scispace - formally typeset
D

Dongsu Han

Researcher at KAIST

Publications -  88
Citations -  4358

Dongsu Han is an academic researcher from KAIST. The author has contributed to research in topics: Computer science & Network packet. The author has an hindex of 30, co-authored 77 publications receiving 3567 citations. Previous affiliations of Dongsu Han include Carnegie Mellon University.

Papers
More filters
Proceedings ArticleDOI

MICA: a holistic approach to fast in-memory key-value storage

TL;DR: MICA optimizes for multi-core architectures by enabling parallel access to partitioned data, and for efficient parallel data access, MICA maps client requests directly to specific CPU cores at the server NIC level by using client-supplied information and adopts a light-weight networking stack that bypasses the kernel.
Proceedings ArticleDOI

ATLAS: A scalable and high-performance scheduling algorithm for multiple memory controllers

TL;DR: It is shown that the implementation of least-attained-service thread prioritization reduces the time the cores spend stalling and significantly improves system throughput, and ATLAS's performance benefit increases as the number of cores increases.
Proceedings ArticleDOI

mTCP: a highly scalable user-level TCP stack for multicore systems

TL;DR: mTCP is presented, a high-performance user-level TCP stack for multicore systems that addresses the inefficiencies from the ground up--from packet I/O and TCP connection management to the application interface and improves the performance of various popular applications.
Proceedings Article

Information-agnostic flow scheduling for commodity data centers

TL;DR: PIAS is a DCN flow scheduling mechanism that aims to minimize FCT by mimicking shortest job first (SJF) on the premise that flow size is not known a priori, and significantly outperforms existing information-agnostic schemes.
Proceedings ArticleDOI

SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.

TL;DR: SGX-Shield is built on a secure in-enclave loader to secretly bootstrap the memory space layout with a finer-grained randomization and shows a high degree of randomness in memory layouts and stops memory corruption attacks with a high probability.