Jun Yuan

Affiliations:
  • Stony Brook University, New York, NY, USA


According to our database1, Jun Yuan authored at least 17 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
File System Aging.
CoRR, 2024

2022
BetrFS: a compleat file system for commodity SSDs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

2021
Copy-on-Abundant-Write for Nimble File System Clones.
ACM Trans. Storage, 2021

External-memory Dictionaries in the Affine and PDAM Models.
ACM Trans. Parallel Comput., 2021

2020
How to Not Copy Files.
login Usenix Mag., 2020

How to Copy Files.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

2019
Small Refinements to the DAM Can Have Big Consequences for Data-Structure Design.
Proceedings of the 31st ACM on Symposium on Parallelism in Algorithms and Architectures, 2019

2018
Efficient Directory Mutations in a Full-Path-Indexed File System.
ACM Trans. Storage, 2018

The Full Path to Full-Path Indexing.
Proceedings of the 16th USENIX Conference on File and Storage Technologies, 2018

2017
How to Fragment Your File System.
login Usenix Mag., 2017

Writes Wrought Right, and Other Adventures in File System Optimization.
ACM Trans. Storage, 2017

File Systems Fated for Senescence? Nonsense, Says Science!
Proceedings of the 15th USENIX Conference on File and Storage Technologies, 2017

2016
Optimizing Every Operation in a Write-optimized File System.
Proceedings of the 14th USENIX Conference on File and Storage Technologies, 2016

2015
An Introduction to Bε-trees and Write-Optimization.
login Usenix Mag., 2015

BetrFS: Write-Optimization in a Kernel File System.
ACM Trans. Storage, 2015

BetrFS: A Right-Optimized Write-Optimized File System.
Proceedings of the 13th USENIX Conference on File and Storage Technologies, 2015

2012
CAWDOR: Compiler Assisted Worm Defense.
Proceedings of the 12th IEEE International Working Conference on Source Code Analysis and Manipulation, 2012


  Loading...