Scott

Results: 22067



#Item
1Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
2Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
3Elections / Politics / Government / Electoral fraud / Voting / Security engineering / Electronic voting / Voter registration / Election Assistance Commission / Election security / United States federal budget / Help America Vote Act

STATE OF HAWAII OFFICE OF ELECTIONS SCOTT T. NAGO CHIEF ELECTION OFFICER 802 LEHUA AVENUE

Add to Reading List

Source URL: elections.hawaii.gov

Language: English - Date: 2018-06-27 22:28:08
4Computer programming / Computing / Software engineering / Debugging / Rr / Delta debugging / Software bug / Software-defined networking / Debugger / Fuzzing / Race condition / Event

Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences Colin Scott Andreas Wundsam†? Barath Raghavan? Aurojit Panda

Add to Reading List

Source URL: people.ee.ethz.ch

Language: English - Date: 2017-02-01 15:47:47
5Routing algorithms / Fair division / Computing / Microeconomics / Fairness measure / Max-min fairness / Scheduling / Cloud computing / System resource / Central processing unit / Resource monotonicity / Pareto efficiency

Dominant Resource Fairness: Fair Allocation of Multiple Resource Types Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, Ion Stoica University of California, Berkeley {alig,matei,benh,andyk,shen

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2014-02-27 02:30:26
6Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Forwarding plane / Router / Packet processing / Packet forwarding / Control plane / Transmission Control Protocol

Ensuring Connectivity via Data Plane Mechanisms Junda Liu‡ , Aurojit Panda\ , Ankit Singla† , Brighten Godfrey† , Michael Schapira , Scott Shenker\♠ ‡ Google Inc., \ UC Berkeley, † UIUC,  Hebrew U., ♠ ICS

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2013-02-21 13:22:56
7Internet architecture / Computing / Network architecture / Internet / Border Gateway Protocol / BGP hijacking / Routing / Router / Peering / IP routing / Control plane / Computer network

Route Bazaar: Automatic Interdomain Contract Negotiation Ignacio Castro ♣†♠ Aurojit Panda ‡ Barath Raghavan ♠ Scott Shenker ♠‡ Sergey Gorinsky ♣ ♣ IMDEA Networks Institute † Open University of Catalon

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 02:46:52
8Cryptocurrencies / Blockchains / Concurrent computing / Alternative currencies / Economy / Distributed computing / Cross-platform software / Ethereum / Smart contract / Counterparty / Lisk / Heuristic

The XY Oracle Network: The Proof-of-Origin Based Cryptographic Location Network Arie Trouw ∗, Markus Levin †, Scott Scheper ‡

Add to Reading List

Source URL: icorating.com

Language: English - Date: 2018-03-19 09:28:54
9Computer network security / Computer security / Cyberwarfare / Middlebox / Computing / Firewall / Network switch / Computer network

New Directions for Network Verification Aurojit Panda, Katerina Argyraki, Mooly Sagiv, Michael Schapira, Scott Shenker •

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2015-06-27 13:25:24
10Geometry / Mathematics / Space / Analytic number theory / Elliptic curve / Group theory / Curve

A New Family of Pairing-Friendly Elliptic Curves Michael Scott and Aurore Guillevic MIRACL.com Université de Lorraine, CNRS, Inria, LORIA, Nancy, France WAIFI 2018, Bergen, Norway, June 14–16

Add to Reading List

Source URL: caramba.inria.fr

Language: English - Date: 2018-10-18 08:05:03
UPDATE