scispace - formally typeset
M

Mihai Budiu

Researcher at Microsoft

Publications -  71
Citations -  10100

Mihai Budiu is an academic researcher from Microsoft. The author has contributed to research in topics: Compiler & Reconfigurable computing. The author has an hindex of 27, co-authored 63 publications receiving 9710 citations. Previous affiliations of Mihai Budiu include Carnegie Mellon University.

Papers
More filters
Proceedings ArticleDOI

Dryad: distributed data-parallel programs from sequential building blocks

TL;DR: The Dryad execution engine handles all the difficult problems of creating a large distributed, concurrent application: scheduling the use of computers and their CPUs, recovering from communication or computer failures, and transporting data between vertices.
Proceedings ArticleDOI

Control-flow integrity

TL;DR: Control-Flow Integrity provides a useful foundation for enforcing further security policies, as it is demonstrated with efficient software implementations of a protected shadow call stack and of access control for memory regions.
Proceedings ArticleDOI

DryadLINQ: a system for general-purpose distributed data-parallel computing using a high-level language

TL;DR: It is shown that excellent absolute performance can be attained--a general-purpose sort of 1012 Bytes of data executes in 319 seconds on a 240-computer, 960- disk cluster--as well as demonstrating near-linear scaling of execution time on representative applications as the authors vary the number of computers used for a job.
Journal ArticleDOI

Bimodal multicast

TL;DR: This article introduces the protocol, provides a theoretical analysis of its behavior, review experimental results, and discusses some candidate applications, confirming that bimodal multicast is reliable, scalable, and that the protocol provides remarkably stable delivery throughput.
Proceedings Article

Control-Flow Integrity - Principles, Implementations, and Applications

TL;DR: Control-flow integrity provides a useful foundation for enforcing further security policies, as it is demonstrated with efficient software implementations of a protected shadow call stack and of access control for memory regions.