Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
A constraint definition assigns a name to the result of a constraint expression: GettysburgAddress = starts with "Four score and seven years ago", ends with "shall not perish from the earth" ...
Check out the Proceedings of the past USENIX Security Symposia. Join us in Montreal, Canada, August 10–14, 2009, for the 18th USENIX Security Symposium. The USENIX Security Symposium brings together ...
Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford, École Polytechnique Fédérale de Lausanne (EPFL) ...
Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J. Franklin, Scott Shenker, and Ion Stoica, University of California ...
Bin Fan and David G. Andersen, Carnegie Mellon University; Michael Kaminsky, Intel Labs Modern data center environments are subject to some of the largest and most extreme workloads of any computing ...
Matthew Green and Susan Hohenberger, Johns Hopkins University; Brent Waters, University of Texas at Austin ...
Ruoyu Wang, University of California, Santa Barbara, and Tsinghua University; Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna, University of California, Santa Barbara ...
Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang, National University of Singapore ...
Himanshu Raj, ContainerX; Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork Loeser, Dennis Mattoon ...
Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage, University of California, San Diego ...