default search action
Emery D. Berger
Person information
- affiliation: University of Massachusetts, College of Information and Computer Sciences, Amherst, MA, USA
- affiliation (PhD 2002): University of Texas at Austin, Department of Computer Science, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i22]Juan Altmayer Pizzorno, Emery D. Berger:
CoverUp: Coverage-Guided LLM-Based Test Generation. CoRR abs/2403.16218 (2024) - [i21]Kyla Levin, Nicolas van Kempen, Emery D. Berger, Stephen N. Freund:
ChatDBG: An AI-Powered Debugging Assistant. CoRR abs/2403.16354 (2024) - 2023
- [c48]Juan Altmayer Pizzorno, Emery D. Berger:
SlipCover: Near Zero-Overhead Code Coverage for Python. ISSTA 2023: 1195-1206 - [c47]Emery D. Berger, Sam Stern, Juan Altmayer Pizzorno:
Triangulating Python Performance Issues with SCALENE. OSDI 2023: 51-64 - [i20]Juan Altmayer Pizzorno, Emery D. Berger:
SlipCover: Near Zero-Overhead Code Coverage for Python. CoRR abs/2305.02886 (2023) - 2022
- [i19]Emery D. Berger, Sam Stern, Juan Altmayer Pizzorno:
Triangulating Python Performance Issues with Scalene. CoRR abs/2212.07597 (2022) - 2021
- [j19]Emma Tosch, Eytan Bakshy, Emery D. Berger, David D. Jensen, J. Eliot B. Moss:
PlanAlyzer: assessing threats to the validity of online experiments. Commun. ACM 64(9): 108-116 (2021) - [e5]Tim Sherwood, Emery D. Berger, Christos Kozyrakis:
ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Virtual Event, USA, April 19-23, 2021. ACM 2021, ISBN 978-1-4503-8317-2 [contents] - 2020
- [j18]John Vilk, Emery D. Berger:
BLeak: automatically debugging memory leaks in web applications. Commun. ACM 63(11): 146-153 (2020) - [j17]Breanna Devore-McDonald, Emery D. Berger:
Mossad: defeating software plagiarism detection. Proc. ACM Program. Lang. 4(OOPSLA): 138:1-138:28 (2020) - [i18]Emery D. Berger:
Scalene: Scripting-Language Aware Profiling for Python. CoRR abs/2006.03879 (2020) - [i17]Breanna Devore-McDonald, Emery D. Berger:
Mossad: Defeating Software Plagiarism Detection. CoRR abs/2010.01700 (2020)
2010 – 2019
- 2019
- [j16]Emery D. Berger, Stephen M. Blackburn, Carla E. Brodley, H. V. Jagadish, Kathryn S. McKinley, Mario A. Nascimento, Minjeong Shin, Kuansan Wang, Lexing Xie:
GOTO rankings considered helpful. Commun. ACM 62(7): 29-30 (2019) - [j15]Emma Tosch, Eytan Bakshy, Emery D. Berger, David D. Jensen, J. Eliot B. Moss:
PlanAlyzer: assessing threats to the validity of online experiments. Proc. ACM Program. Lang. 3(OOPSLA): 182:1-182:30 (2019) - [j14]Emery D. Berger, Celeste Hollenbeck, Petr Maj, Olga Vitek, Jan Vitek:
On the Impact of Programming Languages on Code Quality: A Reproduction Study. ACM Trans. Program. Lang. Syst. 41(4): 21:1-21:24 (2019) - [j13]Abhinav Jangda, Bobby Powers, Emery D. Berger, Arjun Guha:
Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code. login Usenix Mag. 44(3) (2019) - [c46]Bobby Powers, David Tench, Emery D. Berger, Andrew McGregor:
Mesh: compacting memory management for C/C++ applications. PLDI 2019: 333-346 - [c45]Eunice Jun, Maureen Daum, Jared Roesch, Sarah E. Chasins, Emery D. Berger, René Just, Katharina Reinecke:
Tea: A High-level Language and Runtime System for Automating Statistical Analysis. UIST 2019: 591-603 - [c44]Abhinav Jangda, Bobby Powers, Emery D. Berger, Arjun Guha:
Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code. USENIX ATC 2019: 107-120 - [i16]Abhinav Jangda, Bobby Powers, Arjun Guha, Emery D. Berger:
Mind the Gap: Analyzing the Performance of WebAssembly vs. Native Code. CoRR abs/1901.09056 (2019) - [i15]Emery D. Berger, Celeste Hollenbeck, Petr Maj, Olga Vitek, Jan Vitek:
On the Impact of Programming Languages on Code Quality. CoRR abs/1901.10220 (2019) - [i14]Daniel W. Barowy, Emery D. Berger, Benjamin G. Zorn:
ExceLint: Automatically Finding Spreadsheet Formula Errors. CoRR abs/1901.11100 (2019) - [i13]Bobby Powers, David Tench, Emery D. Berger, Andrew McGregor:
Mesh: Compacting Memory Management for C/C++ Applications. CoRR abs/1902.04738 (2019) - [i12]Eunice Jun, Maureen Daum, Jared Roesch, Sarah E. Chasins, Emery D. Berger, René Just, Katharina Reinecke:
Tea: A High-level Language and Runtime System for Automating Statistical Analysis. CoRR abs/1904.05387 (2019) - [i11]Emma Tosch, Eytan Bakshy, Emery D. Berger, David D. Jensen, J. Eliot B. Moss:
PlanAlyzer: Assessing Threats to the Validity of Online Experiments. CoRR abs/1909.13649 (2019) - [i10]Emery D. Berger, Petr Maj, Olga Vitek, Jan Vitek:
FSE/CACM Rebuttal2: Correcting A Large-Scale Study of Programming Languages and Code Quality in GitHub. CoRR abs/1911.11894 (2019) - 2018
- [j12]Claire Le Goues, Yuriy Brun, Sven Apel, Emery D. Berger, Sarfraz Khurshid, Yannis Smaragdakis:
Effectiveness of anonymization in double-blind review. Commun. ACM 61(6): 30-33 (2018) - [j11]Charlie Curtsinger, Emery D. Berger:
Coz: finding code that counts with causal profiling. Commun. ACM 61(6): 91-99 (2018) - [j10]Daniel W. Barowy, Emery D. Berger, Benjamin G. Zorn:
ExceLint: automatically finding spreadsheet formula errors. Proc. ACM Program. Lang. 2(OOPSLA): 148:1-148:26 (2018) - [c43]Sundaresan Rajasekaran, Harpreet Singh Chawla, Zhen Ni, Neel Shah, Emery D. Berger, Timothy Wood:
CRIMES: Using Evidence to Secure the Cloud. Middleware 2018: 40-52 - [c42]John Vilk, Emery D. Berger:
BLeak: automatically debugging memory leaks in web applications. PLDI 2018: 15-29 - [i9]Emery D. Berger, Stephen M. Blackburn, Carla E. Brodley, H. V. Jagadish, Kathryn S. McKinley, Mario A. Nascimento, Minjeong Shin, Lexing Xie:
GOTO Rankings Considered Helpful. CoRR abs/1807.00071 (2018) - [i8]John Vilk, Emery D. Berger, James Mickens, Mark Marron:
McFly: Time-Travel Debugging for the Web. CoRR abs/1810.11865 (2018) - 2017
- [c41]Bobby Powers, John Vilk, Emery D. Berger:
Browsix: Bridging the Gap Between Unix and the Browser. ASPLOS 2017: 253-266 - [c40]Daniel W. Barowy, Emery D. Berger, Daniel G. Goldstein, Siddharth Suri:
VoxPL: Programming with the Wisdom of the Crowd. CHI 2017: 2347-2358 - [i7]Claire Le Goues, Yuriy Brun, Sven Apel, Emery D. Berger, Sarfraz Khurshid, Yannis Smaragdakis:
Effectiveness of Anonymization in Double-Blind Review. CoRR abs/1709.01609 (2017) - 2016
- [j9]Daniel W. Barowy, Charlie Curtsinger, Emery D. Berger, Andrew McGregor:
AutoMan: a platform for integrating human-based and digital computation. Commun. ACM 59(6): 102-109 (2016) - [j8]Charlie Curtsinger, Emery D. Berger:
coz: This Is the Profiler You're Looking For. login Usenix Mag. 41(2) (2016) - [c39]Sundaresan Rajasekaran, Zhen Ni, Harpreet Singh Chawla, Neel Shah, Timothy Wood, Emery D. Berger:
Scalable Cloud Security via Asynchronous Virtual Machine Introspection. HotCloud 2016 - [c38]Tongping Liu, Charlie Curtsinger, Emery D. Berger:
DoubleTake: fast and precise error detection via evidence-based dynamic analysis. ICSE 2016: 911-922 - [c37]Diogenes Nunez, Samuel Z. Guyer, Emery D. Berger:
Prioritized garbage collection: explicit GC support for software caches. OOPSLA 2016: 695-710 - [c36]Charlie Curtsinger, Emery D. Berger:
COZ: Finding Code that Counts with Causal Profiling. USENIX ATC 2016 - [c35]Carl A. Waldspurger, Emery D. Berger, Abhishek Bhattacharjee, Kevin T. Pedretti, Simon Peter, Christopher J. Rossbach:
Sweet Spots and Limits for Virtualization. VEE 2016: 177 - [e4]Chandra Krintz, Emery D. Berger:
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2016, Santa Barbara, CA, USA, June 13-17, 2016. ACM 2016, ISBN 978-1-4503-4261-2 [contents] - [i6]Tongping Liu, Charlie Curtsinger, Emery D. Berger:
DoubleTake: Fast and Precise Error Detection via Evidence-Based Dynamic Analysis. CoRR abs/1601.07962 (2016) - [i5]Rajeev Alur, Emery D. Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel P. Lopresti, Klara Nahrstedt, Elizabeth D. Mynatt, Shwetak N. Patel, Jennifer Rexford, John A. Stankovic, Benjamin G. Zorn:
Systems Computing Challenges in the Internet of Things. CoRR abs/1604.02980 (2016) - [i4]Charlie Curtsinger, Emery D. Berger:
Coz: Finding Code that Counts with Causal Profiling. CoRR abs/1608.03676 (2016) - [i3]Diogenes Nunez, Samuel Z. Guyer, Emery D. Berger:
Prioritized Garbage Collection: Explicit GC Support for Software Caches. CoRR abs/1610.04790 (2016) - [i2]Bobby Powers, John Vilk, Emery D. Berger:
Browsix: Bridging the Gap Between Unix and the Browser. CoRR abs/1611.07862 (2016) - 2015
- [c34]Charlie Curtsinger, Emery D. Berger:
Coz: finding code that counts with causal profiling. SOSP 2015: 184-197 - 2014
- [c33]Emma Tosch, Emery D. Berger:
SurveyMan: programming and automatically debugging surveys. OOPSLA 2014: 197-211 - [c32]Daniel W. Barowy, Dimitar Gochev, Emery D. Berger:
CheckCell: data debugging for spreadsheets. OOPSLA 2014: 507-523 - [c31]John Vilk, Emery D. Berger:
Doppio: breaking the browser language barrier. PLDI 2014: 508-518 - [c30]Tongping Liu, Chen Tian, Ziang Hu, Emery D. Berger:
PREDATOR: predictive false sharing detection. PPoPP 2014: 3-14 - [i1]Emma Tosch, Emery D. Berger:
SurveyMan: Programming and Automatically Debugging Surveys. CoRR abs/1406.5572 (2014) - 2013
- [j7]Emery D. Berger, Benjamin G. Zorn, Kathryn S. McKinley:
OOPSLA 2002: Reconsidering custom memory allocation. ACM SIGPLAN Notices 48(4S): 46-57 (2013) - [j6]Francisco J. Cazorla, Eduardo Quiñones, Tullio Vardanega, Liliana Cucu, Benoit Triquet, Guillem Bernat, Emery D. Berger, Jaume Abella, Franck Wartel, Michael Houston, Luca Santinelli, Leonidas Kosmidis, Code Lo, Dorin Maxim:
PROARTIS: Probabilistically Analyzable Real-Time Systems. ACM Trans. Embed. Comput. Syst. 12(2s): 94:1-94:26 (2013) - [c29]Charlie Curtsinger, Emery D. Berger:
STABILIZER: statistically sound performance evaluation. ASPLOS 2013: 219-228 - [c28]Leonidas Kosmidis, Charlie Curtsinger, Eduardo Quiñones, Jaume Abella, Emery D. Berger, Francisco J. Cazorla:
Probabilistic timing analysis on conventional cache designs. DATE 2013: 603-606 - [e3]Emery D. Berger, Kim M. Hazelwood:
5th USENIX Workshop on Hot Topics in Parallelism, HotPar'13, San Jose, CA, USA, June 24-25, 2013. USENIX Association 2013 [contents] - 2012
- [j5]Emery D. Berger:
Software needs seatbelts and airbags. Commun. ACM 55(9): 48-53 (2012) - [j4]Emery D. Berger:
Software Needs Seatbelts and Airbags. ACM Queue 10(7): 30 (2012) - [c27]Daniel W. Barowy, Charlie Curtsinger, Emery D. Berger, Andrew McGregor:
AutoMan: a platform for integrating human-based and digital computation. OOPSLA 2012: 639-654 - 2011
- [c26]Tongping Liu, Emery D. Berger:
SHERIFF: precise detection and automatic mitigation of false sharing. OOPSLA 2011: 3-18 - [c25]Tongping Liu, Charlie Curtsinger, Emery D. Berger:
Dthreads: efficient deterministic multithreading. SOSP 2011: 327-336 - [c24]Gene Novark, Emery D. Berger:
DieHarder: Securing the Heap. WOOT 2011: 103-117 - 2010
- [c23]Gene Novark, Emery D. Berger:
DieHarder: securing the heap. CCS 2010: 573-584 - [e2]Marc E. Fiuczynski, Emery D. Berger, Andrew Warfield:
Proceedings of the 6th International Conference on Virtual Execution Environments, VEE 2010, Pittsburgh, Pennsylvania, USA, March 17-19, 2010. ACM 2010, ISBN 978-1-60558-910-7 [contents]
2000 – 2009
- 2009
- [c22]Eduardo Quiñones, Emery D. Berger, Guillem Bernat, Francisco J. Cazorla:
Using Randomized Caches in Probabilistic Real-Time Systems. ECRTS 2009: 129-138 - [c21]Emery D. Berger, Ting Yang, Tongping Liu, Gene Novark:
Grace: safe multithreaded programming for C/C++. OOPSLA 2009: 81-96 - [c20]Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Efficiently and precisely locating memory leaks and bloat. PLDI 2009: 397-407 - 2008
- [j3]Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Exterminator: Automatically correcting memory errors with high probability. Commun. ACM 51(12): 87-95 (2008) - [c19]Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Archipelago: trading address space for reliability and security. ASPLOS 2008: 115-124 - [c18]Ting Yang, Tongping Liu, Emery D. Berger, Scott F. Kaplan, J. Eliot B. Moss:
Redline: First Class Support for Interactivity in Commodity Operating Systems. OSDI 2008: 73-86 - [e1]Emery D. Berger, Brad Chen:
Proceedings of the 2008 ACM SIGPLAN workshop on Memory Systems Performance and Correctness: held in conjunction with the Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '08), Seattle, Washington, USA, March 2, 2008. ACM 2008, ISBN 978-1-60558-049-4 [contents] - 2007
- [j2]James Cipar, Mark D. Corner, Emery D. Berger:
Contributing storage using the transparent file system. ACM Trans. Storage 3(3): 12:1-12:26 (2007) - [c17]James Cipar, Mark D. Corner, Emery D. Berger:
TFS: A Transparent File System for Contributory Storage. FAST 2007: 215-229 - [c16]Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Exterminator: automatically correcting memory errors with high probability. PLDI 2007: 1-11 - [c15]Jacob Sorber, Alexander Kostadinov, Matthew Garber, Matthew Brennan, Mark D. Corner, Emery D. Berger:
Eon: a language and runtime system for perpetual systems. SenSys 2007: 161-174 - 2006
- [c14]Ting Yang, Emery D. Berger, Scott F. Kaplan, J. Eliot B. Moss:
CRAMM: Virtual Memory Support for Garbage-Collected Applications. OSDI 2006: 103-116 - [c13]Emery D. Berger, Benjamin G. Zorn:
DieHard: probabilistic memory safety for unsafe languages. PLDI 2006: 158-168 - [c12]James Cipar, Mark D. Corner, Emery D. Berger:
Transparent Contribution of Memory. USENIX ATC, General Track 2006: 109-114 - [c11]Brendan Burns, Kevin Grimaldi, Alexander Kostadinov, Emery D. Berger, Mark D. Corner:
Flux: A Language for Programming High-Performance Servers. USENIX ATC, General Track 2006: 129-142 - [c10]Jacob Sorber, Alexander Kostadinov, Matthew Brennan, Mark D. Corner, Emery D. Berger:
eFlux: Simple Automatic Adaptation for Environmentally Powered Devices. WMCSA 2006: 50 - 2005
- [c9]Yi Feng, Emery D. Berger:
A locality-improving dynamic memory allocator. Memory System Performance 2005: 68-77 - [c8]Matthew Hertz, Emery D. Berger:
Quantifying the performance of garbage collection vs. explicit memory management. OOPSLA 2005: 313-326 - [c7]Matthew Hertz, Yi Feng, Emery D. Berger:
Garbage collection without paging. PLDI 2005: 143-153 - 2004
- [c6]Ting Yang, Matthew Hertz, Emery D. Berger, Scott F. Kaplan, J. Eliot B. Moss:
Automatic heap sizing: taking real memory into account. ISMM 2004: 61-72 - [c5]Narendran Sachindran, J. Eliot B. Moss, Emery D. Berger:
MC2: high-performance garbage collection for memory-constrained environments. OOPSLA 2004: 81-98 - 2002
- [c4]Emery D. Berger, Benjamin G. Zorn, Kathryn S. McKinley:
Reconsidering custom memory allocation. OOPSLA 2002: 1-12 - 2001
- [c3]Emery D. Berger, Benjamin G. Zorn, Kathryn S. McKinley:
Composing High-Performance Memory Allocators. PLDI 2001: 114-124 - [c2]Emery D. Berger, Samuel Z. Guyer, Calvin Lin:
Customizing Software Libraries for Performance Portability. PP 2001 - 2000
- [j1]James C. Browne, Emery D. Berger, Aditya Dube:
Compositional Development of Performance Models in Poems. Int. J. High Perform. Comput. Appl. 14(4): 283-291 (2000) - [c1]Emery D. Berger, Kathryn S. McKinley, Robert D. Blumofe, Paul R. Wilson:
Hoard: A Scalable Memory Allocator for Multithreaded Applications. ASPLOS 2000: 117-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint