Author of the publication

Knock Out 2PC with Practicality Intact: a High-performance and General Distributed Transaction Protocol (Technical Report).

, , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on the Dynamic Transmission Law of Spiral Drum Cutting Coal Rock Based on ANSYS/LS-DYNA Simulation., , and . Complex., (2019)The (surprising) computational power of the SDN data plane., and . INFOCOM, page 496-504. IEEE, (2015)Knock Out 2PC with Practicality Intact: a High-performance and General Distributed Transaction Protocol (Technical Report)., , , , , , and . CoRR, (2023)PolarDB-IMCI: A Cloud-Native HTAP Database System at Alibaba., , , , , , , , , and 14 other author(s). Proc. ACM Manag. Data, 1 (2): 199:1-199:25 (2023)Efficient querying and maintenance of network provenance at internet-scale., , , , , and . SIGMOD Conference, page 615-626. ACM, (2010)Recursive Computation of Regions and Connectivity in Networks., , , , and . ICDE, page 1108-1119. IEEE Computer Society, (2009)Flux: Decoupled Auto-Scaling for Heterogeneous Query Workload in Alibaba AnalyticDB., , , , , , , and . SIGMOD Conference Companion, page 255-268. ACM, (2024)TimeCloth: Fast Point-in-Time Database Recovery in The Cloud., , , , , , and . SIGMOD Conference Companion, page 214-226. ACM, (2024)Data-plane Defenses against Routing Attacks on Tor., , and . Proc. Priv. Enhancing Technol., 2016 (4): 276-293 (2016)Hidden Voice Commands., , , , , , , and . USENIX Security Symposium, page 513-530. USENIX Association, (2016)