A Device for Secure Transaction Approval

ANISH ATHALYE , ADAM BELAY , M FRANS KAASHOEK , ROBERT MORRIS

Live migration of virtual machine during direct access to storage over SR IOV adapter

Edward Joseph Goggin , Hariharan Subramanian , Sanjana Aswani , Adam M Belay

144
2013
Live migration of virtual machine during direct access to storage over SR IOV adapter

Edward Joseph Goggin , Hariharan Subramanian , Sanjana Aswani , Adam M Belay

27
2015
Dune: safe user-level access to privileged CPU features

Adam Belay , Andrea Bittau , Ali Mashtizadeh , David Terei
operating systems design and implementation 335 -348

161
2012
Vote the OS off your Core

Anant Agarwal , David Wentzlaff , Adam Belay

1
2011
Fleets: Scalable Services in a Factored Operating System

Anant Agarwal , David Wentzlaff , Charles Gruenwald III , Nathan Beckmann

7
2011
A Unified Operating System for Clouds and Manycore: fos

Lamia Youseff , Kevin Modzelewski , Charles Gruenwald , Anant Agarwal

25
2009
IX: a protected dataplane operating system for high throughput and low latency

Christos Kozyrakis , Ana Klimovic , George Prekas , Samuel Grossman
operating systems design and implementation 49 -65

229
2014
IX Open-source version 1.1 - Deployment and Evaluation Guide

Christos Kozyrakis , Mia Primorac , Ana Klimovic , George Prekas

2016
Shenango: Achieving High {CPU} Efficiency for Latency-sensitive Datacenter Workloads

Hari Balakrishnan , Amy Ousterhout , Joshua Fried , Jonathan Behrens
networked systems design and implementation 361 -378

192
2019
Just In Time Delivery: Leveraging Operating Systems Knowledge for Better Datacenter Congestion Control

Amy Ousterhout , Adam Belay , Irene Zhang
usenix conference on hot topics in cloud ccomputing

5
2019
AIFM: High-Performance, Application-Integrated Far Memory.

Malte Schwarzkopf , Marcos K. Aguilera , Zhenyuan Ruan , Adam Belay
operating systems design and implementation 315 -332

1
2020
Caladan: Mitigating Interference at Microsecond Timescales.

Amy Ousterhout , Joshua Fried , Zhenyuan Ruan , Adam Belay
operating systems design and implementation 281 -297

74
2020
Overload Control for µs-scale RPCs with Breakwater.

Inho Cho , Ahmed Saeed , Joshua Fried , Seo Jin Park
operating systems design and implementation 299 -314

18
2020
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract.

Nickolai Zeldovich , M. Frans Kaashoek , Jonathan Behrens , Adam Belay
operating systems design and implementation 1139 -1154

1
2020
Notary: a device for secure transaction approval

Anish Athalye , Adam Belay , M. Frans Kaashoek , Robert Morris
symposium on operating systems principles 97 -113

3
2019
Energy proportionality and workload consolidation for latency-critical applications

George Prekas , Mia Primorac , Adam Belay , Christos Kozyrakis
symposium on cloud computing 342 -355

37
2015
Hacking Blind

Andrea Bittau , Adam Belay , Ali Mashtizadeh , David Mazieres
ieee symposium on security and privacy 227 -242

470
2014