| Mnemosyne: Lightweight persistent memory H Volos, AJ Tack, MM Swift ACM SIGARCH Computer Architecture News 39 (1), 91-104, 2011 | 1162 | 2011 |
| Peeking behind the curtains of serverless platforms L Wang, M Li, Y Zhang, T Ristenpart, M Swift 2018 USENIX annual technical conference (USENIX ATC 18), 133-146, 2018 | 921 | 2018 |
| Improving the reliability of commodity operating systems MM Swift, BN Bershad, HM Levy Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003 | 574 | 2003 |
| LogTM-SE: Decoupling hardware transactional memory from caches L Yen, J Bobba, MR Marty, KE Moore, H Volos, MD Hill, MM Swift, ... 2007 IEEE 13th International Symposium on High Performance Computer …, 2007 | 483 | 2007 |
| Recovering device drivers MM Swift, M Annamalai, BN Bershad, HM Levy ACM Transactions on Computer Systems (TOCS) 24 (4), 333-360, 2006 | 474 | 2006 |
| Efficient virtual memory for big memory servers A Basu, J Gandhi, J Chang, MD Hill, MM Swift ACM SIGARCH Computer Architecture News 41 (3), 237-248, 2013 | 453 | 2013 |
| Method and system for secure running of untrusted content S Chan, G Jensenworth, MC Goertzel, B Shah, MM Swift, RB Ward US Patent 6,505,300, 2003 | 420 | 2003 |
| Controlling access to objects on multiple operating systems DS Montague, PK Misra, MM Swift US Patent 5,675,782, 1997 | 411 | 1997 |
| {ATP}: In-network aggregation for multi-tenant learning CL Lao, Y Le, K Mahajan, Y Chen, W Wu, A Akella, M Swift 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2021 | 349 | 2021 |
| Improving the reliability of commodity operating systems MM Swift, BN Bershad, HM Levy ACM Transactions on Computer Systems (TOCS) 23 (1), 77-110, 2005 | 344 | 2005 |
| Extensible security system and method for controlling access to objects in a computing environment CP Van Dyke, PT Brundrett, MM Swift, P Garg, RB Ward US Patent 6,412,070, 2002 | 331 | 2002 |
| Performance pathologies in hardware transactional memory J Bobba, KE Moore, H Volos, L Yen, MD Hill, MM Swift, DA Wood ACM SIGARCH Computer Architecture News 35 (2), 81-91, 2007 | 330 | 2007 |
| Aerie: Flexible file-system interfaces to storage-class memory H Volos, S Nalli, S Panneerselvam, V Varadarajan, P Saxena, MM Swift Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 308 | 2014 |
| Method for changing passwords on a remote computer MM Swift, CP Van Dyke, PK Misra US Patent 5,719,941, 1998 | 296 | 1998 |
| Supporting nested transactional memory in LogTM MJ Moravan, J Bobba, KE Moore, L Yen, MD Hill, B Liblit, MM Swift, ... ACM SIGARCH Computer Architecture News 34 (5), 359-370, 2006 | 288 | 2006 |
| An analysis of persistent memory use with whisper S Nalli, S Haria, MD Hill, MM Swift, H Volos, K Keeton ACM SIGPLAN Notices 52 (4), 135-148, 2017 | 269 | 2017 |
| A placement vulnerability study in {Multi-Tenant} public clouds V Varadarajan, Y Zhang, T Ristenpart, M Swift 24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015 | 248 | 2015 |
| Flashtier: a lightweight, consistent and durable storage cache M Saxena, MM Swift, Y Zhang Proceedings of the 7th ACM european conference on Computer Systems, 267-280, 2012 | 248 | 2012 |
| Resource-freeing attacks: improve your cloud performance (at your neighbor's expense) V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 244 | 2012 |
| Least privilege via restricted tokens MM Swift US Patent 6,308,274, 2001 | 243 | 2001 |