Follow
Lillian Tsai
Lillian Tsai
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Are we susceptible to rowhammer? an end-to-end methodology for cloud providers
L Cojocar, J Kim, M Patel, L Tsai, S Saroiu, A Wolman, O Mutlu
2020 IEEE symposium on security and privacy (SP), 712-728, 2020
1012020
Type-aware transactions for faster concurrent code
N Herman, JP Inala, Y Huang, L Tsai, E Kohler, B Liskov, L Shrira
Proceedings of the Eleventh European Conference on Computer Systems, 1-16, 2016
602016
Casa: End-to-end quantitative security analysis of randomly mapped caches
T Bourgeat, J Drean, Y Yang, L Tsai, J Emer, M Yan
2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020
462020
Widespread of horizontal gene transfer in the human genome
W Huang, L Tsai, Y Li, N Hua, C Sun, C Wei
Bmc Genomics 18, 1-11, 2017
352017
enclosure: Group communication via encounter closures
L Tsai, R De Viti, M Lentz, S Saroiu, B Bhattacharjee, P Druschel
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
82019
Privacy heroes need data disguises
L Tsai, M Schwarzkopf, E Kohler
Proceedings of the Workshop on Hot Topics in Operating Systems, 112-118, 2021
22021
Edna: Disguising and Revealing User Data in Web Applications
L Tsai, H Gross, E Kohler, F Kaashoek, M Schwarzkopf
Proceedings of the 29th Symposium on Operating Systems Principles, 434-450, 2023
2023
A Revised and Verified Proof of the Scalable Commutativity Rule
L Tsai, E Kohler, MF Kaashoek, N Zeldovich
arXiv preprint arXiv:1809.09550, 2018
2018
Concurrent Algorithms in Transactional Data Structures
LY Tsai
2017
Type-Aware Transactions for Faster Concurrent Code
L Shrira, N Herman, JP Inala, Y Huang, L Tsai, E Kohler, B Liskov
EuroSys 2016, 0
Poster–enClosure: Group Communication via Encounter Closures
L Tsai, R De Viti, M Lentz, S Saroiu, B Bhattacharjee, P Druschel
The system can't perform the operation now. Try again later.
Articles 1–11