Follow
Joseph Tucek
Joseph Tucek
Amazon AWS
Verified email at amazon.com
Title
Cited by
Cited by
Year
AVIO: detecting atomicity violations via access interleaving invariants
S Lu, J Tucek, F Qin, Y Zhou
ACM SIGOPS Operating Systems Review 40 (5), 37-48, 2006
5312006
Rx: treating bugs as allergies---a safe method to survive software failures
F Qin, J Tucek, J Sundaresan, Y Zhou
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
4582005
Designing and Implementing Malicious Hardware.
ST King, J Tucek, A Cozzie, C Grier, W Jiang, Y Zhou
Leet 8, 1-8, 2008
4492008
Triage: diagnosing production run failures at the user's site
J Tucek, S Lu, C Huang, S Xanthos, Y Zhou
ACM SIGOPS Operating Systems Review 41 (6), 131-144, 2007
1982007
Koi: A {Location-Privacy} platform for smartphone apps
S Guha, M Jain, VN Padmanabhan
9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012
145*2012
What Consistency Does Your {Key-Value} Store Actually Provide?
E Anderson, X Li, MA Shah, J Tucek, JJ Wylie
Sixth Workshop on Hot Topics in System Dependability (HotDep 10), 2010
1392010
Understanding the robustness of {SSDs} under power fault
M Zheng, J Tucek, F Qin, M Lillibridge
11th USENIX Conference on File and Storage Technologies (FAST 13), 271-284, 2013
1302013
Torturing databases for fun and profit
M Zheng, J Tucek, D Huang, F Qin, M Lillibridge, ES Yang, BW Zhao, ...
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
1012014
MediaBench II video: Expediting the next generation of video systems research
JE Fritts, FW Steiling, JA Tucek, W Wolf
Microprocessors and Microsystems 33 (4), 301-318, 2009
982009
Sweeper: A lightweight end-to-end system for defending against fast worms
J Tucek, J Newsome, S Lu, C Huang, S Xanthos, D Brumley, Y Zhou, ...
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer …, 2007
912007
Efficiency matters!
E Anderson, J Tucek
ACM SIGOPS Operating Systems Review 44 (1), 40-45, 2010
892010
In-memory performance for big data
G Graefe, H Volos, H Kimura, H Kuno, J Tucek, M Lillibridge, A Veitch
Proceedings of the VLDB Endowment 8 (1), 37-48, 2014
882014
Rx: Treating bugs as allergies—a safe method to survive software failures
F Qin, J Tucek, Y Zhou, J Sundaresan
ACM Transactions on Computer Systems (TOCS) 25 (3), 7-es, 2007
842007
Efficient online validation with delta execution
J Tucek, W Xiong, Y Zhou
Proceedings of the 14th international conference on Architectural support …, 2009
652009
Mediabench II video: expediting the next generation of video systems research
JE Fritts, FW Steiling, JA Tucek
Embedded Processors for Multimedia and Communications II 5683, 79-93, 2005
582005
Disks are like snowflakes: no two are alike
E Krevat, J Tucek, GR Ganger
13th Workshop on Hot Topics in Operating Systems (HotOS XIII), 2011
552011
Multi-geography cloud storage
EA Anderson, JJ Wylie, JA Tucek
US Patent App. 13/460,806, 2013
462013
Identifying a location containing invalid data in a storage media
JA Tucek
US Patent 8,904,092, 2014
422014
AVIO: Detecting atomicity violations via access-interleaving invariants
S Lu, J Tucek, F Qin, Y Zhou
IEEE micro 27 (1), 26-35, 2007
352007
Controlled lock violation
G Graefe, M Lillibridge, H Kuno, J Tucek, A Veitch
Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013
332013
The system can't perform the operation now. Try again later.
Articles 1–20