default search action
Adam Belay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Inho Cho, Seo Jin Park, Ahmed Saeed, Mohammad Alizadeh, Adam Belay:
LDB: An Efficient Latency Profiling Tool for Multithreaded Applications. NSDI 2024 - [c23]Joshua Fried, Gohar Irfan Chaudhry, Enrique Saurez, Esha Choukse, Íñigo Goiri, Sameh Elnikety, Rodrigo Fonseca, Adam Belay:
Making Kernel Bypass Practical for the Cloud with Junction. NSDI 2024: 55-73 - [c22]Yifan Qiao, Zhenyuan Ruan, Haoran Ma, Adam Belay, Miryung Kim, Harry Xu:
Harvesting Idle Memory for Application-managed Soft State with Midas. NSDI 2024 - [c21]Ariel Szekely, Adam Belay, Robert Tappan Morris, M. Frans Kaashoek:
Unifying serverless and microservice workloads with SigmaOS. SOSP 2024: 385-402 - [i3]Enrique Saurez, Joshua Fried, Gohar Irfan Chaudhry, Esha Choukse, Íñigo Goiri, Sameh Elnikety, Adam Belay, Rodrigo Fonseca:
Junctiond: Extending FaaS Runtimes with Kernel-Bypass. CoRR abs/2403.03377 (2024) - 2023
- [c20]Zhenyuan Ruan, Shihang Li, Kaiyan Fan, Marcos K. Aguilera, Adam Belay, Seo Jin Park, Malte Schwarzkopf:
Unleashing True Utility Computing with Quicksand. HotOS 2023: 196-205 - [c19]Yifan Qiao, Chenxi Wang, Zhenyuan Ruan, Adam Belay, Qingda Lu, Yiying Zhang, Miryung Kim, Guoqing Harry Xu:
Hermit: Low-Latency, High-Throughput, and Transparent Remote Memory via Feedback-Directed Asynchrony. NSDI 2023: 181-198 - [c18]Inho Cho, Ahmed Saeed, Seo Jin Park, Mohammad Alizadeh, Adam Belay:
Protego: Overload Control for Applications with Unpredictable Lock Contention. NSDI 2023: 725-738 - [c17]Zhenyuan Ruan, Seo Jin Park, Marcos K. Aguilera, Adam Belay, Malte Schwarzkopf:
Nu: Achieving Microsecond-Scale Resource Fungibility with Logical Processes. NSDI 2023: 1409-1427 - 2022
- [c16]Jonathan Behrens, Adam Belay, M. Frans Kaashoek:
Performance evolution of mitigating transient execution attacks. EuroSys 2022: 251-265 - [c15]Seo Jin Park, Joshua Fried, Sunghyun Kim, Mohammad Alizadeh, Adam Belay:
Efficient Strong Scaling Through Burst Parallel Training. MLSys 2022 - [i2]Thomas E. Anderson, Adam Belay, Mosharaf Chowdhury, Asaf Cidon, Irene Zhang:
Treehouse: A Case For Carbon-Aware Datacenter Software. CoRR abs/2201.02120 (2022) - 2021
- [c14]Adam Belay:
Improving Efficiency and Performance Through Faster Scheduling Mechanisms. HiPC 2021: xxii - [i1]Seo Jin Park, Joshua Fried, Sunghyun Kim, Mohammad Alizadeh, Adam Belay:
Efficient Strong Scaling Through Burst Parallel Training. CoRR abs/2112.10065 (2021) - 2020
- [j4]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. GetMobile Mob. Comput. Commun. 24(2): 34-38 (2020) - [j3]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. login Usenix Mag. 45(1) (2020) - [c13]Joshua Fried, Zhenyuan Ruan, Amy Ousterhout, Adam Belay:
Caladan: Mitigating Interference at Microsecond Timescales. OSDI 2020: 281-297 - [c12]Inho Cho, Ahmed Saeed, Joshua Fried, Seo Jin Park, Mohammad Alizadeh, Adam Belay:
Overload Control for µs-scale RPCs with Breakwater. OSDI 2020: 299-314 - [c11]Zhenyuan Ruan, Malte Schwarzkopf, Marcos K. Aguilera, Adam Belay:
AIFM: High-Performance, Application-Integrated Far Memory. OSDI 2020: 315-332 - [c10]Jonathan Behrens, Anton Cao, Cel Skeggs, Adam Belay, M. Frans Kaashoek, Nickolai Zeldovich:
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract. OSDI 2020: 1139-1154
2010 – 2019
- 2019
- [c9]Amy Ousterhout, Adam Belay, Irene Zhang:
Just In Time Delivery: Leveraging Operating Systems Knowledge for Better Datacenter Congestion Control. HotCloud 2019 - [c8]Kostis Kaffes, Timothy Chong, Jack Tigar Humphries, Adam Belay, David Mazières, Christos Kozyrakis:
Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency. NSDI 2019: 345-360 - [c7]Amy Ousterhout, Joshua Fried, Jonathan Behrens, Adam Belay, Hari Balakrishnan:
Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads. NSDI 2019: 361-378 - [c6]Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich:
Notary: a device for secure transaction approval. SOSP 2019: 97-113 - 2017
- [j2]Adam Belay, George Prekas, Mia Primorac, Ana Klimovic, Samuel Grossman, Christos Kozyrakis, Edouard Bugnion:
The IX Operating System: Combining Low Latency, High Throughput, and Efficiency in a Protected Dataplane. ACM Trans. Comput. Syst. 34(4): 11:1-11:39 (2017) - [j1]Adam Belay, George Prekas, Mia Primorac, Ana Klimovic, Samuel Grossman, Christos Kozyrakis, Edouard Bugnion:
Corrigendum to "The IX Operating System: Combining Low Latency, High Throughput and Efficiency in a Protected Dataplane". ACM Trans. Comput. Syst. 35(3): 10:1 (2017) - 2016
- [b1]Adam Belay:
Unleashing hardware potential through better operating system abstractions. Stanford University, USA, 2016 - 2015
- [c5]George Prekas, Mia Primorac, Adam Belay, Christos Kozyrakis, Edouard Bugnion:
Energy proportionality and workload consolidation for latency-critical applications. SoCC 2015: 342-355 - 2014
- [c4]Adam Belay, George Prekas, Ana Klimovic, Samuel Grossman, Christos Kozyrakis, Edouard Bugnion:
IX: A Protected Dataplane Operating System for High Throughput and Low Latency. OSDI 2014: 49-65 - [c3]Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, Dan Boneh:
Hacking Blind. IEEE Symposium on Security and Privacy 2014: 227-242 - 2012
- [c2]Adam Belay, Andrea Bittau, Ali José Mashtizadeh, David Terei, David Mazières, Christos Kozyrakis:
Dune: Safe User-level Access to Privileged CPU Features. OSDI 2012: 335-348 - 2010
- [c1]David Wentzlaff, Charles Gruenwald III, Nathan Beckmann, Kevin Modzelewski, Adam Belay, Lamia Youseff, Jason E. Miller, Anant Agarwal:
An operating system for multicore and clouds: mechanisms and implementation. SoCC 2010: 3-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint