scispace - formally typeset
D

David H. C. Du

Researcher at University of Minnesota

Publications -  330
Citations -  7315

David H. C. Du is an academic researcher from University of Minnesota. The author has contributed to research in topics: Cache & Server. The author has an hindex of 46, co-authored 324 publications receiving 6856 citations. Previous affiliations of David H. C. Du include Sandia National Laboratories & Apple Inc..

Papers
More filters
Proceedings ArticleDOI

Path sensitization in critical path problem

TL;DR: A framework which allows various previously proposed path sensitization criteria to be compared with each other in a unified way is presented and an exact path sensitized criterion and a looser path sensitizing criterion based on the framework are proposed.
Proceedings ArticleDOI

BloomFlash: Bloom Filter on Flash-Based Storage

TL;DR: BLOOMFLASH is a bloom filter designed for flash memory based storage that provides a new dimension of trade off with bloom filter access times to reduce RAM space usage (and hence system cost) and is advocated that flash memory may serve as a suitable medium for storing bloom filters.
Journal ArticleDOI

Video staging: a proxy-server-based approach to end-to-end video delivery over wide-area networks

TL;DR: The results demonstrate that the proposed proxy-server-based approach provides an effective and scalable solution to the problem of the end-to-end video delivery over WANs.
Proceedings Article

Characterizing, Modeling, and Benchmarking RocksDB Key-Value Workloads at Facebook

TL;DR: A key-range based modeling approach is proposed and a benchmark that can better emulate the workloads of real-world key-value stores is developed that can synthetically generate more preciseKey-value queries that represent the reads and writes of key- Value stores to the underlying storage system.
Proceedings ArticleDOI

Real-Time Detection of Clone Attacks in Wireless Sensor Networks

TL;DR: This paper proposes a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for each message by checking the enclosed fingerprint.