Follow
Sylvan Clebsch
Sylvan Clebsch
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Deny capabilities for safe, fast actors
S Clebsch, S Drossopoulou, S Blessing, A McNeil
Proceedings of the 5th International Workshop on Programming Based on Actors …, 2015
1392015
CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019
702019
Fully concurrent garbage collection of actors on many-core machines
S Clebsch, S Drossopoulou
Proceedings of the 2013 ACM SIGPLAN international conference on Object …, 2013
422013
Toward confidential cloud computing
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Communications of the ACM 64 (6), 54-61, 2021
352021
Orca: GC and type system co-design for actor languages
S Clebsch, J Franco, S Drossopoulou, AM Yang, T Wrigstad, J Vitek
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
262017
Snmalloc: a message passing allocator
P Liétar, T Butler, S Clebsch, S Drossopoulou, J Franco, MJ Parkinson, ...
Proceedings of the 2019 ACM SIGPLAN International Symposium on Memory …, 2019
252019
Amp: Authentication of media via provenance
P England, HS Malvar, E Horvitz, JW Stokes, C Fournet, R Burke-Aguero, ...
Proceedings of the 12th ACM Multimedia Systems Conference, 108-121, 2021
162021
Multi-stakeholder media provenance management to counter synthetic media risks in news publishing
J Aythora, R Burke-Agüero, A Chamayou, S Clebsch, M Costa, ...
Proc. Intl. Broadcasting Convention (IBC) 1 (2), 8, 2020
162020
{ia-ccf}: Individual accountability for permissioned ledgers
A Shamis, P Pietzuch, B Canakci, M Castro, C Fournet, E Ashton, ...
19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022
132022
Tree topologies for causal message delivery
S Blessing, S Clebsch, S Drossopoulou
Proceedings of the 7th ACM SIGPLAN International Workshop on Programming …, 2017
132017
Ownership and reference counting based garbage collection in the actor world
S Clebsch, S Blessing, J Franco, S Drossopoulou
ICOOOLPS’2015, 2015
112015
Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Queue 19 (1), 49-76, 2021
102021
'Pony': co-designing a type system and a runtime.
S Clebsch
Imperial College London, UK, 2017
92017
The pony programming language. The Pony Developers
S Clebsch
The Pony Developers 1, 2015
82015
Efficient transmission of data to multiple network nodes
AM Lovell, S Clebsch, G Cockroft
US Patent 6,633,570, 2003
72003
Reference capabilities for flexible memory management
E Arvidsson, E Castegren, S Clebsch, S Drossopoulou, J Noble, ...
Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1363-1393, 2023
62023
Package processing
SW Clebsch, MMJ Brockschmidt, SS Ishtiaq, JEC Alglave, MJ Parkinson, ...
US Patent 10,592,661, 2020
62020
Efficient transmission of data to multiple network nodes
AM Lovell, S Clebsch, G Cockroft
US Patent 7,206,311, 2007
62007
Roy Schuster, Alex Shamis, Olga Vrousgou, and Christoph M Wintersteiger.[nd]
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
CCF: A Framework for Building Confidential Verifiable Replicated Services …, 0
6
PAC: Practical accountability for CCF
A Shamis, P Pietzuch, M Castro, E Ashton, A Chamayou, S Clebsch, ...
arXiv preprint arXiv:2105.13116, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20