Flag-Proxy Networks: Overcoming the Architectural, Scheduling and Decoding Obstacles of Quantum LDPC CodesSuhas VittalAli Javadiet al.2024MICRO 2024
Optimizing GPU Multiplexing for Efficient and Cost-Effective Access to Diverse Large Language Models in GPU ClustersYue ZhuChen Wanget al.2024MASCOTS 2024
Caspian: A Carbon-aware Workload Scheduler in Multi-Cluster Kubernetes EnvironmentsTayebeh BahreiniAsser Tantawiet al.2024MASCOTS 2024
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersRay ValdezMd Salman Ahmedet al.2024CCS 2024
Understanding Legal Professionals’ Practices and Expectations in Data Breach Incident ReportingEce GumuselYue Xiaoet al.2024CCS 2024
Password-Protected Key Retrieval with(out) HSM ProtectionSebastian FallerTobias Handirket al.2024CCS 2024
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology PoisoningMingming ChenTom La Portaet al.2024CCS 2024