The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Kaminsky: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Kaminsky, Paul Dourish, W. Keith Edwards, Anthony LaMarca, Michael Salisbury, Ian E. Smith
    SWEETPEA: Software Tools for Programmable Embodied Agents. [Citation Graph (0, 0)][DBLP]
    CHI, 1999, pp:144-151 [Conf]
  2. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman
    SybilGuard: defending against sybil attacks via social networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:267-278 [Conf]
  3. David Mazières, Michael Kaminsky, M. Frans Kaashoek, Emmett Witchel
    Separating key management from file system security. [Citation Graph (0, 0)][DBLP]
    SOSP, 1999, pp:124-139 [Conf]
  4. Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek
    Decentralized user authentication in a global file system. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:60-73 [Conf]
  5. Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazières, M. Frans Kaashoek
    REX: Secure, Extensible Remote Execution. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2004, pp:199-212 [Conf]
  6. Jeffrey Pang, Phillip B. Gibbons, Michael Kaminsky, Srinivasan Seshan, Haifeng Yu
    Defragmenting DHT-based Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:14- [Conf]
  7. Scott Garriss, Michael Kaminsky, Michael J. Freedman, Brad Karp, David Mazières, Haifeng Yu
    RE: Reliable Email. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  8. Himabindu Pucha, David G. Andersen, Michael Kaminsky
    Exploiting Similarity for Multi-Source Downloads Using File Handprints. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]
  9. Niraj Tolia, Michael Kaminsky, David G. Andersen, Swapnil Patil
    An Architecture for Internet Data Transfer. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  10. Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky
    Toward an optimal social network defense against Sybil attacks. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:376-377 [Conf]

  11. Migration without Virtualization. [Citation Graph (, )][DBLP]


  12. FAWNdamentally Power-efficient Clusters. [Citation Graph (, )][DBLP]


  13. Mark-and-sweep: getting the "inside" scoop on neighborhood networks. [Citation Graph (, )][DBLP]


  14. Efficient Similarity Estimation for Systems Exploiting Data Redundancy. [Citation Graph (, )][DBLP]


  15. Wifi-reports: improving wireless network selection with collaboration. [Citation Graph (, )][DBLP]


  16. Access Point Localization Using Local Signal Strength Gradient. [Citation Graph (, )][DBLP]


  17. DIRC: increasing indoor wireless capacity using directional antennas. [Citation Graph (, )][DBLP]


  18. c-Through: part-time optics in data centers. [Citation Graph (, )][DBLP]


  19. FAWN: a fast array of wimpy nodes. [Citation Graph (, )][DBLP]


  20. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. [Citation Graph (, )][DBLP]


  21. DSybil: Optimal Sybil-Resistance for Recommendation Systems. [Citation Graph (, )][DBLP]


  22. Adaptive File Transfers for Diverse Environments. [Citation Graph (, )][DBLP]


  23. Energy-efficient cluster computing with FAWN: workloads and implications. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002