Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandana: Using Non-volatile Memory for Storing Deep Learning Models., , , , , , , and . CoRR, (2018)Cliffhanger: Scaling Performance Cliffs in Web Memory Caches., , , and . NSDI, page 379-392. USENIX Association, (2016)Privacy Budget Scheduling., , , , , and . OSDI, page 55-74. USENIX Association, (2021)Efficient Compactions between Storage Tiers with PrismDB., , , and . ASPLOS (3), page 179-193. ACM, (2023)Memshare: a Dynamic Multi-tenant Key-value Cache., , , and . USENIX ATC, page 321-334. USENIX Association, (2017)Cloud Actor-Oriented Database Transactions in Orleans., , , , , and . Proc. VLDB Endow., 17 (12): 3720-3730 (August 2024)Venus: verification for untrusted cloud storage., , , , , and . CCSW, page 19-30. ACM, (2010)Chardonnay: Fast and General Datacenter Transactions for On-Disk Databases., , , , and . OSDI, page 343-360. USENIX Association, (2023)Turbo: Effective Caching in Differentially-Private Databases., , , , and . SOSP, page 579-594. ACM, (2023)Detecting and Characterizing Lateral Phishing at Scale., , , , , , , and . USENIX Security Symposium, page 1273-1290. USENIX Association, (2019)