Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
A constraint definition assigns a name to the result of a constraint expression: GettysburgAddress = starts with "Four score and seven years ago", ends with "shall not perish from the earth" ...
Check out the Proceedings of the past USENIX Security Symposia. Join us in Montreal, Canada, August 10–14, 2009, for the 18th USENIX Security Symposium. The USENIX Security Symposium brings together ...
This paper has described a new state-machine replication system that offers both integrity and high availability in the presence of Byzantine faults. The new system can be used to implement real ...
In this paper, we thus investigate the threat of application-layer traffic loops. To this end, we propose a systematic approach to identify loops among real servers. Our core idea is to learn the ...
Bianca Schroeder, University of Toronto; Raghav Lagisetty and Arif Merchant, Google, Inc.
James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, JJ Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild ...
Jeanna Neefe Matthews, Randoph Y. Wang, Drew S. Roselly, and Thomas Anderson,, University of California, Berkeley ...
William J. Bolosky and Michael L. Scott, University of Rochester ...
The mutex primitive provides mutual exclusion for one or more data objects. Two versions of the mutex primitive are provided: spin mutexes and sleep mutexes. Spin mutexes are a simple spin lock. If ...