Key-value stores typically leave access control to the systems for which...
Many applications of approximate membership query data structures, or
fi...
We present the Cuckoo Trie, a fast, memory-efficient ordered index struc...
Spectre v1 attacks, which exploit conditional branch misprediction, are ...
We present the first recoverable mutual exclusion (RME) algorithm that i...
Modern highly-concurrent search data structures, such as search trees, o...
Recent security vulnerabilities that target speculative execution (e.g.,...
Bring Your Own Device (BYOD) has become the new norm in enterprise netwo...
Proving the linearizability of highly concurrent data structures, such a...