Nickolai Zeldovich
Nickolai Zeldovich
Unknown affiliation
Verified email at csail.mit.edu
TitleCited byYear
CryptDB: protecting confidentiality with encrypted query processing
RA Popa, C Redfield, N Zeldovich, H Balakrishnan
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
11282011
Making information flow explicit in HiStar
N Zeldovich, S Boyd-Wickizer, E Kohler, D Mazières
Proceedings of the 7th symposium on Operating systems design and …, 2006
7382006
An Analysis of Linux Scalability to Many Cores.
S Boyd-Wickizer, AT Clements, Y Mao, A Pesterev, MF Kaashoek, ...
OSDI 10 (13), 86-93, 2010
4372010
Relational cloud: A database-as-a-service for the cloud
C Curino, EPC Jones, RA Popa, N Malviya, E Wu, S Madden, ...
4182011
Algorand: Scaling byzantine agreements for cryptocurrencies
Y Gilad, R Hemo, S Micali, G Vlachos, N Zeldovich
Proceedings of the 26th Symposium on Operating Systems Principles, 51-68, 2017
3642017
Reusable garbled circuits and succinct functional encryption
S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
3252013
An ideal-security protocol for order-preserving encoding
RA Popa, FH Li, N Zeldovich
2013 IEEE Symposium on Security and Privacy, 463-477, 2013
3192013
Processing analytical queries over encrypted data
S Tu, MF Kaashoek, S Madden, N Zeldovich
Proceedings of the VLDB Endowment 6 (5), 289-300, 2013
3082013
Proving program termination
B Cook, A Podelski, A Rybalchenko
Communications of the ACM 54 (5), 88-98, 2011
305*2011
Securing Distributed Systems with Information Flow Control.
N Zeldovich, S Boyd-Wickizer, D Mazieres
NSDI 8, 293-308, 2008
2822008
Virtual Appliances for Deploying and Maintaining Software.
CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ...
LISA 3, 181-194, 2003
2482003
Virtual appliance management
MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ...
US Patent 7,890,689, 2011
2472011
Improving application security with data flow assertions
A Yip, X Wang, N Zeldovich, MF Kaashoek
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
2062009
The collective: A cache-based system management architecture
R Chandra, N Zeldovich, C Sapuntzakis, MS Lam
Proceedings of the 2nd conference on Symposium on Networked Systems Design …, 2005
1992005
Energy management in mobile devices with the Cinder operating system
A Roy, SM Rumble, R Stutsman, P Levis, D Mazières, N Zeldovich
Proceedings of the sixth conference on Computer systems, 139-152, 2011
178*2011
Cache-based system management architecture with virtual appliances, network repositories, and virtual appliance transceivers
MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ...
US Patent 7,373,451, 2008
1662008
Event-driven programming for robust software
F Dabek, N Zeldovich, F Kaashoek, D Mazières, R Morris
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 186-189, 2002
1632002
The scalable commutativity rule: Designing scalable software for multicore processors
AT Clements, MF Kaashoek, N Zeldovich, RT Morris, E Kohler
ACM Transactions on Computer Systems (TOCS) 32 (4), 10, 2015
1612015
Using Crash Hoare logic for certifying the FSCQ file system
H Chen, D Ziegler, T Chajed, A Chlipala, MF Kaashoek, N Zeldovich
Proceedings of the 25th Symposium on Operating Systems Principles, 18-37, 2015
1512015
CryptDB: Processing queries on an encrypted database.
RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan
Commun. ACM 55 (9), 103-111, 2012
1512012
The system can't perform the operation now. Try again later.
Articles 1–20