Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
The main problem with user authentication on the Web is that many sites are used infrequently and people forget their passwords over time. Another problem is that the ...
Unlike high fidelity prototypes which are very detailed and may look very much like the final interface, low fidelity or ``low-fi'' prototypes are a rough rendition of the interface that presents only ...
After the portfolio selection phase, we use a short training phase to improve the memorability of the portfolio images. During training, the user points out the pictures in her portfolio from a ...
Our proposed approach to estimating the upstream bandwidth requires that the end-host sends data frames to an access point in the unaffiliated state and records the time elapsed between the instant ...
Check out the Proceedings of the past USENIX Security Symposia. Join us in Montreal, Canada, August 10–14, 2009, for the 18th USENIX Security Symposium. The USENIX Security Symposium brings together ...
This paper has described a new state-machine replication system that offers both integrity and high availability in the presence of Byzantine faults. The new system can be used to implement real ...
Bianca Schroeder, University of Toronto; Raghav Lagisetty and Arif Merchant, Google, Inc.
James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, JJ Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild ...