Rob Johnson

Orcid: 0000-0002-0784-7410

According to our database1, Rob Johnson authored at least 84 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
File System Aging.
CoRR, 2024

IONIA: High-Performance Replication for Modern Disk-based KV Stores.
Proceedings of the 22nd USENIX Conference on File and Storage Technologies, 2024

2023
SplinterDB and Maplets: Improving the Tradeoffs in Key-Value Store Compaction Policy.
Proc. ACM Manag. Data, 2023

IcebergHT: High Performance Hash Tables Through Stability and Low Associativity.
Proc. ACM Manag. Data, 2023

Mosaic Pages: Big TLB Reach with Small Pages.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
IcebergHT: High Performance PMEM Hash Tables Through Stability and Low Associativity.
CoRR, 2022

An incrementally updatable and scalable system for large-scale sequence search using the Bentley-Saxe transformation.
Bioinform., 2022

Physics-Informed Neural Networks for Solar Wind Prediction.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022

BetrFS: a compleat file system for commodity SSDs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting.
Proceedings of the 30th Annual European Symposium on Algorithms, 2022

2021
Copy-on-Abundant-Write for Nimble File System Clones.
ACM Trans. Storage, 2021

External-memory Dictionaries in the Affine and PDAM Models.
ACM Trans. Parallel Comput., 2021

Timely Reporting of Heavy Hitters Using External Memory.
ACM Trans. Database Syst., 2021

Paging and the Address-Translation Problem.
Proceedings of the SPAA '21: 33rd ACM Symposium on Parallelism in Algorithms and Architectures, 2021

Vector Quotient Filters: Overcoming the Time/Space Trade-Off in Filter Design.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

2020
How to Not Copy Files.
login Usenix Mag., 2020

An Efficient, Scalable, and Exact Representation of High-Dimensional Color Information Enabled Using de Bruijn Graph Search.
J. Comput. Biol., 2020

SplinterDB: Closing the Bandwidth Gap for NVMe Key-Value Stores.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Closing the Gap Between Cache-oblivious and Cache-adaptive Analysis.
Proceedings of the SPAA '20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, 2020

Flushing Without Cascades.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

Storage Systems are Distributed Systems (So Verify Them That Way!).
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

How to Copy Files.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

2019
Preprints and Scholarly Communication: Adoption, Practices, Drivers and Barriers.
F1000Research, 2019

Theoretical Foundations of Storage Systems (Dagstuhl Seminar 19111).
Dagstuhl Reports, 2019

Small Refinements to the DAM Can Have Big Consequences for Data-Structure Design.
Proceedings of the 31st ACM on Symposium on Parallelism in Algorithms and Architectures, 2019

Optimal Ball Recycling.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

An Efficient, Scalable and Exact Representation of High-Dimensional Color Information Enabled via de Bruijn Graph Search.
Proceedings of the Research in Computational Molecular Biology, 2019

Engineering a high-performance GPU B-Tree.
Proceedings of the 24th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2019

Filesystem Aging: It's more Usage than Fullness.
Proceedings of the 11th USENIX Workshop on Hot Topics in Storage and File Systems, 2019

2018
Efficient Directory Mutations in a Full-Path-Indexed File System.
ACM Trans. Storage, 2018

The Online Event-Detection Problem.
CoRR, 2018

Estimating city-level travel patterns using street imagery: a case study of using Google Street View in Britain.
CoRR, 2018

Squeakr: an exact and approximate k-mer counting system.
Bioinform., 2018

Mantis: A Fast, Small, and Exact Large-Scale Sequence-Search Index.
Proceedings of the Research in Computational Molecular Biology, 2018

Bloom Filters, Adaptivity, and the Dictionary Problem.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018

The Full Path to Full-Path Indexing.
Proceedings of the 16th USENIX Conference on File and Storage Technologies, 2018

2017
How to Fragment Your File System.
login Usenix Mag., 2017

Writes Wrought Right, and Other Adventures in File System Optimization.
ACM Trans. Storage, 2017

A Fast x86 Implementation of Select.
CoRR, 2017

deBGR: an efficient and near-exact representation of the weighted de Bruijn graph.
Bioinform., 2017

A General-Purpose Counting Filter: Making Every Bit Count.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Write-Optimized Skip Lists.
Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2017

File Systems Fated for Senescence? Nonsense, Says Science!
Proceedings of the 15th USENIX Conference on File and Storage Technologies, 2017

2016
Business process costs of implementing "gold" and "green" open access in institutional and national contexts.
J. Assoc. Inf. Sci. Technol., 2016

Cache-Adaptive Analysis.
Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, 2016

Anti-Persistence on Persistent Storage: History-Independent Sparse Tables and Dictionaries.
Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2016

The I/O Complexity of Computing Prime Tables.
Proceedings of the LATIN 2016: Theoretical Informatics, 2016

Lazy Analytics: Let Other Queries Do the Work For You.
Proceedings of the 8th USENIX Workshop on Hot Topics in Storage and File Systems, 2016

Optimizing Every Operation in a Write-optimized File System.
Proceedings of the 14th USENIX Conference on File and Storage Technologies, 2016

Games without Frontiers: Investigating Video Games as a Covert Channel.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
An Introduction to Bε-trees and Write-Optimization.
login Usenix Mag., 2015

BetrFS: Write-Optimization in a Kernel File System.
ACM Trans. Storage, 2015

On shifting sands: assessing the financial sustainability of UK learned societies.
Learn. Publ., 2015

Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database.
CoRR, 2015

SYSBIONS: nested sampling for systems biology.
Bioinform., 2015

BetrFS: A Right-Optimized Write-Optimized File System.
Proceedings of the 13th USENIX Conference on File and Storage Technologies, 2015

Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection.
Proceedings of the 10th ACM Symposium on Information, 2015

Tracking Network Events with Write Optimized Data Structures.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
How Best to Handle a Dicey Situation.
CoRR, 2014

New Approaches to Website Fingerprinting Defenses.
CoRR, 2014

Glove: A Bespoke Website Fingerprinting Defense.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Effective Attacks and Provable Defenses for Website Fingerprinting.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Cache-Adaptive Algorithms.
Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, 2014

A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
The password allocation problem: strategies for reusing passwords effectively.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

2012
Don't Thrash: How to Cache Your Hash on Flash.
Proc. VLDB Endow., 2012

CAWDOR: Compiler Assisted Worm Defense.
Proceedings of the 12th IEEE International Working Conference on Source Code Analysis and Manipulation, 2012

Touching from a distance: website fingerprinting attacks and defenses.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Mobile ultrasound with DICOM and cloud connectivity.
Proceedings of 2012 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2012

Types and Access Controls for Cross-Domain Security in Flash.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Text Classification for Data Loss Prevention.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Don't Thrash: How to Cache Your Hash on Flash.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Storage and File Systems, 2011

Homomorphic Signatures for Digital Photographs.
Proceedings of the Financial Cryptography and Data Security, 2011

Implementing a key recovery attack on the High-Bandwidth Digital Content Protection Protocol.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

PhorceField: a phish-proof password ceremony.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis.
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference, 19-24 June, 2011, Portland, Oregon, USA, 2011

2010
Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010.
Proceedings of the CLEF 2010 LABs and Workshops, 2010

2009
Exploiting Unix File-System Races via Algorithmic Complexity Attacks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

iTag: a personalized blog tagger.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

Usable Privacy Controls for Blogs.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A practical mimicry attack against powerful system-call monitors.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2007

1995
Editorial.
Log. J. IGPL, 1995


  Loading...