Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stash in a Flash., , , , and . FAST, page 169-188. USENIX Association, (2018)Mosaic Pages: Big TLB Reach with Small Pages., , , , , , , , , and 6 other author(s). ASPLOS (3), page 433-448. ACM, (2023)Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior., , , , , and . ISSRE, page 388-399. IEEE Computer Society, (2016)Sinter: low-bandwidth remote access for the visually-impaired., , and . EuroSys, page 27:1-27:16. ACM, (2016)Writes Wrought Right, and Other Adventures in File System Optimization., , , , , , , , , and 4 other author(s). ACM Trans. Storage, 13 (1): 3:1-3:26 (2017)SteeringWheel: A Locality-Preserving Magnification Interface for Low Vision Web Browsing., , , and . CHI, page 20. ACM, (2018)CloudFlow: Cloud-wide Policy Enforcement Using Fast VM Introspection., , , , and . IC2E, page 159-164. IEEE Computer Society, (2014)The dose makes the poison - Leveraging uncertainty for effective malware detection., , , , , , , and . DSC, page 123-130. IEEE, (2017)Introspections on the Semantic Gap., , , , and . IEEE Secur. Priv., 13 (2): 48-55 (2015)Apps Can Quickly Destroy Your Mobile's Flash: Why They Don't, and How to Keep It That Way., , , and . MobiSys, page 207-221. ACM, (2019)