Are we susceptible to rowhammer? an end-to-end methodology for cloud providers L Cojocar, J Kim, M Patel, L Tsai, S Saroiu, A Wolman, O Mutlu 2020 IEEE symposium on security and privacy (SP), 712-728, 2020 | 105 | 2020 |
Type-aware transactions for faster concurrent code N Herman, JP Inala, Y Huang, L Tsai, E Kohler, B Liskov, L Shrira Proceedings of the Eleventh European Conference on Computer Systems, 1-16, 2016 | 61 | 2016 |
Casa: End-to-end quantitative security analysis of randomly mapped caches T Bourgeat, J Drean, Y Yang, L Tsai, J Emer, M Yan 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020 | 47 | 2020 |
Widespread of horizontal gene transfer in the human genome W Huang, L Tsai, Y Li, N Hua, C Sun, C Wei Bmc Genomics 18, 1-11, 2017 | 35 | 2017 |
enclosure: Group communication via encounter closures L Tsai, R De Viti, M Lentz, S Saroiu, B Bhattacharjee, P Druschel Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 9 | 2019 |
Privacy heroes need data disguises L Tsai, M Schwarzkopf, E Kohler Proceedings of the Workshop on Hot Topics in Operating Systems, 112-118, 2021 | 2 | 2021 |
Edna: Disguising and Revealing User Data in Web Applications L Tsai, H Gross, E Kohler, F Kaashoek, M Schwarzkopf Proceedings of the 29th Symposium on Operating Systems Principles, 434-450, 2023 | | 2023 |
A Revised and Verified Proof of the Scalable Commutativity Rule L Tsai, E Kohler, MF Kaashoek, N Zeldovich arXiv preprint arXiv:1809.09550, 2018 | | 2018 |
Concurrent Algorithms in Transactional Data Structures LY Tsai | | 2017 |
Type-Aware Transactions for Faster Concurrent Code L Shrira, N Herman, JP Inala, Y Huang, L Tsai, E Kohler, B Liskov EuroSys 2016, 0 | | |
Poster–enClosure: Group Communication via Encounter Closures L Tsai, R De Viti, M Lentz, S Saroiu, B Bhattacharjee, P Druschel | | |