The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been suggested to enable a ...
FTP Mirror Tracker [Note 1] is a software package (written in Perl and C++) that enables transparent, user-controlled redirection to the nearest anonymous FTP mirror sites that are exact replicas of ...
Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
We know that many of you have been impacted by the economic downturn and, due to the recent tragedy, are reluctant to travel. To encourage your attendance at ALS '01, the USENIX Association and the ...
It remains to choose a representation for the collection of region intervals that provides the operations we need (region relations, union, and intersection). Figure 5: A region [b,e] corresponds to a ...
USENIX tries to ensure a consistent style of proceeding. Layout sheets are not required, but authors are required to adhere to the following format parameters. Papers should be done in a readable font ...
Many applications demand availability. Unfortunately, software failures greatly reduce system availability. Previous approaches for surviving software failures suffer from several limitations, ...
As computers permeate all aspects of our lives, a wide range of computer systems must achieve high dependability, including availability, reliability, and security. Unfortunately, few current computer ...
for about fifteen years, DNS is undergoing its inevitable rototilling, and BIND with it. It's time for the world to learn what to expect from BIND-9 and EDNS. Repetitive Strain Injury (RSI) is an ...