Chisel: Reshaping Queries to Trim Latency in Key-Value StoresRobert BirkeJuan F. Perezet al.2019ICAC 2019
Profiling Memory Vulnerability of Big-Data ApplicationsNavaneeth RameshanRobert Birkeet al.2016DSN-W 2016