Blog
VMware Academic Program
Login
Menu
Projects
Team
Announcements
Publications
About Us
Directions
Recruiting
Publications
Sort by:
Latest
Oldest
A-Z
Z-A
Research Area
Algorithms
Anomaly Detection
Approximate Membership Query Data Structure
authenticated data structures
automated testing
B-tree
big data
Bloom filter
Browser exploit
Cache-Oblivious Algorithms
Cascade
cluster management
Compact Data Structures
Computational Biology
Computer Architecture
Concurrency
Consistent Hashing
constraint programming
Counting Filter
Counting Quotient Filters
cryptocurrency mining
Cryptographic Agility
cryptography
Data center networks
Data Structures
data visualization
Databases
de Bruijn Graphs
declarative programming
Device drivers
Direct Memory Access (DMA)
disaggregated memory
Disaggregated storage
Distributed Computing
distributed systems
DVFS
EDF
External-Memory Algorithms
External-Memory Data Structures
File systems
filesystems
GPU
Heterogeneous NoC
Input/Output
Just-in-Time
K-mer Counting
Linux
Load Balancer
Load balancing
Lossy compression
Lower Bounds
Machine Learning
Memory management
Middle boxes / network appliances
Middleboxes
Multi-core
multiclass classification
Network diagnosis
Network Function Virtualization
Network management
Network measurments
Network Virtualization
NIDS
NoC simulator
Operating Systems
Optical interconnect
P4
Performance diagnosis
Persistent Memory
Post Quantum Cryptography
PQC
programmable data planes
Quotient filter
Real-time
reliability
Remote Memory
resource efficiency
Scheduling
SDN
Security
Shared Randomness
Simulator
Skip Lists
Software-Defined Networks
Statistics
storage
Streaming Algorithms
sustainability
Systems
verification
Verified software
Verified Systems Software
Verilog
Virtual Memory
Virtualization
WebGL
Write-Optimized Data Structures
Publication Year
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2007
Programmable System Security in a Software-Defined World: Research Challenges and Opportunities
Guofei Gu
,
David Ott
,
Vyas Sekar
,
Kun Sun
NSF Workshop Report | October, 2018
Software Defined Infrastructure: Rethinking Cybersecurity with a More Capable Toolset
David Ott
ACM SIGOPS Operating Systems Review | August, 2018
A Scalable Linearizable Multi-Index Table
Erez Petrank
,
Gali Sheffi
,
Guy Golan Gueta
38th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2018, Vienna, Austria, July 2-6, 2018 | July, 2018
Stable and Consistent Membership at Scale with Rapid
Lalith Suresh
,
Dahlia Malkhi
,
Parikshit Gopalan
,
Ivan Porto Carreiro
,
Zeeshan Lokhandwala
USENIX ATC | July, 2018
Network Approximation using Tensor Sketching
Shiva Prasad Kasiviswanathan
,
Nina Narodytska
,
Hongxia Jin
The 27th International Joint Conference on Artificial Intelligence | July, 2018
Constrained Image Generation Using Binarized Neural Networks with Decision Procedures
Svyatoslav Korneev
,
Nina Narodytska
,
Luca Pulina
,
Armando Tacchella
,
Nikolaj Bjorner
,
Mooly Sagiv
The International Conference on Theory and Applications of Satisfiability Testing (SAT) | July, 2018
Learning Optimal Decision Trees with SAT
Nina Narodytska
,
Filipe Pereira
,
Alexey Ignatiev
,
Joao Marques Silva
The 27th International Joint Conference on Artificial Intelligence | July, 2018
A SAT-Based Approach to Learn Explainable Decision Sets
Alexey Ignatiev
,
Filipe Pereira
,
Nina Narodytska
,
Joao Marques-Silva
The 9th International Joint Conference on Automated Reasoning | July, 2018
Distributed SSH Key Management with Proactive RSA Threshold Signatures
Yotam Harchol
,
Ittai Abraham
,
Benny Pinkas
ACNS | July, 2018
Metric Embedding via Shortest Path Decompositions
Ittai Abraham
,
Arnold Filtser
,
Anupam Gupta
,
Ofer Neiman
STOC | July, 2018
The Design and Implementation of Hyperupcalls
Nadav Amit
,
Michael Wei
USENIX Annual Technical Conference (ATC) | July, 2018
Core-Guided Minimal Correction Set and Core Enumeration
Nina Narodytska
,
Nikolaj Bjørner
,
Maria-Cristina Marinescu
,
Mooly Sagiv
Twenty-Seventh International Joint Conference on Artificial Intelligence | July, 2018
Formal Analysis of Deep Binarized Neural Networks
Nina Narodytska
Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI'18) | July, 2018
Remote regions: a simple abstraction for remote memory
Marcos Aguilera
,
Nadav Amit
,
Irina Calciu
,
Xavier Deguillard
,
Jayneel Gandhi
,
Stanko Novakovic
,
Arun Ramanathan
,
Pratap Subrahmanyam
,
Lalith Suresh
,
Kiran Tati
,
Rajesh Venkatasubramanian
,
Michael Wei
USENIX Annual Technique Conference (ATC) | July, 2018
Passing Messages while Sharing Memory
Marcos Aguilera
,
Naama Ben David
,
Irina Calciu
,
Rachid Guerraoui
,
Erez Petrank
,
Sam Toueg
ACM Symposium on Principles of Distributed Computing (PODC) | July, 2018
Locking Timestamps Versus Locking Objects
Marcos Aguilera
,
Marcos K. Aguilera
,
Tudor David
,
Rachid Guerraoui
,
Junxiong Wang
ACM Symposium on Principles of Distributed Computing (PODC) | July, 2018
Optimal Ball Recycling
Michael A Bender
,
Jake Christensen
,
Alex Conway
,
Martin Farach-Colton
,
Rob Johnson
,
Meng-Tsung Tsai
July, 2018
Mantis: A Fast, Small, and Exact Large-Scale Sequence-Search Index (journal version)
Prashant Pandey
,
Fatemah Almodaresi
,
Michael A. Bender
,
Michael Ferdman
,
Rob Johnson
,
Rob Patro
Cell Systems | June, 2018
Another proof for Cuckoo-Hashing with new variants
arXiv preprint | June, 2018
Efficient Circuit-Based {PSI} via Cuckoo Hashing
Benny Pinkas
,
Thomas Schneider
,
Christian Weinert
,
Udi Wieder
Eurocrypt | April, 2018
<
1
…
10
11
12
…
17
>