Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degrading Data to Save the Planet., , and . HotOS, page 61-69. ACM, (2023)A Survey of Patterns for Adapting Smartphone App UIs to Smart Watches., , , and . MobileHCI, page 2:1-2:11. ACM, (2020)Apps Can Quickly Destroy Your Mobile's Flash: Why They Don't, and How to Keep It That Way., , , and . MobiSys, page 207-221. ACM, (2019)Introspections on the Semantic Gap., , , , and . IEEE Secur. Priv., 13 (2): 48-55 (2015)Civet: An Efficient Java Partitioning Framework for Hardware Enclaves., , , , , and . USENIX Security Symposium, page 505-522. USENIX Association, (2020)Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX., , and . USENIX ATC, page 645-658. USENIX Association, (2017)Virtualize Storage, Not Disks., , and . HotOS, USENIX Association, (2013)The Case for Less Predictable Operating System Behavior., , , and . HotOS, USENIX Association, (2015)Small Refinements to the DAM Can Have Big Consequences for Data-Structure Design., , , , , , , , , and 3 other author(s). SPAA, page 265-274. ACM, (2019)How to Not Copy Files., , , , , , , , , and 1 other author(s). login Usenix Mag., (2020)