Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. C Cowan, C Pu, D Maier, J Walpole, P Bakke, S Beattie, A Grier, P Wagle, ... USENIX security symposium 98, 63-78, 1998 | 2417 | 1998 |
Buffer overflows: Attacks and defenses for the vulnerability of the decade C Cowan, F Wagle, C Pu, S Beattie, J Walpole Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 804 | 2000 |
XWRAP: An XML-enabled wrapper construction system for web information sources L Liu, C Pu, W Han Proceedings of 16th International Conference on Data Engineering (Cat. No …, 2000 | 767 | 2000 |
Continual queries for internet scale event-driven information delivery L Liu, C Pu, W Tang IEEE Transactions on Knowledge and Data Engineering 11 (4), 610-628, 1999 | 531 | 1999 |
An analysis of performance interference effects in virtual environments Y Koh, R Knauerhase, P Brett, M Bowman, Z Wen, C Pu 2007 IEEE International Symposium on Performance Analysis of Systems …, 2007 | 463 | 2007 |
A feedback-driven proportion allocator for real-rate scheduling DC Steere, A Goel, J Gruenberg, D McNamee, C Pu, J Walpole OSDI 99, 145-158, 1999 | 442 | 1999 |
Mistral: Dynamically managing power, performance, and adaptation cost in cloud infrastructures G Jung, MA Hiltunen, KR Joshi, RD Schlichting, C Pu 2010 IEEE 30th International Conference on Distributed Computing Systems, 62-73, 2010 | 403 | 2010 |
A fully automated object extraction system for the World Wide Web D Buttler, L Liu, C Pu Proceedings 21st International Conference on Distributed Computing Systems …, 2001 | 359 | 2001 |
Replica control in distributed systems: as asynchronous approach C Pu, A Leff Proceedings of the 1991 ACM SIGMOD International Conference on Management of …, 1991 | 359 | 1991 |
Split-Transactions for Open-Ended Activities. C Pu, GE Kaiser, NC Hutchinson VLDB 88, 26-37, 1988 | 346 | 1988 |
Research challenges in environmental observation and forecasting systems DC Steere, A Baptista, D McNamee, C Pu, J Walpole Proceedings of the 6th annual international conference on Mobile computing …, 2000 | 324 | 2000 |
Optimistic incremental specialization: Streamlining a commercial operating system C Pu, T Autrey, A Black, C Consel, C Cowan, J Inouye, L Kethana, ... Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995 | 321 | 1995 |
Differentially private model publishing for deep learning L Yu, L Liu, C Pu, ME Gursoy, S Truex 2019 IEEE symposium on security and privacy (SP), 332-349, 2019 | 303 | 2019 |
Understanding performance interference of i/o workload in virtualized cloud environments X Pu, L Liu, Y Mei, S Sivathanu, Y Koh, C Pu 2010 IEEE 3rd International Conference on Cloud Computing, 51-58, 2010 | 283 | 2010 |
Improving performance and availability of services hosted on iaas clouds with structural constraint-aware virtual machine placement D Jayasinghe, C Pu, T Eilam, M Steinder, I Whally, E Snible 2011 IEEE international conference on services computing, 72-79, 2011 | 277 | 2011 |
A distributed real-time MPEG video audio player S Cen, C Pu, R Staehli, C Cowan, J Walpole Network and Operating Systems Support for Digital Audio and Video: 5th …, 1995 | 268 | 1995 |
The synthesis kernel C Pu, H Massalin, J Ioannidis Computing Systems 1 (1), 11-32, 1988 | 236 | 1988 |
Reducing TCB complexity for security-sensitive applications: Three case studies L Singaravelu, C Pu, H Härtig, C Helmuth Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer …, 2006 | 226 | 2006 |
A lock-free multiprocessor OS kernel H Massalin, C Pu ACM SIGOPS Operating Systems Review 26 (2), 108, 1992 | 225 | 1992 |
Reverse social engineering attacks in online social networks D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011 | 221 | 2011 |