A constraint definition assigns a name to the result of a constraint expression: GettysburgAddress = starts with "Four score and seven years ago", ends with "shall not perish from the earth" ...
Check out the Proceedings of the past USENIX Security Symposia. Join us in Montreal, Canada, August 10–14, 2009, for the 18th USENIX Security Symposium. The USENIX Security Symposium brings together ...
This paper has described a new state-machine replication system that offers both integrity and high availability in the presence of Byzantine faults. The new system can be used to implement real ...
Bianca Schroeder, University of Toronto; Raghav Lagisetty and Arif Merchant, Google, Inc.
James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, JJ Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild ...
The four papers that received awards are available in PDF format. You may purchase the other papers individually by using our Offprints Order Form (in PDF format).
Nathan Bronson, Zach Amsden, George Cabrera, Prasad Chakka, Peter Dimov, Hui Ding, Jack Ferris, Anthony Giardullo, Sachin Kulkarni, Harry Li, Mark Marchukov, Dmitri ...
The mutex primitive provides mutual exclusion for one or more data objects. Two versions of the mutex primitive are provided: spin mutexes and sleep mutexes. Spin mutexes are a simple spin lock. If ...
Sahar Mazloom, Mohammad Rezaeirad, and Aaron Hunter, George Mason University; Damon McCoy, New York University ...
Frederik Armknecht, University of Mannheim; Ludovic Barman, Jens-Matthias Bohli, and Ghassan O. Karame, NEC Laboratories Europe ...
Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford, École Polytechnique Fédérale de Lausanne (EPFL) ...