default search action
Hai Huang 0002
Person information
- affiliation: IBM T. J. Watson Research Center, Hawthorne, NY, USA
- affiliation: University of Michigan, Ann Arbor, MI, USA
Other persons with the same name
- Hai Huang — disambiguation page
- Hai Huang 0001 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, China (and 1 more)
- Hai Huang 0003 — Université Côte d'Azur, INRIA, Sophia Antipolis, France (and 3 more)
- Hai Huang 0004 — Harbin Engineering University, National Key Laboratory of Science and Technology on Underwater Vehicle, Harbin, China (and 1 more)
- Hai Huang 0005 — Shanghai Jiaotong University, Shanghai, China
- Hai Huang 0006 — Bundeswehr University Munich, Institute for Applied Computer Science, Germany (and 1 more)
- Hai Huang 0007 — Duke University, Durham, NC, USA
- Hai Huang 0008 — China Univ. of Mining & Technololgy, Xuzhou, China
- Hai Huang 0009 — Nanning Teachers College, Longzhou, China
- Hai Huang 0010 — University of Texas at Dallas, Texas Analog Center of Excellence, Richardson, TX, USA
- Hai Huang 0011 — Arizona State University, Department of Computer Science and Engineering, Tempe, AZ, USA (and 1 more)
- Hai Huang 0012 — University of Waterloo, Department of Electrical and Computer Engineering, Waterloo, Canada
- Hai Huang 0013 — Zhejiang University, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Dushyant Behl, Hai Huang, Palanivel A. Kodeswaran, Sayandeep Sen:
On eBPF extensions to Kubernetes CNI datapath#. COMSNETS 2023: 207-209 - 2021
- [j4]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds. IEEE Trans. Cloud Comput. 9(1): 401-413 (2021) - [j3]Rupesh Raj Karn, Prabhakar Kudva, Hai Huang, Sahil Suneja, Ibrahim M. Elfadel:
Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning. IEEE Trans. Parallel Distributed Syst. 32(3): 674-691 (2021) - [c25]Mert Toslali, Srinivasan Parthasarathy, Fábio Oliveira, Hai Huang, Ayse K. Coskun:
Iter8: Online Experimentation in the Cloud. SoCC 2021: 289-304 - 2020
- [j2]Ali Anwar, Yue Cheng, Hai Huang, Jingoo Han, Hyogi Sim, Dongyoon Lee, Fred Douglis, Ali Raza Butt:
Customizable Scale-Out Key-Value Stores. IEEE Trans. Parallel Distributed Syst. 31(9): 2081-2096 (2020)
2010 – 2019
- 2019
- [j1]Hong Zhang, Hai Huang, Liqiang Wang:
Meteor: Optimizing spark-on-yarn for short applications. Future Gener. Comput. Syst. 101: 262-271 (2019) - 2018
- [c24]Hong Zhang, Zixia Liu, Hai Huang, Liqiang Wang:
FTSGD: An Adaptive Stochastic Gradient Descent Algorithm for Spark MLlib. DASC/PiCom/DataCom/CyberSciTech 2018: 828-835 - [c23]Ali Anwar, Yue Cheng, Hai Huang, Jingoo Han, Hyogi Sim, Dongyoon Lee, Fred Douglis, Ali Raza Butt:
bespoKV: application tailored scale-out key-value stores. SC 2018: 2:1-2:16 - 2017
- [c22]Hong Zhang, Hai Huang, Liqiang Wang:
MRapid: An Efficient Short Job Optimizer on Hadoop. IPDPS 2017: 459-468 - 2016
- [c21]Ali Anwar, Yue Cheng, Hai Huang, Ali Raza Butt:
ClusterOn: Building Highly Configurable and Reusable Clustered Data Services Using Simple Data Nodes. HotStorage 2016 - [c20]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. USENIX ATC 2016 - 2015
- [c19]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. LISA 2015: 1-12 - [c18]Jidong Xiao, Hai Huang, Haining Wang:
Defeating Kernel Driver Purifier. SecureComm 2015: 116-134 - [c17]Jidong Xiao, Hai Huang, Haining Wang:
Kernel Data Attack Is a Realistic Security Threat. SecureComm 2015: 135-154 - 2014
- [c16]Duy Le, Jidong Xiao, Hai Huang, Haining Wang:
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment. CNSM 2014: 169-174 - [c15]Nan Zheng, Kun Bai, Hai Huang, Haining Wang:
You Are How You Touch: User Verification on Smartphones via Tapping Behaviors. ICNP 2014: 221-232 - [c14]Hong Zhang, Liqiang Wang, Hai Huang:
SMARTH: Enabling Multi-pipeline Data Transfer in HDFS. ICPP 2014: 30-39 - 2013
- [c13]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
Security implications of memory deduplication in a virtualized environment. DSN 2013: 1-12 - 2012
- [c12]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
A covert channel construction in a virtualized environment. CCS 2012: 1040-1042 - [c11]Duy Le, Hai Huang, Haining Wang:
Understanding performance implications of nested file systems in a virtualized environment. FAST 2012: 8 - 2010
- [c10]Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Brian Peterson, Xiaodong Zhang:
Splitter: a proxy-based approach for post-migration testing of web applications. EuroSys 2010: 97-110
2000 – 2009
- 2009
- [c9]Hai Huang, Yaoping Ruan, Anees Shaikh, Ramani Routray, Chung-Hao Tan, Sandeep Gopisetty:
Building end-to-end management analytics for enterprise data centers. Integrated Network Management 2009: 661-675 - 2008
- [c8]Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang:
Automatic Software Fault Diagnosis by Exploiting Application Signatures. LISA 2008: 23-39 - 2007
- [c7]Hai Huang, Raymond B. Jennings III, Yaoping Ruan, Ramendra K. Sahoo, Sambit Sahu, Anees Shaikh:
PDA: A Tool for Automated Problem Determination. LISA 2007: 153-166 - [c6]Hai Huang, Kang G. Shin:
Partial Disk Failures: Using Software to Analyze Physical Damage. MSST 2007: 185-198 - 2006
- [b1]Hai Huang:
Exploiting unused storage resources to enhance systems' energy efficiency, performance, and fault-tolerance. University of Michigan, USA, 2006 - 2005
- [c5]Hai Huang, Kang G. Shin, Charles Lefurgy, Tom W. Keller:
Improving energy efficiency by making DRAM less randomly accessed. ISLPED 2005: 393-398 - [c4]Hai Huang, Wanda Hung, Kang G. Shin:
FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. SOSP 2005: 263-276 - 2004
- [c3]Hai Huang, Kang G. Shin, Charles Lefurgy, Karthick Rajamani, Tom W. Keller, Eric Van Hensbergen, Freeman L. Rawson III:
Software-Hardware Cooperative Power Management for Main Memory. PACS 2004: 61-77 - 2003
- [c2]Hai Huang, Padmanabhan Pillai, Kang G. Shin:
Design and Implementation of Power-Aware Virtual Memory. USENIX ATC, General Track 2003: 57-70 - 2002
- [c1]Hai Huang, Padmanabhan Pillai, Kang G. Shin:
Improving Wait-Free Algorithms for Interprocess Communication in Embedded Real-Time Systems. USENIX ATC, General Track 2002: 303-316
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint