Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
On-site Registration 7:30am - 5:00pm
Continental Breakfast 7:30am - 9:00am
Opening Remarks 8:45am - 9:00am
Quartet: Harmonizing Task Scheduling and Caching...
Opening Remarks 9:00am - 9:15am
How Not to Bid the Cloud 9:15am - 9:40am
Lazy Analytics: Let Other Queries Do the Work Fo...
QoX: Quality of Service and Consumption in the C...
SEeSAW - Similarity Exploiting Storage for Accel...
Cloud Spot Markets are Not Sustainable: The Case...
Neutrino: Revisiting Memory Caching for Iterativ...
Break with Refreshments 10:30am - 11:15am
Break with Refreshments 10:40am - 11:15am
Interactive Debugging for Big Data Analytics
Feeding the Pelican: Using Archival Hard Drives...
Ovid: A Software-Defined Distributed Systems Fra...
ZEA, A Data Management Approach for SMR
Evaluating Host Aware SMR Drives
Serverless Computation with OpenLambda
Luncheon for Workshop Attendees 12:30pm - 2:00pm
Avoiding the Streetlight Effect: I/O Workload An...
Accelerating Complex Data Transfer for Cluster C...
NVMeDirect: A User-space I/O Framework for Appli...
HyperOptics: A High Throughput and Low Latency M...
Optimizing Flash-based Key-value Cache Systems
Graviton: Twisting Space and Time to Speed-up Co...
Break with Refreshments 3:15pm - 4:00pm
Break with Refreshments 3:15pm - 3:45pm
ClusterOn: Building Highly Configurable and Reus...
Mlcached: Multi-level DRAM-NAND Key-value Cache
Silver: A Scalable, Distributed, Multi-versionin...
When Spark Meets FPGAs: A Case Study for Next-Ge...
Exo-clones: Better Container Runtime Image Manag...
Unikernel Monitors: Extending Minimalism Outside...
Finding Consistency in an Inconsistent World: To...
Joint Poster Session and Happy Hour with HotCloud 6:00pm - 7:00pm
Joint Poster Session and Happy Hour with HotStorage 6:00pm - 7:00pm
Continental Breakfast 8:00am - 9:00am
On-site Registration 8:00am - 5:00pm
What's Changing in Big Data? 9:00am - 10:30am
Break with Refreshments 10:30am - 11:00am
Why Do We Always Blame The Storage Stack?
Mapping Cross-Cloud Systems: Challenges and Oppo...
An Empirical Study of File-System Fragmentation...
Towards a Network Marketplace in a Cloud
Neutrality in Future Public Clouds: Implications...
Pixelsior: Photo Management as a Platform Servic...
Luncheon for Workshop Attendees 12:15pm - 2:00pm
99 Deduplication Problems 2:00pm - 2:25pm
Scalable Cloud Security via Asynchronous Virtual...
Low-Profile Source-side Deduplication for Virtua...
A Simulation Result of Replicating Data with Ano...
Deduplicating Compressed Contents in Cloud Stora...
Design Patterns for Container-based Distributed...
Non-volatile Memory through Customized Key-value...
Break with Refreshments 3:40pm - 4:10pm
An Experiment on Bare-Metal BigData Provisioning
Write Amplification Reduction in Flash-Based SSD...
The Tail at Scale: How to Predict It?
Improving I/O Resource Sharing of Linux Cgroup f...
On The [Ir]relevance of Network Performance for...
Unblinding the OS to Optimize User-Perceived Fla...
Continental Breakfast 7:30am - 8:30am
Who Are You?! Adventures in Authentication 8:30am - 5:00pm
Workshop on Privacy Indicators 8:30am - 12:10pm
2nd Workshop on Security Information Workers 8:30am - 5:00pm
Introduction to Password Cracking and Research on Passwords 8:30am - 12:10pm
Opening Remarks and Awards 8:45am - 9:00am
The Future of Infrastructure 9:00am - 10:00am
Break with Refreshments 10:00am - 10:30am
Opportunities and Challenges in Adopting Microse...
FLICK: Developing and Running Application-Specif...
Jenkins Job Builder - What? Why? How?
SoftFlow: A Middlebox Architecture for Open vSwi...
Bring Your Own Dilemma: OEM Laptops and Windows...
Fast and Cautious: Leveraging Multi-path Diversi...
StackMap: Low-Latency Networking with the OS Sta...
In-place Resumable Partial Decompression Techniq...
Lunch (on your own) 12:10pm - 1:40pm
Workshop on Security Fatigue 1:40pm - 5:00pm
Unsafe Time Handling in Smartphones
Workshop on the Future of Privacy Notices and Indicators: Will Drones Deliver My Privacy Policy? 1:40pm - 5:00pm
SLIK: Scalable Low-Latency Indexes for a Key-Val...
Energy Discounted Computing on Multicore Smartph...
Understanding Manycore Scalability of File Syste...
Beam: Ending Monolithic Applications for Connect...
ParaFS: A Log-Structured File System to Exploit...
FastCDC: a Fast and Efficient Content-Defined Ch...
Caching Doesn't Improve Mobile Web Performance (...
Break with Refreshments 3:00pm - 3:30pm
Break with Refreshments 3:20pm - 3:50pm
Secure and Efficient Application Monitoring and...
The Next Generation of Apache Hadoop: Open Probl...
Optimizing Every Operation in a Write-optimized...
Blockstack: A Global Naming and Storage System S...
Satellite: Joint Analysis of CDNs and Network-Le...
Pivot Tracing: Dynamic Causal Monitoring for Dis...
Environmental Conditions and Disk Reliability in...
Subversive-C: Abusing and Protecting Dynamic Mes...
SOUPS 2016 Poster Session and Happy Hour 5:15pm - 7:00pm
USENIX ATC '16 Conference Reception 6:30pm - 8:00pm
Welcome and Awards Presentations 8:30am - 9:00am
Informing (Public) Policy 9:00am - 10:00am
A Wardrobe for the Emperor: Stitching Practical Bias into System... 9:00am - 10:00am
Callinicos: Robust Transactional Storage for Dis...
Rethinking Connection Security Indicators
Horton Tables: Fast Hash Tables for In-Memory Da...
A Week to Remember: The Impact of Browser Warnin...
Filo: Consolidated Consensus as a Cloud Service
Ginseng: Market-Driven LLC Allocation
Follow My Recommendations: A Personalized Assist...
Elfen Scheduling: Fine-Grain Principled Borrowin...
Modular Composition of Coordination Services
'They Keep Coming Back Like Zombies': Improving...
Coherence Stalls or Latency Tolerance: Informed...
Cheap and Available State Machine Replication
Lunch (on your own) 12:00pm - 1:30pm
Conference Luncheon 12:10pm - 1:40pm
Why Do They Do What They Do?: A Study of What Mo...
Unlocking Energy 1:40pm - 2:05pm
Replex: A Scalable, Highly Available Multi-Index...
Expecting the Unexpected: Understanding Mismatch...
Kinetic Modeling of Data Eviction in Cache
Greening the Video Transcoding Service with Low-...
Do or Do Not, There Is No Try: User Engagement M...
MEANTIME: Achieving Both Minimal Energy and Time...
Scalable In-Memory Transaction Processing with H...
Lightning Talks and Demos 2:37pm - 3:00pm
Erasing Belady’s Limitations: In Search of Flash...
An Inconvenient Trust: User Attitudes toward Sec...
Design Guidelines for High Performance RDMA Syst...
Using Crash Hoare Logic for Certifying the FSCQ...
User Attitudes Toward the Inspection of Encrypte...
Snooping on Mobile Phones: Prevalence and Trends
Balancing CPU and Network in the Cell Distribute...
COZ: Finding Code that Counts with Causal Profil...
Expert and Non-Expert Attitudes towards (Secure)...
An Evolutionary Study of Linux Memory Management...
All Your Biases Belong to Us: Breaking RC4 in WP...
Intuitions, Analytics, and Killing Ants: Inferen...
Getting Back Up: Understanding How Enterprise Da...
Under-Constrained Symbolic Execution: Correctnes...
Lightning Talks and Demos 5:20pm - 5:45pm
SOUPS 2016 Symposium Reception 6:00pm - 7:30pm
Poster Session and Happy Hour 6:30pm - 8:00pm
On-site Registration 8:00am - 12:00pm
Understanding Password Choices: How Frequently E...
A Study of Authentication in Daily Life
SplitJoin: A Scalable, Low-latency Stream Join A...
Samsara: Efficient Deterministic Replay in Multi...
Use the Force: Evaluating Force-Sensitive Authen...
Hardware-Assisted On-Demand Hypervisor Activatio...
Load the Edges You Need: A Generic I/O Optimizat...
Ask Me Again But Don't Annoy Me: Evaluating Re-a...
gScale: Scaling up GPU Virtualization with Dynam...
Version Traveler: Fast and Memory-Efficient Vers...
Tucana: Design and Implementation of a Fast and...
A General Persistent Code Caching Framework for...
Turning Contradictions into Innovations or: How...
Break with Refreshments 10:40am - 11:00am
Productive Security: A Scalable Methodology for...
Instant OS Updates via Userspace Checkpoint-and-...
Passive Wi-Fi: Bringing Low Power to Wi-Fi Trans...
Lightning Talks and Demos 11:10am - 11:40am
Apps with Hardware: Enabling Run-time Architectu...
An Industrial-Scale Software Defined Internet Ex...
SOUPS 2016 Symposium Luncheon 11:40am - 1:10pm
Testing Error Handling Code in Device Drivers Us...
PhyCloak: Obfuscating Sensing from Communication...
Multicore Locks: The Case Is Not Closed Yet
Hyperprobe: Towards Virtual Machine Extrospectio...
Hard Problems in Security, Privacy, and Usability: Issues from the Field 1:30pm - 3:00pm
SOUPS 2016 Ice Cream Social 3:00pm - 3:30pm
Forgetting in Social Media: Understanding and Co...
Sharing Health Information on Facebook: Practice...
How Short Is Too Short? Implications of Length a...
Addressing Physical Safety, Security, and Privac...