AVIO: detecting atomicity violations via access interleaving invariants S Lu, J Tucek, F Qin, Y Zhou ACM SIGOPS Operating Systems Review 40 (5), 37-48, 2006 | 540 | 2006 |
Rx: treating bugs as allergies---a safe method to survive software failures F Qin, J Tucek, J Sundaresan, Y Zhou Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 474 | 2005 |
Designing and Implementing Malicious Hardware. ST King, JA Tucek, A Cozzie, C Grier, W Jiang, Y Zhou Leet 8, 1-8, 2008 | 458 | 2008 |
Triage: diagnosing production run failures at the user's site J Tucek, S Lu, C Huang, S Xanthos, Y Zhou ACM SIGOPS Operating Systems Review 41 (6), 131-144, 2007 | 204 | 2007 |
What Consistency Does Your {Key-Value} Store Actually Provide? E Anderson, X Li, MA Shah, J Tucek, JJ Wylie Sixth Workshop on Hot Topics in System Dependability (HotDep 10), 2010 | 144 | 2010 |
Understanding the robustness of {SSDs} under power fault M Zheng, J Tucek, F Qin, M Lillibridge 11th USENIX Conference on File and Storage Technologies (FAST 13), 271-284, 2013 | 140 | 2013 |
Torturing databases for fun and profit M Zheng, J Tucek, D Huang, F Qin, M Lillibridge, ES Yang, BW Zhao, ... 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 110 | 2014 |
MediaBench II video: Expediting the next generation of video systems research JE Fritts, FW Steiling, JA Tucek, W Wolf Microprocessors and Microsystems 33 (4), 301-318, 2009 | 105 | 2009 |
In-memory performance for big data G Graefe, H Volos, H Kimura, H Kuno, J Tucek, M Lillibridge, A Veitch Proceedings of the VLDB Endowment 8 (1), 37-48, 2014 | 96 | 2014 |
Sweeper: A lightweight end-to-end system for defending against fast worms J Tucek, J Newsome, S Lu, C Huang, S Xanthos, D Brumley, Y Zhou, ... Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer …, 2007 | 92 | 2007 |
Efficiency matters! E Anderson, J Tucek ACM SIGOPS Operating Systems Review 44 (1), 40-45, 2010 | 91 | 2010 |
Rx: Treating bugs as allergies—a safe method to survive software failures F Qin, J Tucek, Y Zhou, J Sundaresan ACM Transactions on Computer Systems (TOCS) 25 (3), 7-es, 2007 | 85 | 2007 |
Efficient online validation with delta execution J Tucek, W Xiong, Y Zhou Proceedings of the 14th international conference on Architectural support …, 2009 | 66 | 2009 |
Mediabench II video: expediting the next generation of video systems research JE Fritts, FW Steiling, JA Tucek Embedded Processors for Multimedia and Communications II 5683, 79-93, 2005 | 59 | 2005 |
Disks are like snowflakes: no two are alike E Krevat, J Tucek, GR Ganger 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), 2011 | 55 | 2011 |
Identifying a location containing invalid data in a storage media JA Tucek US Patent 8,904,092, 2014 | 50 | 2014 |
Multi-geography cloud storage EA Anderson, JJ Wylie, JA Tucek US Patent App. 13/460,806, 2013 | 47 | 2013 |
Controlled lock violation G Graefe, M Lillibridge, H Kuno, J Tucek, A Veitch Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013 | 38 | 2013 |
AVIO: Detecting atomicity violations via access-interleaving invariants S Lu, J Tucek, F Qin, Y Zhou IEEE micro 27 (1), 26-35, 2007 | 38 | 2007 |
Reliability analysis of ssds under power fault M Zheng, J Tucek, F Qin, M Lillibridge, BW Zhao, ES Yang ACM Transactions on Computer Systems (TOCS) 34 (4), 1-28, 2016 | 35 | 2016 |