Joshua Fried

Orcid: 0000-0002-5761-3516

According to our database1, Joshua Fried authored at least 16 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Beware, PCIe Switches! CXL Pools Are Out to Get You.
CoRR, March, 2025

My CXL Pool Obviates Your PCIe Switch.
Proceedings of the 2025 Workshop on Hot Topics in Operating Systems, 2025

2024
Junctiond: Extending FaaS Runtimes with Kernel-Bypass.
CoRR, 2024

Making Kernel Bypass Practical for the Cloud with Junction.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

2023
Capybara: μSecond-Scale Live TCP Migration.
Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems, 2023

2022
Efficient Strong Scaling Through Burst Parallel Training.
Proceedings of the Fifth Conference on Machine Learning and Systems, 2022

2021
When Idling is Ideal: Optimizing Tail-Latency for Heavy-Tailed Datacenter Workloads with Perséphone.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

2020
Caladan: Mitigating Interference at Microsecond Timescales.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

Overload Control for µs-scale RPCs with Breakwater.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

2019
Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

2018
Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

2016
Measuring small subgroup attacks against Diffie-Hellman.
IACR Cryptol. ePrint Arch., 2016

A kilobit hidden SNFS discrete logarithm computation.
IACR Cryptol. ePrint Arch., 2016

Weak Keys Remain Widespread in Network Devices.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Factoring as a Service.
IACR Cryptol. ePrint Arch., 2015


  Loading...