To apply, fill out the application below: ...
Our protocol contains the following message types: ...
Submissions for this form are closed.
Figure 1: The simplified NetBill protocol.
Work as a post-doctorate or early career professional in computer science or related field Describe limited funding, unemployment status, or other barriers to being able to readily attend this USENIX ...
Figure 5: Simplified digital cash protocol. Observe that the essential part of spending the coin is not sending the coin to M, but responding to M's challenge. A consumer must take care not to respond ...
The console logs generated by an application contain messages that the application developers believed would be useful in debugging or monitoring the application. Despite the ubiquity and large size ...
The speculative execution approach exploits the increasing abundance of spare processing cycles to automate prefetching for applications that stall on disk I/O. Usually, when an application needs some ...
Figure 6: Excerpt from a web page describing user interface toolkits. The page describes over 100 toolkits with various properties: some are free, some are commercial; some run on Unix, others ...
Consumers face two types of trojan horse challenges when they engage in electronic commerce on the World Wide Web.
Plain text has less explicit structure than HTML, so text constraints for plain text typically refer to delimiters like punctuation marks and line breaks. Consider the following example of processing ...
In this first experiment, we have configured the compressed cache using what we though would be nice parameters. We have used a 1Mbyte cache and a cleaning threshold of 50% of the cache. Using these ...