Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Legacy Code to Deploy Desktop Applications on the Web., , , and . OSDI, page 339-354. USENIX Association, (2008)Slicer: Auto-Sharding for Datacenter Applications., , , , , , , , , and 5 other author(s). OSDI, page 739-753. USENIX Association, (2016)Ironclad Apps: End-to-End Security via Automated Full-System Verification., , , , , , and . OSDI, page 165-181. USENIX Association, (2014)Geppetto: Versatile Verifiable Computation., , , , , , , and . IACR Cryptology ePrint Archive, (2014)Straightforward Java Persistence Through Checkpointing.. POS/PJW, page 322-334. Morgan Kaufmann, (1998)Geppetto: Versatile Verifiable Computation., , , , , , , and . IEEE Symposium on Security and Privacy, page 253-270. IEEE Computer Society, (2015)Pinocchio: Nearly Practical Verifiable Computation., , , and . IEEE Symposium on Security and Privacy, page 238-252. IEEE Computer Society, (2013)How to Run POSIX Apps in a Minimal Picoprocess., , and . USENIX ATC, page 321-332. USENIX Association, (2013)End-to-End Authorization., and . OSDI, page 151-164. USENIX Association, (2000)Experiments with Desktop Mobile Manipulators., , , , , and . ISER, volume 250 of Lecture Notes in Control and Information Sciences, page 37-46. Springer, (1999)