University of Michigan

Results: 11802



#Item
1Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
2Computing / Technology / California / EMC Corporation / VMware / Embedded system / Synopsys / USENIX Annual Technical Conference / Debugging / Intel / Software Guard Extensions / Edouard Bugnion

Baris Kasikci Assistant Professor Electrical Engineering and Computer Science University of Michigan 4820 BBB 2260 Hayward Street

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-10-23 14:59:27
3Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
4Computing / Programming language implementation / Parallel computing / Debugging / Optimizing compiler / X86 / Computer engineering

REPT: Reverse Debugging of Failures in Deployed Software Weidong Cui and Xinyang Ge, Microsoft Research Redmond; Baris Kasikci, University of Michigan; Ben Niu, Microsoft Research Redmond; Upamanyu Sharma, University of

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-10-23 14:59:27
5Computing / Computer architecture / Computer engineering / Computer memory / Computer security / Memory management / Side-channel attacks / Software Guard Extensions / Cold boot attack / C dynamic memory allocation / Sync / Cache

Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves Ofir Weisse Valeria Bertacco Todd Austin University of Michigan oweisse/vale/

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
6Publishing / Academic publishing / Knowledge / Electronic publishing / Open access / Library science / Library publishing / University of Michigan Library / Scholarly communication / Ann Arbor /  Michigan / Digital preservation / Institutional repository

Jonathan McGlone University of Michigan Libraries, Michigan Publishing 839 Greene St 1210 Buhr Bldg, Ann Arbor MIhttp://jmcglone.com

Add to Reading List

Source URL: jmcglone.com

Language: English - Date: 2018-10-02 12:02:39
7Cryptocurrencies / Cryptography / Bitcoin / Computing / Alternative currencies / Economy / Blockchains / Transport Layer Security / Mining pool / Proof-of-stake / Cryptographic nonce / Peercoin

DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
8Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
9Computing / Content delivery networks / Concurrent computing / Internet / Distributed data storage / Internet security / Computer networking / Cloudflare / Freedom of speech in the United States / Geo-blocking / Akamai Technologies / Amazon CloudFront

403 Forbidden: A Global View of CDN Geoblocking Allison McDonald University of Michigan Benjamin VanderSloot

Add to Reading List

Source URL: ensa.fi

Language: English - Date: 2018-09-24 17:21:27
10Software / Computing / Digital media / Social media / Social networking services / Business intelligence / Real-time web / Text messaging / Twitter / Predictive modelling / Prediction / Instagram

Exploring Limits to Prediction in Complex Social Systems Jake M. Hofman Travis Martin University of Michigan

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 01:32:49
UPDATE