Sciweavers

NSDI
2008
13 years 7 months ago
D3S: Debugging Deployed Distributed Systems
Xuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xia...
NSDI
2008
13 years 7 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
NSDI
2008
13 years 7 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
NSDI
2008
13 years 7 months ago
Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services
Energy consumption in hosting Internet services is becoming a pressing issue as these services scale up. Dynamic server provisioning techniques are effective in turning off unnece...
Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas...
NSDI
2008
13 years 7 months ago
Efficiency Through Eavesdropping: Link-layer Packet Caching
The broadcast nature of wireless networks is the source of both their utility and much of their complexity. To turn what would otherwise be unwanted interference into an advantage...
Mikhail Afanasyev, David G. Andersen, Alex C. Snoe...
NSDI
2008
13 years 7 months ago
cSamp: A System for Network-Wide Flow Monitoring
Critical network management applications increasingly demand fine-grained flow level measurements. However, current flow monitoring solutions are inadequate for many of these appl...
Vyas Sekar, Michael K. Reiter, Walter Willinger, H...
NSDI
2008
13 years 7 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
NSDI
2008
13 years 7 months ago
Wedge: Splitting Applications into Reduced-Privilege Compartments
Andrea Bittau, Petr Marchenko, Mark Handley, Brad ...
NSDI
2008
13 years 7 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...
NSDI
2008
13 years 7 months ago
Beyond Pilots: Keeping Rural Wireless Networks Alive
Very few computer systems that have been deployed in rural developing regions manage to stay operationally sustainable over the long term; most systems do not go beyond the pilot ...
Sonesh Surana, Rabin K. Patra, Sergiu Nedevschi, M...