


default search action
Muli Ben-Yehuda
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c28]Ilya Lesokhin, Haggai Eran
, Shachar Raindel
, Guy Shapiro, Sagi Grimberg, Liran Liss, Muli Ben-Yehuda, Nadav Amit
, Dan Tsafrir:
Page Fault Support for Network Controllers. ASPLOS 2017: 449-466 - 2016
- [j10]Nadav Amit
, Abel Gordon, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir:
Bare-metal performance for virtual machines with exitless interrupts. Commun. ACM 59(1): 108-116 (2016) - [c27]Muli Ben-Yehuda, Orna Agmon Ben-Yehuda, Dan Tsafrir:
The nom Profit-Maximizing Operating System. VEE 2016: 145-160 - 2015
- [c26]Moshe Malka, Nadav Amit
, Muli Ben-Yehuda, Dan Tsafrir:
rIOMMU: Efficient IOMMU for I/O Devices that Employ Ring Buffers. ASPLOS 2015: 355-368 - [c25]Igor Smolyar, Muli Ben-Yehuda, Dan Tsafrir:
Securing Self-Virtualizing Ethernet Devices. USENIX Security Symposium 2015: 335-350 - 2014
- [j9]Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, Dan Tsafrir:
The rise of RaaS: the resource-as-a-service cloud. Commun. ACM 57(7): 76-84 (2014) - [c24]Lluís Vilanova
, Muli Ben-Yehuda, Nacho Navarro, Yoav Etsion, Mateo Valero
:
CODOMs: Protecting software with Code-centric memory Domains. ISCA 2014: 469-480 - [c23]Orna Agmon Ben-Yehuda, Eyal Posener, Muli Ben-Yehuda, Assaf Schuster, Ahuva Mu'alem:
Ginseng: market-driven memory allocation. VEE 2014: 41-52 - 2013
- [j8]Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, Dan Tsafrir:
Deconstructing Amazon EC2 Spot Instance Pricing. ACM Trans. Economics and Comput. 1(3): 16:1-16:20 (2013) - [c22]Muli Ben-Yehuda, Omer Peleg, Orna Agmon Ben-Yehuda, Igor Smolyar, Dan Tsafrir:
The nonkernel: a kernel designed for the cloud. APSys 2013: 4:1-4:7 - [c21]Nadav Har'El, Abel Gordon, Alex Landau, Muli Ben-Yehuda, Avishay Traeger, Razya Ladelsky:
Efficient and Scalable Paravirtual I/O System. USENIX ATC 2013: 231-242 - 2012
- [c20]Abel Gordon, Nadav Amit
, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir:
ELI: bare-metal performance for I/O virtualization. ASPLOS 2012: 411-422 - [c19]Muli Ben-Yehuda, Michael Factor, Eran Rom, Avishay Traeger, Eran Borovik, Ben-Ami Yassour:
Adding advanced storage controller functionality via low-overhead virtualization. FAST 2012: 15 - [c18]Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, Dan Tsafrir:
The Resource-as-a-Service (RaaS) Cloud. HotCloud 2012 - [c17]Abel Gordon, Nadav Har'El, Alex Landau, Muli Ben-Yehuda, Avishay Traeger:
Towards exitless and efficient paravirtual I/O. SYSTOR 2012: 4 - 2011
- [c16]Michael R. Hines, Abel Gordon, Márcio Silva, Dilma Da Silva, Kyung Dong Ryu, Muli Ben-Yehuda:
Applications Know Best: Performance-Driven Memory Overcommit with Ginkgo. CloudCom 2011: 130-137 - [c15]Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, Dan Tsafrir:
Deconstructing Amazon EC2 Spot Instance Pricing. CloudCom 2011: 304-311 - [c14]Nadav Amit, Muli Ben-Yehuda, Dan Tsafrir, Assaf Schuster:
vIOMMU: Efficient IOMMU Emulation. USENIX ATC 2011 - [c13]Alex Landau, Muli Ben-Yehuda, Abel Gordon:
SplitX: Split Guest/Hypervisor Execution on Multi-Core. WIOV 2011 - 2010
- [c12]Nadav Amit
, Muli Ben-Yehuda, Ben-Ami Yassour:
IOMMU: Strategies for Mitigating the IOTLB Bottleneck. ISCA Workshops 2010: 256-274 - [c11]Miriam Allalouf, Muli Ben-Yehuda, Julian Satran, Itai Segall:
Block storage listener for detecting file-level intrusions. MSST 2010: 1-12 - [c10]Muli Ben-Yehuda, Michael D. Day, Zvi Dubitzky, Michael Factor, Nadav Har'El, Abel Gordon, Anthony Liguori, Orit Wasserman, Ben-Ami Yassour:
The Turtles Project: Design and Implementation of Nested Virtualization. OSDI 2010: 423-436 - [c9]Alex Landau, David Hadas, Muli Ben-Yehuda:
Plugging the hypervisor abstraction leaks caused by virtual networking. SYSTOR 2010 - [c8]Ben-Ami Yassour, Muli Ben-Yehuda, Orit Wasserman:
On the DMA mapping problem in direct device assignment. SYSTOR 2010 - [c7]Leah Shalev, Julian Satran, Eran Borovik, Muli Ben-Yehuda:
IsoStack - Highly Efficient Network Processing on Dedicated Cores. USENIX ATC 2010
2000 – 2009
- 2009
- [j7]Benny Rochwerger, David Breitgand
, Eliezer Levy, Alex Galis, Kenneth Nagin, Ignacio Martín Llorente
, Rubén S. Montero, Yaron Wolfsthal, Erik Elmroth, Juan A. Cáceres, Muli Ben-Yehuda, Wolfgang Emmerich, Fermín Galán:
The Reservoir model and architecture for open federated cloud computing. IBM J. Res. Dev. 53(4): 4 (2009) - [j6]David Cohen
, Fabrizio Petrini, Michael D. Day, Muli Ben-Yehuda, Steven W. Hunter
, Uri Cummings:
Applying Amdahl's Other Law to the data center. IBM J. Res. Dev. 53(5): 5 (2009) - [c6]Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula Ta-Shma:
Out-of-band detection of boot-sequence termination events. ICAC 2009: 71-72 - [c5]Muli Ben-Yehuda, David Breitgand
, Michael Factor, Hillel Kolodner, Valentin Kravtsov, Dan Pelleg:
NAP: a building block for remediating performance bottlenecks via black box network analysis. ICAC 2009: 179-188 - 2008
- [j5]Muli Ben-Yehuda, Eric Van Hensbergen
:
Open source as a foundation for systems research. ACM SIGOPS Oper. Syst. Rev. 42(1): 2-4 (2008) - [j4]Dan Pelleg, Muli Ben-Yehuda, Rick Harper, Lisa Spainhower, Tokunbo O. S. Adeshiyan:
Vigilant: out-of-band detection of failures in virtual machines. ACM SIGOPS Oper. Syst. Rev. 42(1): 26-31 (2008) - [j3]Muli Ben-Yehuda:
1st Annual Haifa Systems and Storage Conference (SYSTOR 2007): a message from the organizers. ACM SIGOPS Oper. Syst. Rev. 42(1): 110 (2008) - [j2]Paula Ta-Shma, Guy Laden, Muli Ben-Yehuda, Michael Factor:
Virtual machine time travel using continuous data protection and checkpointing. ACM SIGOPS Oper. Syst. Rev. 42(1): 127-134 (2008) - [j1]Muli Ben-Yehuda, Eric Van Hensbergen, Marc E. Fiuczynski:
Minding the gap: R&D in the Linux kernel. ACM SIGOPS Oper. Syst. Rev. 42(5): 1-3 (2008) - [c4]Yaron Weinsberg, Danny Dolev
, Tal Anker, Muli Ben-Yehuda, Pete Wyckoff:
Tapping into the fountain of CPUs: on operating system support for programmable devices. ASPLOS 2008: 179-188 - [c3]Julian Satran, Leah Shalev, Muli Ben-Yehuda, Zorik Machulsky:
Scalable I/O - A Well-Architected Way to Do Scalable, Secure and Virtualized I/O. Workshop on I/O Virtualization 2008 - [e1]Muli Ben-Yehuda, Alan L. Cox, Scott Rixner:
First Workshop on I/O Virtualization, WIOV'08, San Diego, CA, USA, December 10-11, 2008, Proceedings. USENIX Association 2008 [contents] - 2006
- [c2]Leah Shalev, Vadim Makhervaks, Zorik Machulsky, Giora Biran, Julian Satran, Muli Ben-Yehuda, Ilan Shimony:
Loosely Coupled TCP Acceleration Architecture. Hot Interconnects 2006: 3-8 - [c1]Muli Ben-Yehuda, Oleg Goldshmidt, Elliot K. Kolodner, Zorik Machulsky, Vadim Makhervaks, Julian Satran, Marc Segal, Leah Shalev, Ilan Shimony:
IP Only Server. USENIX ATC, General Track 2006: 381-386
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint