AVIO: detecting atomicity violations via access interleaving invariants S Lu, J Tucek, F Qin, Y Zhou ACM SIGOPS Operating Systems Review 40 (5), 37-48, 2006 | 537 | 2006 |
Rx: treating bugs as allergies---a safe method to survive software failures F Qin, J Tucek, J Sundaresan, Y Zhou Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 462 | 2005 |
Designing and Implementing Malicious Hardware. ST King, J Tucek, A Cozzie, C Grier, W Jiang, Y Zhou Leet 8, 1-8, 2008 | 452 | 2008 |
Triage: diagnosing production run failures at the user's site J Tucek, S Lu, C Huang, S Xanthos, Y Zhou ACM SIGOPS Operating Systems Review 41 (6), 131-144, 2007 | 199 | 2007 |
Koi: A {Location-Privacy} platform for smartphone apps S Guha, M Jain, VN Padmanabhan 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012 | 145* | 2012 |
What Consistency Does Your {Key-Value} Store Actually Provide? E Anderson, X Li, MA Shah, J Tucek, JJ Wylie Sixth Workshop on Hot Topics in System Dependability (HotDep 10), 2010 | 142 | 2010 |
Understanding the robustness of {SSDs} under power fault M Zheng, J Tucek, F Qin, M Lillibridge 11th USENIX Conference on File and Storage Technologies (FAST 13), 271-284, 2013 | 132 | 2013 |
Torturing databases for fun and profit M Zheng, J Tucek, D Huang, F Qin, M Lillibridge, ES Yang, BW Zhao, ... 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 102 | 2014 |
MediaBench II video: Expediting the next generation of video systems research JE Fritts, FW Steiling, JA Tucek, W Wolf Microprocessors and Microsystems 33 (4), 301-318, 2009 | 100 | 2009 |
Sweeper: A lightweight end-to-end system for defending against fast worms J Tucek, J Newsome, S Lu, C Huang, S Xanthos, D Brumley, Y Zhou, ... Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer …, 2007 | 92 | 2007 |
In-memory performance for big data G Graefe, H Volos, H Kimura, H Kuno, J Tucek, M Lillibridge, A Veitch Proceedings of the VLDB Endowment 8 (1), 37-48, 2014 | 91 | 2014 |
Efficiency matters! E Anderson, J Tucek ACM SIGOPS Operating Systems Review 44 (1), 40-45, 2010 | 90 | 2010 |
Rx: Treating bugs as allergies—a safe method to survive software failures F Qin, J Tucek, Y Zhou, J Sundaresan ACM Transactions on Computer Systems (TOCS) 25 (3), 7-es, 2007 | 84 | 2007 |
Efficient online validation with delta execution J Tucek, W Xiong, Y Zhou Proceedings of the 14th international conference on Architectural support …, 2009 | 65 | 2009 |
Mediabench II video: expediting the next generation of video systems research JE Fritts, FW Steiling, JA Tucek Embedded Processors for Multimedia and Communications II 5683, 79-93, 2005 | 58 | 2005 |
Disks are like snowflakes: no two are alike E Krevat, J Tucek, GR Ganger 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), 2011 | 55 | 2011 |
Multi-geography cloud storage EA Anderson, JJ Wylie, JA Tucek US Patent App. 13/460,806, 2013 | 47 | 2013 |
Identifying a location containing invalid data in a storage media JA Tucek US Patent 8,904,092, 2014 | 43 | 2014 |
AVIO: Detecting atomicity violations via access-interleaving invariants S Lu, J Tucek, F Qin, Y Zhou IEEE micro 27 (1), 26-35, 2007 | 36 | 2007 |
Controlled lock violation G Graefe, M Lillibridge, H Kuno, J Tucek, A Veitch Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013 | 34 | 2013 |