|
Search the dblp DataBase
Steven Hand:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Alex Ho, Steven Hand
On the design of a pervasive debugger. [Citation Graph (0, 0)][DBLP] AADEBUG, 2005, pp:117-122 [Conf]
- Steven Hand, Timothy Roscoe
Spread Spectrum Storage with Mnemosyne. [Citation Graph (0, 0)][DBLP] Future Directions in Distributed Computing, 2003, pp:148-152 [Conf]
- Klaus Lenßen, Steven Hand, Arno Spinner
Towards the Messaging System of Tomorrow. [Citation Graph (0, 0)][DBLP] Broadband Islands, 1993, pp:287-292 [Conf]
- Boris Dragovic, Evangelos Kotsovinos, Steven Hand, Peter R. Pietzuch
XenoTrust: Event-based distributed trust management. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:410-414 [Conf]
- Alex Ho, Steven Hand, Timothy L. Harris
PDB: Pervasive Debugging With Xen. [Citation Graph (0, 0)][DBLP] GRID, 2004, pp:260-265 [Conf]
- Timothy Roscoe, Steven Hand
Palimpsest: Soft-Capacity Storage for Planetary-Scale Services. [Citation Graph (0, 0)][DBLP] HotOS, 2003, pp:127-132 [Conf]
- Steven Hand, Timothy Roscoe
Mnemosyne: Peer-to-Peer Steganographic Storage. [Citation Graph (0, 0)][DBLP] IPTPS, 2002, pp:130-140 [Conf]
- Boris Dragovic, Steven Hand, Timothy L. Harris, Evangelos Kotsovinos, Andrew Twigg
Managing Trust and Reputation in the XenoServer Open Platform. [Citation Graph (0, 0)][DBLP] iTrust, 2003, pp:59-74 [Conf]
- Ripduman Sohan, Steven Hand
A User-Level Approach To Network Attached Storage. [Citation Graph (0, 0)][DBLP] LCN, 2005, pp:108-114 [Conf]
- Timothy Roscoe, Steven Hand
Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System. [Citation Graph (0, 0)][DBLP] NETWORKING Workshops, 2002, pp:335-350 [Conf]
- Yu-En Lu, Steven Hand, Pietro Liò
Keyword Searching in Hypercubic Manifolds. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2005, pp:150-151 [Conf]
- Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Timothy L. Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
Xen and the art of virtualization. [Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:164-177 [Conf]
- Andrew Warfield, Steven Hand, Keir Fraser, Tim Deegan
Facilitating the Development of Soft Devices. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2005, pp:379-382 [Conf]
- Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand
Practical taint-based protection using demand emulation. [Citation Graph (0, 0)][DBLP] EuroSys, 2006, pp:29-41 [Conf]
- Jon Crowcroft, Steven Hand, Richard Mortier, Timothy Roscoe, Andrew Warfield
Plutarch: an argument for network pluralism. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2003, v:33, n:4, pp:258-266 [Journal]
- Timothy Roscoe, Steven Hand, Rebecca Isaacs, Richard Mortier, Paul W. Jardetzky
Predicate routing: enabling controlled networking. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2003, v:33, n:1, pp:65-70 [Journal]
- Yu-En Lu, Steven Hand, Pietro Liò
Keyword Searching in Structured Overlays Via Content Distance Addressing. [Citation Graph (0, 0)][DBLP] DBISP2P, 2006, pp:259-272 [Conf]
- Rashid Mehmood, Jon Crowcroft, Steven Hand, Steven Smith
Grid-level computing needs pervasive debugging. [Citation Graph (0, 0)][DBLP] GRID, 2005, pp:186-193 [Conf]
- Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield
Live Migration of Virtual Machines. [Citation Graph (0, 0)][DBLP] NSDI, 2005, pp:- [Conf]
On low dimensional random projections and similarity search. [Citation Graph (, )][DBLP]
Parallax: Managing Storage for a Million Machines. [Citation Graph (, )][DBLP]
Are Virtual Machine Monitors Microkernels Done Right? [Citation Graph (, )][DBLP]
Self-adaptive and self-configured CPU resource provisioning for virtualized servers using Kalman filters. [Citation Graph (, )][DBLP]
The case for crowd computing. [Citation Graph (, )][DBLP]
InfoSpect: using a logic language for system health monitoring in distributed systems. [Citation Graph (, )][DBLP]
A transactional approach to lock scalability. [Citation Graph (, )][DBLP]
Improving Xen security through disaggregation. [Citation Graph (, )][DBLP]
A runtime system for software lock elision. [Citation Graph (, )][DBLP]
Location based placement of whole distributed systems. [Citation Graph (, )][DBLP]
Beta Random Projection. [Citation Graph (, )][DBLP]
Spread-Spectrum Computation. [Citation Graph (, )][DBLP]
Privilege separation made easy: trusting small libraries not big processes. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|