Export 7 results:
Filters: Author is Joseph Tucek  [Clear All Filters]
Zheng M, Tucek J, Huang D, Qin F, Lillibridge M, Yang ES, Zhao BW, Singh S.  2014.  Torturing Databases for Fun and Profit. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :449--464.
Zheng M, Tucek J, Qin F, Lillibridge M.  2013.  Understanding the Robustness of SSDs under Power Fault. 11th USENIX Conference on File and Storage Technologies (FAST 13). :271--284.
Krevat E, Tucek J, Ganger GR.  2011.  Disks Are Like Snowflakes: No Two Are Alike. 13th Workshop on Hot Topics in Operating Systems (HotOS XIII).
Anderson E, Li X, Shah MA, Tucek J, Wylie JJ.  2010.  What Consistency Does Your Key-Value Store Actually Provide? Sixth Workshop on Hot Topics in System Dependability (HotDep 10).
King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y.  2008.  Designing and Implementing Malicious Hardware. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
Tucek J, Lu S, Huang C, Xanthos S, Zhou Y.  2006.  Automatic On-line Failure Diagnosis at the End-User Site. Second Workshop on Hot Topics in System Dependability (HotDep 06).
Pluta G, Brumbaugh L, Yurcik W, Tucek J.  2004.  Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments 18th Large Installation System Administration Conference (LISA 04).