Haohui Mai
Cited by
Cited by
Debugging the data plane with anteater
H Mai, A Khurshid, R Agarwal, M Caesar, PB Godfrey, ST King
ACM SIGCOMM Computer Communication Review 41 (4), 290-301, 2011
Sherlog: error diagnosis by connecting clues from run-time logs
D Yuan, H Mai, W Xiong, L Tan, Y Zhou, S Pasupathy
Proceedings of the fifteenth International Conference on Architectural …, 2010
Trust and protection in the illinois browser operating system
S Tang, H Mai, ST King
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
Verifying security invariants in ExpressOS
H Mai, E Pek, H Xue, ST King, P Madhusudan
Proceedings of the eighteenth international conference on Architectural …, 2013
A case for parallelizing web pages
H Mai, S Tang, ST King, C Cascaval, P Montesinos
4th USENIX Workshop on Hot Topics in Parallelism (HotPar 12), 2012
Boxer: Preventing fraud by scanning credit cards
Z Abi Din, H Venugopalan, J Park, A Li, W Yin, H Mai, YJ Lee, S Liu, ...
29th USENIX Security Symposium (USENIX Security 20), 1571-1588, 2020
Honeycomb: Secure and Efficient {GPU} Executions via Static Validation
H Mai, J Zhao, H Zheng, Y Zhao, Z Liu, M Gao, C Wang, H Cui, X Feng, ...
17th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2023
Towards Automatic Inference of Task Hierarchies in Complex Systems.
H Mai, C Gao, X Liu, X Wang, GM Voelker
HotDep, 2008
SIRIUS: Harvesting Whole-Program Optimization Opportunities for DNNs
Y Li, J Zhao, S Qianqi, H Mai, L Chen, W Cao, Y Chen, Y LIU, X Zhang, ...
Proceedings of Machine Learning and Systems 5, 2023
Building abstractions for fast, secure, reliable computer systems
H Mai
University of Illinois at Urbana-Champaign, 2013
Trust and Protection in the Illinois Browser OS
S Tang, H Mai, ST King
The system can't perform the operation now. Try again later.
Articles 1–11