Mnemosyne: Lightweight persistent memory H Volos, AJ Tack, MM Swift ACM SIGARCH Computer Architecture News 39 (1), 91-104, 2011 | 1116 | 2011 |
Peeking behind the curtains of serverless platforms L Wang, M Li, Y Zhang, T Ristenpart, M Swift 2018 USENIX Annual Technical Conference (USENIX ATC 18), 133-146, 2018 | 654 | 2018 |
Improving the reliability of commodity operating systems MM Swift, BN Bershad, HM Levy Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003 | 560 | 2003 |
LogTM-SE: Decoupling hardware transactional memory from caches L Yen, J Bobba, MR Marty, KE Moore, H Volos, MD Hill, MM Swift, ... 2007 IEEE 13th International Symposium on High Performance Computer …, 2007 | 462 | 2007 |
Recovering device drivers MM Swift, M Annamalai, BN Bershad, HM Levy ACM Transactions on Computer Systems (TOCS) 24 (4), 333-360, 2006 | 455 | 2006 |
Method and system for secure running of untrusted content S Chan, G Jensenworth, MC Goertzel, B Shah, MM Swift, RB Ward US Patent 6,505,300, 2003 | 447 | 2003 |
Controlling access to objects on multiple operating systems DS Montague, PK Misra, MM Swift US Patent 5,675,782, 1997 | 415 | 1997 |
Efficient virtual memory for big memory servers A Basu, J Gandhi, J Chang, MD Hill, MM Swift ACM SIGARCH Computer Architecture News 41 (3), 237-248, 2013 | 410 | 2013 |
Improving the reliability of commodity operating systems MM Swift, BN Bershad, HM Levy ACM Transactions on Computer Systems (TOCS) 23 (1), 77-110, 2005 | 347 | 2005 |
Extensible security system and method for controlling access to objects in a computing environment CP Van Dyke, PT Brundrett, MM Swift, P Garg, RB Ward US Patent 6,412,070, 2002 | 337 | 2002 |
Performance pathologies in hardware transactional memory J Bobba, KE Moore, H Volos, L Yen, MD Hill, MM Swift, DA Wood ACM SIGARCH Computer Architecture News 35 (2), 81-91, 2007 | 325 | 2007 |
Aerie: Flexible file-system interfaces to storage-class memory H Volos, S Nalli, S Panneerselvam, V Varadarajan, P Saxena, MM Swift Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 285 | 2014 |
Method for changing passwords on a remote computer MM Swift, CP Van Dyke, PK Misra US Patent 5,719,941, 1998 | 283 | 1998 |
Supporting nested transactional memory in LogTM MJ Moravan, J Bobba, KE Moore, L Yen, MD Hill, B Liblit, MM Swift, ... ACM SIGARCH Computer Architecture News 34 (5), 359-370, 2006 | 273 | 2006 |
Least privilege via restricted tokens MM Swift US Patent 6,308,274, 2001 | 259 | 2001 |
An analysis of persistent memory use with WHISPER S Nalli, S Haria, MD Hill, MM Swift, H Volos, K Keeton ACM SIGPLAN Notices 52 (4), 135-148, 2017 | 245 | 2017 |
Flashtier: a lightweight, consistent and durable storage cache M Saxena, MM Swift, Y Zhang Proceedings of the 7th ACM european conference on Computer Systems, 267-280, 2012 | 239 | 2012 |
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense) V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 237 | 2012 |
Security model using restricted tokens G Jensenworth, P Garg, MM Swift, MC Goertzel, SJ Chan US Patent 6,279,111, 2001 | 233 | 2001 |
A placement vulnerability study in {Multi-Tenant} public clouds V Varadarajan, Y Zhang, T Ristenpart, M Swift 24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015 | 221 | 2015 |