|
Search the dblp DataBase
Michael Kaminsky:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael Kaminsky, Paul Dourish, W. Keith Edwards, Anthony LaMarca, Michael Salisbury, Ian E. Smith
SWEETPEA: Software Tools for Programmable Embodied Agents. [Citation Graph (0, 0)][DBLP] CHI, 1999, pp:144-151 [Conf]
- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman
SybilGuard: defending against sybil attacks via social networks. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2006, pp:267-278 [Conf]
- David Mazières, Michael Kaminsky, M. Frans Kaashoek, Emmett Witchel
Separating key management from file system security. [Citation Graph (0, 0)][DBLP] SOSP, 1999, pp:124-139 [Conf]
- Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek
Decentralized user authentication in a global file system. [Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:60-73 [Conf]
- Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazières, M. Frans Kaashoek
REX: Secure, Extensible Remote Execution. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2004, pp:199-212 [Conf]
- Jeffrey Pang, Phillip B. Gibbons, Michael Kaminsky, Srinivasan Seshan, Haifeng Yu
Defragmenting DHT-based Distributed File Systems. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:14- [Conf]
- Scott Garriss, Michael Kaminsky, Michael J. Freedman, Brad Karp, David Mazières, Haifeng Yu
RE: Reliable Email. [Citation Graph (0, 0)][DBLP] NSDI, 2006, pp:- [Conf]
- Himabindu Pucha, David G. Andersen, Michael Kaminsky
Exploiting Similarity for Multi-Source Downloads Using File Handprints. [Citation Graph (0, 0)][DBLP] NSDI, 2007, pp:- [Conf]
- Niraj Tolia, Michael Kaminsky, David G. Andersen, Swapnil Patil
An Architecture for Internet Data Transfer. [Citation Graph (0, 0)][DBLP] NSDI, 2006, pp:- [Conf]
- Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky
Toward an optimal social network defense against Sybil attacks. [Citation Graph (0, 0)][DBLP] PODC, 2007, pp:376-377 [Conf]
Migration without Virtualization. [Citation Graph (, )][DBLP]
FAWNdamentally Power-efficient Clusters. [Citation Graph (, )][DBLP]
Mark-and-sweep: getting the "inside" scoop on neighborhood networks. [Citation Graph (, )][DBLP]
Efficient Similarity Estimation for Systems Exploiting Data Redundancy. [Citation Graph (, )][DBLP]
Wifi-reports: improving wireless network selection with collaboration. [Citation Graph (, )][DBLP]
Access Point Localization Using Local Signal Strength Gradient. [Citation Graph (, )][DBLP]
DIRC: increasing indoor wireless capacity using directional antennas. [Citation Graph (, )][DBLP]
c-Through: part-time optics in data centers. [Citation Graph (, )][DBLP]
FAWN: a fast array of wimpy nodes. [Citation Graph (, )][DBLP]
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. [Citation Graph (, )][DBLP]
DSybil: Optimal Sybil-Resistance for Recommendation Systems. [Citation Graph (, )][DBLP]
Adaptive File Transfers for Diverse Environments. [Citation Graph (, )][DBLP]
Energy-efficient cluster computing with FAWN: workloads and implications. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|