizing NFS Performance with Compounds and Vectorized I/O": 1556, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). The Logic of Physical Garbage Collection in Deduplicating Storage The Logic of Physical Garbage Collection in Deduplicating Storage": 1559, + "This paper is included in the Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST '17). To FUSE or Not to FUSE: Performance of User-Space File Systems To FUSE or Not to FUSE: Performance of User-Space File Systems": 1576, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Automatically Correcting Networks with NEAt Automatically Correcting Networks with NEAt": 2775, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Azure Accelerated Networking: SmartNICs in the Public Cloud Azure Accelerated Networking: SmartNICs in the Public Cloud": 2749, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Balancing on the Edge: Transport Affinity without Network State Balancing on the edge: transport affinity without network state": 2737, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Copa: Practical Delay-Based Congestion Control for the Internet Copa: Practical Delay-Based Congestion Control for the Internet": 2738, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Elastic Scaling of Stateful Network Functions Elastic Scaling of Stateful Network Functions": 2772, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Open access to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX. NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion": 2748, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). SafeBricks: Shielding Network Functions in the Cloud SafeBricks: Shielding Network Functions in the Cloud": 2764, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Stateless Datacenter Load-balancing with Beamer Stateless Datacenter Load-balancing with Beamer": 2763, + "This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). Towards Battery-Free HD Video Streaming Towards Battery-Free HD Video Streaming": 2760, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX The CASE of FEMU: Cheap, Accurate, Scalable and Extensible Flash Emulator The CASE of FEMU: Cheap, Accurate, Scalable and Extensible Flash Emulator": 1590, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Barrier-Enabled IO Stack for Flash Storage": 1597, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Clay Codes: Moulding MDS Codes to Yield an MSR Code Clay Codes: Moulding MDS Codes to Yield an MSR Code": 1596, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Designing a True Direct-Access File System with DevFS Designing a True Direct-Access File System with DevFS": 1587, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Endurable Transient Inconsistency in Byte- Addressable Persistent B+-Tree Endurable Transient Inconsistency in Byte-Addressable Persistent B+-Tree": 1586, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. FStream: Managing Flash Streams in the File System FStream: Managing Flash Streams in the File System": 1592, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Improving Docker Registry Design based on Production Workload Analysis Improving Docker Registry Design based on Production Workload Analysis": 1583, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Logical Synchronous Replication in the Tintri VMstore File System Logical Synchronous Replication in the Tintri VMstore File System": 1585, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. MQSim: A Framework for Enabling Realistic Studies of Modern Multi-Queue SSD Devices MQSim: A Framework for Enabling Realistic Studies of Modern Multi-Queue SSD Devices": 1595, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. PEN: Design and Evaluation of Partial-Erase for 3D NAND-Based High Density SSDs PEN: Design and Evaluation of Partial-Erase for 3D NAND-Based High Density SSDs": 1591, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures": 1603, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. RFLUSH: Rethink the Flush RFLUSH: Rethink the Flush": 1601, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Spiffy: Enabling File-System Aware Storage Applications Spiffy: Enabling File-System Aware Storage Applications": 1594, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Stash in a Flash Stash in a Flash": 1604, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. The Full Path to Full-Path Indexing The Full Path to Full-Path Indexing": 1602, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Towards Robust File System Checkers Towards Robust File System Checkers": 1584, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. Towards Web-based Delta Synchronization for Cloud Storage Services Towards Web-based Delta Synchronization for Cloud Storage Services": 1600, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. UKSM: Swift Memory Deduplication via Hierarchical and Adaptive Memory Region Distilling UKSM: Swift Memory Deduplication via Hierarchical and Adaptive Memory Region Distilling": 1598, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Open access to the Proceedings of the 16th USENIX Conference on File and Storage Technologies is sponsored by USENIX. WAFL Iron: Repairing Live Enterprise File Systems WAFL Iron: Repairing Live Enterprise File Systems": 1589, + "This paper is included in the Proceedings of the 16th USENIX Conference on File and Storage Technologies. Protocol-Aware Recovery for Consensus-Based Storage Protocol-Aware Recovery for Consensus-Based Storage": 1582, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Alembic: Automated Model Inference for Stateful Network Functions Alembic: Automated Model Inference for Stateful Network Functions *": 2801, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). BLAS-on-flash: An Efficient Alternative for Large Scale ML Training and Inference? BLAS-on-flash : An Efficient Alternative for Large Scale ML Training and Inference?": 2812, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Blink: Fast Connectivity Recovery Entirely in the Data Plane Blink: Fast Connectivity Recovery Entirely in the Data Plane": 2787, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks": 2778, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Confluo: Distributed Monitoring and Diagnosis Stack for High-speed Networks Confluo: Distributed Monitoring and Diagnosis Stack for High-speed Networks": 2796, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Correctness and Performance for Stateful Chained Network Functions Correctness and Performance for Stateful Chained Network Functions": 2795, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). DETER: Deterministic TCP Replay for Performance Diagnosis DETER: Deterministic TCP Replay for Performance Diagnosis": 2798, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Datacenter RPCs can be General and Fast Datacenter RPCs can be General and Fast": 2794, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Deniable Upload and Download via Passive Participation Deniable Upload and Download via Passive Participation": 2809, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Direct Universal Access: Making Data Center Resources Available to FPGA Direct Universal Access: Making Data Center Resources Available to FPGA": 2808, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Eiffel: Efficient and Flexible Software Packet Scheduling Eiffel: Efficient and Flexible Software Packet Scheduling": 2806, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). End-to-end I/O Monitoring on a Leading Supercomputer End-to-end I/O Monitoring on a Leading Supercomputer": 2818, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Exploiting Commutativity For Practical Fast Replication Exploiting Commutativity For Practical Fast Replication": 2803, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). FlowBlaze: Stateful Packet Processing in Hardware FlowBlaze: Stateful Packet Processing in Hardware": 2804, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). FreeFlow: Software-based Virtual RDMA Networking for Containerized Clouds FreeFlow: Software-based Virtual RDMA Networking for Containerized Clouds": 2797, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Hydra: a federated resource manager for data-center scale analytics Hydra: a federated resource manager for data-center scale analytics": 2779, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs": 2817, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Is advance knowledge of flow sizes a plausible assumption? Is advance knowledge of flow sizes a plausible assumption?": 2782, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Janus: Fast and Flexible Deep Learning via Symbolic Graph Execution of Imperative Programs JANUS: Fast and Flexible Deep Learning via Symbolic Graph Execution of Imperative Programs": 2790, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Loom: Flexible and Efficient NIC Packet Scheduling Loom: Flexible and Efficient NIC Packet Scheduling": 2811, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Many-to-Many Beam Alignment in Millimeter Wave Networks Many-to-Many Beam Alignment in Millimeter Wave Networks": 2792, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Minimal Rewiring: Efficient Live Expansion for Clos Data Center Networks Minimal Rewiring: Efficient Live Expansion for Clos Data Center Networks": 2822, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Model-Agnostic and Efficient Exploration of Numerical State Space of Real-World TCP Congestion Control Implementations Model-Agnostic and Efficient Exploration of Numerical State Space of Real-World TCP Congestion Control Implementations": 2813, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Monoxide: Scale out Blockchains with Asynchronous Consensus Zones Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones": 2815, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). NetBouncer: Active Device and Link Failure Localization in Data Center Networks NetBouncer: Active Device and Link Failure Localization in Data Center Networks": 2814, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). NetScatter: Enabling Large-Scale Backscatter Networks NetScatter: Enabling Large-Scale Backscatter Networks": 2786, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Performance Contracts for Software Network Functions Performance Contracts for Software Network Functions": 2789, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Pushing the Range Limits of Commercial Passive RFIDs Pushing the Range Limits of Commercial Passive RFIDs": 2816, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Scaling Community Cellular Networks with CommunityCellularManager Scaling Community Cellular Networks with CommunityCellularManager": 2785, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads": 2802, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shinjuku: Preemptive Scheduling for \u00b5second-scale Tail Latency Shinjuku: Preemptive Scheduling for \u00b5second-scale Tail Latency": 2793, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shoal: A Network Architecture for Disaggregated Racks Shoal: A Network Architecture for Disaggregated Racks": 2807, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Shuffling, Fast and Slow: Scalable Analytics on Serverless Infrastructure Shuffling, Fast and Slow: Scalable Analytics on Serverless Infrastructure": 2805, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Size-aware Sharding For Improving Tail Latencies in In-memory Key-value Stores Size-aware Sharding For Improving Tail Latencies in In-memory Key-value Stores": 2781, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Slim: OS Kernel Support for a Low-Overhead Container Overlay Network Slim: OS Kernel Support for a Low-Overhead Container Overlay Network": 2823, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Stable and Practical AS Relationship Inference with ProbLink Stable and Practical AS Relationship Inference with ProbLink": 2791, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Stardust: Divide and Conquer in the Data Center Network Stardust: Divide and Conquer in the Data Center Network": 2824, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-cost Radios SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-Cost Radios": 2784, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Tiresias: A GPU Cluster Manager for Distributed Deep Learning Tiresias: A GPU Cluster Manager for Distributed Deep Learning": 2783, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Towards Programming the Radio Environment with Large Arrays of Inexpensive Antennas Towards Programming the Radio Environment with Large Arrays of Inexpensive Antennas": 2800, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). TrackIO: Tracking First Responders Inside-Out TrackIO: Tracking First Responders Inside-Out": 2780, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). Understanding Lifecycle Management Complexity of Datacenter Topologies Understanding Lifecycle Management Complexity of Datacenter Topologies": 2820, + "This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19). dShark: A General, Easy to Program and Scalable Framework for Analyzing In-network Packet Traces dShark: A General, Easy to Program and Scalable Framework for Analyzing In-network Packet Traces": 2819, + "This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Automatic, Application-Aware I/O Forwarding Resource Allocation Automatic, Application-Aware I/O Forwarding Resource Allocation": 1613, + "This paper is included in the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19). Open access to the Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST '19) is sponsored by Finesse: Fine-Grained Feature Locality based Fast Resemblance Detection for Post-Deduplication Delta Compression Finesse: Fine-Grained Feature Locality based Fast Resemblance Detection for Post-Deduplication Delta Compression": 1630, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency": 2828, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) APKeep: Realtime Verification for Real Networks APKeep: Realtime Network Verification for Real Networks": 2864, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) AccelTCP: Accelerating Network Applications with Stateful TCP Offloading AccelTCP: Accelerating Network Applications with Stateful TCP Offloading": 2852, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Adapting TCP for Reconfigurable Datacenter Networks Adapting TCP for Reconfigurable Datacenter Networks": 2853, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) AmphiLight: Direct Air-Water Communication with Laser Light AmphiLight: Direct Air-Water Communication with Laser Light": 2834, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Batchy: Batch-scheduling Data Flow Graphs with Service-level Objectives Batchy: Batch-scheduling Data Flow Graphs with Service-level Objectives": 2847, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Check before You Change: Preventing Correlated Failures in Service Updates Check before You Change: Preventing Correlated Failures in Service Updates": 2863, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Config2Spec: Mining Network Specifications from Network Configurations Config2Spec: Mining Network Specifications from Network Configurations": 2829, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Diamond-Miner: Comprehensive Discovery of the Internet's Topology Diamonds Diamond-Miner: Comprehensive Discovery of the Internet's Topology Diamonds": 2860, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Experiences with Modeling Network Topologies at Multiple Levels of Abstraction Experiences with Modeling Network Topologies at Multiple Levels of Abstraction": 2851, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) FLAIR: Accelerating Reads with Consistency-Aware Network Routing FLAIR: Accelerating Reads with Consistency-Aware Network Routing": 2857, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) FileMR: Rethinking RDMA Networking for Scalable Persistent Memory FileMR: Rethinking RDMA Networking for Scalable Persistent Memory": 2862, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Finding Network Misconfigurations by Automatic Template Inference Finding Network Misconfigurations by Automatic Template Inference": 2842, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Firecracker: Lightweight Virtualization for Serverless Applications Firecracker: Lightweight Virtualization for Serverless Applications": 2825, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat": 2837, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust": 2838, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Gryff: Unifying Consensus and Shared Registers Gryff: Unifying Consensus and Shared Registers": 2831, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Is Big Data Performance Reproducible in Modern Cloud Networks? Is Big Data Performance Reproducible in Modern Cloud Networks?": 2859, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Learning in situ: a randomized experiment in video streaming Learning in situ: a randomized experiment in video streaming": 2861, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Measuring Congestion in High-Performance Datacenter Interconnects Measuring Congestion in High-Performance Datacenter Interconnects": 2841, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Millions of Tiny Databases Millions of Tiny Databases": 2830, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Near-Optimal Latency Versus Cost Tradeoffs in Geo-Distributed Storage Near-Optimal Latency Versus Cost Tradeoffs in Geo-Distributed Storage": 2858, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) NetTLP: A Development Platform for PCIe devices in Software Interacting with Hardware NetTLP: A Development Platform for PCIe devices in Software Interacting with Hardware": 2844, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Performant TCP for Low-Power Wireless Networks Performant TCP for Low-Power Wireless Networks": 2845, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Programmable Calendar Queues for High-speed Packet Scheduling Programmable Calendar Queues for High-speed Packet Scheduling": 2855, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Re-architecting Congestion Management in Lossless Ethernet Re-architecting Congestion Management in Lossless Ethernet": 2836, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) SP-PIFO: Approximating Push-In First-Out Behaviors using Strict-Priority Queues SP-PIFO: Approximating Push-In First-Out Behaviors using Strict-Priority Queues": 2827, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Sol: Fast Distributed Computation Over Slow Networks Sol: Fast Distributed Computation Over Slow Networks": 2846, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) TCP \u2248 RDMA: CPU-efficient Remote Storage Access with i10 TCP \u2248 RDMA: CPU-efficient Remote Storage Access with i10": 2840, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Telekine: Secure Computing with Cloud GPUs Telekine: Secure Computing with Cloud GPUs": 2839, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Themis: Fair and Efficient GPU Cluster Scheduling THEMIS: Fair and Efficient GPU Cluster Scheduling": 2850, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control": 2833, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) Understanding, Detecting and Localizing Partial Failures in Large System Software Understanding, Detecting and Localizing Partial Failures in Large System Software": 2849, + "This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20) VMscatter: A Versatile MIMO Backscatter VMscatter: A Versatile MIMO Backscatter": 2848, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20)": 1637, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) A Study of SSD Reliability in Large Scale Enterprise Storage Deployments A Study of SSD Reliability in Large Scale Enterprise Storage Deployments": 1640, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Characterizing, Modeling, and Benchmarking RocksDB Key-Value Workloads at Facebook Characterizing, Modeling, and Benchmarking RocksDB Key-Value Workloads at Facebook": 1635, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) GoSeed: Generating an Optimal Seeding Plan for Deduplicated Storage GoSeed: Generating an Optimal Seeding Plan for Deduplicated Storage": 1641, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) How to Copy Files How to Copy Files": 1650, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Hybrid Data Reliability for Emerging Key-Value Storage Devices Hybrid Data Reliability for Emerging Key-Value Storage Devices": 1645, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) InfiniCache: Exploiting Ephemeral Serverless Functions to Build a Cost-Effective Memory Cache INFINICACHE: Exploiting Ephemeral Serverless Functions to Build a Cost-Effective Memory Cache": 1646, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Making Disk Failure Predictions SMARTer! Making Disk Failure Predictions SMARTer!": 1639, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by An Empirical Guide to the Behavior and Use of Scalable Persistent Memory An Empirical Guide to the Behavior and Use of Scalable Persistent Memory": 1649, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by BCW: Buffer-Controlled Writes to HDDs for SSD-HDD Hybrid Storage Server BCW: Buffer-Controlled Writes to HDDs for SSD-HDD Hybrid Storage Server": 1647, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by CRaft: An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost CRaft: An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost": 1648, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by Carver: Finding Important Parameters for Storage System Tuning Carver: Finding Important Parameters for Storage System Tuning": 1634, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by GIFT: A Coupon Based Throttle-and-Reward Mechanism for Fair and Efficient I/O Bandwidth Management on Parallel Storage Systems GIFT: A Coupon Based Throttle-and-Reward Mechanism for Fair and Efficient I/O Bandwidth Management on Parallel Storage Systems": 1642, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) is sponsored by Quiver: An Informed Storage Cache for Deep Learning Quiver: An Informed Storage Cache for Deep Learning": 1638, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Strong and Efficient Consistency with Consistency-Aware Durability Strong and Efficient Consistency with Consistency-Aware Durability": 1636, + "This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST '20) Uncovering Access, Reuse, and Sharing Characteristics of I/O-Intensive Files on Large-Scale Production HPC Systems Uncovering Access, Reuse, and Sharing Characteristics of I/O-Intensive Files on Large-Scale Production HPC Systems": 1644, + "Thoth: Comprehensive Policy Compliance in Data Retrieval Systems Thoth: Comprehensive Policy Compliance in Data Retrieval Systems": 3299, + "Thoughts on Improving Review Quality": 1730, + "Thread and Memory Placement on NUMA Systems: Asymmetry Matters Thread and Memory Placement on NUMA Systems: Asymmetry Matters": 916, + "Thread-Safe Dynamic Binary Translation using Transactional Memory": 4606, + "Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance": 490, + "Three steps is all you need: fast, accurate, automatic scaling decisions for distributed streaming dataflows Three steps is all you need: fast, accurate, automatic scaling decisions for distributed streaming dataflows": 3047, + "Through the Looking-Glass, and What Eve Found There": 4023, + "Throwhammer: Rowhammer Attacks over the Network and Defenses Throwhammer: Rowhammer Attacks over the Network and Defenses": 1114, + "Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network": 1986, + "Tick Tock: Building Browser Red Pills from Timing Side Channels": 4029, + "TidyFS: A Simple and Small Distributed File System": 386, + "Tiered Fault Tolerance for Long-Term Integrity": 1328, + "Tiered Replication: A Cost-effective Alternative to Full Cluster Geo-replication Tiered Replication: A Cost-effective Alternative to Full Cluster Geo-replication": 894, + "Tierless Programming and Reasoning for Software-Defined Networks Tierless Programming and Reasoning for Software-Defined Networks": 2586, + "Tight Bounds for Asynchronous Randomized Consensus * (Preliminary Version) General Terms": 147, + "Tight Bounds for Delay-Sensitive Aggregation": 3532, + "Time Expression Analysis and Recognition Using Syntactic Token Types and General Heuristic Rules": 4252, + "Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit Rates": 86, + "Time Travel and Provenance for Machine Learning Pipelines": 2901, + "Time-Bounded Sequential Parameter Optimization": 3, + "Time-Dependent Semantic Similarity Measure of Queries Using Historical Click-Through Data *": 4474, + "Time-based Coordination in Geo-Distributed Cyber-Physical Systems": 1880, + "TimeGraph: GPU Scheduling for Real-Time Multi-Tasking Environments": 478, + "Tintenfisch: File System Namespace Schemas and Generators": 2212, + "Titan: Fair Packet Scheduling for Commodity Multiqueue NICs Titan: Fair Packet Scheduling for Commodity Multiqueue NICs": 1039, + "To Attend or not to Attend: A Case Study on Syntactic Structures for Semantic Relatedness": 4372, + "To Relay or Not to Relay for Inter-Cloud Transfers?": 1908, + "To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds": 2297, + "To SAT or Not to SAT: Ashenhurst Decomposition in a Large Scale": 4892, + "To Search or to Crawl? Towards a Query Optimizer for Text-Centric Tasks": 4454, + "To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code": 2985, + "To Zip or not to Zip: Effective Resource Usage for Real-Time Compression *": 1472, + "Token Coherence: Decoupling Performance and Correctness": 4799, + "Token Tenure: PATCHing Token Counting Using Directory-Based Cache Coherence": 4513, + "Token-level and sequence-level loss smoothing for RNN language models": 4370, + "Tolerating File-System Mistakes with EnvyFS": 1283, + "Tolerating Malicious Device Drivers in Linux": 289, + "Tolerating Overload Attacks Against Packet Capturing Systems": 829, + "Tolerating latency in replicated state machines through client speculation": 3990, + "TonY: An Orchestrator for Distributed Machine Learning Jobs TonY: An Orchestrator for Distributed Machine Learning Jobs": 2885, + "Too Many Knobs to Tune? Towards Faster Database Tuning by Pre-selecting Important Knobs": 2260, + "Tools for Active and Passive Network Side-Channel Detection for Web Applications": 4101, + "ToothPicker: Apple Picking in the iOS Bluetooth Stack": 4125, + "Topic Modeling with Network Regularization": 4468, + "Topic Sentiment Mixture: Modeling Facets and Opinions in Weblogs": 4470, + "Topology Switching for Data Center Networks": 708, + "Torturing Databases for Fun and Profit Torturing Databases for Fun and Profit": 2977, + "Toshiba MT System Description for the WAT2015 Workshop": 1605, + "TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion": 306, + "Touchstone: Generating Enormous Query-Aware Test Databases Touchstone: Generating Enormous Query-Aware Test Databases": 1094, + "Toward Cloud-based Collaboration Services": 1285, + "Toward Coordination-free and Reconfigurable Mixed Concurrency Control Toward Coordination-free and Reconfigurable Mixed Concurrency Control": 1113, + "Toward Efficient Querying of Compressed Network Payloads": 830, + "Toward Efficient Support for Multithreaded MPI Communication": 2054, + "Toward Eidetic Distributed File Systems": 2141, + "Toward Entity Retrieval over Structured and Text Data": 4648, + "Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets": 3111, + "Toward Integrating Word Sense and Entity Disambiguation into Statistical Machine Translation": 4706, + "Toward Learning Based Web Query Processing": 4770, + "Toward Lighter Containers for the Edge": 2020, + "Toward Loosely Coupled Orchestration for the LEO Satellite Edge": 2008, + "Toward Online Testing of Federated and Heterogeneous Distributed Systems": 309, + "Toward Optimal Performance with Network Assisted TCP at Mobile Edge": 1982, + "Toward Orchestration of Complex Networking Experiments": 1424, + "Toward Predictable Performance in Software Packet-Processing Platforms": 2497, + "Toward Provenance-Based Security for Configuration Languages": 3896, + "Toward Risk Assessment as a Service in Cloud Environments": 468, + "Toward Secure Embedded Web Interfaces": 406, + "Toward a Lightweight Model of BGP Safety": 3865, + "Toward practical and unconditional verification of remote computations": 642, + "Towards A Context-Based Dialog Management Layer for Expert Systems": 142, + "Towards Accurate Detection and Genotyping of Expressed Variants from Whole Transcriptome Sequencing Data": 1443, + "Towards Adversarial Phishing Detection": 1426, + "Towards An Application Objective-Aware Network Interface": 1942, + "Towards Automated Identification of Security Zone Classification in Enterprise Networks": 613, + "Towards Automated Performance Diagnosis in a Large IPTV Network": 151, + "Towards Automatic Update of Access Control Policy": 440, + "Towards Automatically Checking Thousands of Failures with Micro-specifications": 415, + "Towards Better Understanding of Black-box Auto-Tuning: A Comparative Analysis for Storage Systems Towards Better Understanding of Black-box Auto-Tuning: A Comparative Analysis for Storage Systems": 1061, + "Towards Bootstrapping a Polarity Shifter Lexicon using Linguistic Features": 4178, + "Towards Carrier Grade Linux Platforms Network Element SAF Standard Interfaces PICMG ATCA Carrier Grade Linux Standards-Based Proprietary Network Element SAF Standard Interfaces PICMG ATCA Carrier Grade Linux": 1749, + "Towards Client-side HTML Security Policies": 712, + "Towards Combining Online & Offline Management for Big Data Applications Towards Combining Online & Offline Management for Big Data Applications": 2318, + "Towards Completely Automatic Decoder Synthesis": 4857, + "Towards Deploying Decommissioned Mobile Devices as Cheap Energy-Efficient Compute Nodes": 1892, + "Towards Detecting Anomalous User Behavior in Online Social Networks Towards Detecting Anomalous User Behavior in Online Social Networks": 3208, + "Towards Detecting Target Link Flooding Attack Towards Detecting Target Link Flooding Attack": 2435, + "Towards Effective Partition Management for Large Graphs": 4654, + "Towards Efficient Heap Overflow Discovery Towards Efficient Heap Overflow Discovery": 3368, + "Towards Energy Proportional Cloud for Data Processing Frameworks": 2368, + "Towards Estimating the Number of Distinct Value Combinations for a Set of Attributes Keywords relational database, cardinality estimation": 4481, + "Towards Fair Sharing of Block Storage in a Multi-tenant Cloud": 1803, + "Towards Fast and Scalable Graph Pattern Mining": 1904, + "Towards Formal Verification of Memory Properties using Separation Logic *": 4500, + "Towards GPU Utilization Prediction for Cloud Deep Learning": 1955, + "Towards General-Purpose Resource Management in Shared Cloud Services": 1964, + "Towards High-Performance Application-Level Storage Management": 2135, + "Towards Hybrid Programming in Big Data": 1850, + "Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion Independent researcher \u2020": 1682, + "Towards Index-based Global Trading in Cloud Spot Markets": 1893, + "Towards Interactive Training with an Avatar-based Human-Computer Interface": 155, + "Towards IoT-DDoS Prevention Using Edge Computing": 1970, + "Towards Measuring and Mitigating Social Engineering Software Download Attacks Towards Measuring and Mitigating Social Engineering Software Download Attacks": 3317, + "Towards Model-based Management of Database Fragmentation": 1651, + "Towards Optimizing Hadoop Provisioning in the Cloud": 2359, + "Towards Performance-Portable, Scalable, and Convenient Linear Algebra": 2088, + "Towards Plan-aware Resource Allocation in Serverless Query Processing": 1936, + "Towards Pre-Deployment Detection of Performance Failures in Cloud Distributed Systems": 1849, + "Towards Predicting Efficient and Anonymous Tor Circuits Towards Predicting Efficient and Anonymous Tor Circuits": 3430, + "Towards Production-Run Heisenbugs Reproduction on Commercial Hardware Towards Production-Run Heisenbugs Reproduction on Commercial Hardware": 1014, + "Towards Provably-Secure Scalable Anonymous Broadcast": 1686, + "Towards Provision of Quality of Service Guarantees in Job Scheduling": 2176, + "Towards Query Interoperability: PASSing PLUS * \u2020": 1308, + "Towards Reliable Storage of 56-bit Secrets in Human Memory Towards reliable storage of 56-bit secrets in human memory": 3156, + "Towards Statistical Queries over Distributed Private User Data": 2504, + "Towards String-to-Tree Neural Machine Translation": 4270, + "Towards Supporting Millions of Users in Modifiable Virtual Environments by Redesigning Minecraft-Like Games as Serverless Systems": 1940, + "Towards Survivability of Application-Level Multicast": 543, + "Towards Taming the Resource and Data Heterogeneity in Federated Learning Towards Taming the Resource and Data Heterogeneity in Federated Learning": 2882, + "Towards The Web Of Concepts: Extracting Concepts from Large Datasets": 3309, + "Towards Transparent and Seamless Storage-As-You-Go with Persistent Memory *": 2213, + "Towards Trusted Cloud Computing": 3112, + "Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault": 3868, + "Towards Understanding the Geometry of Knowledge Graph Embeddings": 4283, + "Towards Verifying Android Apps for the Absence of No-Sleep Energy Bugs": 2091, + "Towards a Censorship Analyser for Tor": 1685, + "Towards a Framework for Evaluating BGP Security": 1349, + "Towards a Leaner Geo-distributed Cloud Infrastructure": 1826, + "Towards a Model of Computer Systems Research": 773, + "Towards a Network Marketplace in a Cloud": 1875, + "Towards a Robust Query Optimizer: A Principled and Practical Approach": 625, + "Towards a Secure and Efficient System for End-to-End Provenance": 2462, + "Towards a Serverless Platform for Edge AI": 2001, + "Towards an Architecture for Trusted Edge IoT Security Gateways": 2018, + "Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems": 4906, + "Towards an Internet-Scale XML Dissemination Service": 4435, + "Towards an Unwritten Contract of Intel Optane SSD": 2246, + "Towards an algebraic theory of bidirectional transformations": 96, + "Towards an understanding of oversubscription in cloud": 2034, + "Towards practical incremental recomputation for scientists: An implementation for the Python language": 1745, + "Towards proving security in the presence of large untrusted components": 239, + "Towards secure user-space provenance capture": 3919, + "TrInc: Small Trusted Hardware for Large Distributed Systems": 2400, + "TraceBack: First Fault Diagnosis by Reconstruction of Distributed Control Flow": 134, + "Tracing Information Flows Between Ad Exchanges Using Retargeted Ads Tracing Information Flows Between Ad Exchanges Using Retargeted Ads": 3288, + "Track-based Translation Layers for Interlaced Magnetic Recording Track-based Translation Layers for Interlaced Magnetic Recording": 1149, + "Tracking Back References in a Write-Anywhere File System": 2450, + "Tracking DDoS Attacks: Insights into the Business of Disrupting the Web": 2384, + "Tracking Emigrant Data via Transient Provenance": 462, + "Tracking the Evolution of Feature Oriented Product Lines": 4671, + "Tractable Computational Methods for Finding Nash Equilibria of Perfect-Information Position Auctions": 3221, + "Trade & Cap A Customer-Managed, Market-Based System for Trading Bandwidth Allowances at a Shared Link": 525, + "Tradeoffs between Stretch Factor and Load Balancing Ratio in Routing on Growth Restricted Graphs": 4714, + "Tradeoffs in Scalable Data Routing for Deduplication Clusters": 362, + "Tradeoffs in Transactional Memory Virtualization": 4614, + "Traffic Engineering With Traditional IP Routing Protocols": 4398, + "Traffic Shaping to Optimize Ad Delivery": 4866, + "Tragedy of Anticommons in Digital Right Management of Medical Records": 1764, + "Training Classifiers with Natural Language Explanations": 4350, + "Training an Active Random Field for Real-Time Image Denoising": 4667, + "Training and Professional Development in an IT Community": 2414, + "TransMR: Data-Centric Programming Beyond Data Parallelism": 614, + "Transaction Support using Compound Commands in Key-Value SSDs": 2236, + "Transactional Collection Classes": 4610, + "Transactional Consistency and Automatic Management in an Application Data Cache": 600, + "Transactional Execution of Java Programs": 4625, + "Transactional Memory Coherence and Consistency": 4630, + "Transactuations: Where Transactions Meet the Physical World Transactuations: Where Transactions Meet the Physical World": 1189, + "Transcend: Detecting Concept Drift in Malware Classification Models Transcend: Detecting Concept Drift in Malware Classification Models": 3369, + "Transfer Learning for Performance Modeling of Deep Neural Network Systems Transfer Learning for Performance Modeling of Deep Neural Network Systems": 2886, + "Transfer Learning in Natural Language Processing Tutorial": 4229, + "Transformation Networks for Target-Oriented Sentiment Classification *": 4306, + "Transkernel: Bridging Monolithic Kernels to Peripheral Cores Transkernel: Bridging Monolithic Kernels to Peripheral Cores": 1148, + "Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks": 3460, + "Transparent Microsegmentation in Smart Home IoT Networks": 2019, + "Transparent Mobile Storage Protection in Trusted Virtual Domains": 1318, + "Transparent System Call Based Performance Debugging for Cloud Computing": 2454, + "TrapperKeeper: The Case for Using Virtualization to Add Type Awareness to File Systems": 587, + "Trash Day: Coordinating Garbage Collection in Distributed Systems": 2053, + "Tributary: spot-dancing for elastic services with latency SLOs Tributary: spot-dancing for elastic services with latency SLOs": 1077, + "Trickle: Rate Limiting YouTube Video Streaming": 827, + "TriopusNet: Automating Wireless Sensor Network Deployment and Replacement in Pipeline Monitoring": 4970, + "Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior": 1718, + "Triton: A Software-Reconfigurable Federated Avionics Testbed": 1409, + "TritonSort: A Balanced Large-Scale Sorting System": 615, + "Troubleshooting Chronic Conditions in Large IP Networks": 4921, + "Troubleshooting Transiently-Recurring Errors in Production Systems with Blame-Proportional Logging Troubleshooting Transiently-Recurring Problems in Production Systems with Blame-Proportional Logging": 1097, + "Truck Hacking: An Experimental Analysis of the SAE J1939 Standard": 4061, + "TrueSeT: Faster Verifiable Set Computations TRUESET: Faster Verifiable Set Computations *": 3180, + "Truly Non-blocking Writes": 687, + "Truncating TLS Connections to Violate Beliefs in Web Applications": 4020, + "TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication": 3391, + "Trusted Computing and Provenance: Better Together": 2449, + "Trusted Disk Loading in the Emulab Network Testbed": 346, + "Trustless IoT: A Logic-Driven Architecture for IoT Hubs": 2007, + "Trustworthy Whole-System Provenance for the Linux Kernel Trustworthy Whole-System Provenance for the Linux Kernel": 3223, + "Truthful Prioritization Schemes for Spectrum Sharing": 2, + "Truthful and Near-Optimal Mechanism Design via Linear Programming *": 4838, + "Tryst: The Case for Confidential Service Discovery": 40, + "Tucana: Design and Implementation of a Fast and Efficient Scale-up Key-value Store Tucana: Design and implementation of a fast and efficient scale-up key-value store": 977, + "Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure": 579, + "Tuning Schema Matching Software using Synthetic Scenarios": 4647, + "Tuning Skype's Redundancy Control Algorithm for User Satisfaction": 111, + "Turbo King: Framework for Large-Scale Internet Delay Measurements": 47, + "Turbo Tunnel, a good way to design censorship circumvention protocols": 1724, + "Turning 802.11 Inside-Out *": 3777, + "Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations": 3781, + "Turning Down the LAMP: Software Specialisation for the Cloud": 534, + "Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring": 3426, + "Twizzler: a Data-Centric OS for Non-Volatile Memory Twizzler: a Data-Centric OS for Non-Volatile Memory": 1209, + "Two Methods for Domain Adaptation of Bilingual Tasks: Delightfully Simple and Broadly Applicable": 4299, + "Two methods for exploiting speculative control flow hijacks": 4115, + "Two senses of \"work\"": 4480, + "Two-Level Processor-Sharing Scheduling Disciplines: Mean Delay Analysis": 4932, + "Two-Sided Matching with Partial Information": 2221, + "Two-level Throughput and Latency IO Control for Parallel File Systems": 1661, + "TxFS: Leveraging File-System Crash Consistency to Provide ACID Transactions TxFS: Leveraging File-System Crash Consistency to Provide ACID Transactions": 1078, + "TxLinux: Using and Managing Hardware Transactional Memory in an Operating System": 4902, + "TxSpecTor: Uncovering Attacks in Ethereum from Transactions TXSPECTOR: Uncovering Attacks in Ethereum from Transactions": 3744, + "Typed Assembly Language for Implementing OS Kernels in SMP/Multi-Core Environments with Interrupts": 535, + "Typed Tensor Decomposition of Knowledge Bases for Relation Extraction": 4169, + "U-root: A Go-based, Firmware Embeddable Root File System with On-demand Compilation U-root: A Go-based, firmware embeddable root file system with on-demand compilation": 924, + "UBCIS: Ultimate Benchmark for Container Image Scanning": 1419, + "UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware": 3308, + "USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs": 3406, + "USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation": 3691, + "USENIX Association 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13) 15 VeriFlow: Verifying Network-Wide Invariants in Real Time": 2517, + "USENIX Association 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13) 443 BOSS: Building Operating System Services": 2557, + "USENIX Association 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13) 71 ArrayTrack: A Fine-Grained Indoor Location System": 2550, + "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 1 Flat Datacenter Storage": 2934, + "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 107 AppInsight: Mobile App Performance Monitoring in the Wild": 2936, + "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 179 Dissent in Numbers: Making Strong Anonymity Scale": 2915, + "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 307 X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software": 2929, + "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 31 GraphChi: Large-Scale Graph Computation on Just a PC": 2917, + "USENIX Association 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12) 93 COMET: Code Offload by Migrating Execution Transparently": 2914, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 1 ffsck: The Fast File System Checker": 1474, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 133 MixApart: Decoupled Analytics for Shared Storage Systems": 1476, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 175 File Recipe Compression in Data Deduplication Systems": 1475, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 215 Getting Real: Lessons in Transitioning Research Simulations into Hardware Systems": 1473, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 243 LDPC-in-SSD: Making Advanced Error Correction Codes Work Effectively in Solid State Drives": 1468, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 285 Gecko: Contention-Oblivious Disk Arrays for Cloud Storage": 1470, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 307 Virtual Machine Workloads: The Case for New Benchmarks for NAS": 1481, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 45 Write Policies for Host-side Flash Caches": 1478, + "USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST '13) 81 Memory Efficient Sanitization of a Deduplicated Storage System": 1463, + "USENIX Association 26th Large Installation System Administration Conference (LISA '12) 135 Teaching System Administration": 2405, + "USENIX Association 26th Large Installation System Administration Conference (LISA '12) 153 Extensible Monitoring with Nagios and Messaging Middleware": 2415, + "USENIX Association 26th Large Installation System Administration Conference (LISA '12) 203 204 26th Large Installation System Administration Conference (LISA '12) USENIX Association": 2413, + "USENIX Association 7th USENIX Conference on File and Storage Technologies 183 BORG: Block-reORGanization for Self-optimizing Storage Systems": 1294, + "USENIX Association 7th USENIX Conference on File and Storage Technologies 211 Smoke and Mirrors: Reflecting Files at a Geographically Remote Location Without Loss of Performance": 3979, + "USENIX Association 7th USENIX Conference on File and Storage Technologies PARDA: Proportional Allocation of Resources for Distributed Storage Access": 1742, + "USENIX Association 7th USENIX Conference on File and Storage Technologies Spyglass: Fast, Scalable Metadata Search for Large-Scale Storage Systems": 2396, + "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 137 iPlane Nano: Path Prediction for Peer-to-Peer Applications": 2456, + "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 395 Wishbone: Profile-based Partitioning for Sensornet Applications": 2487, + "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 423 Block-switched Networks: A New Paradigm for Wireless Transport": 2402, + "USENIX Association NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation 43 Flexible, Wide-Area Storage for Distributed Systems with WheelFS": 3883, + "USENIX Association Proceedings of FAST '03: 2nd USENIX Conference on File and Storage Technologies 2nd USENIX Conference on File and Storage Technologies USENIX Association 175 The Direct Access File System": 1435, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Access Control to Information in Pervasive Computing Environments": 1784, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Cassyopia: Compiler Assisted System Optimization": 3093, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection": 3995, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two": 1300, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems One Hop Lookups for Peer-to-Peer Overlays": 1748, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems POST: A secure, resilient, cooperative messaging system *": 2474, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Scheduling and Simulation: How to Upgrade Distributed Systems": 764, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Sensing User Intention and Context for Energy Management": 1430, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems TCP offload is a dumb idea whose time has come": 2476, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe": 2357, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Towards a Semantic-Aware File Store HotOS IX: The 9th Workshop on Hot Topics in Operating Systems USENIX Association 182": 4144, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems USENIX Association 133 Certifying Program Execution with Secure Processors": 1326, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems USENIX Association 31 TCP Meets Mobile Code": 3077, + "USENIX Association Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Why Events Are A Bad Idea (for high-concurrency servers)": 3962, + "USENIX Association Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference": 2479, + "Ultra-Fine Entity Typing": 4281, + "Ultra-Low Latency SSDs' Impact on Overall Energy Efficiency": 2256, + "Unblinding the OS to Optimize User-Perceived Flash SSD Latency": 2173, + "Under New Management: Practical Attacks on SNMPv3": 3997, + "Under-Constrained Symbolic Execution: Correctness Checking for Real Code Under-Constrained Symbolic Execution: Correctness Checking for Real Code": 3259, + "Undermining Information Hiding (and What to Do about It) Undermining Information Hiding (And What to do About it)": 3304, + "Understanding Customer Problem Troubleshooting from Storage System Logs": 2354, + "Understanding Disconnection and Stabilization of Chord": 4751, + "Understanding Ephemeral Storage for Serverless Analytics Understanding Ephemeral Storage for Serverless Analytics": 1090, + "Understanding Internet Censorship Policy: The Case of Greece": 1692, + "Understanding Manycore Scalability of File Systems Understanding Manycore Scalability of File Systems": 972, + "Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites": 3783, + "Understanding Rack-Scale Disaggregated Storage": 2191, + "Understanding Security Implications of Using Containers in the Cloud Understanding Security Implications of Using Containers in the Cloud": 1041, + "Understanding Sources of Inefficiency in General-Purpose Chips": 4884, + "Understanding Task Design Trade-offs in Crowdsourced Paraphrase Collection": 4269, + "Understanding Transactional Memory Performance": 133, + "Understanding and Finding Crash-Consistency Bugs in Parallel File Systems": 2271, + "Understanding and Mitigating the Impact of RF Interference on 802.11 Networks": 4710, + "Understanding and Supporting Volunteer Contributors: The Case of Metadata and Document Servers": 4533, + "Understanding and Tackling the Hidden Memory Latency for Edge-based Heterogeneous Platform": 2025, + "Understanding latent sector errors and how to protect against them": 3113, + "Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It": 3726, + "Understanding the Challenges with Medical Data Segmentation for Privacy": 1778, + "Understanding the Emerging Threat of DDoS-As-a-Service": 2389, + "Understanding the Fault Resilience of File System Checkers": 2183, + "Understanding the Impact of Cache Locations on Storage Performance and Energy Consumption of Virtualization Systems": 1336, + "Understanding the Interleaving-Space Overlap across Inputs and Software Versions": 2077, + "Understanding the Mirai Botnet Understanding the Mirai Botnet": 3346, + "Understanding the Reproducibility of Crowd- reported Security Vulnerabilities Understanding the Reproducibility of Crowd-reported Security Vulnerabilities": 3485, + "Understanding the Security Properties of Ballot-Based Verification Techniques (Short Paper)": 3096, + "Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment": 4122, + "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing": 4114, + "Unification of Temporary Storage in the NodeKernel Architecture Unification of Temporary Storage in the NodeKernel Architecture": 1192, + "Unifying Text, Metadata, and User Network Representations with a Neural Network for Geolocation Prediction": 4266, + "Unikernel Monitors: Extending Minimalism Outside of the Box": 1873, + "Unioning of the Buffer Cache and Journaling Layers with Non-volatile Memory": 1465, + "Universal Packet Scheduling Universal Packet Scheduling": 2672, + "Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols": 4104, + "Unlabeled data: Now it helps, now it doesn't": 4978, + "Unleashing the Power of Learning: An Enhanced Learning-Based Approach for Dynamic Binary Translation Unleashing the Power of Learning: An Enhanced Learning-Based Approach for Dynamic Binary Translation": 1190, + "Unlocking Energy Unlocking Energy": 959, + "Unobservable Communication over Fully Untrusted Infrastructure Unobservable communication over fully untrusted infrastructure": 2982, + "Unobtrusive Deferred Update Stabilization for Efficient Geo-Replication Unobtrusive Deferred Update Stabilization for Efficient Geo-Replication": 1007, + "Unpaired Sentiment-to-Sentiment Translation: A Cycled Reinforcement Learning Approach": 4308, + "Unraveling Unstructured Process Models": 4947, + "Unraveling the Complexity of Network Management": 1291, + "Unsafe Time Handling in Smartphones Unsafe Time Handling in Smartphones": 964, + "Unshackle the Cloud!": 716, + "Unsupervised Discrete Sentence Representation Learning for Interpretable Neural Dialog Generation": 4317, + "Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogue Systems": 4249, + "Unsupervised Learning of Soft Patterns for Generating Definitions from Online News": 4477, + "Unsupervised Neural Machine Translation with Weight Sharing": 4279, + "Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes": 3439, + "Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning": 3704, + "Updating Probabilistic XML *": 4839, + "Ureqa: Leveraging Operation-Aware Error Rates for Effective Quantum Circuit Mapping on NISQ-Era Quantum Computers UREQA: Leveraging Operation-Aware Error Rates for Effective Quantum Circuit Mapping on NISQ-Era Quantum Computers": 1246, + "Usability Analysis of Helios -An Open Source Verifiable Remote Electronic Voting System": 474, + "Usable Sexurity: Studying People's Concerns and Strategies When Sexting Usable Sexurity: Studying People's Concerns and Strategies When Sexting": 3860, + "Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices": 3774, + "User Browsing Graph: Structure, Evolution and Application 1": 4788, + "User Mental Models of Cryptocurrency Systems -A Grounded Theory Approach User Mental Models of Cryptocurrency Systems -A Grounded Theory Approach": 3864, + "User freedom to attach devices": 464, + "User-Guided Device Driver Synthesis": 2963, + "User-Level Secure Deletion on Log-structured File Systems": 4711, + "Using Accessor Variety Features of Source Graphemes in Machine Transliteration of English to Chinese": 3599, + "Using Bowel Sounds to Create a Forensically-aware Insulin Pump System": 1779, + "Using Destination-Set Prediction to Improve the Latency/Bandwidth Tradeoff in Shared-Memory Multiprocessors": 4498, + "Using Elimination and Delegation to Implement a Scalable NUMA-Friendly Stack": 2081, + "Using First-Order Logic to Reason about Policies": 4952, + "Using Forgetful Routing to Control BGP Table Size": 4744, + "Using Hierarchal Change Mining to Manage Network Security Policy Evolution": 707, + "Using Natural Language Relations between Answer Choices for Machine Comprehension": 4217, + "Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks": 113, + "Using Provenance for Repeatability": 3908, + "Using Provenance to Extract Semantic File Attributes": 2460, + "Using Proxies to Accelerate Cloud Applications": 3988, + "Using Pr\u00eatPr\u00eat\u00e0 Voter in Victorian State elections": 1462, + "Using R for Iterative and Incremental Processing": 1786, + "Using Set Cover to Optimize a Large-Scale Low Latency Distributed Graph": 1813, + "Using Syslog Message Sequences for Predicting Disk Failures": 381, + "Using TCP/IP traffic shaping to achieve iSCSI service predictability": 281, + "Using Taxonomies for Content-based Routing with Ants *": 4581, + "Using UML and Maude for Writing and Reasoning about ODP Policies": 4843, + "Using Word Embedding for Cross-Language Plagiarism Detection": 4177, + "Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems": 55, + "Using constraints for Norm-aware BDI Agents": 4814, + "Using pseudo-senses for improving the extraction of synonyms from word embeddings": 4390, + "Utilitarian Performance Isolation in Shared SSDs": 2205, + "Utility-Based Control Feedback in a Digital Library Search Engine: Cases in CiteSeerX": 1670, + "Utilizing the IOMMU Scalably Utilizing the IOMMU Scalably": 928, + "V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics": 2523, + "V0LTpwn: Attacking x86 Processor Integrity from Software V0LTpwn: Attacking x86 Processor Integrity from Software": 3651, + "VALUE OF INFORMATION METHODS FOR PAIRWISE SAMPLING WITH CORRELATIONS": 432, + "VAMOS: Virtualization Aware Middleware": 405, + "VARIATIONAL BAYESIAN IMAGE PROCESSING ON STOCHASTIC FACTOR GRAPHS": 102, + "VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension": 333, + "VESPA: Portable, Scalable, and Flexible FPGA-Based Vector Processors": 954, + "VOCL: An Optimized Environment for Transparent Virtualization of Graphics Processing Units": 2344, + "Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem": 4120, + "Vale: Verifying High-Performance Cryptographic Assembly Code Vale: Verifying High-Performance Cryptographic Assembly Code": 3351, + "Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter? Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter?": 3794, + "Valuation Uncertainty and Imperfect Introspection in Second-Price Auctions": 4910, + "Value Function Approximation on Non-Linear Manifolds for Robot Motor Control": 3165, + "Valuing Security by Getting [d0x3d!] Experiences with a network security board game": 1358, + "Vantage: Scalable and Efficient Fine-Grain Cache Partitioning": 4858, + "Varys: Protecting SGX enclaves from practical side-channel attacks Varys Protecting SGX Enclaves From Practical Side-Channel Attacks": 1102, + "Vector Lane Threading": 4854, + "Vector Vs. Superscalar and VLIW Architectures for Embedded Multimedia Benchmarks": 4891, + "Venus: Verification for Untrusted Cloud Storage": 532, + "Veracity: Practical Secure Network Coordinates via Vote-based Agreements": 3762, + "Verifiable Computation with Massively Parallel Interactive Proofs": 1811, + "Verification of Stack Manipulation in the SCIP Processor": 589, + "Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication": 4928, + "Verifying Safety of a Token Coherence Implementation by Parametric Compositional Refinement \ud97b\udf59": 4497, + "Verifying concurrent software using movers in CspeC Verifying concurrent software using movers in CSPEC": 3034, + "Vetting Single Sign-On SDK Implementations via Symbolic Reasoning Vetting Single Sign-On SDK Implementations via Symbolic Reasoning": 3519, + "Victim Disk First: An Asymmetric Cache to Boost the Performance of Disk Arrays under Faulty Conditions": 702, + "VideoChef: Efficient Approximation for Streaming Video Processing Pipelines VIDEOCHEF: Efficient Approximation for Streaming Video Processing Pipelines": 1120, + "Virtual Guard: A Track-Based Translation Layer for Shingled Disks": 2199, + "Virtual Putty: Reshaping the Physical Footprint of Virtual Machines": 3764, + "Virtual Switching Without a Hypervisor for a More Secure Cloud": 41, + "Virtual Switching Without a Hypervisor for a More Secure Cloud_2038": 2038, + "Virtual machine images as structured data: the Mirage image library": 234, + "Virtual machine introspection in a hybrid honeypot architecture": 1346, + "Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional Links": 3688, + "VirtualFace: An Algorithm to Guarantee Packet Delivery of Virtual-Coordinate-Based Routing Protocols in Wireless Sensor Networks": 34, + "Virtualize Everything but Time": 293, + "Virtually Cool Ternary Content Addressable Memory": 278, + "Virtually Eliminating Router Bugs": 4444, + "Vis-` a-vis Cryptography: Private and Trustworthy In-Person Certifications": 1771, + "Visual Attention Model for Name Tagging in Multimodal Social Media": 4360, + "Visual Security Policy for the Web": 581, + "Voice of the Customers: Mining Online Customer Reviews for Product Feature-based Ranking": 746, + "Void: A fast and light voice liveness detection system Void: A fast and light voice liveness detection system": 3585, + "Volley: Automated Data Placement for Geo-Distributed Cloud Services": 758, + "VoteAgAin: A scalable coercion-resistant voting system VOTEAGAIN: A scalable coercion-resistant voting system": 3667, + "Vsys: A programmable sudo": 275, + "Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities using Machine Learning": 729, + "W32.Duqu: The Precursor to the Next Stuxnet": 2380, + "WAFFle: Fingerprinting Filter Rules of Web Application Firewalls": 4003, + "WALDIO: Eliminating the Filesystem Journaling in Resolving the Journaling of Journal Anomaly WALDIO: Eliminating the Filesystem Journaling in Resolving the Journaling of Journal Anomaly": 915, + "WALKING YOUR DOG IN THE WOODS IN POLYNOMIAL TIME": 1776, + "WAVE: A Decentralized Authorization Framework with Transitive Delegation WAVE: A Decentralized Authorization Framework with Transitive Delegation": 3530, + "WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server Requests": 352, + "WEB CONTENT EXTRACTION THROUGH HISTOGRAM CLUSTERING": 129, + "WIKIQA: A Challenge Dataset for Open-Domain Question Answering": 4171, + "WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring": 3440, + "Wake-on-WLAN": 2366, + "Walkie-Markie: Indoor Pathway Mapping Made Easy": 2522, + "Warming up Storage-Level Caches with Bonfire": 1467, + "Wave Computing in the Cloud": 1759, + "Wavelet and Time-Domain Modeling of Multi-Layer VBR Video Traffic": 58, + "We Crashed, Now What? *": 401, + "We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS": 3445, + "Weak Semi-Markov CRFs for NP Chunking in Informal Text": 4189, + "Weakly Supervised Semantic Parsing with Abstract Examples": 4344, + "Wealth-Based Evolution Model for the Internet AS-Level Topology": 4750, + "WearDrive: Fast and Energy-Efficient Storage for Wearables WearDrive: Fast and Energy-Efficient Storage for Wearables": 908, + "Web Projections: Learning from Contextual Subgraphs of the Web": 1810, + "Web-based Attacks on Host-Proof Encrypted Storage": 4004, + "WebCop: Locating Neighborhoods of Malware on the Web": 663, + "WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios": 4982, + "WebProphet: Automating Performance Prediction for Web Services": 2401, + "WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths": 3256, + "Weblio Pre-reordering Statistical Machine Translation System": 2866, + "Webseclab Security Education Workbench": 302, + "Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing": 3884, + "Weighted parsing for grammar-based language models": 781, + "Well-Supported Semantics for Description Logic Programs": 2665, + "What Action Causes This? Towards Naive Physical Action-Effect Prediction": 4305, + "What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete": 3557, + "What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses": 3314, + "What If You Could Actually Trust Your Kernel?": 433, + "What Kind of Language Is Hard to Language-Model?": 3753, + "What Ought A Program Committee To Do?": 767, + "What Your CDN Won't Tell You: Optimizing a News Website for Speed and Stability": 2409, + "What consistency does your key-value store actually provide?": 237, + "What makes a good conversation? How controllable attributes affect human judgments": 4204, + "What papers should I cite from my reading list? User evaluation of a manuscript preparatory assistive task": 527, + "What you can cram into a single $&!#* vector: Probing sentence embeddings for linguistic properties": 4373, + "When Address Remapping Techniques Meet Consistency Guarantee Mechanisms": 2204, + "When Apache Spark Meets FPGAs: A Case Study for Next-Generation DNA Sequencing Acceleration": 1858, + "When Cache Blocking of Sparse Matrix Vector Multiply Works and Why": 4730, + "When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks": 3498, + "When Oblivious is Not: Attacks against OPAM": 4130, + "When is a Tree Really a Truck? Exploring Mental Models of Encryption When is a Tree Really a Truck? Exploring Mental Models of Encryption": 3827, + "When is the Cache Warm? Manufacturing a Rule of Thumb": 1957, + "When the Signal is in the Noise: Exploiting Diffix's Sticky Noise When the Signal is in the Noise: Exploiting Diffix's Sticky Noise": 3539, + "When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers": 3386, + "Which Melbourne? Augmenting Geocoding with Maps": 4334, + "Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations": 1675, + "White-Stingray: Evaluating IMSI Catchers Detection Applications": 4085, + "Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path": 3480, + "Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies": 3456, + "Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO": 4113, + "Who Watches the Watchmen? -Protecting Operating System Reliability Mechanisms": 1958, + "Who wears me? Bioimpedance as a passive biometric": 1773, + "Who's Afraid of Uncorrectable Bit Errors? Online Recovery of Flash Errors with Distributed Redundancy Who's Afraid of Uncorrectable Bit Errors? Online Recovery of Flash Errors with Distributed Redundancy": 1194, + "Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security": 3873, + "Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks and Pluribus One Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks": 3538, + "Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice Why Do They Do What They Do? A Study of What Motivates Users to (Not) Follow Computer Security Advice": 3772, + "Why Do We Always Blame The Storage Stack?": 2167, + "Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm": 448, + "Why let resources idle? Aggressive Cloning of Jobs with Dolly": 1804, + "Wh\u00af anau: A Sybil-proof Distributed Hash Table": 2395, + "Wide-Area Route Control for Distributed Services": 690, + "Wide-Area Route Control for Distributed Services_4443": 4443, + "Wide-area Network Acceleration for the Developing World": 450, + "Willow: A User-Programmable SSD Willow: A User-Programmable SSD": 2964, + "Wimpy Nodes with 10GbE: Leveraging One-Sided Operations in Soft-RDMA to Boost Memcached": 839, + "Win32 API Emulation on UNIX for Software DSM Win32 API Emulation on UNIX for Software DSM": 3075, + "Wire Speed Name Lookup: A GPU-based Approach": 2548, + "Wireless Networks Should Spread Spectrum Based On Demands *": 10, + "Wireless Peer-to-Peer Scheduling in Mobile Networks": 2799, + "Work in Progress: On The Scalability of Storage Sub-System Back-end Network": 2404, + "Work in Progress: Performance Evaluation of RAID6 Systems": 2403, + "Work-in-progress: Automated Named Entity Extraction for Tracking Censorship of Current Events": 374, + "WorkOut: I/O Workload Outsourcing for Boosting RAID Reconstruction Performance": 4140, + "Working Memory Networks: Augmenting Memory Networks with a Relational Reasoning Module": 4311, + "Working Set Model for Multithreaded Programs": 3944, + "Workload-driven Analysis of File Systems in Shared Multi-tier Data-Centers over InfiniBand": 2277, + "Write Amplification Reduction in Flash-Based SSDs Through Extent-Based Temperature Identification": 2170, + "Write Endurance in Flash Drives: Measurements and Analysis": 1302, + "Write-Optimized and High-Performance Hashing Index Scheme for Persistent Memory Write-Optimized and High-Performance Hashing Index Scheme for Persistent Memory": 3074, + "X-Force: Force-Executing Binary Programs for Security Applications X-Force: Force-Executing Binary Programs for Security Applications": 3194, + "XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers": 2663, + "XIA: Efficient Support for Evolvable Internetworking": 2495, + "XML WAREHOUSING MEETS SOCIOLOGY W3C Member -Semantic Web BP": 4578, + "XRay: Enhancing the Web's Transparency with Differential Correlation XRay: Enhancing the Web's Transparency with Differential Correlation": 3183, + "XvMotion: Unified Virtual Machine Migration over Long Distance XvMotion: Unified Virtual Machine Migration over Long Distance": 875, + "YAF: Yet Another Flowmeter": 452, + "YAPA: A generic tool for computing intruder knowledge": 998, + "Yank: Enabling Green Data Centers to Pull the Plug": 2525, + "You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors": 3305, + "You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems": 1752, + "You Snooze, You Lose: Measuring PLC Cycle Times under Attacks": 4102, + "You Want Me To Do What? A Design Study of Two-Factor Authentication Messages": 3969, + "Your Coflow has Many Flows: Sampling them for Fun and Speed Your Cooow Has Many Flows: Sampling Them for Fun and Speed": 1157, + "Your computer is already a distributed system. Why isn't your OS?": 1287, + "ZEA, A Data Management Approach for SMR": 2168, + "ZKBoo: Faster Zero-Knowledge for Boolean Circuits ZKBoo: Faster Zero-Knowledge for Boolean Circuits": 3303, + "Zanzibar: Google's Consistent, Global Authorization System Zanzibar: Google's Consistent, Global Authorization System": 1184, + "ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks": 3050, + "Zero-Shot Transfer Learning for Event Extraction": 4377, + "Zero-delay Lightweight Defenses against Website Fingerprinting Zero-delay Lightweight Defenses against Website Fingerprinting": 3637, + "ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities": 3274, + "Zippier ZMap: Internet-Wide Scanning at 10 Gbps": 4022, + "ZoneAlloy: Elastic Data and Space Management for Hybrid SMR Drives": 2245, + "ZooKeeper: Wait-free coordination for Internet-scale systems": 447, + "aiql: Enabling Efficient Attack Investigation from System Monitoring Data AIQL: Enabling Efficient Attack Investigation from System Monitoring Data": 1072, + "cHash: Detection of Redundant Compilations via AST Hashing cHash: Detection of Redundant Compilations via AST Hashing": 1004, + "coIOMMU: A Virtual IOMMU with Cooperative DMA Buffer Tracking for Efficient Memory Management in Direct I/O coIOMMU: A Virtual IOMMU with Cooperative DMA Buffer Tracking for Effi- cient Memory Management in Direct I/O": 1256, + "dBug: Systematic Evaluation of Distributed Systems": 653, + "deSEO: Combating Search-Result Poisoning": 461, + "deTector: a Topology-aware Monitoring System for Data Center Networks deTector: a Topology-aware Monitoring System for Data Center Networks": 1033, + "diaNED: Time-Aware Named Entity Disambiguation for Diachronic Corpora": 4419, + "dr0wned -Cyber-Physical Attack with Additive Manufacturing": 4080, + "dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data": 2426, + "go-pmem: Native Support for Programming Persistent Memory in Go go-pmem: Native Support for Programming Persistent Memory in Go": 1220, + "iJournaling: Fine-Grained Journaling for Improving the Latency of Fsync System Call iJournaling: Fine-Grained Journaling for Improving the Latency of Fsync System Call": 1031, + "iSCSI SANs Don't Have To Suck": 260, + "iShuffle: Improving Hadoop Performance with Shuffle-on-Write": 2286, + "iWARP Redefined: Scalable Connectionless Communication over High-Speed Ethernet": 1910, + "jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components": 714, + "libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK) libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK)": 1186, + "mCarve: Carving Attributed Dump Sets": 360, + "mClock: Handling Throughput Variability for Hypervisor IO Scheduling": 413, + "mLSM: Making Authenticated Storage Faster in Ethereum": 2211, + "mPuff: Automated Detection of Cigarette Smoking Puffs from Respiration Measurements": 107, + "mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems mTCP: A Highly Scalable User-level TCP Stack for Multicore Systems": 2574, + "make world": 659, + "malWASH: Washing malware to evade dynamic analysis": 4068, + "qNVRAM: quasi Non-Volatile RAM for Low Overhead Persistency Enforcement in Smartphones": 2131, + "sRDMA -Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access sRDMA -Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access": 1254, + "simd-x: Programming and Processing of Graph Algorithms on GPUs SIMD-X: Programming and Processing of Graph Algorithms on GPUs": 1173, + "tensorflow-tracing: A Performance Tuning Framework for Production tensorflow-tracing: A Performance Tuning Framework for Production": 2884, + "tiqr: a novel take on two-\u00ad-factor authentication": 624, + "unknown_110": 110, + "unknown_1488": 1488, + "unknown_2390": 2390, + "unknown_2391": 2391, + "unknown_2451": 2451, + "unknown_2488": 2488, + "unknown_2610": 2610, + "unknown_2721": 2721, + "unknown_2877": 2877, + "unknown_3218": 3218, + "unknown_3699": 3699, + "unknown_4005": 4005, + "unknown_4024": 4024, + "unknown_438": 438, + "unknown_4499": 4499, + "unknown_4544": 4544, + "unknown_4698": 4698, + "unknown_4759": 4759, + "unknown_477": 477, + "unknown_4797": 4797, + "unknown_4859": 4859, + "unknown_4945": 4945, + "unknown_568": 568, + "unknown_585": 585, + "unknown_718": 718, + "vCRIB: Virtualized Rule Management in the Cloud": 1789, + "vCacheShare: Automated Server Flash Cache Space Management in a Virtualization Environment vCacheShare: Automated Server Flash Cache Space Management in a Virtualization Environment": 877, + "vDC: Virtual Data Center Powered with AS Alliance for Enabling Cost-Effective Business Continuity and Coverage": 431, + "vIC: Interrupt Coalescing for Virtual Machine Storage Device IO": 226, + "vIOMMU: Efficient IOMMU Emulation": 232, + "vPath: Precise Discovery of Request Processing Paths from Black-Box Observations of Thread and Network Activities": 3889, + "vSMT-IO: Improving I/O Performance and Efficiency on SMT Processors in Virtualized Clouds VSMT-IO: Improving I/O Performance and Efficiency on SMT Processors in Virtualized Clouds": 1228, + "xJS: Practical XSS Prevention for Web Application Development": 248, + "\u00d0\u00d9\u00ccae \u00d3\u00bb\u00bf\u00ad\u00ab\u00ae\u00b7\u00b2\u00b9 \u00d3\u00b1\u00be\u00b7\u00b4\u00b7\u00ac \u00a7 \u00ce\u00bb\u00b4\u00bf\u00ac\u00b7\u00b1\u00b2\u00ad\u00b8\u00b7\u00b0 \u00ab\u00ad\u00b7\u00b2\u00b9 \u00d0\u00bb\u00ae\u00ad\u00b1\u00b2\u00bf\u00b4\u00f4 \u00d9\u00b4\u00b1\u00be\u00bf\u00b4\u00bf\u00b2\u00bc\u00d9\u00b4\u00b1\u00be\u00bf\u00b4\u00bf\u00b2\u00bc \u00cc\u00bb\u00b3\u00b0\u00b1\u00ae\u00bf\u00b4\u00da\u00bf\u00bd\u00ac\u00b1\u00ae\u00ad\u00cc\u00bb\u00b3\u00b0\u00b1\u00ae\u00bf\u00b4\u00da\u00bf\u00bd\u00ac\u00b1\u00ae\u00ad \u00d8\u00b1\u00b2\u00b9 \u00b6\u00b7\u00bf\u00b2 \u00c9\u00bf\u00b2\u00b9 \u00f4 AE\u00b8\u00bb\u00b2\u00b8\u00ab\u00b7 \u00d4\u00b7 \u00f4 \u00c9\u00bf\u00b2\u00b9\u00f3\u00dd\u00b8\u00b7\u00bb\u00b2 \u00d4\u00bb\u00bb \u00a7 \u00dd\u00b1\u00b4\u00b4\u00bb\u00b9\u00bb \u00b1\u00ba \u00d7\u00b2\u00ba\u00b1\u00ae\u00b3\u00bf\u00ac\u00b7\u00b1\u00b2 \u00cd\u00bd\u00b7\u00bb\u00b2\u00bd\u00bb\u00ad \u00bf\u00b2\u00bc \u00cc\u00bb\u00bd\u00b8\u00b2\u00b1\u00b4\u00b1\u00b9 \u00a7\u00f4 \u00d0\u00bb\u00b2\u00b2\u00ad \u00a7\u00b4\u00aa\u00bf\u00b2\u00b7\u00bf \u00cd\u00ac\u00bf\u00ac\u00bb \u00cb\u00b2\u00b7\u00aa\u00bb\u00ae\u00ad\u00b7\u00ac \u00a7": 449, + "\u00fcberSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor USENIX Association 25th USENIX Security Symposium 87 \u00dcBERSPARK \u2020 : Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor": 3337, + "\u03c0Box: A Platform for Privacy-Preserving Apps": 2549, + "\ufffd\ufffd \ufffd\ufffd": 4856 + }, + "max_position_embeddings": 512, + "model_type": "distilbert", + "n_heads": 12, + "n_layers": 6, + "pad_token_id": 0, + "qa_dropout": 0.1, + "seq_classif_dropout": 0.2, + "sinusoidal_pos_embds": false, + "tie_weights_": true, + "transformers_version": "4.39.3", + "vocab_size": 30522 +}