Lidong Zhou
Lidong Zhou
Microsoft Research
Verified email at - Homepage
Cited by
Cited by
Securing ad hoc networks
L Zhou, ZJ Haas
IEEE network 13 (6), 24-30, 1999
Vigilante: End-to-end containment of internet worms
M Costa, J Crowcroft, M Castro, A Rowstron, L Zhou, L Zhang, P Barham
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
A multi-radio unification protocol for IEEE 802.11 wireless networks
A Adya, P Bahl, J Padhye, A Wolman, L Zhou
First international conference on broadband networks, 344-354, 2004
COCA: A secure distributed online certification authority
L Zhou, FB Schneider, R Van Renesse
ACM Transactions on Computer Systems (TOCS) 20 (4), 329-368, 2002
Apollo: Scalable and Coordinated Scheduling for {Cloud-Scale} Computing
E Boutin, J Ekanayake, W Lin, B Shi, J Zhou, Z Qian, M Wu, L Zhou
11th USENIX symposium on operating systems design and implementation (OSDI …, 2014
Kineograph: taking the pulse of a fast-changing and connected world
R Cheng, J Hong, A Kyrola, Y Miao, X Weng, M Wu, F Yang, L Zhou, ...
Proceedings of the 7th ACM european conference on Computer Systems, 85-98, 2012
Gandiva: Introspective cluster scheduling for deep learning
W Xiao, R Bhardwaj, R Ramjee, M Sivathanu, N Kwatra, Z Han, P Patel, ...
13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018
MODIST: Transparent model checking of unmodified distributed systems
J Yang, T Chen, M Wu, Z Xu, X Liu, H Lin, M Yang, F Long, L Zhang, ...
NSDI'09, 213-228, 2009
Boxwood: Abstractions as the Foundation for Storage Infrastructure.
J MacCormick, N Murphy, M Najork, CA Thekkath, L Zhou
OSDI 4, 8-8, 2004
Timestream: Reliable stream computation in the cloud
Z Qian, Y He, C Su, Z Wu, H Zhu, T Zhang, L Zhou, Y Yu, Z Zhang
Proceedings of the 8th ACM European Conference on Computer Systems, 1-14, 2013
Distributed systems meet economics: pricing in the cloud
H Wang, Q Jing, R Chen, B He, Z Qian, L Zhou
2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10), 2010
Performing a deletion of a node in a tree data storage structure
L Zhou, CA Thekkath
US Patent 7,630,998, 2009
A first look at peer-to-peer worms: Threats and defenses
L Zhou, L Zhang, F McSherry, N Immorlica, M Costa, S Chien
International Workshop on Peer-to-Peer Systems, 24-35, 2005
Bouncer: Securing software by blocking bad input
M Costa, M Castro, L Zhou, L Zhang, M Peinado
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
Chronos: a graph engine for temporal graph analysis
W Han, Y Miao, K Li, M Wu, F Yang, L Zhou, V Prabhakaran, W Chen, ...
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
Vertical paxos and primary-backup replication
L Lamport, D Malkhi, L Zhou
Proceedings of the 28th ACM symposium on Principles of distributed computing …, 2009
Transactional Flash.
V Prabhakaran, TL Rodeheffer, L Zhou
OSDI 8, 2008
Comet: batched stream processing for data intensive distributed computing
B He, M Yang, Z Guo, R Chen, B Su, W Lin, L Zhou
Proceedings of the 1st ACM symposium on Cloud computing, 63-74, 2010
APSS: Proactive secret sharing in asynchronous systems
L Zhou, FB Schneider, R Van Renesse
ACM transactions on information and system security (TISSEC) 8 (3), 259-286, 2005
Fault detection, isolation, and diagnosis in multihop wireless networks
L Qiu, P Bahl, A Rao, L Zhou
Dec, 2003
The system can't perform the operation now. Try again later.
Articles 1–20