The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven Hand: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alex Ho, Steven Hand
    On the design of a pervasive debugger. [Citation Graph (0, 0)][DBLP]
    AADEBUG, 2005, pp:117-122 [Conf]
  2. Steven Hand, Timothy Roscoe
    Spread Spectrum Storage with Mnemosyne. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:148-152 [Conf]
  3. Klaus Lenßen, Steven Hand, Arno Spinner
    Towards the Messaging System of Tomorrow. [Citation Graph (0, 0)][DBLP]
    Broadband Islands, 1993, pp:287-292 [Conf]
  4. Boris Dragovic, Evangelos Kotsovinos, Steven Hand, Peter R. Pietzuch
    XenoTrust: Event-based distributed trust management. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:410-414 [Conf]
  5. Alex Ho, Steven Hand, Timothy L. Harris
    PDB: Pervasive Debugging With Xen. [Citation Graph (0, 0)][DBLP]
    GRID, 2004, pp:260-265 [Conf]
  6. Timothy Roscoe, Steven Hand
    Palimpsest: Soft-Capacity Storage for Planetary-Scale Services. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:127-132 [Conf]
  7. Steven Hand, Timothy Roscoe
    Mnemosyne: Peer-to-Peer Steganographic Storage. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:130-140 [Conf]
  8. Boris Dragovic, Steven Hand, Timothy L. Harris, Evangelos Kotsovinos, Andrew Twigg
    Managing Trust and Reputation in the XenoServer Open Platform. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:59-74 [Conf]
  9. Ripduman Sohan, Steven Hand
    A User-Level Approach To Network Attached Storage. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:108-114 [Conf]
  10. Timothy Roscoe, Steven Hand
    Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System. [Citation Graph (0, 0)][DBLP]
    NETWORKING Workshops, 2002, pp:335-350 [Conf]
  11. Yu-En Lu, Steven Hand, Pietro Liò
    Keyword Searching in Hypercubic Manifolds. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2005, pp:150-151 [Conf]
  12. Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Timothy L. Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
    Xen and the art of virtualization. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:164-177 [Conf]
  13. Andrew Warfield, Steven Hand, Keir Fraser, Tim Deegan
    Facilitating the Development of Soft Devices. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:379-382 [Conf]
  14. Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand
    Practical taint-based protection using demand emulation. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2006, pp:29-41 [Conf]
  15. Jon Crowcroft, Steven Hand, Richard Mortier, Timothy Roscoe, Andrew Warfield
    Plutarch: an argument for network pluralism. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:4, pp:258-266 [Journal]
  16. Timothy Roscoe, Steven Hand, Rebecca Isaacs, Richard Mortier, Paul W. Jardetzky
    Predicate routing: enabling controlled networking. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:65-70 [Journal]
  17. Yu-En Lu, Steven Hand, Pietro Liò
    Keyword Searching in Structured Overlays Via Content Distance Addressing. [Citation Graph (0, 0)][DBLP]
    DBISP2P, 2006, pp:259-272 [Conf]
  18. Rashid Mehmood, Jon Crowcroft, Steven Hand, Steven Smith
    Grid-level computing needs pervasive debugging. [Citation Graph (0, 0)][DBLP]
    GRID, 2005, pp:186-193 [Conf]
  19. Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield
    Live Migration of Virtual Machines. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]

  20. On low dimensional random projections and similarity search. [Citation Graph (, )][DBLP]


  21. Parallax: Managing Storage for a Million Machines. [Citation Graph (, )][DBLP]


  22. Are Virtual Machine Monitors Microkernels Done Right? [Citation Graph (, )][DBLP]


  23. Self-adaptive and self-configured CPU resource provisioning for virtualized servers using Kalman filters. [Citation Graph (, )][DBLP]


  24. The case for crowd computing. [Citation Graph (, )][DBLP]


  25. InfoSpect: using a logic language for system health monitoring in distributed systems. [Citation Graph (, )][DBLP]


  26. A transactional approach to lock scalability. [Citation Graph (, )][DBLP]


  27. Improving Xen security through disaggregation. [Citation Graph (, )][DBLP]


  28. A runtime system for software lock elision. [Citation Graph (, )][DBLP]


  29. Location based placement of whole distributed systems. [Citation Graph (, )][DBLP]


  30. Beta Random Projection. [Citation Graph (, )][DBLP]


  31. Spread-Spectrum Computation. [Citation Graph (, )][DBLP]


  32. Privilege separation made easy: trusting small libraries not big processes. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002