default search action
James Bornholt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Samuel Thomas, James Bornholt:
Automatic Generation of Vectorizing Compilers for Customizable Digital Signal Processors. ASPLOS (1) 2024: 19-34 - [c21]Hayley LeBlanc, Nathan Taylor, James Bornholt, Vijay Chidambaram:
SquirrelFS: using the Rust compiler to check file-system crash consistency. OSDI 2024: 387-404 - [i3]Hayley LeBlanc, Nathan Taylor, James Bornholt, Vijay Chidambaram:
SquirrelFS: using the Rust compiler to check file-system crash consistency. CoRR abs/2406.09649 (2024) - 2023
- [c20]Jacob Van Geffen, Xi Wang, Emina Torlak, James Bornholt:
Synthesis-Aided Crash Consistency for Storage Systems. ECOOP 2023: 35:1-35:26 - [c19]Hayley LeBlanc, Shankara Pailoor, Om Saran K. R. E, Isil Dillig, James Bornholt, Vijay Chidambaram:
Chipmunk: Investigating Crash-Consistency in Persistent-Memory File Systems. EuroSys 2023: 718-733 - 2022
- [j6]Kostas Ferles, Benjamin Sepanski, Rahul Krishnan, James Bornholt, Isil Dillig:
Synthesizing fine-grained synchronization protocols for implicit monitors. Proc. ACM Program. Lang. 6(OOPSLA1): 1-26 (2022) - [i2]Kostas Ferles, Benjamin Sepanski, Rahul Krishnan, James Bornholt, Isil Dillig:
Synthesizing Fine-Grained Synchronization Protocols for Implicit Monitors (Extended Version). CoRR abs/2203.00783 (2022) - [i1]Hayley LeBlanc, Shankara Pailoor, Isil Dillig, James Bornholt, Vijay Chidambaram:
Finding and Analyzing Crash-Consistency Bugs in Persistent-Memory File Systems. CoRR abs/2204.06066 (2022) - 2021
- [c18]Alexa VanHattum, Rachit Nigam, Vincent T. Lee, James Bornholt, Adrian Sampson:
Vectorization for digital signal processors via equality saturation. ASPLOS 2021: 874-886 - [c17]James Bornholt, Rajeev Joshi, Vytautas Astrauskas, Brendan Cully, Bernhard Kragl, Seth Markle, Kyle Sauri, Drew Schleit, Grant Slatton, Serdar Tasiran, Jacob Van Geffen, Andrew Warfield:
Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3. SOSP 2021: 836-850 - 2020
- [j5]Luke Nelson, James Bornholt, Arvind Krishnamurthy, Emina Torlak, Xi Wang:
Noninterference specifications for secure systems. ACM SIGOPS Oper. Syst. Rev. 54(1): 31-39 (2020) - [c16]Meghan Cowan, Thierry Moreau, Tianqi Chen, James Bornholt, Luis Ceze:
Automatic generation of high-performance quantized machine learning kernels. CGO 2020: 305-316 - [c15]Alexa VanHattum, Rachit Nigam, Vincent T. Lee, James Bornholt, Adrian Sampson:
A Synthesis-Aided Compiler for DSP Architectures (WiP Paper). LCTES 2020: 131-135 - [c14]Sorawee Porncharoenwase, James Bornholt, Emina Torlak:
Fixing Code that Explodes Under Symbolic Evaluation. VMCAI 2020: 44-67
2010 – 2019
- 2019
- [b1]James Bornholt:
Optimizing the Automated Programming Stack. University of Washington, USA, 2019 - [c13]Luke Nelson, James Bornholt, Ronghui Gu, Andrew Baumann, Emina Torlak, Xi Wang:
Scaling symbolic evaluation for automated verification of systems code with Serval. SOSP 2019: 225-242 - 2018
- [j4]Thierry Moreau, Joshua San Miguel, Mark Wyse, James Bornholt, Armin Alaghi, Luis Ceze, Natalie D. Enright Jerger, Adrian Sampson:
A Taxonomy of General Purpose Approximate Computing Techniques. IEEE Embed. Syst. Lett. 10(1): 2-5 (2018) - [j3]James Bornholt, Emina Torlak:
Finding code that explodes under symbolic evaluation. Proc. ACM Program. Lang. 2(OOPSLA): 149:1-149:26 (2018) - [c12]Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang:
Nickel: A Framework for Design and Verification of Information Flow Control Systems. OSDI 2018: 287-305 - 2017
- [j2]James Bornholt, Randolph Lopez, Douglas M. Carmean, Luis Ceze, Georg Seelig, Karin Strauss:
Toward a DNA-Based Archival Storage System. IEEE Micro 37(3): 98-104 (2017) - [c11]James Bornholt, Emina Torlak:
Synthesizing memory models from framework sketches and Litmus tests. PLDI 2017: 467-481 - [c10]Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, Xi Wang:
Hyperkernel: Push-Button Verification of an OS Kernel. SOSP 2017: 252-269 - [c9]Helgi Sigurbjarnarson, James Bornholt, Nicolas Christin, Lorrie Faith Cranor:
Push-Button Verification of File Systems via Crash Refinement. USENIX ATC 2017 - 2016
- [c8]James Bornholt, Antoine Kaufmann, Jialin Li, Arvind Krishnamurthy, Emina Torlak, Xi Wang:
Specifying and Checking File System Crash-Consistency Models. ASPLOS 2016: 83-98 - [c7]James Bornholt, Randolph Lopez, Douglas M. Carmean, Luis Ceze, Georg Seelig, Karin Strauss:
A DNA-Based Archival Storage System. ASPLOS 2016: 637-649 - [c6]Brandon Holt, James Bornholt, Irene Zhang, Dan R. K. Ports, Mark Oskin, Luis Ceze:
Disciplined Inconsistency with Consistency Types. SoCC 2016: 279-293 - [c5]Helgi Sigurbjarnarson, James Bornholt, Emina Torlak, Xi Wang:
Push-Button Verification of File Systems via Crash Refinement. OSDI 2016: 1-16 - [c4]James Bornholt, Emina Torlak, Dan Grossman, Luis Ceze:
Optimizing synthesis with metasketches. POPL 2016: 775-788 - 2015
- [j1]James Bornholt, Todd Mytkowicz, Kathryn S. McKinley:
Uncertain<T>: Abstractions for Uncertain Hardware and Software. IEEE Micro 35(3): 132-143 (2015) - [c3]Adrian Sampson, James Bornholt, Luis Ceze:
Hardware-Software Co-Design: Not Just a Cliché. SNAPL 2015: 262-273 - 2014
- [c2]James Bornholt, Todd Mytkowicz, Kathryn S. McKinley:
Uncertain: a first-order type for uncertain data. ASPLOS 2014: 51-66 - 2012
- [c1]James Bornholt, Todd Mytkowicz, Kathryn S. McKinley:
The model is not enough: Understanding energy consumption in mobile devices. Hot Chips Symposium 2012: 1-3
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint