USENIX Mach Symposium | Parallelizing Signal Handling and Process Management in OSF/1 | Don Bolinger, Shashi Mangalat |
USENIX Mach Symposium | Mach Resource Control in OSF/1 | David W. Mitchell |
USENIX Mach Symposium | Mach Interfaces to Support Guest O.S. Debugging | Rand Hoven |
USENIX Mach Symposium | Kernel Support for Network Protocol Servers | Franklin Reynolds, Jeffrey Heller |
USENIX Mach Symposium | An I/O System for Mach 3.0 | Alessandro Forin, David Golub, Bryan Bershad |
USENIX Mach Symposium | Moving the Default Memory Manager Out of the Mach Kernl | David B. Golub, Richard P. Draves |
USENIX Mach Symposium | User-Level Physical Memory Management for Mach | Stuart Sechrest, Yoonho Park |
USENIX Mach Symposium | Page Replacement and Reference Bit Emulation in Mach | Richard P. Draves |
USENIX Mach Symposium | Evaluation of Real-Time Synchronization in Real-Time Mach | Hideyuki Tokuda, Tatsuo Nakajima |
USENIX Mach Symposium | How to Design Reliable Servers using Fault Tolerant Micro-Kernel Mechanisms | Michel Banâtre, Gilles Muller, Pack Heng, Bruno Rochat |
USENIX Mach Symposium | The FIle System Belongs in the Kernel | Brent Welch |
USENIX Mach Symposium | Distributed Trusted Mach Architecture | Edward John Sebes |
USENIX Security '24 | A High Coverage Cybersecurity Scale Predictive of User Behavior | |
USENIX Security '24 | NetShaper: A Differentially Private Network Side-Channel Mitigation System | |
USENIX Security '24 | Splitting the Difference on Adversarial Training | |
USENIX Security '24 | Quantifying Privacy Risks of Prompts in Visual Prompt Learning | |
USENIX Security '24 | Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants | |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | |
USENIX Security '24 | Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..." | |
USENIX Security '24 | Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security | |
USENIX Security '24 | Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting | |
USENIX Security '24 | Cascade: CPU Fuzzing via Intricate Program Generation | |
USENIX Security '24 | Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS | |
USENIX Security '24 | Less is More: Revisiting the Gaussian Mechanism for Differential Privacy | |
USENIX Security '24 | DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | |