Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandana: Using Non-volatile Memory for Storing Deep Learning Models., , , , , , , and . CoRR, (2018)PrismDB: Read-aware Log-structured Merge Trees for Heterogeneous Storage., , , and . CoRR, (2020)Packing Privacy Budget Efficiently., , , , , , and . CoRR, (2022)Privacy Budget Scheduling., , , , , and . OSDI, page 55-74. USENIX Association, (2021)Cliffhanger: Scaling Performance Cliffs in Web Memory Caches., , , and . NSDI, page 379-392. USENIX Association, (2016)Memshare: a Dynamic Multi-tenant Key-value Cache., , , and . USENIX Annual Technical Conference, page 321-334. USENIX Association, (2017)Efficient Compactions between Storage Tiers with PrismDB., , , and . ASPLOS (3), page 179-193. ACM, (2023)Flashield: a Key-value Cache that Minimizes Writes to Flash., , , , , , and . CoRR, (2017)A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts., , , , , and . CoRR, (2020)Venus: verification for untrusted cloud storage., , , , , and . CCSW, page 19-30. ACM, (2010)