| Cited by |
Paper title |
Year |
| 2483 |
Dryad: distributed data-parallel programs from sequential building blocks. |
2007 |
| 1314 |
CloneCloud: elastic execution between mobile device and cloud. |
2011 |
| 1148 |
Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. |
2010 |
| 880 |
User interactions in social networks and their implications. |
2009 |
| 703 |
Understanding user behavior in large-scale video-on-demand systems. |
2006 |
| 656 |
Adaptive control of virtualized resources in utility computing environments. |
2007 |
| 638 |
Flicker: an execution infrastructure for tcb minimization. |
2008 |
| 613 |
Container-based operating system virtualization: a scalable high-performance alternative to hypervisors. |
2007 |
| 546 |
Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof. |
2012 |
| 541 |
DepSky: dependable and secure storage in a cloud-of-clouds. |
2011 |
| 515 |
Automated control of multiple virtualized resources. |
2009 |
| 461 |
Q-clouds: managing performance interference effects for QoS-aware clouds. |
2010 |
| 432 |
SnowFlock: rapid virtual machine cloning for cloud computing. |
2009 |
| 421 |
Thorough static analysis of device drivers. |
2006 |
| 348 |
BlinkDB: queries with bounded errors and bounded response times on very large data. |
2013 |
| 337 |
Migrating server storage to SSDs: analysis of tradeoffs. |
2009 |
| 331 |
Omega: flexible scalable schedulers for large compute clusters. |
2013 |
| 325 |
Language support for fast and reliable message-based communication in singularity OS. |
2006 |
| 321 |
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. |
2006 |
| 308 |
NOVA: a microhypervisor-based secure virtualization architecture. |
2010 |
| 302 |
Fine-grained power modeling for smartphones using system call tracing. |
2011 |
| 280 |
Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors. |
2007 |
| 274 |
Large-scale cluster management at Google with Borg. |
2015 |
| 252 |
STMBench7: a benchmark for software transactional memory. |
2007 |
| 232 |
GreenHadoop: leveraging green energy in data-processing frameworks. |
2012 |
| 226 |
Bias scheduling in heterogeneous multi-core architectures. |
2010 |
| 225 |
Scarlett: coping with skewed content popularity in mapreduce clusters. |
2011 |
| 211 |
Towards practical page coloring-based multicore cache management. |
2009 |
| 208 |
System software for persistent memory. |
2014 |
| 202 |
Koala: a platform for OS-level power management. |
2009 |
| 199 |
Practical taint-based protection using demand emulation. |
2006 |
| 195 |
Execution synthesis: a technique for automated software debugging. |
2010 |
| 189 |
Exploiting nonstationarity for performance prediction. |
2007 |
| 185 |
Emergent (mis)behavior vs. complex software systems. |
2006 |
| 176 |
Mizan: a system for dynamic load balancing in large-scale graph processing. |
2013 |
| 174 |
Balancing power consumption in multiprocessor systems. |
2006 |
| 174 |
Automated known problem diagnosis with event traces. |
2006 |
| 171 |
A fresh look at the reliability of long-term digital storage. |
2006 |
| 171 |
Parallel symbolic execution for automated real-world software testing. |
2011 |
| 169 |
Resource-conscious scheduling for energy efficiency on multicore processors. |
2010 |
| 169 |
Documenting and automating collateral evolutions in linux device drivers. |
2008 |
| 168 |
Reducing TCB complexity for security-sensitive applications: three case studies. |
2006 |
| 163 |
“Defeating return-oriented rootkits with “”Return-Less”” kernels. “ |
2010 |
| 162 |
Peer sharing behaviour in the eDonkey network and implications for the design of server-less file sharing systems. |
2006 |
| 157 |
Ksplice: automatic rebootless kernel updates. |
2009 |
| 156 |
Energy efficiency for large-scale MapReduce workloads with significant interactive analysis. |
2012 |
| 156 |
Fingerprinting the datacenter: automated classification of performance crises. |
2010 |
| 155 |
Parallax: virtual disks for virtual machines. |
2008 |
| 153 |
Cache craftiness for fast multicore key-value storage. |
2012 |
| 153 |
Jockey: guaranteed job latency in data parallel clusters. |
2012 |
| 150 |
MDCC: multi-data center consistency. |
2013 |
| 144 |
Isolating web programs in modern browser architectures. |
2009 |
| 144 |
Cycles cells and platters: an empirical analysisof hardware failures on a million consumer PCs. |
2011 |
| 142 |
FlashTier: a lightweight consistent and durable storage cache. |
2012 |
| 139 |
K42: building a complete operating system. |
2006 |
| 139 |
A comprehensive scheduler for asymmetric multicore systems. |
2010 |
| 136 |
The next 700 BFT protocols. |
2010 |
| 135 |
Differential RAID: rethinking RAID for SSD reliability. |
2010 |
| 135 |
Statistical profiling-based techniques for effective power provisioning in data centers. |
2009 |
| 130 |
Kineograph: taking the pulse of a fast-changing and connected world. |
2012 |
| 128 |
CPI2: CPU performance isolation for shared compute clusters. |
2013 |
| 127 |
Energy management in mobile devices with the cinder operating system. |
2011 |
| 126 |
Pointless tainting?: evaluating the practicality of pointer tainting. |
2009 |
| 126 |
TimeStream: reliable stream computation in the cloud. |
2013 |
| 126 |
Sierra: practical power-proportionality for data center storage. |
2011 |
| 124 |
Evaluation of AMD’s advanced synchronization facility within a complete transactional memory stack. |
2010 |
| 124 |
A quantitative analysis of aspects in the eCos kernel. |
2006 |
| 122 |
Boom analytics: exploring data-centric declarative programming for the cloud. |
2010 |
| 120 |
The Xen-Blanket: virtualize once run everywhere. |
2012 |
| 112 |
Feature consistency in compile-time-configurable system software: facing the linux 10000 feature problem. |
2011 |
| 111 |
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. |
2009 |
| 106 |
A virtual machine for sensor networks. |
2007 |
| 105 |
Dingo: taming device drivers. |
2009 |
| 103 |
Concierge: a service platform for resource-constrained devices. |
2007 |
| 102 |
PowerLyra: differentiated graph computation and partitioning on skewed graphs. |
2015 |
| 101 |
Multi-aspect profiling of kernel rootkit behavior. |
2009 |
| 100 |
Dr. multicast: Rx for data center communication scalability. |
2010 |
| 99 |
Efficient guaranteed disk request scheduling with fahrrad. |
2008 |
| 98 |
DepSpace: a byzantine fault-tolerant coordination service. |
2008 |
| 98 |
RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient high performance storage systems. |
2006 |
| 97 |
Choosy: max-min fair sharing for datacenter jobs with constraints. |
2013 |
| 93 |
Enabling scalability and performance in a large scale CMP environment. |
2007 |
| 92 |
Fireflies: scalable support for intrusion-tolerant network overlays. |
2006 |
| 92 |
Improving network connection locality on multicore systems. |
2012 |
| 92 |
Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels. |
2007 |
| 90 |
Comparing the performance of web server architectures. |
2007 |
| 90 |
Tashkent: uniting durability with transaction ordering for high-performance scalable database replication. |
2006 |
| 88 |
Tashkent+: memory-aware load balancing and update filtering in replicated databases. |
2007 |
| 85 |
Reconciling high server utilization and sub-millisecond quality-of-service. |
2014 |
| 84 |
Automatic configuration of internet services. |
2007 |
| 83 |
Is co-scheduling too expensive for SMP VMs? |
2011 |
| 83 |
Sealing OS processes to improve dependability and safety. |
2007 |
| 82 |
The SMART way to migrate replicated stateful services. |
2006 |
| 81 |
Locating cache performance bottlenecks using data profiling. |
2010 |
| 79 |
Database engines on multicores why parallelize when you can distribute? |
2011 |
| 77 |
Sweeper: a lightweight end-to-end system for defending against fast worms. |
2007 |
| 77 |
Understanding collateral evolution in Linux device drivers. |
2006 |
| 76 |
TrustLite: a security architecture for tiny embedded devices. |
2014 |
| 75 |
CheapBFT: resource-efficient byzantine fault tolerance. |
2012 |
| 75 |
Using transparent compression to improve SSD-based I/O caches. |
2010 |
| 75 |
Controlled systematic and efficient code replacement for running java programs. |
2008 |
| 73 |
ChainReaction: a causal+ consistent datastore based on chain replication. |
2013 |
| 72 |
Using queries for distributed monitoring and forensics. |
2006 |
| 72 |
Towards cinematic internet video-on-demand. |
2008 |
| 71 |
ZZ and the art of practical BFT execution. |
2011 |
| 71 |
Presto: distributed machine learning and graph processing with sparse matrices. |
2013 |
| 69 |
Whodunit: transactional profiling for multi-tier applications. |
2007 |
| 69 |
Jettison: efficient idle desktop consolidation with partial VM migration. |
2012 |
| 67 |
Manageable fine-grained information flow. |
2008 |
| 65 |
Reverse engineering of binary device drivers with RevNIC. |
2010 |
| 65 |
Otherworld: giving applications a chance to survive OS kernel crashes. |
2010 |
| 65 |
Competitive prefetching for concurrent sequential I/O. |
2007 |
| 63 |
Experiences in building and operating ePOST a reliable peer-to-peer application. |
2006 |
| 62 |
Resolving the conflict between generality and plausibility in verified computation. |
2013 |
| 61 |
Aerie: flexible file-system interfaces to storage-class memory. |
2014 |
| 60 |
Database replication policies for dynamic content applications. |
2006 |
| 59 |
Sprint: a middleware for high-performance transaction processing. |
2007 |
| 59 |
Delta-FTL: improving SSD lifetime via exploiting content locality. |
2012 |
| 59 |
High-level programming of embedded hard real-time devices. |
2010 |
| 59 |
Chronos: a graph engine for temporal graph analysis. |
2014 |
| 58 |
Symbolic crosschecking of floating-point and SIMD code. |
2011 |
| 58 |
TCP offload through connection handoff. |
2006 |
| 57 |
HadoopToSQL: a mapReduce query optimizer. |
2010 |
| 57 |
Application-level isolation and recovery with solitude. |
2008 |
| 56 |
Macroprogramming heterogeneous sensor networks using cosmos. |
2007 |
| 56 |
Application level ballooning for efficient server consolidation. |
2013 |
| 55 |
VPFS: building a virtual private file system with a small trusted computing base. |
2008 |
| 55 |
Kaleidoscope: cloud micro-elasticity via VM state coloring. |
2011 |
| 53 |
Experiences with open overlays: a middleware approach to network heterogeneity. |
2008 |
| 52 |
On the road to recovery: restoring data after disasters. |
2006 |
| 52 |
GreenFS: making enterprise computers greener by protecting them better. |
2008 |
| 52 |
Kivati: fast detection and prevention of atomicity violations. |
2010 |
| 52 |
Privacy-preserving browser-side scripting with BFlow. |
2009 |
| 52 |
Finding complex concurrency bugs in large multi-threaded applications. |
2011 |
| 51 |
Task activity vectors: a new metric for temperature-aware scheduling. |
2008 |
| 51 |
Itrustpage: a user-assisted anti-phishing tool. |
2008 |
| 50 |
BorderPatrol: isolating events for black-box tracing. |
2008 |
| 50 |
“Melange: creating a “”functional”” internet. “ |
2007 |
| 50 |
RadixVM: scalable address spaces for multithreaded applications. |
2013 |
| 49 |
Caching in video CDNs: building strong lines of defense. |
2014 |
| 49 |
Canal: scaling social network-based Sybil tolerance schemes. |
2012 |
| 48 |
Using restricted transactional memory to build a scalable in-memory database. |
2014 |
| 48 |
Isolating commodity hosted hypervisors with HyperLock. |
2012 |
| 48 |
Keypad: an auditing file system for theft-prone devices. |
2011 |
| 48 |
Maygh: building a CDN from client web browsers. |
2013 |
| 47 |
Antiquity: exploiting a secure log for wide-area distributed storage. |
2007 |
| 47 |
Ferret: a toolkit for content-based similarity search of feature-rich data. |
2006 |
| 47 |
hFS: a hybrid file system prototype for improving small file and metadata performance. |
2007 |
| 47 |
A compiler-level intermediate representation based binary analysis and rewriting system. |
2013 |
| 47 |
Solving the starting problem: device drivers as self-describing artifacts. |
2006 |
| 47 |
A case for scaling applications to many-core with OS clustering. |
2011 |
| 46 |
MadLINQ: large-scale distributed matrix computation for the cloud. |
2012 |
| 46 |
Efficient middleware for byzantine fault tolerant database replication. |
2011 |
| 46 |
MeT: workload aware elasticity for NoSQL. |
2013 |
| 45 |
IFDB: decentralized information flow control for databases. |
2013 |
| 44 |
LazyBase: trading freshness for performance in a scalable database. |
2012 |
| 44 |
Algorithmic improvements for fast concurrent Cuckoo hashing. |
2014 |
| 43 |
Practical TDMA for datacenter ethernet. |
2012 |
| 43 |
Samurai: protecting critical data in unsafe languages. |
2008 |
| 43 |
Discrete control for safe execution of IT automation workflows. |
2007 |
| 42 |
WCMP: weighted cost multipathing for improved fairness in data centers. |
2014 |
| 42 |
SpotCheck: designing a derivative IaaS cloud on the spot market. |
2015 |
| 41 |
An efficient design and implementation of LSM-tree based key-value store on open-channel SSD. |
2014 |
| 39 |
Prefetching mobile ads: can advertising systems afford it? |
2013 |
| 39 |
Efficiently effectively detecting mobile app bugs with AppDoctor. |
2014 |
| 39 |
Replication degree customization for high availability. |
2008 |
| 39 |
Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency. |
2011 |
| 38 |
Hypnos: understanding and treating sleep conflicts in smartphones. |
2013 |
| 38 |
xCalls: safe I/O in memory transactions. |
2009 |
| 38 |
Putting consistency back into eventual consistency. |
2015 |
| 37 |
Failure-atomic msync(): a simple and efficient mechanism for preserving the integrity of durable data. |
2013 |
| 37 |
Transactional memory support for scalable and transparent parallelization of multiplayer games. |
2010 |
| 37 |
A runtime system for software lock elision. |
2009 |
| 36 |
Musketeer: all for one, one for all in data processing systems |
2015 |
| 36 |
JIT instrumentation: a novel approach to dynamically instrument operating systems. |
2007 |
| 35 |
Callisto: co-scheduling parallel runtime systems. |
2014 |
| 35 |
Self-tuning schedulers for legacy real-time applications. |
2010 |
| 34 |
Barricade: defending systems against operator mistakes. |
2010 |
| 34 |
A critique of snapshot isolation. |
2012 |
| 33 |
Latency and bandwidth-minimizing failure detectors. |
2007 |
| 32 |
Evaluating network processing efficiency with processor partitioning and asynchronous I/O. |
2006 |
| 32 |
GeePS: scalable deep learning on distributed GPUs with a GPU-specialized parameter server. |
2016 |
| 32 |
Policy-based access control for weakly consistent replication. |
2010 |
| 31 |
Composing OS extensions safely and efficiently with Bascule. |
2013 |
| 31 |
Context-specific middleware specialization techniques for optimizing software product-line architectures. |
2006 |
| 31 |
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores. |
2011 |
| 31 |
TM2C: a software transactional memory for many-cores. |
2012 |
| 30 |
Secure file system versioning at the block level. |
2007 |
| 29 |
Striking a new balance between program instrumentation and debugging time. |
2011 |
| 29 |
Memory resource allocation for file system prefetching: from a supply chain management perspective. |
2009 |
| 28 |
Process-level power estimation in VM-based systems. |
2015 |
| 28 |
URICA: Usage-awaRe Interactive Content Adaptation for mobile devices. |
2006 |
| 28 |
Guaranteeing deadlines for inter-datacenter transfers. |
2015 |
| 28 |
Cooperation and security isolation of library OSes for multi-process applications. |
2014 |
| 27 |
First-aid: surviving and preventing memory management bugs during production runs. |
2009 |
| 27 |
Adaptive parallelism for web search. |
2013 |
| 27 |
The Linux scheduler: a decade of wasted cores. |
2016 |
| 26 |
Popcorn: bridging the programmability gap in heterogeneous-ISA platforms. |
2015 |
| 26 |
Predictive log-synchronization. |
2006 |
| 26 |
Authorizing applications in singularity. |
2007 |
| 26 |
Fine grained kernel logging with KLogger: experience and insights. |
2007 |
| 26 |
StackTrack: an automated transactional approach to concurrent memory reclamation. |
2014 |
| 26 |
STM in the small: trading generality for performance in software transactional memory. |
2012 |
| 26 |
Predicting replicated database scalability from standalone database profiling. |
2009 |
| 25 |
Data tiering in heterogeneous memory systems. |
2016 |
| 25 |
Rex: replication at the speed of multi-core. |
2014 |
| 25 |
Eudaemon: involuntary and on-demand emulation against zero-day exploits. |
2008 |
| 25 |
NBA (network balancing act): a high-performance packet processing framework for heterogeneous processors. |
2015 |
| 25 |
Conversion: multi-version concurrency control for main memory segments. |
2013 |
| 25 |
Transparent checkpoints of closed distributed systems in Emulab. |
2009 |
| 24 |
Tralfamadore: unifying source code and execution experience. |
2009 |
| 24 |
BWS: balanced work stealing for time-sharing multicores. |
2012 |
| 23 |
Fair and timely scheduling via cooperative polling. |
2009 |
| 23 |
Hang analysis: fighting responsiveness bugs. |
2008 |
| 23 |
Improving interrupt response time in a verifiable protected microkernel. |
2012 |
| 22 |
Switchblade: enforcing dynamic personalized system call models. |
2008 |
| 22 |
Fast black-box testing of system recovery code. |
2012 |
| 21 |
Efficient queue management for cluster scheduling. |
2016 |
| 21 |
Frugal storage for cloud file systems. |
2012 |
| 20 |
Operating system support for application-specific speculation. |
2011 |
| 20 |
A high performance file system for non-volatile main memory. |
2016 |
| 19 |
Delusional boot: securing hypervisors without massive re-engineering. |
2012 |
| 19 |
Removing the memory limitations of sensor networks with flash-based virtual memory. |
2007 |
| 18 |
Scheduling large jobs by abstraction refinement. |
2011 |
| 18 |
Effective and efficient compromise recovery for weakly consistent replication. |
2009 |
| 18 |
CYRUS: towards client-defined cloud storage. |
2015 |
| 18 |
An efficient page-level FTL to optimize address translation in flash memory. |
2015 |
| 17 |
MALT: distributed data-parallelism for existing ML applications. |
2015 |
| 17 |
An aggressive worn-out flash block management scheme to alleviate SSD performance degradation. |
2014 |
| 17 |
Fast and general distributed transactions using RDMA and HTM. |
2016 |
| 17 |
Flint: batch-interactive data-intensive processing on transient servers. |
2016 |
| 17 |
30 seconds is not enough!: a study of operating system timer usage. |
2008 |
| 16 |
hClock: hierarchical QoS for packet scheduling in a hypervisor. |
2013 |
| 16 |
pVM: persistent virtual memory for efficient capacity scaling and object storage. |
2016 |
| 16 |
Splitter: a proxy-based approach for post-migration testing of web applications. |
2010 |
| 16 |
GD-Wheel: a cost-aware replacement policy for key-value stores. |
2015 |
| 16 |
?PnP: plug and play peripherals for the internet of things. |
2015 |
| 16 |
From application requests to virtual IOPs: provisioned key-value storage with Libra. |
2014 |
| 16 |
DynMR: dynamic MapReduce with ReduceTask interleaving and MapTask backfilling. |
2014 |
| 15 |
Enforcing appropriate process execution for exploiting idle resources from outside operating systems. |
2008 |
| 15 |
TetriSched: global rescheduling with adaptive plan-ahead in dynamic heterogeneous clusters. |
2016 |
| 14 |
Synapse: a microservices architecture for heterogeneous-database web applications. |
2015 |
| 14 |
In-Net: in-network processing for the masses. |
2015 |
| 14 |
Flux: multi-surface computing in Android. |
2015 |
| 14 |
Simba: tunable end-to-end data consistency for mobile apps. |
2015 |
| 14 |
An in-memory object caching framework with adaptive load balancing. |
2015 |
| 14 |
RapiLog: reducing system complexity through verification. |
2013 |
| 13 |
Snapshots in a flash with ioSnap. |
2014 |
| 13 |
Archiving cold data in warehouses with clustered network coding. |
2014 |
| 13 |
DIBS: just-in-time congestion mitigation for data centers. |
2014 |
| 13 |
Scalable testing of file system checkers. |
2012 |
| 13 |
Optimus: a dynamic rewriting framework for data-parallel execution plans. |
2013 |
| 13 |
Scaling concurrent log-structured data stores. |
2015 |
| 12 |
HAFT: hardware-assisted fault tolerance. |
2016 |
| 12 |
Process firewalls: protecting processes during resource access. |
2013 |
| 11 |
Augustus: scalable and robust storage for cloud applications. |
2013 |
| 11 |
Application-assisted live migration of virtual machines with Java applications. |
2015 |
| 11 |
Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. |
2016 |
| 10 |
STRADS: a distributed framework for scheduled model parallel machine learning. |
2016 |
| 10 |
Type-aware transactions for faster concurrent code. |
2016 |
| 10 |
Refuse to crash with Re-FUSE. |
2011 |
| 10 |
Protectit: trusted distributed services operating on sensitive data. |
2008 |
| 10 |
Improving server applications with system transactions. |
2012 |
| 10 |
ConfValley: a systematic configuration validation framework for cloud services. |
2015 |
| 9 |
TinMan: eliminating confidential mobile data exposure with security oriented offloading. |
2015 |
| 9 |
Maxoid: transparently confining mobile applications with custom views of state. |
2015 |
| 9 |
Optimizing distributed actor systems for dynamic interactive services. |
2016 |
| 9 |
Improving the responsiveness of internet services with automatic cache placement. |
2009 |
| 9 |
Taming uncertainty in distributed systems with help from the network. |
2015 |
| 9 |
Hare: a file system for non-cache-coherent multicores. |
2015 |
| 9 |
Flash storage disaggregation. |
2016 |
| 8 |
Kronos: the design and implementation of an event ordering service. |
2014 |
| 8 |
Extensible distributed coordination. |
2015 |
| 8 |
SCAN-Lite: enterprise-wide analysis on the cheap. |
2009 |
| 8 |
Picocenter: supporting long-lived mostly-idle applications in cloud environments. |
2016 |
| 8 |
Whose cache line is it anyway?: operating system support for live detection and repair of false sharing. |
2013 |
| 8 |
Verifiable differential privacy. |
2015 |
| 8 |
Relational access to Unix kernel data structures. |
2014 |
| 7 |
Modeling viral economies for digital media. |
2008 |
| 7 |
A study of modern Linux API usage and compatibility: what to support when you’re supporting. |
2016 |
| 7 |
On the capacity of thermal covert channels in multicores. |
2016 |
| 7 |
Residue objects: a challenge to web browser security. |
2010 |
| 7 |
PSLO: enforcing theXthpercentile latency and throughput SLOs for consolidated VM storage. |
2016 |
| 7 |
Juggler: a practical reordering resilient network stack for datacenters. |
2016 |
| 6 |
T-Rex: a dynamic race detection tool for C/C++ transactional memory applications. |
2014 |
| 5 |
Guardat: enforcing data policies at the storage layer. |
2015 |
| 5 |
SGXBOUNDS: Memory Safety for Shielded Execution. |
2017 |
| 5 |
Hardware read-write lock elision. |
2016 |
| 5 |
TAQ: enhancing fairness and performance predictability in small packet regimes. |
2014 |
| 5 |
POSIX abstractions in modern operating systems: the old, the new, and the missing |
2016 |
| 5 |
Practical techniques to obviate setuid-to-root binaries. |
2014 |
| 4 |
Hold ‘em or fold ‘em?: aggregation queries under performance variations. |
2016 |
| 4 |
Deriving and comparing deduplication techniques using a model-based classification. |
2015 |
| 4 |
Visigoth fault tolerance. |
2015 |
| 4 |
High-performance determinism with total store order consistency. |
2015 |
| 4 |
Mosaic: Processing a Trillion-Edge Graph on a Single Machine. |
2017 |
| 3 |
Hybrids on Steroids: SGX-Based High Performance BFT. |
2017 |
| 3 |
Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters. |
2017 |
| 3 |
Yoda: a highly available layer-7 load balancer. |
2016 |
| 3 |
zExpander: a key-value cache with both high performance and fewer misses. |
2016 |
| 3 |
Oasis: energy proportionality with hybrid server consolidation. |
2016 |
| 3 |
Proteus: agile ML elasticity through tiered reliability in dynamic resource markets. |
2017 |
| 3 |
Increasing large-scale data center capacity by statistical power control. |
2016 |
| 3 |
Sinter: low-bandwidth remote access for the visually-impaired. |
2016 |
| 3 |
TESLA: temporally enhanced system logic assertions. |
2014 |
| 3 |
Crayon: saving power through shape and color approximation on next-generation displays. |
2016 |
| 2 |
vScale: automatic and efficient processor scaling for SMP virtual machines. |
2016 |
| 2 |
Node.fz: Fuzzing the Server-Side Event-Driven Architecture. |
2017 |
| 2 |
DangSan: Scalable Use-after-free Detection. |
2017 |
| 2 |
Eleos: ExitLess OS Services for SGX Enclaves. |
2017 |
| 2 |
Practical condition synchronization for transactional memory. |
2016 |
| 2 |
Saturn: a Distributed Metadata Service for Causal Consistency. |
2017 |
| 2 |
Application-specific quantum for multi-core platform scheduler. |
2016 |
| 2 |
Malthusian Locks. |
2017 |
| 1 |
TFC: token flow control in data center networks. |
2016 |
| 1 |
Parallel sections: scaling system-level data-structures. |
2016 |
| 1 |
Taming Parallelism in a Multi-Variant Execution Environment. |
2017 |
| 1 |
kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. |
2017 |
| 1 |
Statistical Analysis of Latency Through Semantic Profiling. |
2017 |
| 1 |
MiniCrypt: Reconciling Encryption and Compression for Big Data Stores. |
2017 |
| 1 |
An Empirical Study on the Correctness of Formally Verified Distributed Systems. |
2017 |
| 1 |
Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud. |
2017 |
| 1 |
The lock holder and the lock waiter pre-emption problems: nip them in the bud using informed spinlocks (I-Spinlock). |
2017 |
| 1 |
No Need to Hide: Protecting Safe Regions on Commodity Hardware. |
2017 |
| 1 |
FloDB: Unlocking Memory in Persistent Key-Value Stores. |
2017 |
| 1 |
Shared address translation revisited. |
2016 |
| 1 |
Atomic In-place Updates for Non-volatile Main Memories with Kamino-Tx. |
2017 |
| 1 |
Online Reconstruction of Structural Information from Datacenter Logs. |
2017 |
| 0 |
COCONUT: Seamless Scale-out of Network Elements. |
2017 |
| 0 |
One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics. |
2017 |
| 0 |
DStress: Efficient Differentially Private Computations on Distributed Data. |
2017 |
| 0 |
ROS: A Rack-based Optical Storage System with Inline Accessibility for Long-Term Data Preservation. |
2017 |
| 0 |
Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling. |
2017 |
| 0 |
GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices. |
2017 |
| 0 |
A Characterization of State Spill in Modern Operating Systems. |
2017 |
| 0 |
BB: booting booster for consumer electronics with modern OS. |
2016 |
| 0 |
Exploiting variability for energy optimization of parallel programs. |
2016 |
| 0 |
RFP: When RPC is Faster than Server-Bypass with RDMA. |
2017 |
| 0 |
Design and Evaluation of an RDMA-aware Data Shuffling Operator for Parallel Database Systems. |
2017 |
| 0 |
The Unwritten Contract of Solid State Drives. |
2017 |
| 0 |
Abstracting Multi-Core Topologies with MCTOP. |
2017 |
| 0 |
NVthreads: Practical Persistence for Multi-threaded Applications. |
2017 |
| 0 |
SyncPerf: Categorizing, Detecting, and Diagnosing Synchronization Performance Bugs. |
2017 |
| 0 |
High-Throughput Subset Matching on Commodity GPU-Based Systems. |
2017 |
| 0 |
Direct Inter-Process Communication (dIPC): Repurposing the CODOMs Architecture to Accelerate IPC. |
2017 |
| 0 |
Malacology: A Programmable Storage System. |
2017 |
| 0 |
Pandia: comprehensive contention-sensitive thread placement. |
2017 |
| 0 |
An interface to implement NUMA policies in the Xen hypervisor. |
2017 |
| 0 |
Forkscan: Conservative Memory Reclamation for Modern Operating Systems. |
2017 |
| 0 |
NChecker: saving mobile app developers from network disruptions. |
2016 |
| 0 |
CloudTalk: Enabling Distributed Application Optimisations in Public Clouds. |
2017 |