The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven D. Gribble: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Armando Fox, Steven D. Gribble, Eric A. Brewer, Elan Amir
    Adapting to Network and Client Variability via On-Demand Dynamic Distillation. [Citation Graph (1, 0)][DBLP]
    ASPLOS, 1996, pp:160-170 [Conf]
  2. Armando Fox, Steven D. Gribble, Yatin Chawathe, Eric A. Brewer, Paul Gauthier
    Cluster-Based Scalable Network Services. [Citation Graph (1, 0)][DBLP]
    SOSP, 1997, pp:78-91 [Conf]
  3. Kori Inkpen, Kellogg S. Booth, Steven D. Gribble, Maria M. Klawe
    Give and take: children collaborating on one computer. [Citation Graph (0, 0)][DBLP]
    CHI 95 Conference Companion, 1995, pp:258-259 [Conf]
  4. Randy H. Katz, Eric A. Brewer, Elan Amir, Hari Balakrishnan, Armando Fox, Steven D. Gribble, Todd D. Hodes, Daniel Jiang, Giao Thanh Nguyen, Venkata N. Padmanabhan, Mark Stemm
    The Bay Area Research Wireless Access Network (BARWAN). [Citation Graph (0, 0)][DBLP]
    COMPCON, 1996, pp:15-20 [Conf]
  5. Steven D. Gribble
    Robustness in Complex Systems. [Citation Graph (0, 0)][DBLP]
    HotOS, 2001, pp:21-26 [Conf]
  6. Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall
    Systems Directions for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    HotOS, 2001, pp:147-151 [Conf]
  7. P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble
    King: estimating latency between arbitrary internet end hosts. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:5-18 [Conf]
  8. Jared Saia, Amos Fiat, Steven D. Gribble, Anna R. Karlin, Stefan Saroiu
    Dynamically Fault-Tolerant Content Addressable Networks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:270-279 [Conf]
  9. Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble
    Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:214-224 [Conf]
  10. Armando Fox, Steven D. Gribble
    Security on the Move: Indirect Authentication using Kerberos. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1996, pp:155-164 [Conf]
  11. Alex Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy
    A Crawler-based Study of Spyware in the Web. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  12. Stefan Saroiu, Steven D. Gribble, Henry M. Levy
    Measurement and Analysis of Spyware in a University Environment. [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:141-153 [Conf]
  13. Andrew Whitaker, Richard S. Cox, Marianne Shaw, Steven D. Gribble
    Constructing Services with Interposable Virtual Hardware. [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:169-182 [Conf]
  14. Stefan Saroiu, P. Krishna Gummadi, Richard J. Dunn, Steven D. Gribble, Henry M. Levy
    An Analysis of Internet Content Delivery Systems. [Citation Graph (0, 0)][DBLP]
    OSDI, 2002, pp:- [Conf]
  15. Steven D. Gribble, Eric A. Brewer, Joseph M. Hellerstein, David E. Culler
    Scalable, Distributed Data Structures for Internet Service Construction. [Citation Graph (0, 0)][DBLP]
    OSDI, 2000, pp:319-332 [Conf]
  16. P. Krishna Gummadi, Harsha V. Madhyastha, Steven D. Gribble, Henry M. Levy, David Wetherall
    Improving the Reliability of Internet Paths with One-hop Source Routing. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:183-198 [Conf]
  17. Andrew Whitaker, Richard S. Cox, Steven D. Gribble
    Configuration Debugging as Search: Finding the Needle in the Haystack. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:77-90 [Conf]
  18. Andrew Whitaker, Marianne Shaw, Steven D. Gribble
    Scale and Performance in the Denali Isolation Kernel. [Citation Graph (0, 0)][DBLP]
    OSDI, 2002, pp:- [Conf]
  19. Richard J. Dunn, John Zahorjan, Steven D. Gribble, Henry M. Levy
    Presence-Based Availability and P2P Systems. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2005, pp:209-216 [Conf]
  20. Luke McDowell, Susan J. Eggers, Steven D. Gribble
    Improving server software support for simultaneous multithreaded processors. [Citation Graph (0, 0)][DBLP]
    PPOPP, 2003, pp:37-48 [Conf]
  21. Luke McDowell, Oren Etzioni, Steven D. Gribble, Alon Y. Halevy, Henry M. Levy, William Pentney, Deepak Verma, Stani Vlasseva
    Mangrove: Enticing Ordinary People onto the Semantic Web via Instant Gratification. [Citation Graph (0, 0)][DBLP]
    International Semantic Web Conference, 2003, pp:754-770 [Conf]
  22. P. Krishna Gummadi, Ramakrishna Gummadi, Steven D. Gribble, Sylvia Ratnasamy, Scott Shenker, Ion Stoica
    The impact of DHT routing geometry on resilience and proximity. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:381-394 [Conf]
  23. Steven D. Gribble, Gurmeet Singh Manku, Drew S. Roselli, Eric A. Brewer, Timothy J. Gibson, Ethan L. Miller
    Self-Similarity in File Systems. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:141-150 [Conf]
  24. P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan
    Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:314-329 [Conf]
  25. Richard S. Cox, Steven D. Gribble, Henry M. Levy, Jacob Gorm Hansen
    A Safety-Oriented Platform for Web Applications. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:350-364 [Conf]
  26. Armando Fox, Steven D. Gribble, Yatin Chawathe, Anthony S. Polito, Andrew C. Huang, Benjamin C. Ling, Eric A. Brewer
    Orthogonal Extensions to the WWW User Interface Using Client-Side Technologies. [Citation Graph (0, 0)][DBLP]
    ACM Symposium on User Interface Software and Technology, 1997, pp:83-84 [Conf]
  27. Steven D. Gribble, Matt Welsh, Eric A. Brewer, David E. Culler
    The MultiSpace: An Evolutionary Platform for Infrastructural Services. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 1999, pp:157-170 [Conf]
  28. Tobias Holgers, David E. Watson, Steven D. Gribble
    Cutting through the Confusion: A Measurement Study of Homograph Attacks. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:261-266 [Conf]
  29. Ian Goldberg, Steven D. Gribble, David Wagner, Eric A. Brewer
    The Ninja Jukebox. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  30. Steven D. Gribble, Eric A. Brewer
    System Design Issues for Internet Middleware Services: Deductions from a Large Client Trace. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1997, pp:- [Conf]
  31. Steven D. Gribble, Alon Y. Halevy, Zachary G. Ives, Maya Rodrig, Dan Suciu
    What Can Database Do for Peer-to-Peer? [Citation Graph (0, 0)][DBLP]
    WebDB, 2001, pp:31-36 [Conf]
  32. Luke McDowell, Oren Etzioni, Steven D. Gribble, Alon Y. Halevy, Henry M. Levy, William Pentney, Deepak Verma, Stani Vlasseva
    Evolving the Semantic Web with Mangrove. [Citation Graph (0, 0)][DBLP]
    WWW (Posters), 2003, pp:- [Conf]
  33. David W. Richardson, Steven D. Gribble, Edward D. Lazowska
    The limits of global scanning worm detectors in the presence of background noise. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:60-70 [Conf]
  34. Eric J. Anderson, Thomas E. Anderson, Steven D. Gribble, Anna R. Karlin, Stefan Savage
    A quantitative evaluation of traffic-aware routing strategies. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:67- [Journal]
  35. P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble
    A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:82- [Journal]
  36. P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble
    King: estimating latency between arbitrary internet end hosts. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:11- [Journal]
  37. Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, S. Ross, Ben Y. Zhao
    The Ninja architecture for robust Internet-scale systems and services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:4, pp:473-497 [Journal]
  38. Andrew Whitaker, Richard S. Cox, Marianne Shaw, Steven D. Gribble
    Rethinking the Design of Virtual Machine Monitors. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:5, pp:57-62 [Journal]
  39. Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble
    Measuring and analyzing the characteristics of Napster and Gnutella hosts. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:2, pp:170-184 [Journal]
  40. Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall
    System support for pervasive applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2004, v:22, n:4, pp:421-486 [Journal]
  41. Roxana Geambasu, Magdalena Balazinska, Steven D. Gribble, Henry M. Levy
    Homeviews: peer-to-peer middleware for personal data sharing applications. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2007, pp:235-246 [Conf]
  42. Eytan Adar, Daniel S. Weld, Brian N. Bershad, Steven D. Gribble
    Why we search: visualizing and predicting user behavior. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:161-170 [Conf]

  43. Flashproxy: transparently enabling rich web content via remote execution. [Citation Graph (, )][DBLP]


  44. Detecting In-Flight Page Changes with Web Tripwires. [Citation Graph (, )][DBLP]


  45. Studying Spamming Botnets Using Botlab. [Citation Graph (, )][DBLP]


  46. The Architecture and Implementation of an Extensible Web Crawler. [Citation Graph (, )][DBLP]


  47. Using time travel to diagnose computer problems. [Citation Graph (, )][DBLP]


  48. Denali: a scalable isolation kernel. [Citation Graph (, )][DBLP]


  49. Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. [Citation Graph (, )][DBLP]


  50. Organizing and sharing distributed personal web-service data. [Citation Graph (, )][DBLP]


  51. Isolating web programs in modern browser architectures. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002