Sciweavers

USS
2008
13 years 9 months ago
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards
Optical scan electronic voting machines employ software components that are customized for each specific election. Such software components are critical from a security and integr...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
USS
2008
13 years 9 months ago
Principles for Developing Comprehensive Network Visibility
We argue that for both defending against attacks and apprehending the scope of attacks after they are detected, there is great utility in attaining views of network activity that ...
Mark Allman, Christian Kreibich, Vern Paxson, Robi...
USS
2008
13 years 9 months ago
Replayable Voting Machine Audit Logs
Audit logs are an important tool for post-election investigations, in the event of an election dispute or problem. We propose a new approach to logging that is designed to provide...
Arel Cordero, David Wagner
USS
2008
13 years 9 months ago
Coercion-Resistant Tallying for STV Voting
There are many advantages to voting schemes in which voters rank all candidates in order, rather than just choosing their favourite. However, these schemes inherently suffer from ...
Vanessa Teague, Kim Ramchen, Lee Naish
USS
2008
13 years 9 months ago
In Defense of Pseudorandom Sample Selection
Generation of random numbers is a critical component of existing post-election auditing techniques. Recent work has largely discouraged the use of all pseudorandom number generato...
Joseph A. Calandrino, J. Alex Halderman, Edward W....
USS
2008
13 years 9 months ago
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes
We introduce Scantegrity II, a practical enhancement for optical scan voting systems that achieves increased election integrity through the novel use of confirmation codes printed...
David Chaum, Richard Carback, Jeremy Clark, Aleksa...
USS
2008
13 years 9 months ago
Administrative and Public Verifiability: Can We Have Both?
Administrative verifiability gives election officials the means to protect against certain kinds of errors and fraud. This is typically accomplished with tools like paper audit tr...
Josh Benaloh
USENIX
2008
13 years 9 months ago
Measurement and Analysis of Large-Scale Network File System Workloads
In this paper we present the analysis of two large-scale network file system workloads. We measured CIFS traffic for two enterprise-class file servers deployed in the NetApp data ...
Andrew W. Leung, Shankar Pasupathy, Garth R. Goods...
USENIX
2008
13 years 9 months ago
A Multi-Site Virtual Cluster System for Wide Area Networks
A virtual cluster is a promising technology for reducing management costs and improving capacity utilization in datacenters and computer centers. However, recent cluster virtualiz...
Takahiro Hirofuchi, Takeshi Yokoi, Tadashi Ebara, ...
USENIX
2008
13 years 9 months ago
Automatic Optimization of Parallel Dataflow Programs
Large-scale parallel dataflow systems, e.g., Dryad and Map-Reduce, have attracted significant attention recently. High-level dataflow languages such as Pig Latin and Sawzall are b...
Christopher Olston, Benjamin Reed, Adam Silberstei...