default search action
Joseph A. Tucek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [p1]Goetz Graefe, Mark Lillibridge, Harumi A. Kuno, Joseph A. Tucek, Alistair C. Veitch:
Controlled Lock Violation. On Transactional Concurrency Control 2019: 129-157 - 2017
- [j6]Mai Zheng, Joseph A. Tucek, Feng Qin, Mark Lillibridge, Bill W. Zhao, Elizabeth S. Yang:
Reliability Analysis of SSDs Under Power Fault. ACM Trans. Comput. Syst. 34(4): 10:1-10:28 (2017) - [c23]Mijung Kim, Jun Li, Haris Volos, Manish Marwah, Alexander Ulanov, Kimberly Keeton, Joseph A. Tucek, Lucy Cherkasova, Le Xu, Pradeep Fernando:
Sparkle: optimizing spark for large memory machines and analytics. SoCC 2017: 656 - [i1]Mijung Kim, Jun Li, Haris Volos, Manish Marwah, Alexander Ulanov, Kimberly Keeton, Joseph A. Tucek, Lucy Cherkasova, Le Xu, Pradeep Fernando:
Sparkle: Optimizing Spark for Large Memory Machines and Analytics. CoRR abs/1708.05746 (2017) - 2014
- [j5]Goetz Graefe, Haris Volos, Hideaki Kimura, Harumi A. Kuno, Joseph A. Tucek, Mark Lillibridge, Alistair C. Veitch:
In-Memory Performance for Big Data. Proc. VLDB Endow. 8(1): 37-48 (2014) - [c22]Mai Zheng, Joseph A. Tucek, Dachuan Huang, Feng Qin, Mark Lillibridge, Elizabeth S. Yang, Bill W. Zhao, Shashank Singh:
Torturing Databases for Fun and Profit. OSDI 2014: 449-464 - 2013
- [c21]Mai Zheng, Joseph A. Tucek, Feng Qin, Mark Lillibridge:
Understanding the robustness of SSDS under power fault. FAST 2013: 271-284 - [c20]Goetz Graefe, Mark Lillibridge, Harumi A. Kuno, Joseph A. Tucek, Alistair C. Veitch:
Controlled lock violation. SIGMOD Conference 2013: 85-96 - 2011
- [b1]Joseph A. Tucek:
Addressing production run failures dynamically. University of Illinois Urbana-Champaign, USA, 2011 - [c19]Elie Krevat, Joseph A. Tucek, Gregory R. Ganger:
Disks Are Like Snowflakes: No Two Are Alike. HotOS 2011 - [c18]Elie Krevat, Tomer Shiran, Eric Anderson, Joseph A. Tucek, Jay J. Wylie, Gregory R. Ganger:
Applying idealized lower-bound runtime models to understand inefficiencies in data-intensive computing. SIGMETRICS 2011: 125-126 - 2010
- [j4]Eric Anderson, Joseph A. Tucek:
Efficiency matters! ACM SIGOPS Oper. Syst. Rev. 44(1): 40-45 (2010) - [c17]Eric Anderson, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph A. Tucek, Mustafa Uysal, Jay J. Wylie:
Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive. DSN 2010: 181-190 - [c16]Eric Anderson, Xiaozhou Li, Mehul A. Shah, Joseph A. Tucek, Jay J. Wylie:
What Consistency Does Your Key-Value Store Actually Provide? HotDep 2010
2000 – 2009
- 2009
- [j3]Jason E. Fritts, Frederick W. Steiling, Joseph A. Tucek, Wayne H. Wolf:
MediaBench II video: Expediting the next generation of video systems research. Microprocess. Microsystems 33(4): 301-318 (2009) - [c15]Joseph A. Tucek, Weiwei Xiong, Yuanyuan Zhou:
Efficient online validation with delta execution. ASPLOS 2009: 193-204 - [c14]Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph A. Tucek, Alistair C. Veitch:
Applying syntactic similarity algorithms for enterprise information management. KDD 2009: 1087-1096 - [c13]Eric Anderson, Christopher Hoover, Xiaozhou Li, Joseph A. Tucek:
Efficient tracing and performance analysis for large distributed systems. MASCOTS 2009: 1-10 - 2008
- [c12]Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou:
Designing and Implementing Malicious Hardware. LEET 2008 - 2007
- [j2]Shan Lu, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. IEEE Micro 27(1): 26-35 (2007) - [j1]Feng Qin, Joseph A. Tucek, Yuanyuan Zhou, Jagadeesan Sundaresan:
Rx: Treating bugs as allergies - a safe method to survive software failures. ACM Trans. Comput. Syst. 25(3): 7 (2007) - [c11]Joseph A. Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 - [c10]Joseph A. Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Triage: diagnosing production run failures at the user's site. SOSP 2007: 131-144 - 2006
- [c9]Shan Lu, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: detecting atomicity violations via access interleaving invariants. ASPLOS 2006: 37-48 - [c8]Joseph A. Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Automatic On-line Failure Diagnosis at the End-User Site. HotDep 2006 - 2005
- [c7]Feng Qin, Joseph A. Tucek, Yuanyuan Zhou:
Treating Bugs as Allergies: A Safe Method for Surviving Software Failures. HotOS 2005 - [c6]Joseph A. Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, William Yurcik:
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. MSST 2005: 329-340 - [c5]Feng Qin, Joseph A. Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou:
Rx: treating bugs as allergies - a safe method to survive software failures. SOSP 2005: 235-248 - [c4]Elizabeth Haubert, Joseph A. Tucek, Larry Brumbaugh, William Yurcik:
Tamper-resistant storage techniques for multimedia systems. Storage and Retrieval Methods and Applications for Multimedia 2005: 30-40 - [c3]Ragib Hasan, Joseph A. Tucek, Paul Stanton, William Yurcik, Larry Brumbaugh, Jeff Rosendale, Roelof Boonstra:
The techniques and challenges of immutable storage with applications in multimedia. Storage and Retrieval Methods and Applications for Multimedia 2005: 41-52 - 2004
- [c2]Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph A. Tucek:
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. LISA 2004: 177-186 - 2003
- [c1]William D. Smart, Michael Dixon, Nik A. Melchior, Joseph A. Tucek, Ashwin Srinivas:
Lewis the Graduate Student: An Entry in the AAAI Robot Challenge. AAAI Mobile Robot Competition 2003: 46-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint