Mistral: Dynamically managing power, performance, and adaptation cost in cloud infrastructures G Jung, MA Hiltunen, KR Joshi, RD Schlichting, C Pu 2010 IEEE 30th International Conference on Distributed Computing Systems, 62-73, 2010 | 403 | 2010 |
An exploration of L2 cache covert channels in virtualized environments Y Xu, M Bailey, F Jahanian, K Joshi, M Hiltunen, R Schlichting Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 29-40, 2011 | 334 | 2011 |
Coyote: A system for constructing fine-grain configurable communication services NT Bhatti, MA Hiltunen, RD Schlichting, W Chiu ACM Transactions on Computer Systems (TOCS) 16 (4), 321-366, 1998 | 240 | 1998 |
Generating adaptation policies for multi-tier applications in consolidated server environments G Jung, KR Joshi, MA Hiltunen, RD Schlichting, C Pu 2008 International Conference on Autonomic Computing, 23-32, 2008 | 208 | 2008 |
Constructing adaptive software in distributed systems WK Chen, MA Hiltunen, RD Schlichting Proceedings 21st International Conference on Distributed Computing Systems …, 2001 | 198 | 2001 |
Dynamically allocating multitier applications based upon application requirements and performance and reliability of resources M Hiltunen, KR Joshi, G Jung, C Pu, RD Schlichting US Patent 8,489,939, 2013 | 180 | 2013 |
Nfsight: netflow-based network awareness tool R Berthier, M Cukier, M Hiltunen, D Kormann, G Vesonder, D Sheleheda | 164 | 2010 |
A cost-sensitive adaptation engine for server consolidation of multitier applications G Jung, KR Joshi, MA Hiltunen, RD Schlichting, C Pu Middleware 2009: ACM/IFIP/USENIX, 10th International Middleware Conference …, 2009 | 161 | 2009 |
A configurable and extensible transport protocol GT Wong, MA Hiltunen, RD Schlichting Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 115 | 2001 |
Jettison: Efficient idle desktop consolidation with partial VM migration N Bila, E de Lara, K Joshi, HA Lagar-Cavilla, M Hiltunen, ... Proceedings of the 7th ACM european conference on Computer Systems, 211-224, 2012 | 114 | 2012 |
Survivability through customization and adaptability: The cactus approach MA Hiltunen, RD Schlichting, CA Ugarte, GT Wong Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 100 | 2000 |
Real-time dependable channels: Customizing QoS attributes for distributed systems MA Hiltunen, RD Schlichting, X Han, MM Cardozo, R Das IEEE Transactions on Parallel and Distributed Systems 10 (6), 600-612, 1999 | 93 | 1999 |
Fault-tolerant grid services using primary-backup: feasibility and performance X Zhang, D Zagorodnov, M Hiltunen, K Marzullo, RD Schlichting 2004 IEEE International Conference on Cluster Computing (IEEE Cat. No …, 2004 | 91 | 2004 |
Performance and availability aware regeneration for cloud based multitier applications G Jung, KR Joshi, MA Hiltunen, RD Schlichting, C Pu 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 90 | 2010 |
Adaptive distributed and fault-tolerant systems MA Hiltunen, RD Schlichting Computer Systems Science and Engineering 11 (5), 275-285, 1996 | 88 | 1996 |
RIC: A RAN intelligent controller platform for AI-enabled cellular networks B Balasubramanian, ES Daniels, M Hiltunen, R Jana, K Joshi, R Sivaraj, ... IEEE Internet Computing 25 (2), 7-17, 2021 | 82 | 2021 |
Kaleidoscope: cloud micro-elasticity via vm state coloring R Bryant, A Tumanov, O Irzak, A Scannell, K Joshi, M Hiltunen, ... Proceedings of the sixth conference on Computer systems, 273-286, 2011 | 80 | 2011 |
Reliability techniques for RFID-based object tracking applications A Rahmati, L Zhong, M Hiltunen, R Jana 37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007 | 80 | 2007 |
The Cactus approach to building configurable middleware services MA Hiltunen, RD Schlichting Proceedings of the Workshop on Dependable System Middleware and Group …, 2000 | 77 | 2000 |
System call monitoring using authenticated system calls M Rajagopalan, MA Hiltunen, T Jim, RD Schlichting IEEE Transactions on Dependable and Secure Computing 3 (3), 216-229, 2006 | 74 | 2006 |