Jacob Lorch
Jacob Lorch
Microsoft Research
Verified email at - Homepage
Cited by
Cited by
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
A Adya, WJ Bolosky, M Castro, G Cermak, R Chaiken, JR Douceur, ...
ACM SIGOPS Operating Systems Review 36 (SI), 1-14, 2002
A comparison of file system workloads
D Roselli, JR Lorch, TE Anderson
2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000
SubVirt: Implementing malware with virtual machines
ST King, PM Chen
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006
Improving dynamic voltage scaling algorithms with PACE
JR Lorch, AJ Smith
ACM SIGMETRICS Performance Evaluation Review 29 (1), 50-61, 2001
A five-year study of file-system metadata
N Agrawal, WJ Bolosky, JR Douceur, JR Lorch
ACM Transactions on Storage (TOS) 3 (3), 9-es, 2007
Securing anti-virus software with virtualization
JH Wang, JR Lorch, BJ Parno
US Patent 8,307,443, 2012
IronFleet: proving practical distributed systems correct
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015
Software strategies for portable computer energy management
JR Lorch, AJ Smith
IEEE Personal Communications 5 (3), 60-73, 1998
Enabling security in cloud storage {SLAs} with {CloudProof}
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011
Ironclad apps:{End-to-End} security via automated {Full-System} verification
C Hawblitzel, J Howell, JR Lorch, A Narayan, B Parno, D Zhang, B Zill
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
TrInc: Small Trusted Hardware for Large Distributed Systems.
D Levin, JR Douceur, JR Lorch, T Moscibroda
NSDI 9, 1-14, 2009
Donnybrook: Enabling large-scale, high-speed, peer-to-peer games
A Bharambe, JR Douceur, JR Lorch, T Moscibroda, J Pang, S Seshan, ...
ACM SIGCOMM Computer Communication Review 38 (4), 389-400, 2008
Making world wide web caching servers cooperate
R Malpani, J Lorch, D Berger
Proceedings of the Fourth International Conference on World Wide Web, 107-117, 1995
Matchmaking for online games and other latency-sensitive P2P systems
S Agarwal, JR Lorch
Proceedings of the ACM SIGCOMM 2009 conference on Data communication, 315-326, 2009
Vale: Verifying {High-Performance} Cryptographic Assembly Code
B Bond, C Hawblitzel, M Kapritsos, KRM Leino, JR Lorch, B Parno, ...
26th USENIX security symposium (USENIX security 17), 917-934, 2017
PACE: A new approach to dynamic voltage scaling
JR Lorch, AJ Smith
IEEE Transactions on Computers 53 (7), 856-869, 2004
Gray failure: The achilles' heel of cloud-scale systems
P Huang, C Guo, L Zhou, JR Lorch, Y Dang, M Chintalapati, R Yao
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 150-155, 2017
Memoir: Practical state continuity for protected modules
B Parno, JR Lorch, JR Douceur, J Mickens, JM McCune
2011 IEEE Symposium on Security and Privacy, 379-394, 2011
Can the fractal dimension of images be measured?
Q Huang, JR Lorch, RC Dubes
Pattern recognition 27 (3), 339-349, 1994
Leveraging legacy code to deploy desktop applications on the web.
JR Douceur, J Elson, J Howell, JR Lorch
OSDI 8, 339-354, 2008
The system can't perform the operation now. Try again later.
Articles 1–20