default search action
Eric Eide
Person information
- affiliation: University of Utah, Salt Lake City, Utah, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c41]William Gallard Hatch, Pierce Darragh, Sorawee Porncharoenwase, Guy Watson, Eric Eide:
Generating Conforming Programs with Xsmith. GPCE 2023: 86-99 - [c40]Mary W. Hall, Ganesh Gopalakrishnan, Eric Eide, Johanna Cohoon, Jeff M. Phillips, Mu Zhang, Shireen Y. Elhabian, Aditya Bhaskara, Harvey Dam, Artem Yadrov, Tushar Kataria, Amir Mohammad Tavakkoli, Sameeran Joshi, Mokshagna Sai Teja Karanam:
An NSF REU Site Based on Trust and Reproducibility of Intelligent Computation: Experience Report. SC Workshops 2023: 343-349 - 2022
- [c39]David M. Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic, Laura Tinnel:
Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts. CSET @ USENIX Security Symposium 2022: 65-70 - [c38]Richard Li, Min Du, Zheng Wang, Hyunseok Chang, Sarit Mukherjee, Eric Eide:
LongTale: Toward Automatic Performance Anomaly Explanation in Microservices. ICPE 2022: 5-16 - 2021
- [j10]Joe Breen, Andrew Buffmire, Jonathon Duerig, Kevin Dutt, Eric Eide, Anneswa Ghosh, Mike Hibler, David Johnson, Sneha Kumar Kasera, Earl Lewis, Dustin Maas, Caleb Martin, Alex Orange, Neal Patwari, Daniel Reading, Robert Ricci, David Schurig, Leigh B. Stoller, Allison Todd, Jacobus E. van der Merwe, Naren Viswanathan, Kirk Webb, Gary Wong:
Powder: Platform for Open Wireless Data-driven Experimental Research. Comput. Networks 197: 108281 (2021) - [c37]Joe Breen, Jonathon Duerig, Eric Eide, Mike Hibler, David Johnson, Sneha Kumar Kasera, Dustin Maas, Alex Orange, Neal Patwari, Robert Ricci, David Schurig, Leigh Stoller, Jacobus E. van der Merwe, Kirk Webb, Gary Wong:
Mobile and wireless research on the POWDER platform. MobiSys 2021: 509-510 - 2020
- [c36]Pierce Darragh, William Gallard Hatch, Eric Eide:
Clotho: A Racket Library for Parametric Randomness. Scheme@ICFP 2020: 3-13 - [c35]Richard Li, Min Du, Hyunseok Chang, Sarit Mukherjee, Eric Eide:
Deepstitch: Deep Learning for Cross-Layer Stitching in Microservices. WOC@Middleware 2020: 25-30 - [c34]Joe Breen, Andrew Buffmire, Jonathon Duerig, Kevin Dutt, Eric Eide, Mike Hibler, David Johnson, Sneha Kumar Kasera, Earl Lewis, Dustin Maas, Alex Orange, Neal Patwari, Daniel Reading, Robert Ricci, David Schurig, Leigh B. Stoller, Jacobus E. van der Merwe, Kirk Webb, Gary Wong:
POWDER: Platform for Open Wireless Data-driven Experimental Research. WiNTECH 2020: 17-24
2010 – 2019
- 2019
- [c33]Richard Li, Min Du, David Johnson, Robert Ricci, Jacobus E. van der Merwe, Eric Eide:
Fluorescence: Detecting Kernel-Resident Malware in Clouds. RAID 2019: 367-382 - [c32]Dmitry Duplyakin, Robert Ricci, Aleksander Maricq, Gary Wong, Jonathon Duerig, Eric Eide, Leigh Stoller, Mike Hibler, David Johnson, Kirk Webb, Aditya Akella, Kuang-Ching Wang, Glenn Ricart, Larry Landweber, Chip Elliott, Michael Zink, Emmanuel Cecchet, Snigdhaswin Kar, Prabodh Mishra:
The Design and Operation of CloudLab. USENIX ATC 2019: 1-14 - 2018
- [c31]Hyun Wook Baek, Eric Eide, Robert Ricci, Jacobus E. van der Merwe:
I Heard It through the Firewall: Exploiting Cloud Management Services as an Information Leakage Channel. SoCC 2018: 361-373 - [c30]David Johnson, Elijah Grubb, Eric Eide:
Supporting Docker in Emulab-Based Network Testbeds. CSET @ USENIX Security Symposium 2018 - 2017
- [c29]Anton Burtsev, David Johnson, Josh Kunz, Eric Eide, Jacobus E. van der Merwe:
CapNet: security and least authority in a capability-enabled cloud. SoCC 2017: 128-141 - [c28]Prashanth Nayak, Mike Hibler, David Johnson, Eric Eide:
A Wingman for Virtual Appliances. RV 2017: 390-399 - 2016
- [c27]Junguk Cho, Jonathon Duerig, Eric Eide, Binh Nguyen, Robert Ricci, Aisha Syed, Jacobus E. van der Merwe, Kirk Webb, Gary Wong:
Repeatable mobile networking research with phantomNet: demo. MobiCom 2016: 489-490 - [c26]Anton Burtsev, David Johnson, Mike Hibler, Eric Eide, John Regehr:
Abstractions for Practical Virtual Machine Replay. VEE 2016: 93-106 - [e2]Eric Eide, Mathias Payer:
9th Workshop on Cyber Security Experimentation and Test, CSET '16, Austin, TX, USA, August 8, 2016. USENIX Association 2016 [contents] - 2015
- [j9]Arijit Banerjee, Junguk Cho, Eric Eide, Jonathon Duerig, Binh Nguyen, Robert Ricci, Jacobus E. van der Merwe, Kirk Webb, Gary Wong:
PhantomNet: Research Infrastructure for Mobile Networking, Cloud Computing and Software-Defined Networking. GetMobile Mob. Comput. Commun. 19(2): 28-33 (2015) - [j8]Eric Eide:
Foreword: Special Issue on Repeatability and Sharing of Experimental Artifacts. ACM SIGOPS Oper. Syst. Rev. 49(1): 1-2 (2015) - [j7]Xing Lin, Mike Hibler, Eric Eide, Robert Ricci:
Using Deduplicating Storage for Efficient Disk Image Deployment. EAI Endorsed Trans. Scalable Inf. Syst. 2(6): e1 (2015) - [c25]Richard Li, Dallin Abendroth, Xing Lin, Yuankai Guo, Hyun Wook Baek, Eric Eide, Robert Ricci, Jacobus E. van der Merwe:
Potassium: penetration testing as a service. SoCC 2015: 30-42 - [c24]Daniel M. Lofaro, Martyna Bula, Patrick Early, Eric Eide, Mannan Javid:
ARCHR - Apparatus for Remote Control of Humanoid Robots. Humanoids 2015: 229-236 - 2014
- [j6]Anton Burtsev, Nikhil Mishrikoti, Eric Eide, Robert Ricci:
Weir: a streaming language for performance analysis. ACM SIGOPS Oper. Syst. Rev. 48(1): 65-70 (2014) - [j5]Robert Ricci, Eric Eide, CloudLab Team:
Introducing CloudLab: Scientific Infrastructure for Advancing Cloud Architectures and Applications. login Usenix Mag. 39(6) (2014) - [c23]David Johnson, Mike Hibler, Eric Eide:
Composable multi-level debugging with Stackdb. VEE 2014: 213-226 - 2013
- [c22]Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson, Mike Hibler, Eric Eide:
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. ARES 2013: 82-91 - [c21]Alex Groce, Chaoqiang Zhang, Mohammad Amin Alipour, Eric Eide, Yang Chen, John Regehr:
Help, help, i'm being suppressed! The significance of suppressors in software testing. ISSRE 2013: 390-399 - [c20]Yang Chen, Alex Groce, Chaoqiang Zhang, Weng-Keen Wong, Xiaoli Z. Fern, Eric Eide, John Regehr:
Taming compiler fuzzers. PLDI 2013: 197-208 - [c19]Anton Burtsev, Nikhil Mishrikoti, Eric Eide, Robert Ricci:
Weir: a streaming language for performance analysis. PLOS@SOSP 2013: 6:1-6:6 - 2012
- [b1]Eric Eide:
Software Variability Mechanisms for Improving Run-Time Performance. University of Utah, USA, 2012 - [c18]Alex Groce, Chaoqiang Zhang, Eric Eide, Yang Chen, John Regehr:
Swarm testing. ISSTA 2012: 78-88 - [c17]John Regehr, Yang Chen, Pascal Cuoq, Eric Eide, Chucky Ellison, Xuejun Yang:
Test-case reduction for C compiler bugs. PLDI 2012: 335-346 - [c16]Partha P. Pal, Richard E. Schantz, Aaron Paulos, Brett Benyo, David Johnson, Mike Hibler, Eric Eide:
A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks. SASO Workshops 2012: 15-22 - 2011
- [j4]Eric Eide, Gilles Muller, Wolfgang Schröder-Preikschat, Olaf Spinczyk:
Summary of PLOS 2011: the sixth workshop on programming languages and operating systems. ACM SIGOPS Oper. Syst. Rev. 45(3): 1-4 (2011) - [c15]Xuejun Yang, Yang Chen, Eric Eide, John Regehr:
Finding and understanding bugs in C compilers. PLDI 2011: 283-294 - 2010
- [c14]Cody Cutler, Mike Hibler, Eric Eide, Robert Ricci:
Trusted Disk Loading in the Emulab Network Testbed. CSET 2010
2000 – 2009
- 2009
- [j3]Eric Eide, Gilles Muller, Olaf Spinczyk:
PLOS 2009: fifth workshop on programming languages and operating systems. ACM SIGOPS Oper. Syst. Rev. 43(4): 31-34 (2009) - 2008
- [c13]Venkat Chakravarthy, John Regehr, Eric Eide:
Edicts: implementing features with flexible binding times. AOSD 2008: 108-119 - [c12]Eric Eide, John Regehr:
Volatiles are miscompiled, and what to do about it. EMSOFT 2008: 255-264 - 2007
- [c11]Eric Eide, Leigh Stoller, Jay Lepreau:
An Experimentation Workbench for Replayable Networking Research. NSDI 2007 - [c10]Nathan Cooprider, Will Archer, Eric Eide, David Gay, John Regehr:
Efficient memory safety for TinyOS. SenSys 2007: 205-218 - [c9]Sean Walton, Eric Eide:
Resource management aspects for sensor network software. PLOS@SOSP 2007: 5:1-5:5 - [e1]Eric Eide, Marc E. Fiuczynski:
Proceedings of the 4th workshop on Programming languages and operating systems, PLOS@SOSP 2007, Stevenson, Washington, USA, October 18, 2007. ACM 2007, ISBN 978-1-59593-922-7 [contents] - 2006
- [c8]John Regehr, Nathan Cooprider, Will Archer, Eric Eide:
Efficient type and memory safety for tiny embedded systems. PLOS 2006: 6 - [c7]Eric Eide, Leigh Stoller, Tim Stack, Juliana Freire, Jay Lepreau:
Integrated Scientific Workflow Management for the Emulab Network Testbed. USENIX ATC, General Track 2006: 363-368 - 2004
- [c6]Eric Eide, Tim Stack, John Regehr, Jay Lepreau:
Dynamic CPU Management for Real-Time, Middleware-Based Systems. IEEE Real-Time and Embedded Technology and Applications Symposium 2004: 286-295 - 2002
- [c5]Eric Eide, Alastair Reid, John Regehr, Jay Lepreau:
Static and dynamic structure in design patterns. ICSE 2002: 208-218 - 2000
- [j2]Jay Lepreau, Eric Eide:
Session Summaries from the 17th Symposium on Operating Systems Principles (SOSP'99). ACM SIGOPS Oper. Syst. Rev. 34(2): 4-41 (2000) - [c4]Alastair Reid, Matthew Flatt, Leigh Stoller, Jay Lepreau, Eric Eide:
Knit: Component Composition for Systems Software. OSDI 2000: 347-360
1990 – 1999
- 1999
- [j1]Eric Eide, James L. Simister, Tim Stack, Jay Lepreau:
Flexible IDL compilation for complex communication patterns. Sci. Program. 7(3-4): 275-287 (1999) - 1998
- [c3]Eric Eide, Jay Lepreau, James L. Simister:
Flexible and Optimized IDL Compilation for Distributed Applications. LCR 1998: 288-302 - 1997
- [c2]Eric Eide, Kevin Frei, Bryan Ford, Jay Lepreau, Gary Lindstrom:
Flick: A Flexible, Optimizing IDL Compiler. PLDI 1997: 44-56 - 1995
- [c1]Joseph L. Zachary, Christopher R. Johnson, Eric Eide, Kenneth W. Parker:
An entry-level course in computational engineering and science. SIGCSE 1995: 209-213
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint