ID | Interpret | Skladba | Album | |
181. | Charles Bernstein | No Hiding Place | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
182. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
183. | Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | 17th USENIX Security Symposium Refereed Papers | |
184. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
185. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
186. | Charles Bernstein and Tracie Morris | Truth Be Told, collaboration with Tracie Morris | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
187. | Charles Bernstein | on Blind Witness | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
188. | Charles Bernstein and Tracie Morris | Truth Be Told, collaboration with Tracie Morris | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
189. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
190. | Charles Bernstein | introduction to Dea%r Fr~ien%d | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
191. | Michael Martin and Monica S. Lam, Stanford University | Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | 17th USENIX Security Symposium Refereed Papers | |
192. | Charles Bernstein | Some Remarks on Poetry and Framing | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
193. | Charles Bernstein | annagrammatica from Shadowtime | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
194. | Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity | A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool | 17th USENIX Security Symposium Invited Talks | |
195. | Charles Bernstein | on Blind Witness | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
196. | Charles Bernstein | All the Whiskey in Heaven | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
197. | Charles Bernstein | Kiss Me Tommy | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
198. | Charles Bernstein | introduction to | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
199. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
200. | Byung-Gon Chun, ICSI; Sylvia Ratnasamy, Intel Research Berkeley; Eddie Kohler, University of California, Los Angeles | NetComplex: A Complexity Metric for Networked System Designs | 5th USENIX Symposium on Networked Systems Design and Implementation | |