USENIX

Results: 1311



#Item
1Computing / Information and communications technology / Computer network security / Data transmission / Network architecture / Computer networking / Internet architecture / Networking hardware / OpenFlow / Open vSwitch / Middlebox / Forwarding information base

SoftFlow: A Middlebox Architecture for Open vSwitch Ethan J. Jackson, University of California, Berkeley; Melvin Walls, Penn State Harrisburg and University of California, Berkeley; Aurojit Panda, University of Californi

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-06-22 03:22:28
2Microsoft Research / Aditya Akella / Carnegie Mellon University / Carnegie Mellon Silicon Valley / Research / Computer science / Knowledge

USENIX Association Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16)

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
3Software engineering / Computer programming / Computing / Control flow / Exception handling / Setjmp.h / C++ / Goto / Subroutine / Pointer / Inline expansion / Switch statement

C++ Exception Handling for IA-64 Christophe de Dinechin Hewlett-Packard IA-64 Foundation Lab Abstract The C++ programming language offers a feature

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-01-23 20:49:17
4Computing / Internet / Content-control software / Internet privacy / Information and communications technology / Computer networking / Internet censorship / Privacy / Great Firewall / OpenDNS / Public recursive name server / Google Public DNS

The Anatomy of Web Censorship in Pakistan Zubair Nabi Information Technology University, Pakistan Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2013-10-25 08:52:50
5Error detection and correction

FAST’15   A  Tale  of  Two  Erasure  Codes  in  HDFS   Mingyuan  Xia,  Mohit  Saxena   Mario  Blaum,  David  Pease    

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:48
    6

    This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-03-07 03:28:10
      7Computing / Computer networking / Information and communications technology / Data transmission / Internet architecture / Internet protocols / Internet privacy / Network performance / Proxy server / Router / SOCKS / Internet protocol suite

      Decoy Routing: Toward Unblockable Internet Communication Josh Karlin Daniel Ellard

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2011-07-13 15:24:03
      8Domain name system / Internet / Computing / Network architecture / Extension mechanisms for DNS / Name server / OpenDNS / DNS hijacking / Comparison of DNS server software

      DNS-sly: Avoiding Censorship through Network Complexity Qurat-Ul-Ann Danyal Akbar Northwestern University Marcel Flores Northwestern University

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2016-08-08 03:11:25
      9Internet architecture / Computing / Network architecture / Internet / Border Gateway Protocol / BGP hijacking / Routing / Router / Peering / IP routing / Control plane / Computer network

      Route Bazaar: Automatic Interdomain Contract Negotiation Ignacio Castro ♣†♠ Aurojit Panda ‡ Barath Raghavan ♠ Scott Shenker ♠‡ Sergey Gorinsky ♣ ♣ IMDEA Networks Institute † Open University of Catalon

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2016-02-21 02:46:52
      10Security / Security breaches / Malware / Computer network security / Cybercrime / Multi-agent systems / Spamming / Rogue software / Botnet / Antivirus software / Rogue security software / Computer virus

      Measuring Pay-per-Install: The Commoditization of Malware Distribution Juan Caballero† , Chris Grier∗‡ , Christian Kreibich∗‡ , Vern Paxson∗‡ † IMDEA Software Institute ∗ UC Berkeley ‡ ICSI juan.cabal

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2011-06-09 13:31:25
      UPDATE