Yu Xia
TitleCited byYear
The honey badger of BFT protocols
A Miller, Y Xia, K Croman, E Shi, D Song
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2322016
The Honey Badger of BFT Protocols
DS Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi
ACM Conference on Computer and Communications Security 2016, 31-42, 2016
232*2016
Morphological Segmentation with Window LSTM Neural Networks.
GM Linlin Wang, Zhu Cao, Yu Xia
AAAI 2016, 2842-2848, 2016
34*2016
Non-interactive verifiable secret sharing for monotone circuits
G Bai, I Damgård, C Orlandi, Y Xia
International Conference on Cryptology in Africa, 225-244, 2016
32016
Sundial: Harmonizing Concurrency Control and Caching in a Distributed OLTP Database Management System
X Yu, Y Xia, A Pavlo, D Sanchez, L Rudolph, S Devadas
VLDB, 2018
22018
Depth-preserving style transfer
R Liao, Y Xia, X Zhang
22016
LiTM: A Lightweight Deterministic Software Transactional Memory System
Y Xia, X Yu, W Moses, J Shun, S Devadas
PMAM, 2019
2019
Efficient Asynchronous Atomic Broadcast
A Miller, Y Xia, K Croman, E Shi, D Song
University of California, Berkeley, 2016
2016
Information cascades on arbitrary topologies
J Wan, Y Xia, L Li, T Moscibroda
arXiv preprint arXiv:1604.07166, 2016
2016
Information Cascades on Arbitrary Topologies
TM Jun Wan, Yu Xia, Liang Li
ICALP 2016, 64:1-64:14, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–10