default search action
Terence Kelly
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Terence Kelly:
Programmer Job Interviews: The Hidden Agenda. ACM Queue 21(6): 16-26 (2024) - [j24]Terence Kelly:
Zero Tolerance for Bias. ACM Queue 22(2) (2024) - 2023
- [j23]Terence Kelly, Yekai Pan:
Catch-23: The New C Standard Sets the World on Fire. ACM Queue 21(1): 12-30 (2023) - [j22]Terence Kelly:
Protecting Secrets from Computers. ACM Queue 21(4): 23-43 (2023) - [c32]Suyash Mahar, Mingyao Shen, Terence Kelly, Steven Swanson:
Snapshot: Fast, Userspace Crash Consistency for CXL and PM Using msync. ICCD 2023: 495-498 - [i1]Suyash Mahar, Mingyao Shen, Terence Kelly, Steven Swanson:
Snapshot: Fast, Userspace Crash Consistency for CXL and PM Using msync. CoRR abs/2310.16300 (2023) - 2022
- [j21]Terence Kelly:
Persistent Memory Allocation: Leverage to move a world of software. ACM Queue 20(2): 16-30 (2022) - [j20]Terence Kelly:
Literate Executables. ACM Queue 20(5): 20-32 (2022) - 2021
- [j19]Terence Kelly:
Letters. Computer 54(8): 4 (2021) - [j18]Terence Kelly, Weiwei Gu, Vladimir Maksimovski:
Schrödinger's Code: Undefined behavior in theory and practice. ACM Queue 19(2): 28-44 (2021) - [j17]Terence Kelly:
Crashproofing the Original NoSQL Key-Value Store: An upgrade for the gdbm database. ACM Queue 19(4): 5-18 (2021) - [j16]Terence Kelly:
Steampunk Machine Learning: Victorian contrivances for modern data science. ACM Queue 19(6): 5-17 (2021) - 2020
- [j15]Terence Kelly:
Is persistent memory persistent? Commun. ACM 63(9): 48-54 (2020) - [j14]Terence Kelly:
A penny in every fuse box. Inroads 11(4): 52-53 (2020) - [j13]Terence Kelly:
Is Persistent Memory Persistent? ACM Queue 18(2): 25-46 (2020) - [j12]Terence Kelly:
Efficient Graph Search. ACM Queue 18(4): 25-36 (2020) - [j11]Terence Kelly:
Decentralized Computing. ACM Queue 18(5): 41-53 (2020) - [j10]Terence Kelly:
Offline Algorithms in Low-Frequency Trading: Clearing Combinatorial Auctions. ACM Queue 18(6): 37-51 (2020) - [j9]Terence Kelly:
Programming Workbench: Hand-Over-Hand Locking for Highly Concurrent Collections. login Usenix Mag. 45(3) (2020) - [j8]Terence Kelly:
Programming Workbench: Compressed Sparse Row Format for Representing Graphs. login Usenix Mag. 45(4) (2020)
2010 – 2019
- 2019
- [j7]Terence Kelly:
Persistent Memory Programming on Conventional Hardware. ACM Queue 17(4): 10 (2019) - [j6]Terence Kelly:
Good Old-Fashioned Persistent Memory. login Usenix Mag. 44(4) (2019) - 2017
- [c31]Faisal Nawab, Joseph Izraelevitz, Terence Kelly, Charles B. Morrey III, Dhruva R. Chakrabarti, Michael L. Scott:
Dalí: A Periodically Persistent Hash Map. DISC 2017: 37:1-37:16 - 2016
- [c30]Joseph Izraelevitz, Terence Kelly, Aasheesh Kolli:
Failure-Atomic Persistent Memory Updates via JUSTDO Logging. ASPLOS 2016: 427-442 - 2015
- [c29]Faisal Nawab, Dhruva R. Chakrabarti, Terence Kelly, Charles B. Morrey III:
Procrastination Beats Prevention: Timely Sufficient Persistence for Efficient Crash Resilience. EDBT 2015: 689-694 - [c28]Rajat Verma, Anton Ajay Mendez, Stan Park, Sandya S. Mannarswamy, Terence Kelly, Charles B. Morrey III:
Failure-Atomic Updates of Application Data in a Linux File System. FAST 2015: 203-211 - 2013
- [j5]Hongwei Liao, Yin Wang, Hyoun Kyu Cho, Jason Stanley, Terence Kelly, Stéphane Lafortune, Scott A. Mahlke, Spyros A. Reveliotis:
Concurrency bugs in multithreaded software: modeling and analysis using Petri nets. Discret. Event Dyn. Syst. 23(2): 157-195 (2013) - [j4]Hongwei Liao, Yin Wang, Jason Stanley, Stéphane Lafortune, Spyros A. Reveliotis, Terence Kelly, Scott A. Mahlke:
Eliminating Concurrency Bugs in Multithreaded Software: A New Approach Based on Discrete-Event Control. IEEE Trans. Control. Syst. Technol. 21(6): 2067-2082 (2013) - [c27]Hyoun Kyu Cho, Terence Kelly, Yin Wang, Stéphane Lafortune, Hongwei Liao, Scott A. Mahlke:
Practical lock/unlock pairing for concurrent programs. CGO 2013: 6:1-6:12 - [c26]Stan Park, Terence Kelly, Kai Shen:
Failure-atomic msync(): a simple and efficient mechanism for preserving the integrity of durable data. EuroSys 2013: 225-238 - 2012
- [c25]Yin Wang, Peng Liu, Terence Kelly, Stéphane Lafortune, Spyros A. Reveliotis, Charles Zhang:
On atomicity enforcement in concurrent software via Discrete Event Systems theory. CDC 2012: 7230-7237 - [c24]Sunghwan Yoo, Charles Edwin Killian, Terence Kelly, Hyoun Kyu Cho, Steven Plite:
Composable Reliability for Asynchronous Systems. USENIX ATC 2012: 27-40 - 2010
- [c23]Yin Wang, Hyoun Kyu Cho, Hongwei Liao, Ahmed Nazeem, Terence Kelly, Stéphane Lafortune, Scott A. Mahlke, Spyros A. Reveliotis:
Supervisory control of software execution for failure avoidance: Experience from the Gadara project. WODES 2010: 259-266
2000 – 2009
- 2009
- [j3]Terence Kelly, Yin Wang, Stéphane Lafortune, Scott A. Mahlke:
Eliminating Concurrency Bugs with Control Engineering. Computer 42(11): 52-60 (2009) - [c22]Andrew Byde, Terence Kelly, Yunhong Zhou, Robert Endre Tarjan:
Efficiently Generating k-Best Solutions to Procurement Auctions. AAIM 2009: 68-84 - [c21]Yin Wang, Hongwei Liao, Ahmed Nazeem, Spyros A. Reveliotis, Terence Kelly, Scott A. Mahlke, Stéphane Lafortune:
Maximally permissive deadlock avoidance for multithreaded computer programs (Extended abstract). CASE 2009: 37-41 - [c20]Yin Wang, Hongwei Liao, Spyros A. Reveliotis, Terence Kelly, Scott A. Mahlke, Stéphane Lafortune:
Gadara nets: Modeling and analyzing lock allocation for deadlock avoidance in multithreaded software. CDC 2009: 4971-4976 - [c19]Yin Wang, Stéphane Lafortune, Terence Kelly, Manjunath Kudlur, Scott A. Mahlke:
The theory of deadlock avoidance via discrete control. POPL 2009: 252-263 - 2008
- [c18]Terence Kelly, Kai Shen, Alex Zhang, Christopher Stewart:
Operational Analysis of Parallel Servers. MASCOTS 2008: 227-236 - [c17]Yin Wang, Terence Kelly, Manjunath Kudlur, Stéphane Lafortune, Scott A. Mahlke:
Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. OSDI 2008: 281-294 - [c16]Kai Shen, Alex Zhang, Terence Kelly, Christopher Stewart:
Operational analysis of processor speed scaling. SPAA 2008: 179-181 - [c15]Christopher Stewart, Terence Kelly, Alex Zhang, Kai Shen:
A Dollar from 15 Cents: Cross-Platform Management for Internet Services. USENIX ATC 2008: 199-212 - 2007
- [c14]Christopher Stewart, Terence Kelly, Alex Zhang:
Exploiting nonstationarity for performance prediction. EuroSys 2007: 31-44 - [c13]Yin Wang, Terence Kelly, Stéphane Lafortune:
Discrete control for safe execution of IT automation workflows. EuroSys 2007: 305-314 - [c12]Kimberly Keeton, Terence Kelly, Arif Merchant, Cipriano A. Santos, Janet L. Wiener, Xiaoyun Zhu, Dirk Beyer:
Don't Settle for Less Than the Best: Use Optimization to Make Decisions. HotOS 2007 - 2006
- [j2]Terence Kelly, Andrew Byde:
Generating k-best solutions to auction winner determination problems. SIGecom Exch. 6(1): 23-34 (2006) - [c11]Yin Wang, Terence Kelly, Stéphane Lafortune:
Discrete Control for Dependable IT Automation. HotDep 2006 - 2005
- [c10]Terence Kelly:
Detecting Performance Anomalies in Global Applications. WORLDS 2005 - [c9]Yunhong Zhou, Terence Kelly, Janet L. Wiener, Eric Anderson:
An Extended Evaluation of Two-Phase Scheduling Methods for Animation Rendering. JSSPP 2005: 123-145 - [c8]Eric Anderson, Dirk Beyer, Kamalika Chaudhuri, Terence Kelly, Norman Salazar, Cipriano A. Santos, Ram Swaminathan, Robert Endre Tarjan, Janet L. Wiener, Yunhong Zhou:
Deadline scheduling for animation rendering. SIGMETRICS 2005: 384-385 - [c7]Ira Cohen, Steve Zhang, Moisés Goldszmidt, Julie Symons, Terence Kelly, Armando Fox:
Capturing, indexing, clustering, and retrieving system history. SOSP 2005: 105-118 - [c6]Eric Anderson, Dirk Beyer, Kamalika Chaudhuri, Terence Kelly, Norman Salazar, Cipriano A. Santos, Ram Swaminathan, Robert Endre Tarjan, Janet L. Wiener, Yunhong Zhou:
Value-maximizing deadline scheduling and its application to animation rendering. SPAA 2005: 299-308 - 2004
- [c5]Terence Kelly:
Generalized Knapsack Solvers for Multi-unit Combinatorial Auctions: Analysis and Application to Computational Resource Allocation. AMEC 2004: 73-86 - [c4]Terence Kelly:
Combinatorial Auctions and Knapsack Problems. AAMAS 2004: 1280-1281 - [c3]Jeffrey C. Mogul, Yee-Man Chan, Terence Kelly:
Design, Implementation, and Evaluation of Duplicate Transfer Detection in HTTP. NSDI 2004: 43-56 - [c2]Ira Cohen, Jeffrey S. Chase, Moisés Goldszmidt, Terence Kelly, Julie Symons:
Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. OSDI 2004: 231-244 - 2002
- [b1]Terence Kelly:
Optimization inWeb Caching: Cache Management, Capacity Planning, and Content Naming. University of Michigan, USA, 2002 - [j1]Terence Kelly:
Thin-client Web access patterns: Measurements from a cache-busting proxy. Comput. Commun. 25(4): 357-366 (2002) - [c1]Terence Kelly, Jeffrey C. Mogul:
Aliasing on the world wide web: prevalence and performance implications. WWW 2002: 281-292
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint