Follow
Kapil Vaswani
Kapil Vaswani
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Oblivious multi-party machine learning on trusted processors.
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
USENIX Security Symposium 16, 10-12, 2016
5482016
Holmes: Effective statistical debugging via efficient path profiling
TM Chilimbi, B Liblit, K Mehra, AV Nori, K Vaswani
2009 IEEE 31st International Conference on Software Engineering, 34-44, 2009
3342009
EnclaveDB: A secure database using SGX
C Priebe, K Vaswani, M Costa
2018 IEEE Symposium on Security and Privacy (SP), 264-278, 2018
2642018
Construction and use of linear regression models for processor performance analysis
PJ Joseph, K Vaswani, MJ Thazhuthaveetil
The Twelfth International Symposium on High-Performance Computer …, 2006
2362006
A predictive performance model for superscalar processors
PJ Joseph, K Vaswani, MJ Thazhuthaveetil
2006 39th Annual IEEE/ACM International Symposium on Microarchitecture …, 2006
1752006
Graviton: Trusted Execution Environments on GPUs.
S Volos, K Vaswani, R Bruno
OSDI, 681-696, 2018
1422018
Moat: Verifying confidentiality of enclave programs
R Sinha, S Rajamani, S Seshia, K Vaswani
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1362015
Darwin: An approach to debugging evolving programs
D Qi, A Roychoudhury, Z Liang, K Vaswani
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (3), 1-29, 2012
1362012
Broom: Sweeping out garbage collection from big data systems
I Gog, J Giceva, M Schwarzkopf, K Vaswani, D Vytiniotis, G Ramalingam, ...
15th Workshop on Hot Topics in Operating Systems (HotOS {XV}), 2015
1152015
Safe programmable speculative parallelism
P Prabhu, G Ramalingam, K Vaswani
Proceedings of the 31st ACM SIGPLAN Conference on Programming Language …, 2010
902010
A design and verification methodology for secure isolated regions
R Sinha, M Costa, A Lal, NP Lopes, S Rajamani, SA Seshia, K Vaswani
ACM SIGPLAN Notices 51 (6), 665-681, 2016
742016
SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution.
M Bailleu, J Thalheim, P Bhatotia, C Fetzer, M Honda, K Vaswani
FAST, 173-190, 2019
732019
Preferential path profiling: compactly numbering interesting paths
K Vaswani, AV Nori, TM Chilimbi
ACM Sigplan Notices 42 (1), 351-362, 2007
712007
Mining quantified temporal rules: Formalism, algorithms, and evaluation
D Lo, G Ramalingam, VP Ranganath, K Vaswani
Science of Computer Programming 77 (6), 743-759, 2012
702012
Isolator: dynamically ensuring isolation in comcurrent programs
S Rajamani, G Ramalingam, VP Ranganath, K Vaswani
ACM SIGARCH Computer Architecture News 37 (1), 181-192, 2009
702009
System to reduce interference in concurrent programs
S Rajamani, G Ramalingam, VP Ranganath, K Vaswani
US Patent 7,941,616, 2011
652011
Differential static analysis: opportunities, applications, and challenges
SK Lahiri, K Vaswani, CAR Hoare
Proceedings of the FSE/SDP workshop on Future of software engineering …, 2010
552010
A programmable hardware path profiler
K Vaswani, MJ Thazhuthaveetil, YN Srikant
International Symposium on Code Generation and Optimization, 217-228, 2005
482005
Data structure path profiling
K Vaswani, T Chilimbi
US Patent 7,926,043, 2011
462011
Microarchitecture sensitive empirical models for compiler optimizations
K Vaswani, MJ Thazhuthaveetil, YN Srikant, PJ Joseph
International Symposium on Code Generation and Optimization (CGO'07), 131-143, 2007
452007
The system can't perform the operation now. Try again later.
Articles 1–20