default search action
Kapil Vaswani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code? Commun. ACM 67(1): 68-76 (2024) - [j11]Jinnan Guo, Peter R. Pietzuch, Andrew Paverd, Kapil Vaswani:
Trustworthy AI Using Confidential Federated Learning. Commun. ACM 67(9): 48-53 (2024) - [j10]Jinnan Guo, Peter R. Pietzuch, Andrew Paverd, Kapil Vaswani:
Trustworthy AI using Confidential Federated Learning: Federated learning and confidential computing are not competing technologies. ACM Queue 22(2) (2024) - 2023
- [j9]Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy. ACM Queue 21(4): 94-122 (2023) - [c30]Kapil Vaswani, Stavros Volos, Cédric Fournet, Antonio Nino Diaz, Ken Gordon, Balaji Vembu, Sam Webster, David Chisnall, Saurabh Kulkarni, Graham Cunningham, Richard Osborne, Dan Wilkinson:
Confidential Computing within an AI Accelerator. USENIX ATC 2023: 501-518 - 2022
- [i3]Kapil Vaswani, Stavros Volos, Cédric Fournet, Antonio Nino Diaz, Ken Gordon, Balaji Vembu, Sam Webster, David Chisnall, Saurabh Kulkarni, Graham Cunningham, Richard Osborne, Dan Wilkinson:
Confidential Machine Learning within Graphcore IPUs. CoRR abs/2205.09005 (2022) - 2021
- [j8]Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia:
Toward confidential cloud computing. Commun. ACM 64(6): 54-61 (2021) - [j7]Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia:
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use. ACM Queue 19(1): 49-76 (2021) - [c29]Zhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur:
DICE*: A Formally Verified Implementation of DICE Measured Boot. USENIX Security Symposium 2021: 1091-1107 - 2020
- [c28]Panagiotis Antonopoulos, Arvind Arasu, Kunal D. Singh, Ken Eguro, Nitish Gupta, Rajat Jain, Raghav Kaushik, Hanuma Kodavalla, Donald Kossmann, Nikolas Ogg, Ravi Ramamurthy, Jakub Szymaszek, Jeffrey Trimmer, Kapil Vaswani, Ramarathnam Venkatesan, Mike Zwilling:
Azure SQL Database Always Encrypted. SIGMOD Conference 2020: 1511-1525
2010 – 2019
- 2019
- [c27]Maurice Bailleu, Jörg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, Kapil Vaswani:
SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution. FAST 2019: 173-190 - 2018
- [c26]Stavros Volos, Kapil Vaswani, Rodrigo Bruno:
Graviton: Trusted Execution Environments on GPUs. OSDI 2018: 681-696 - [c25]Christian Priebe, Kapil Vaswani, Manuel Costa:
EnclaveDB: A Secure Database Using SGX. IEEE Symposium on Security and Privacy 2018: 264-278 - 2017
- [j6]Matthew J. Parkinson, Dimitrios Vytiniotis, Kapil Vaswani, Manuel Costa, Pantazis Deligiannis, Dylan McDermott, Aaron Blankstein, Jonathan Balkind:
Project snowflake: non-blocking safe manual memory management in .NET. Proc. ACM Program. Lang. 1(OOPSLA): 95:1-95:25 (2017) - [c24]Piyus Kedia, Manuel Costa, Matthew J. Parkinson, Kapil Vaswani, Dimitrios Vytiniotis, Aaron Blankstein:
Simple, fast, and safe manual memory management. PLDI 2017: 233-247 - 2016
- [c23]Rohit Sinha, Manuel Costa, Akash Lal, Nuno P. Lopes, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani:
A design and verification methodology for secure isolated regions. PLDI 2016: 665-681 - [c22]Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa:
Oblivious Multi-Party Machine Learning on Trusted Processors. USENIX Security Symposium 2016: 619-636 - [i2]Kapil Vaswani, Ravi Ramamurthy, Ramarathnam Venkatesan:
Information Flows in Encrypted Databases. CoRR abs/1605.01092 (2016) - 2015
- [j5]Ravichandhran Madhavan, G. Ramalingam, Kapil Vaswani:
A Framework For Efficient Modular Heap Analysis. Found. Trends Program. Lang. 1(4): 269-381 (2015) - [c21]Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani:
Moat: Verifying Confidentiality of Enclave Programs. CCS 2015: 1169-1184 - [c20]Ionel Gog, Jana Giceva, Malte Schwarzkopf, Kapil Vaswani, Dimitrios Vytiniotis, Ganesan Ramalingam, Manuel Costa, Derek Gordon Murray, Steven Hand, Michael Isard:
Broom: Sweeping Out Garbage Collection from Big Data Systems. HotOS 2015 - 2013
- [c19]Ganesan Ramalingam, Kapil Vaswani:
Fault tolerance via idempotence. POPL 2013: 249-262 - [c18]Sagar Chordia, Sriram K. Rajamani, Kaushik Rajan, Ganesan Ramalingam, Kapil Vaswani:
Asynchronous Resilient Linearizability. DISC 2013: 164-178 - [i1]Bettina Kemme, Ganesan Ramalingam, André Schiper, Marc Shapiro, Kapil Vaswani:
Consistency in Distributed Systems (Dagstuhl Seminar 13081). Dagstuhl Reports 3(2): 92-126 (2013) - 2012
- [j4]David Lo, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Mining quantified temporal rules: Formalism, algorithms, and evaluation. Sci. Comput. Program. 77(6): 743-759 (2012) - [j3]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani:
DARWIN: An approach to debugging evolving programs. ACM Trans. Softw. Eng. Methodol. 21(3): 19:1-19:29 (2012) - [c17]Jose M. Faleiro, Sriram K. Rajamani, Kaushik Rajan, G. Ramalingam, Kapil Vaswani:
CScale - A Programming Model for Scalable and Reliable Distributed Applications. Monterey Workshop 2012: 148-156 - [c16]Jose M. Faleiro, Sriram K. Rajamani, Kaushik Rajan, G. Ramalingam, Kapil Vaswani:
Generalized lattice agreement. PODC 2012: 125-134 - [c15]Ravichandhran Madhavan, G. Ramalingam, Kapil Vaswani:
Modular Heap Analysis for Higher-Order Programs. SAS 2012: 370-387 - 2011
- [j2]Jyotirmoy V. Deshmukh, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Logical Concurrency Control from Sequential Proofs. Log. Methods Comput. Sci. 7(3) (2011) - [c14]Ravichandhran Madhavan, Ganesan Ramalingam, Kapil Vaswani:
Purity Analysis: An Abstract Interpretation Formulation. SAS 2011: 7-24 - 2010
- [c13]Jyotirmoy V. Deshmukh, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Logical Concurrency Control from Sequential Proofs. ESOP 2010: 226-245 - [c12]Prakash Prabhu, Ganesan Ramalingam, Kapil Vaswani:
Safe programmable speculative parallelism. PLDI 2010: 50-61 - [c11]Shuvendu K. Lahiri, Kapil Vaswani, C. A. R. Hoare:
Differential static analysis: opportunities, applications, and challenges. FoSER 2010: 201-204
2000 – 2009
- 2009
- [c10]Sriram K. Rajamani, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
ISOLATOR: dynamically ensuring isolation in comcurrent programs. ASPLOS 2009: 181-192 - [c9]Trishul M. Chilimbi, Ben Liblit, Krishna K. Mehra, Aditya V. Nori, Kapil Vaswani:
HOLMES: Effective statistical debugging via efficient path profiling. ICSE 2009: 34-44 - [c8]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani:
Darwin: an approach for debugging evolving programs. ESEC/SIGSOFT FSE 2009: 33-42 - [c7]David Lo, Ganesan Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation. WCRE 2009: 62-71 - 2007
- [c6]Kapil Vaswani, Matthew J. Thazhuthaveetil, Y. N. Srikant, P. J. Joseph:
Microarchitecture Sensitive Empirical Models for Compiler Optimizations. CGO 2007: 131-143 - [c5]Kapil Vaswani, Aditya V. Nori, Trishul M. Chilimbi:
Preferential path profiling: compactly numbering interesting paths. POPL 2007: 351-362 - [c4]Trishul M. Chilimbi, Aditya V. Nori, Kapil Vaswani:
Quantifying the effectiveness of testing via efficient residual path profiling. ESEC/SIGSOFT FSE 2007: 545-548 - [p1]Kapil Vaswani:
Statistical and Machine Learning Techniques in Compiler Design. The Compiler Design Handbook, 2nd ed. 2007: 8 - 2006
- [c3]P. J. Joseph, Kapil Vaswani, Matthew J. Thazhuthaveetil:
Construction and use of linear regression models for processor performance analysis. HPCA 2006: 99-108 - [c2]P. J. Joseph, Kapil Vaswani, Matthew J. Thazhuthaveetil:
A Predictive Performance Model for Superscalar Processors. MICRO 2006: 161-170 - 2005
- [c1]Kapil Vaswani, Matthew J. Thazhuthaveetil, Y. N. Srikant:
A Programmable Hardware Path Profiler. CGO 2005: 217-228 - 2003
- [j1]Kapil Vaswani, Y. N. Srikant:
Dynamic recompilation and profile-guided optimisations for a .NET JIT compiler. IEE Proc. Softw. 150(5): 296-302 (2003)
Coauthor Index
aka: Ganesan Ramalingam
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint