default search action
Emmett Witchel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Zhipeng Jia, Emmett Witchel:
The Key Ideas Behind Boki's Shared Logs. ACM SIGOPS Oper. Syst. Rev. 58(1): 7-14 (2024) - [c59]Emmett Witchel:
Challenges and Opportunities for Systems Using CXL Memory. ASPLOS (3) 2024: 2 - 2023
- [j16]Henrique Fingler, Zhiting Zhu, Esther Yoon, Zhipeng Jia, Emmett Witchel, Christopher J. Rossbach:
Disaggregated GPU Acceleration for Serverless Applications. ACM SIGOPS Oper. Syst. Rev. 57(1): 10-20 (2023) - 2022
- [c58]Henrique Fingler, Zhiting Zhu, Esther Yoon, Zhipeng Jia, Emmett Witchel, Christopher J. Rossbach:
DGSF: Disaggregated GPUs for Serverless Functions. IPDPS 2022: 739-750 - 2021
- [c57]Zhipeng Jia, Emmett Witchel:
Nightcore: efficient and scalable serverless computing for latency-sensitive, interactive microservices. ASPLOS 2021: 152-166 - [c56]Zhipeng Jia, Emmett Witchel:
Boki: Stateful Serverless Computing with Shared Logs. SOSP 2021: 691-707 - [c55]Jongyul Kim, Insu Jang, Waleed Reda, Jaeseong Im, Marco Canini, Dejan Kostic, Youngjin Kwon, Simon Peter, Emmett Witchel:
LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism. SOSP 2021: 756-771 - 2020
- [c54]Tyler Hunt, Zhipeng Jia, Vance Miller, Ariel Szekely, Yige Hu, Christopher J. Rossbach, Emmett Witchel:
Telekine: Secure Computing with Cloud GPUs. NSDI 2020: 817-833 - [c53]Thomas E. Anderson, Marco Canini, Jongyul Kim, Dejan Kostic, Youngjin Kwon, Simon Peter, Waleed Reda, Henry N. Schuh, Emmett Witchel:
Assise: Performance and Availability via Client-local NVM in a Distributed File System. OSDI 2020: 1011-1027
2010 – 2019
- 2019
- [j15]Yige Hu, Zhiting Zhu, Ian Neal, Youngjin Kwon, Tianyu Cheng, Vijay Chidambaram, Emmett Witchel:
TxFS: Leveraging File-system Crash Consistency to Provide ACID Transactions. ACM Trans. Storage 15(2): 9:1-9:20 (2019) - [c52]Tyler Hunt, Zhipeng Jia, Vance Miller, Christopher J. Rossbach, Emmett Witchel:
Isolation and Beyond: Challenges for System Security. HotOS 2019: 96-104 - [e1]Iris Bahar, Maurice Herlihy, Emmett Witchel, Alvin R. Lebeck:
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2019, Providence, RI, USA, April 13-17, 2019. ACM 2019, ISBN 978-1-4503-6240-5 [contents] - [i3]Thomas E. Anderson, Marco Canini, Jongyul Kim, Dejan Kostic, Youngjin Kwon, Simon Peter, Waleed Reda, Henry N. Schuh, Emmett Witchel:
Assise: Performance and Availability via NVM Colocation in a Distributed File System. CoRR abs/1910.05106 (2019) - 2018
- [j14]Yige Hu, Zhiting Zhu, Ian Neal, Youngjin Kwon, Tianyu Cheng, Vijay Chidambaram, Emmett Witchel:
TxFS: Leveraging File-System Crash Consistency to ProvideACID Transactions. login Usenix Mag. 43(3) (2018) - [c51]Yige Hu, Zhiting Zhu, Ian Neal, Youngjin Kwon, Tianyu Cheng, Vijay Chidambaram, Emmett Witchel:
TxFS: Leveraging File-System Crash Consistency to Provide ACID Transactions. USENIX ATC 2018: 879-891 - [i2]Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel:
Chiron: Privacy-preserving Machine Learning as a Service. CoRR abs/1803.05961 (2018) - 2017
- [j13]Youngjin Kwon, Hangchen Yu, Simon Peter, Christopher J. Rossbach, Emmett Witchel:
Ingens: Huge Page Support for the OS and Hypervisor. ACM SIGOPS Oper. Syst. Rev. 51(1): 83-93 (2017) - [j12]Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, Emmett Witchel:
Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. ACM Trans. Comput. Syst. 35(4): 13:1-13:32 (2017) - [j11]Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, Emmett Witchel:
Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. login Usenix Mag. 42(2) (2017) - [c50]Yige Hu, Youngjin Kwon, Vijay Chidambaram, Emmett Witchel:
From Crash Consistency to Transactions. HotOS 2017: 100-105 - [c49]Zhiting Zhu, Sangman Kim, Yuri Rozhanski, Yige Hu, Emmett Witchel, Mark Silberstein:
Understanding The Security of Discrete GPUs. GPGPU@PPoPP 2017: 1-11 - [c48]Youngjin Kwon, Henrique Fingler, Tyler Hunt, Simon Peter, Emmett Witchel, Thomas E. Anderson:
Strata: A Cross Media File System. SOSP 2017: 460-477 - 2016
- [j10]Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel:
EARP: Principled Storage, Sharing, and Protection for Mobile Apps. GetMobile Mob. Comput. Commun. 20(3): 29-33 (2016) - [j9]Mark Silberstein, Sangman Kim, Seonggu Huh, Xinya Zhang, Yige Hu, Amir Wated, Emmett Witchel:
GPUnet: Networking Abstractions for GPU Programs. ACM Trans. Comput. Syst. 34(3): 9:1-9:31 (2016) - [c47]Youngjin Kwon, Alan M. Dunn, Michael Z. Lee, Owen S. Hofmann, Yuanzhong Xu, Emmett Witchel:
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services. ASPLOS 2016: 277-290 - [c46]Emmett Witchel:
Programmer Productivity in a World of Mushy Interfaces: Challenges of the Post-ISA Reality. ASPLOS 2016: 591 - [c45]Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel:
Earp: Principled Storage, Sharing, and Protection for Mobile Apps. NSDI 2016: 627-642 - [c44]Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, Emmett Witchel:
Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. OSDI 2016: 533-549 - [c43]Youngjin Kwon, Hangchen Yu, Simon Peter, Christopher J. Rossbach, Emmett Witchel:
Coordinated and Efficient Huge Page Management with Ingens. OSDI 2016: 705-721 - 2015
- [c42]Yuanzhong Xu, Emmett Witchel:
Maxoid: transparently confining mobile applications with custom views of state. EuroSys 2015: 26:1-26:16 - 2014
- [j8]Mark Silberstein, Bryan Ford, Emmett Witchel:
GPUfs: the case for operating system services on GPUs. Commun. ACM 57(12): 68-79 (2014) - [j7]Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel:
Anon-Pass: Practical Anonymous Subscriptions. IEEE Secur. Priv. 12(3): 20-27 (2014) - [j6]Mark Silberstein, Bryan Ford, Idit Keidar, Emmett Witchel:
GPUfs: Integrating a file system with GPUs. ACM Trans. Comput. Syst. 32(1): 1:1-1:31 (2014) - [j5]Donald E. Porter, Michael D. Bond, Indrajit Roy, Kathryn S. McKinley, Emmett Witchel:
Practical Fine-Grained Information Flow Control Using Laminar. ACM Trans. Program. Lang. Syst. 37(1): 4:1-4:51 (2014) - [c41]Sangman Kim, Seonggu Huh, Xinya Zhang, Yige Hu, Amir Wated, Emmett Witchel, Mark Silberstein:
GPUnet: Networking Abstractions for GPU Programs. OSDI 2014: 201-216 - [c40]Yuanzhong Xu, Alan M. Dunn, Owen S. Hofmann, Michael Z. Lee, Syed Akbar Mehdi, Emmett Witchel:
Application-Defined Decentralized Access Control. USENIX ATC 2014: 395-407 - 2013
- [c39]Owen S. Hofmann, Sangman Kim, Alan M. Dunn, Michael Z. Lee, Emmett Witchel:
InkTag: secure applications on an untrusted operating system. ASPLOS 2013: 265-278 - [c38]Mark Silberstein, Bryan Ford, Idit Keidar, Emmett Witchel:
GPUfs: integrating a file system with GPUs. ASPLOS 2013: 485-498 - [c37]Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, Jonathan Katz:
Anon-Pass: Practical Anonymous Subscriptions. IEEE Symposium on Security and Privacy 2013: 319-333 - [i1]Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel:
Anon-Pass: Practical Anonymous Subscriptions. IACR Cryptol. ePrint Arch. 2013: 317 (2013) - 2012
- [c36]Sangman Kim, Michael Z. Lee, Alan M. Dunn, Owen S. Hofmann, Xuan Wang, Emmett Witchel, Donald E. Porter:
Improving server applications with system transactions. EuroSys 2012: 15-28 - [c35]Alan M. Dunn, Michael Z. Lee, Suman Jana, Sangman Kim, Mark Silberstein, Yuanzhong Xu, Vitaly Shmatikov, Emmett Witchel:
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. OSDI 2012: 61-75 - 2011
- [c34]Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, Emmett Witchel:
Ensuring operating system kernel integrity with OSck. ASPLOS 2011: 279-290 - [c33]Christopher J. Rossbach, Jon Currey, Emmett Witchel:
Operating Systems Must Support GPU Abstractions. HotOS 2011 - [c32]Christopher J. Rossbach, Jon Currey, Mark Silberstein, Baishakhi Ray, Emmett Witchel:
PTask: operating system abstractions to manage GPUs as compute devices. SOSP 2011: 233-248 - [c31]Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel:
Cloaking Malware with the Trusted Platform Module. USENIX Security Symposium 2011 - 2010
- [j4]Jonathan Wildstrom, Peter Stone, Emmett Witchel:
Autonomous return on investment analysis of additional processing resources. Int. J. Auton. Comput. 1(3): 280-296 (2010) - [c30]Donald E. Porter, Emmett Witchel:
Understanding transactional memory performance. ISPASS 2010: 97-108 - [c29]Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel:
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. NDSS 2010 - [c28]Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel:
Airavat: Security and Privacy for MapReduce. NSDI 2010: 297-312 - [c27]Christopher J. Rossbach, Owen S. Hofmann, Emmett Witchel:
Is transactional programming actually easier? PPoPP 2010: 47-56 - [c26]Donald E. Porter, Emmett Witchel:
Modeling transactional memory workload performance. PPoPP 2010: 349-350
2000 – 2009
- 2009
- [c25]Owen S. Hofmann, Christopher J. Rossbach, Emmett Witchel:
Maximum benefit from a minimal HTM. ASPLOS 2009: 145-156 - [c24]Donald E. Porter, Emmett Witchel:
Operating Systems Should Provide Transactions. HotOS 2009 - [c23]Indrajit Roy, Donald E. Porter, Michael D. Bond, Kathryn S. McKinley, Emmett Witchel:
Laminar: practical fine-grained decentralized information flow control. PLDI 2009: 63-74 - [c22]Hany E. Ramadan, Indrajit Roy, Maurice Herlihy, Emmett Witchel:
Committing conflicting transactions in an STM. PPoPP 2009: 163-172 - [c21]Donald E. Porter, Owen S. Hofmann, Christopher J. Rossbach, Alexander Benn, Emmett Witchel:
Operating systems transactions. SOSP 2009: 161-176 - 2008
- [j3]Christopher J. Rossbach, Hany E. Ramadan, Owen S. Hofmann, Donald E. Porter, Bhandari Aditya, Emmett Witchel:
TxLinux and MetaTM: transactional memory and the operating system. Commun. ACM 51(9): 83-91 (2008) - [j2]Hany E. Ramadan, Christopher J. Rossbach, Donald E. Porter, Owen S. Hofmann, Bhandari Aditya, Emmett Witchel:
MetaTM/TxLinux: Transactional Memory for an Operating System. IEEE Micro 28(1): 42-51 (2008) - [c20]Jonathan Wildstrom, Peter Stone, Emmett Witchel:
CARVE: A Cognitive Agent for Resource Value Estimation. ICAC 2008: 182-191 - [c19]Hany E. Ramadan, Christopher J. Rossbach, Emmett Witchel:
Dependence-aware transactional memory for increased concurrency. MICRO 2008: 246-257 - 2007
- [c18]Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel:
Privacy-preserving remote diagnostics. CCS 2007: 498-507 - [c17]Donald E. Porter, Owen S. Hofmann, Emmett Witchel:
Is the Optimism in Optimistic Concurrency Warranted? HotOS 2007 - [c16]Jonathan Wildstrom, Peter Stone, Emmett Witchel:
Autonomous Return on Investment Analysis of Additional Processing Resources. ICAC 2007: 15 - [c15]Jonathan Wildstrom, Peter Stone, Emmett Witchel, Michael Dahlin:
Machine Learning for On-Line Hardware Reconfiguration. IJCAI 2007: 1113-1118 - [c14]Hany E. Ramadan, Christopher J. Rossbach, Donald E. Porter, Owen S. Hofmann, Bhandari Aditya, Emmett Witchel:
MetaTM//TxLinux: transactional memory for an operating system. ISCA 2007: 92-103 - [c13]Jungwoo Ha, Christopher J. Rossbach, Jason V. Davis, Indrajit Roy, Hany E. Ramadan, Donald E. Porter, David L. Chen, Emmett Witchel:
Improved error reporting for software that uses black-box components. PLDI 2007: 101-111 - [c12]Christopher J. Rossbach, Owen S. Hofmann, Donald E. Porter, Hany E. Ramadan, Bhandari Aditya, Emmett Witchel:
TxLinux: using and managing hardware transactional memory in an operating system. SOSP 2007: 87-102 - 2006
- [c11]Jason V. Davis, Jungwoo Ha, Christopher J. Rossbach, Hany E. Ramadan, Emmett Witchel:
Cost-Sensitive Decision Tree Learning for Forensic Classification. ECML 2006: 622-629 - 2005
- [c10]Jonathan Wildstrom, Peter Stone, Emmett Witchel, Raymond J. Mooney, Michael Dahlin:
Towards Self-Configuring Hardware for Distributed Computer Systems. ICAC 2005: 241-249 - [c9]Andrew Ayers, Richard Schooler, Chris Metcalf, Anant Agarwal, Junghwan Rhee, Emmett Witchel:
TraceBack: first fault diagnosis by reconstruction of distributed control flow. PLDI 2005: 201-212 - [c8]Emmett Witchel, Junghwan Rhee, Krste Asanovic:
Mondrix: memory isolation for linux using mondriaan memory protection. SOSP 2005: 31-44 - 2004
- [b1]Emmett Witchel:
Mondriaan Memory Protection. Massachusetts Institute of Technology, Cambridge, MA, USA, 2004 - 2003
- [c7]Emmett Witchel, Krste Asanovic:
Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection. HotOS 2003: 139-144 - 2002
- [c6]Samuel Larsen, Emmett Witchel, Saman P. Amarasinghe:
Increasing and Detecting Memory Address Congruence. IEEE PACT 2002: 18-29 - [c5]Emmett Witchel, Josh Cates, Krste Asanovic:
Mondrian memory protection. ASPLOS 2002: 304-316 - 2001
- [c4]Emmett Witchel, Samuel Larsen, C. Scott Ananian, Krste Asanovic:
Direct addressed caches for reduced power consumption. MICRO 2001: 124-133
1990 – 1999
- 1999
- [c3]David Mazières, Michael Kaminsky, M. Frans Kaashoek, Emmett Witchel:
Separating key management from file system security. SOSP 1999: 124-139 - 1996
- [c2]Emmett Witchel, Mendel Rosenblum:
Embra: Fast and Flexible Machine Simulation. SIGMETRICS 1996: 68-79 - 1995
- [j1]Mendel Rosenblum, Stephen Alan Herrod, Emmett Witchel, Anoop Gupta:
Complete computer system simulation: the SimOS approach. IEEE Parallel Distributed Technol. Syst. Appl. 3(4): 34-43 (1995) - [c1]Mendel Rosenblum, Edouard Bugnion, Stephen Alan Herrod, Emmett Witchel, Anoop Gupta:
The Impact of Architectural Trends on Operating System Performance. SOSP 1995: 285-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint