Michael Swift
Michael Swift
Professor of Computer Science, University of Wisconsin--Madison
Подтвержден адрес электронной почты в домене cs.wisc.edu - Главная страница
Mnemosyne: Lightweight persistent memory
H Volos, AJ Tack, MM Swift
ACM SIGARCH Computer Architecture News 39 (1), 91-104, 2011
Improving the reliability of commodity operating systems
MM Swift, BN Bershad, HM Levy
Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003
LogTM-SE: Decoupling hardware transactional memory from caches
L Yen, J Bobba, MR Marty, KE Moore, H Volos, MD Hill, MM Swift, ...
2007 IEEE 13th International Symposium on High Performance Computer …, 2007
Method and system for secure running of untrusted content
S Chan, G Jensenworth, MC Goertzel, B Shah, MM Swift, RB Ward
US Patent 6,505,300, 2003
Recovering device drivers
MM Swift, M Annamalai, BN Bershad, HM Levy
ACM Transactions on Computer Systems (TOCS) 24 (4), 333-360, 2006
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 USENIX Annual Technical Conference (USENIX ATC 18), 133-146, 2018
Controlling access to objects on multiple operating systems
DS Montague, PK Misra, MM Swift
US Patent 5,675,782, 1997
Efficient virtual memory for big memory servers
A Basu, J Gandhi, J Chang, MD Hill, MM Swift
ACM SIGARCH Computer Architecture News 41 (3), 237-248, 2013
Improving the reliability of commodity operating systems
MM Swift, BN Bershad, HM Levy
ACM Transactions on Computer Systems (TOCS) 23 (1), 77-110, 2005
Extensible security system and method for controlling access to objects in a computing environment
CP Van Dyke, PT Brundrett, MM Swift, P Garg, RB Ward
US Patent 6,412,070, 2002
Performance pathologies in hardware transactional memory
J Bobba, KE Moore, H Volos, L Yen, MD Hill, MM Swift, DA Wood
ACM SIGARCH Computer Architecture News 35 (2), 81-91, 2007
Supporting nested transactional memory in LogTM
MJ Moravan, J Bobba, KE Moore, L Yen, MD Hill, B Liblit, MM Swift, ...
ACM SIGARCH Computer Architecture News 34 (5), 359-370, 2006
Method for changing passwords on a remote computer
MM Swift, CP Van Dyke, PK Misra
US Patent 5,719,941, 1998
Least privilege via restricted tokens
MM Swift
US Patent 6,308,274, 2001
Aerie: Flexible file-system interfaces to storage-class memory
H Volos, S Nalli, S Panneerselvam, V Varadarajan, P Saxena, MM Swift
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
Flashtier: a lightweight, consistent and durable storage cache
M Saxena, MM Swift, Y Zhang
Proceedings of the 7th ACM european conference on Computer Systems, 267-280, 2012
Ensuring the integrity of remote boot client data
AD Barr, MM Swift, CT Lenzmeier
US Patent 6,189,100, 2001
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Security model using restricted tokens
G Jensenworth, P Garg, MM Swift, MC Goertzel, SJ Chan
US Patent 6,279,111, 2001
More for your money: exploiting performance heterogeneity in public clouds
B Farley, A Juels, V Varadarajan, T Ristenpart, KD Bowers, MM Swift
Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20