FTP Mirror Tracker [Note 1] is a software package (written in Perl and C++) that enables transparent, user-controlled redirection to the nearest anonymous FTP mirror sites that are exact replicas of ...
We know that many of you have been impacted by the economic downturn and, due to the recent tragedy, are reluctant to travel. To encourage your attendance at ALS '01, the USENIX Association and the ...
Cyber security experiments with potentially malicious software can possibly damage the testbed environment and ``escape'' into the Internet. Due to this security concern, networks used in such ...
James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, JJ Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild ...
Complex systems are hard to understand and visualize. The causes for this problem are due to the specific data not being available or the inability to correlate and present the data in a meaningful ...
Daniel Lowe Wheeler, Dropbox Inc.
We have developed a set of defenses based on the detection of abnormal combinations of network events. For example, to detect the injection of a DNS reply, we use bookkeeping of request-reply pairs to ...
Bianca Schroeder, University of Toronto; Raghav Lagisetty and Arif Merchant, Google, Inc.
As mobile applications and services continue to grow in importance, the ability for a mobile device to quickly and accurately locate its own position (and that of its user) has also become ...
Nathan Bronson, Zach Amsden, George Cabrera, Prasad Chakka, Peter Dimov, Hui Ding, Jack Ferris, Anthony Giardullo, Sachin Kulkarni, Harry Li, Mark Marchukov, Dmitri ...
Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, and Yuvraj Agarwal, Carnegie Mellon University ...
The Short Topics in System Administration books provide information not available elsewhere. Presenting topics in thorough, refereed fashion, they are small enough and flexible enough to grow with the ...