Yu Xia
Title
Cited by
Cited by
Year
The honey badger of BFT protocols
A Miller, Y Xia, K Croman, E Shi, D Song
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3412016
The Honey Badger of BFT Protocols
DS Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi
ACM Conference on Computer and Communications Security 2016, 31-42, 2016
341*2016
Morphological Segmentation with Window LSTM Neural Networks.
GM Linlin Wang, Zhu Cao, Yu Xia
AAAI 2016, 2842-2848, 2016
40*2016
Sundial: Harmonizing Concurrency Control and Caching in a Distributed OLTP Database Management System
X Yu, Y Xia, A Pavlo, D Sanchez, L Rudolph, S Devadas
VLDB, 2018
92018
Non-interactive verifiable secret sharing for monotone circuits
G Bai, I Damgård, C Orlandi, Y Xia
International Conference on Cryptology in Africa, 225-244, 2016
62016
Depth-preserving style transfer
R Liao, Y Xia, X Zhang
22016
LiTM: A Lightweight Deterministic Software Transactional Memory System
Y Xia, X Yu, W Moses, J Shun, S Devadas
PMAM, 2019
2019
Efficient Asynchronous Atomic Broadcast
A Miller, Y Xia, K Croman, E Shi, D Song
University of California, Berkeley, 2016
2016
Information cascades on arbitrary topologies
J Wan, Y Xia, L Li, T Moscibroda
arXiv preprint arXiv:1604.07166, 2016
2016
Information Cascades on Arbitrary Topologies
TM Jun Wan, Yu Xia, Liang Li
ICALP 2016, 64:1-64:14, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–10