-
1
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
W. Arbaugh, W. Fithen, and J. McHugh. Windows of Vulnerability: A Case Study Analysis. In IEEE Computer, Vol. 33(12)
-
IEEE Computer
, vol.33
, Issue.12
-
-
Arbaugh, W.1
Fithen, W.2
McHugh, J.3
-
2
-
-
1042290191
-
Information and control in gray-box systems
-
Banff, Canada
-
A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Information and Control in Gray-Box Systems. In SOSP, Banff, Canada, 2001
-
(2001)
SOSP
-
-
Arpaci-Dusseau, A.C.1
Arpaci-Dusseau, R.H.2
-
3
-
-
84883303431
-
Measurements of a distributed file system
-
Pacific Grove, CA
-
M. Baker, et al. Measurements of a Distributed File System. In SOSP, Pacific Grove, CA, 1991
-
(1991)
SOSP
-
-
Baker, M.1
-
5
-
-
34548341204
-
VpC3: A fast and effective trace-compression algorithm
-
New York, NY
-
M. Burtscher. VPC3: A Fast and Effective Trace-Compression Algorithm. In ACM SIGMETRICS. New York, NY, 2004
-
(2004)
ACM SIGMETRICS
-
-
Burtscher, M.1
-
6
-
-
0040746930
-
Query optimization in compressed database systems
-
Santa Barbara, CA
-
Z. Chen, J. Gehrke, F. Korn. Query Optimization In Compressed Database Systems. In ACM SIGMOD. Santa Barbara, CA, 2001
-
(2001)
ACM SIGMOD
-
-
Chen, Z.1
Gehrke, J.2
Korn, F.3
-
7
-
-
0040557408
-
A relational model for large shared databanks
-
E. A. Codd. A relational model for large shared databanks. Communications of the ACM, Vol. 13(6)
-
Communications of the ACM
, vol.13
, Issue.6
-
-
Codd, E.A.1
-
8
-
-
33750045537
-
WayBack: A User-level Versioning File System for Linux
-
Boston, MA
-
B. Cornell, P. A. Dinda, and F. E. .Bustamente. Wayback: A User-level Versioning File System for Linux. In Usenix Technical. Boston, MA, 2004
-
(2004)
Usenix Technical
-
-
Cornell, B.1
Dinda, P.A.2
Bustamente, F.E.3
-
9
-
-
0002183941
-
A large-scale study of file-system content
-
Atlanta, GA
-
J. Douceur, and B. Bolosky. A Large-Scale Study of File-System Content. In ACM SIGMETRICS. Atlanta, GA, 1999
-
(1999)
ACM SIGMETRICS
-
-
Douceur, J.1
Bolosky, B.2
-
10
-
-
4544285425
-
Towards a Self-Managing Software Patching Process Using Blacpk-box Persistent-state Manifests
-
New York, NY
-
J. Dunagan, et al. Towards a Self-Managing Software Patching Process Using Blacpk-box Persistent-state Manifests. In ICAC. New York, NY, 2004
-
(2004)
ICAC
-
-
Dunagan, J.1
-
11
-
-
11844249640
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Boston, MA
-
G. W. Dunlap, et al. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In OSDI, Boston, MA, 2002
-
(2002)
OSDI
-
-
Dunlap, G.W.1
-
12
-
-
4143049367
-
Passive NFS tracing of email and research workloads
-
San Francisco, CA
-
D. Ellard, J. Ledlie, P. Malkani, and M. Seltzer. Passive NFS Tracing of Email and Research Workloads. In USENIX FAST, San Francisco, CA, 2003
-
(2003)
USENIX FAST
-
-
Ellard, D.1
Ledlie, J.2
Malkani, P.3
Seltzer, M.4
-
13
-
-
84960382252
-
Forensix: A robust, high-performance reconstruction system
-
Columbus, OH
-
A. Goel, et al. Forensix: A Robust, High-Performance Reconstruction System. In ICDCS Security Workshop. Columbus, OH, 2005
-
(2005)
ICDCS Security Workshop
-
-
Goel, A.1
-
14
-
-
0003312832
-
Self-similarity in File Systems
-
Madison, WI
-
S. D. Gribble, et al. Self-similarity in File Systems. In ACM SIGMETRICS, Madison, WI, 1998
-
(1998)
ACM SIGMETRICS
-
-
Gribble, S.D.1
-
15
-
-
0043199887
-
Characteristics of I/O traffic in personal compute and server workloads
-
W. H. Hau, and A. J. Smith. Characteristics of I/O Traffic in Personal Compute and Server Workloads. IBM Systems Journal. , 347-372, Vol. 42(2)
-
IBM Systems Journal
, vol.42
, Issue.2
, pp. 347-372
-
-
Hau, W.H.1
Smith, A.J.2
-
17
-
-
10644279224
-
Backtracking intrusions
-
Bolton Landing, NY
-
S. King, and P. Chen. Backtracking Intrusions. In SOSP, Bolton Landing, NY, 2003
-
(2003)
SOSP
-
-
King, S.1
Chen, P.2
-
18
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport. Password authentication with insecure communication. In Communications of the ACM, 24(11):770-772, Nov. 1981
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
19
-
-
0032681069
-
Whole program paths
-
Atlanta, GA
-
J. Larus. Whole Program Paths. In PLDI, Atlanta, GA, 1999
-
(1999)
PLDI
-
-
Larus, J.1
-
21
-
-
0003592399
-
The VTrace tool: Building a system tracer for Windows NT and Windows 2000
-
J. Lorch, and A. J. Smith. The VTrace Tool: Building a System Tracer for Windows NT and Windows 2000. MSDN Magazine. , Vol. 15, 10
-
MSDN Magazine
, vol.15
, pp. 10
-
-
Lorch, J.1
Smith, A.J.2
-
23
-
-
85077681170
-
Crawler-based Study of Spyware in the Web
-
San Diego, CA
-
A. Moshchuk, T. Bragin, S. D. Gribble, and H. A. Levy, Crawler-based Study of Spyware in the Web. In NDSS, San Diego, CA, 2006
-
(2006)
NDSS
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.A.4
-
24
-
-
84875570984
-
Why do Internet services fail, and what can be done about it?
-
Seattle, WA
-
D. Oppenheimer, A. Ganapathi and D. Patterson. Why do Internet services fail, and what can be done about it? In USITS. Seattle, WA, 2003
-
(2003)
USITS
-
-
Oppenheimer, D.1
Ganapathi, A.2
Patterson, D.3
-
25
-
-
84950241176
-
Analysis of file I/O traces in commercial computing environments
-
Newport, RI
-
K. K. Ramakrishnan, B. Biswas, and R. Karedla. Analysis of File I/O Traces in Commercial Computing Environments. In ACM SIGMETRICS. Newport, RI, 1992
-
(1992)
ACM SIGMETRICS
-
-
Ramakrishnan, K.K.1
Biswas, B.2
Karedla, R.3
-
26
-
-
84962435308
-
Security holes... Who cares?
-
Washington, DC
-
E. Rescorla. Security Holes... Who Cares? In USENIX Security Symposium. Washington, DC, 2003
-
(2003)
USENIX Security Symposium
-
-
Rescorla, E.1
-
27
-
-
77957793926
-
PIP: Detecting the unexpected in distributed systems
-
San Jose, CA
-
P. Reynolds, et al. Pip: Detecting the unexpected in distributed systems. In NSDI, San Jose, CA, 2006
-
(2006)
NSDI
-
-
Reynolds, P.1
-
31
-
-
85076746532
-
Metadata efficiency in a comprehensive versioning file system
-
San Francisco, CA
-
C. Soules, G. Goodson, J. Strunk, G. Ganger. Metadata Efficiency in a Comprehensive Versioning File System. In USENIX FAST, San Francisco, CA, 2003
-
(2003)
USENIX FAST
-
-
Soules, C.1
Goodson, G.2
Strunk, J.3
Ganger, G.4
-
32
-
-
33750375032
-
Analyzing persistent state interactions to improve state management
-
MSR-TR-2006-39
-
C. Verbowski, et al. Analyzing Persistent State Interactions to Improve State Management, Microsoft Research Technical Report. MSR-TR-2006-39, 2006
-
(2006)
Microsoft Research Technical Report
-
-
Verbowski, C.1
-
33
-
-
84900001356
-
File system usage in Windows NT 4.0
-
Charleston, SC
-
W. Vogels. File System Usage in Windows NT 4.0. In SOSP, Charleston, SC, 1999
-
(1999)
SOSP
-
-
Vogels, W.1
-
34
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
Portland, OR
-
H. Wang, C. Guo, D. Simon, and A..Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In ACM SIGCOMM. Portland, OR, 2004
-
(2004)
ACM SIGCOMM
-
-
Wang, H.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
-
35
-
-
85077048913
-
Automatic misconfiguration troubleshooting with peerpressure
-
San Francisco, CA
-
H. Wang, et al. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI. San Francisco, CA, 2004
-
(2004)
OSDI
-
-
Wang, H.1
-
36
-
-
77952114571
-
Strider: A Black-box, State-based Approach to Change and Configuration Management and Support
-
San Diego, CA
-
Y.-M. Wang, et al. STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. In LISA. San Diego, CA, 2003
-
(2003)
LISA
-
-
Wang, Y.-M.1
-
37
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
San Diego, CA
-
Y.-M. Wang, et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities. In NDSS. San Diego, CA, 2006
-
(2006)
NDSS
-
-
Wang, Y.-M.1
-
38
-
-
79960164190
-
Gatekeeper: Monitoring auto-start extensibility points (ASEPs) for spyware management
-
Atlanta, GA
-
Y.-M. Wang, et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. In LISA, Atlanta, GA, 2004
-
(2004)
LISA
-
-
Wang, Y.-M.1
-
39
-
-
34548028878
-
Configuration debugging as search: Finding the needle in the haystack
-
San Francisco, CA
-
A. Whitaker R. Cox, S. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. In OSDI, San Francisco, CA, 2004
-
(2004)
OSDI
-
-
Whitaker, A.1
Cox, R.2
Gribble, S.3
-
40
-
-
1542360009
-
Design, implementation, and evaluation of repairable file service
-
San Francisco, CA
-
N. Zhu, T.-C. Chiueh. Design, Implementation, and Evaluation of Repairable File Service. In ICDSN, San Francisco, CA, 2003
-
(2003)
ICDSN
-
-
Zhu, N.1
Chiueh, T.-C.2
|