The tail at store: A revelation from millions of hours of disk and {SSD} deployments M Hao, G Soundararajan, D Kenchammana-Hosekote, AA Chien, ... 14th USENIX Conference on File and Storage Technologies (FAST 16), 263-276, 2016 | 241* | 2016 |
Safely and automatically updating in-network acl configurations with intent language B Tian, X Zhang, E Zhai, HH Liu, Q Ye, C Wang, X Wu, Z Ji, Y Sang, ... Proceedings of the ACM Special Interest Group on Data Communication, 214-226, 2019 | 111 | 2019 |
Lyra: A cross-platform language and compiler for data plane programming on heterogeneous asics J Gao, E Zhai, HH Liu, R Miao, Y Zhou, B Tian, C Sun, D Cai, M Zhang, ... Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 109 | 2020 |
Understanding fileless attacks on linux-based iot devices with honeycloud F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 97 | 2019 |
Heading Off Correlated Failures through {Independence-as-a-Service} E Zhai, R Chen, DI Wolinsky, B Ford 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 65 | 2014 |
Synthesizing configuration file specifications with association rule learning M Santolucito, E Zhai, R Dhodapkar, A Shim, R Piskac Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-20, 2017 | 60 | 2017 |
Accuracy, scalability, coverage: A practical configuration verifier on a global wan F Ye, D Yu, E Zhai, HH Liu, B Tian, Q Ye, C Wang, X Wu, T Guo, C Jin, ... Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 58 | 2020 |
Understanding and detecting overlay-based android malware at market scales Y Yan, Z Li, QA Chen, C Wilson, T Xu, E Zhai, Y Li, Y Liu Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 52 | 2019 |
Aquila: a practically usable verification system for production-scale programmable data planes B Tian, J Gao, M Liu, E Zhai, Y Chen, Y Zhou, L Dai, F Yan, M Ma, M Tang, ... Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 17-32, 2021 | 41 | 2021 |
Probabilistic automated language learning for configuration files M Santolucito, E Zhai, R Piskac Computer Aided Verification: 28th International Conference, CAV 2016 …, 2016 | 41 | 2016 |
Check before you change: Preventing correlated failures in service updates E Zhai, A Chen, R Piskac, M Balakrishnan, B Tian, B Song, H Zhang 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020 | 36 | 2020 |
Cetus: Releasing p4 programmers from the chore of trial and error compiling Y Li, J Gao, E Zhai, M Liu, K Liu, HH Liu 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022 | 35 | 2022 |
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems TT Chekam, E Zhai, Z Li, Y Cui, K Ren IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 33 | 2016 |
Claper: Recommend classical papers to beginners Y Wang, E Zhai, J Hu, Z Chen 2010 Seventh International Conference on Fuzzy Systems and Knowledge …, 2010 | 33 | 2010 |
Towards web-based delta synchronization for cloud storage services H Xiao, Z Li, E Zhai, T Xu, Y Li, Y Liu, Q Zhang, Y Liu 16th USENIX Conference on File and Storage Technologies (FAST 18), 155-168, 2018 | 32 | 2018 |
Static detection of silent misconfigurations with deep interaction analysis J Zhang, R Piskac, E Zhai, T Xu Proceedings of the ACM on Programming Languages 5 (OOPSLA), 1-30, 2021 | 31 | 2021 |
Sorcery: Could we make P2P content sharing systems robust to deceivers? E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009 | 31 | 2009 |
Mobile gaming on personal computers with direct android emulation Q Yang, Z Li, Y Liu, H Long, Y Huang, J He, T Xu, E Zhai The 25th Annual International Conference on Mobile Computing and Networking …, 2019 | 30 | 2019 |
Deterministically deterring timing attacks in deterland W Wu, B Ford arXiv preprint arXiv:1504.07070, 2015 | 29 | 2015 |
An untold story of redundant clouds: Making your service deployment truly reliable E Zhai, R Chen, DI Wolinsky, B Ford Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 1-6, 2013 | 27 | 2013 |