×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
Download -
Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama MIT
Download
Top Related
Computer security: certification Frans Kaashoek 6.033 Spring 2007
CryptDB: Confidentiality for Database Applications with Encrypted Query Processing Raluca Ada Popa, Catherine Redfield, Nickolai Zeldovich, and Hari Balakrishnan
Michael Dalton, Christos Kozyrakis, and Nickolai Zeldovich MIT, Stanford University USENIX 09’
Zeldovich-100 Meetinginfo.tuwien.ac.at/kalashnikov/booklet.pdf · Zeldovich-100 Meeting Subatomicparticles,Nucleons,Atoms, Universe: ProcessesandStructure International conference
Efficient Patch-based Auditing for Web Application ... · Efficient Patch-based Auditing for Web Application Vulnerabilities Taesoo Kim, Ramesh Chandra, Nickolai Zeldovich ... Idea
An Ideal-Security Protocol for Order-Preserving Encoding · Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL Nickolai Zeldovich MIT CSAIL Abstract—Order-preserving encryption—an
Parallelism and operating systems - ACM SIGOPSsigops.org/sosp/sosp15/history/08-kaashoek-slides.pdf · Parallelism and operating systems M. Frans Kaashoek ... Three types of parallelism
Securing Untrustworthy Software Using … Untrustworthy Software Using Information Flow Control Nickolai Zeldovich Joint work with Silas Boyd-Wickizer, Eddie Kohler, David Mazières