Emin Gün Sirer

Affiliations:
  • Cornell University, Ithaca, USA


According to our database1, Emin Gün Sirer authored at least 89 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
StableFees: A Predictable Fee Market for Cryptocurrencies.
Manag. Sci., November, 2023

2022
Measuring Miner Decentralization in Proof-of-Work Blockchains.
CoRR, 2022

2020
CedrusDB: Persistent Key-Value Store with Memory-Mapped Lazy-Trie.
CoRR, 2020

Trustless IoT: A Logic-Driven Architecture for IoT Hubs.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Edge Computing, 2020

Selfish Mining Re-Examined.
Proceedings of the Financial Cryptography and Data Security, 2020

SoK: A Classification Framework for Stablecoin Designs.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
A Classification Framework for Stablecoin Designs.
CoRR, 2019

Scalable and Probabilistic Leaderless BFT Consensus through Metastability.
CoRR, 2019

Towards a Functional Fee Market for Cryptocurrencies.
CoRR, 2019

A vision for autonomous blockchains backed by secure hardware.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

Teechain: a secure payment network with asynchronous blockchain access.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Merlin: A Language for Managing Network Resources.
IEEE/ACM Trans. Netw., 2018

Enabling Strong Database Integrity using Trusted Execution Environments.
CoRR, 2018

Majority is not enough: bitcoin mining is vulnerable.
Commun. ACM, 2018

Teechain: Reducing Storage Costs on the Blockchain With Offline Payment Channels.
Proceedings of the 11th ACM International Systems and Storage Conference, 2018

Decentralization in Bitcoin and Ethereum Networks.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Teechain: Scalable Blockchain Payments using Trusted Execution Environments.
CoRR, 2017

Scaling Databases through Trusted Hardware Proxies.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

Short Paper: Service-Oriented Sharding for Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2017

(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Weaver: A High-Performance, Transactional Graph Database Based on Refinable Timestamps.
Proc. VLDB Endow., 2016

Teechan: Payment Channels Using Trusted Execution Environments.
CoRR, 2016

Service-Oriented Sharding with Aspen.
CoRR, 2016

The state (and security) of the Bitcoin economy: technical perspective.
Commun. ACM, 2016

Bitcoin-NG: A Scalable Blockchain Protocol.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Bitcoin Covenants.
Proceedings of the Financial Cryptography and Data Security, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Warp: Lightweight Multi-Key Transactions for Key-Value Stores.
CoRR, 2015

The Design and Implementation of the Wave Transactional Filesystem.
CoRR, 2015

Weaver: A High-Performance, Transactional Graph Store Based on Refinable Timestamps.
CoRR, 2015

Tiered Replication: A Cost-effective Alternative to Full Cluster Geo-replication.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Configuring Distributed Computations Using Response Surfaces.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

2014
Kronos: the design and implementation of an event ordering service.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Merlin: A Language for Provisioning Network Resources.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
On the Feasibility of Completely Wirelesss Datacenters.
IEEE/ACM Trans. Netw., 2013

Managing the network with Merlin.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

2012
An Introduction to HyperDex and the Brave New World of High Performance, Scalable, Consistent, Fault-tolerant Data Stores.
login Usenix Mag., 2012

HyperDex: a distributed, searchable key-value store.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

On the feasibility of completely wireless datacenters.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
Nexus authorization logic (NAL): Design rationale and applications.
ACM Trans. Inf. Syst. Secur., 2011

Logical attestation: an authorization architecture for trustworthy computing.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

A content propagation metric for efficient content distribution.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Small-world datacenters.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

2010
Blindfold: a system to "See no evil" in content discovery.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

SideCar: building programmable datacenter networks without programmable switches.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

NetQuery: a knowledge plane for reasoning about network properties.
Proceedings of the ACM CoNEXT Student Workshop, 2010

2009
AntFarm: Efficient Content Distribution with Managed Swarms.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

2008
A stateless approach to connection-oriented protocols.
ACM Trans. Comput. Syst., 2008

Device Driver Safety Through a Reference Validation Mechanism.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

2007
Some Lesser-Known Laws of Computer Science.
login Usenix Mag., 2007

Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Hyperspaces for Object Clustering and Approximate Matching in Peer-to-Peer Overlays.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

Latency and bandwidth-minimizing failure detectors.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

2006
A Practical Approach to Peer-to-Peer Publish-Subscribe.
login Usenix Mag., 2006

ClosestNode.com: an open access, scalable, shared geocast service for distributed systems.
ACM SIGOPS Oper. Syst. Rev., 2006

Introduction.
ACM SIGOPS Oper. Syst. Rev., 2006

Interdisciplinary Research: Roles for Self-Organization.
IEEE Intell. Syst., 2006

Geolocalization on the Internet through Constraint Satisfaction.
Proceedings of the 3rd USENIX Workshop on Real, Large Distributed Systems, 2006

Experience with an Object Reputation System for Peer-to-Peer Filesharing.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

Corona: A High Performance Publish-Subscribe System for the World Wide Web.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

2005
Meridian: a lightweight network location service without virtual coordinates.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Fighting peer-to-peer SPAM and decoys with object reputation.
Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 2005

Trickles: A Stateless Network Stack for Improved Scalability, Resilience, and Flexibility.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Design and implementation of a single system image operating system for ad hoc networks.
Proceedings of the 3rd International Conference on Mobile Systems, 2005

Sextant: a unified node and event localization framework using non-convex constraints.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Perils of Transitive Trust in the Domain Name System.
Proceedings of the 5th Internet Measurement Conference, 2005

Client Behavior and Feed Characteristics of RSS, a Publish-Subscribe System for Web Micronews.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Staged simulation: A general technique for improving simulation scale and performance.
ACM Trans. Model. Comput. Simul., 2004

Eluding carnivores: file sharing with strong anonymity.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

The design and implementation of a next generation name service for the internet.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays.
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), 2004

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Peer-to-Peer Authentication with a Distributed Single Sign-On Service.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Comprehensive synchronization elimination for Java.
Sci. Comput. Program., 2003

Simulation of large scale networks I: staged simulation for improving scale and performance of wireless network simulations.
Proceedings of the 35th Winter Simulation Conference: Driving Innovation, 2003

SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

On Selection of Optimal Transmission Power for Ad hoc Networks.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
On the need for system-level support for ad hoc and sensor networks.
ACM SIGOPS Oper. Syst. Rev., 2002

PortOS: an educational operating system for the Post-PC environment.
Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education, 2002

An access control language for web services.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Path set selection in mobile ad hoc networks.
Proceedings of the 3rd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2002

1999
Design and implementation of a distributed virtual machine for networked computers.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

Static Analyses for Eliminating Unnecessary Synchronization from Java Programs.
Proceedings of the Static Analysis, 6th International Symposium, 1999

Using production grammars in software testing.
Proceedings of the Second Conference on Domain-Specific Languages (DSL '99), 1999

1998
Distributed virtual machines: a system architecture for network computing.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

1995
SPIN - An Extensible Microkernel for Application-specific Operating System Services.
ACM SIGOPS Oper. Syst. Rev., 1995

Extensibility, Safety and Performance in the SPIN Operating System.
Proceedings of the Fifteenth ACM Symposium on Operating System Principles, 1995

Protection is a software issue.
Proceedings of the Fifth Workshop on Hot Topics in Operating Systems, 1995


  Loading...