Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
A constraint definition assigns a name to the result of a constraint expression: GettysburgAddress = starts with "Four score and seven years ago", ends with "shall not perish from the earth" ...
Check out the Proceedings of the past USENIX Security Symposia. Join us in Montreal, Canada, August 10–14, 2009, for the 18th USENIX Security Symposium. The USENIX Security Symposium brings together ...
Tobias Fiebig, Janis Danisevskis, and Marta Piekarska, Technische Universität Berlin ...
The mutex primitive provides mutual exclusion for one or more data objects. Two versions of the mutex primitive are provided: spin mutexes and sleep mutexes. Spin mutexes are a simple spin lock. If ...
Zakir Durumeric, Eric Wustrow, and J. Alex Halderman, University of Michigan ...
Hugo Guiroux and Renaud Lachaize, Université Grenoble Alpes and Laboratoire d'Informatique de Grenoble; Vivien Quéma, Université Grenoble Alpes, Grenoble Institute of Technology, and Laboratoire ...
{welch,mju,zabbasi,garth,bmueller,jsmall,jimz,bzhou}@panasas.com The unique aspects of the Panasas system are its use of per-file, client-driven RAID, its parallel RAID rebuild, its treatment of ...
Franziska Roesner, Tadayoshi Kohno, and David Wetherall, University of Washington ...
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage, University of California, San Diego; Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi ...
Daniel Stodolsky, J. Brad Chen and Brian Bershad, School of Computer Science, Carnegie Mellon University ...