Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Witchel, Emmett
add a person with the name Witchel, Emmett
 

Other publications of authors with the same name

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs., , , , , , , and . NDSS, The Internet Society, (2010)Towards Self-Configuring Hardware for Distributed Computer Systems., , , , and . ICAC, page 241-249. IEEE Computer Society, (2005)Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data., , , , and . ;login:, (2017)Understanding transactional memory performance., and . ISPASS, page 97-108. IEEE Computer Society, (2010)Coordinated and Efficient Huge Page Management with Ingens., , , , and . OSDI, page 705-721. USENIX Association, (2016)The Impact of Architectural Trends on Operating System Performance., , , , and . SOSP, page 285-298. ACM, (1995)Operating System Review 29(5).Mondrian memory protection., , and . ASPLOS, page 304-316. ACM Press, (2002)Laminar: practical fine-grained decentralized information flow control., , , , and . PLDI, page 63-74. ACM, (2009)Committing conflicting transactions in an STM., , , and . PPOPP, page 163-172. ACM, (2009)Programmer Productivity in a World of Mushy Interfaces: Challenges of the Post-ISA Reality.. ASPLOS, page 591. ACM, (2016)