Author of the publication

Opportunistic Spinlocks: Achieving Virtual Machine Scalability in the Clouds.

, , and . Operating Systems Review, 50 (1): 9-16 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Zygote to Morula: Fortifying Weakened ASLR on Android., , , , and . IEEE Symposium on Security and Privacy, page 424-439. IEEE Computer Society, (2014)MetaSync: File Synchronization Across Multiple Untrusted Storage Services., , , , , and . USENIX Annual Technical Conference, page 83-95. USENIX Association, (2015)Lightweight Application-Level Crash Consistency on Transactional Flash Storage., , , , and . USENIX Annual Technical Conference, page 221-234. USENIX Association, (2015)Efficient Patch-based Auditing for Web Application Vulnerabilities., , and . OSDI, page 193-206. USENIX Association, (2012)Making Linux Protection Mechanisms Egalitarian with UserFS., and . USENIX Security Symposium, page 13-28. USENIX Association, (2010)Enforcing Unique Code Target Property for Control-Flow Integrity., , , , , , and . ACM Conference on Computer and Communications Security, page 1470-1486. ACM, (2018)Scalability in the Clouds!: A Myth or Reality?, , and . APSys, page 5:1-5:7. ACM, (2015)libmpk: Software Abstraction for Intel Memory Protection Keys., , , , and . CoRR, (2018)Identifying Information Disclosure in Web Applications with Retroactive Auditing., , , , and . OSDI, page 555-569. USENIX Association, (2014)Intrusion Recovery Using Selective Re-execution., , , and . OSDI, page 89-104. USENIX Association, (2010)