Michael Kaminsky
Michael Kaminsky
Intel Labs
Email verificata su intel.com - Home page
Titolo
Citata da
Citata da
Anno
Sybilguard: defending against sybil attacks via social networks
H Yu, M Kaminsky, PB Gibbons, A Flaxman
Proceedings of the 2006 conference on Applications, technologiesá…, 2006
11112006
Sybillimit: A near-optimal social network defense against sybil attacks
H Yu, PB Gibbons, M Kaminsky, F Xiao
2008 IEEE Symposium on Security and Privacy (sp 2008), 3-17, 2008
9112008
Don't settle for eventual: Scalable causal consistency for wide-area storage with COPS
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
Proceedings of the Twenty-Third ACM Symposium on Operating Systemsá…, 2011
7772011
c-Through: Part-time optics in data centers
G Wang, DG Andersen, M Kaminsky, K Papagiannaki, TSE Ng, M Kozuch, ...
Proceedings of the ACM SIGCOMM 2010 Conference, 327-338, 2010
7602010
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principlesá…, 2009
7492009
Separating key management from file system security
D Mazieres, M Kaminsky, MF Kaashoek, E Witchel
Proceedings of the seventeenth ACM symposium on Operating systems principlesá…, 1999
5361999
{MICA}: A holistic approach to fast in-memory key-value storage
H Lim, D Han, DG Andersen, M Kaminsky
11th {USENIX} Symposium on Networked Systems Design and Implementationá…, 2014
5052014
Cuckoo filter: Practically better than bloom
B Fan, DG Andersen, M Kaminsky, MD Mitzenmacher
Proceedings of the 10th ACM International on Conference on emergingá…, 2014
4862014
SILT: A memory-efficient, high-performance key-value store
H Lim, B Fan, DG Andersen, M Kaminsky
Proceedings of the Twenty-Third ACM Symposium on Operating Systemsá…, 2011
4842011
Using RDMA efficiently for key-value services
A Kalia, M Kaminsky, DG Andersen
Proceedings of the 2014 ACM Conference on SIGCOMM, 295-306, 2014
4302014
Memc3: Compact and concurrent memcache with dumber caching and smarter hashing
B Fan, DG Andersen, M Kaminsky
10th {USENIX} Symposium on Networked Systems Design and Implementationá…, 2013
4002013
Sybilguard: defending against sybil attacks via social networks
H Yu, M Kaminsky, PB Gibbons, AD Flaxman
IEEE/ACM Transactions on networking 16 (3), 576-589, 2008
3562008
There is more consensus in egalitarian parliaments
I Moraru, DG Andersen, M Kaminsky
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systemsá…, 2013
3472013
Stronger semantics for low-latency geo-replicated storage
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
10th {USENIX} Symposium on Networked Systems Design and Implementationá…, 2013
3352013
Fasst: Fast, scalable and simple distributed transactions with two-sided ({RDMA}) datagram rpcs
A Kalia, M Kaminsky, DG Andersen
12th {USENIX} Symposium on Operating Systems Design and Implementationá…, 2016
2472016
Design guidelines for high performance {RDMA} systems
A Kalia, M Kaminsky, DG Andersen
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 437-450, 2016
1922016
RE: Reliable Email.
S Garriss, M Kaminsky, MJ Freedman, B Karp, D Mazieres, H Yu
NSDI 6, 22-22, 2006
1862006
Scalable, high performance ethernet forwarding with cuckooswitch
D Zhou, B Fan, H Lim, M Kaminsky, DG Andersen
Proceedings of the ninth ACM conference on Emerging networking experimentsá…, 2013
1622013
Dsybil: Optimal sybil-resistance for recommendation systems
H Yu, C Shi, M Kaminsky, PB Gibbons, F Xiao
2009 30th IEEE Symposium on Security and Privacy, 283-298, 2009
1592009
Algorithmic improvements for fast concurrent cuckoo hashing
X Li, DG Andersen, M Kaminsky, MJ Freedman
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
1582014
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20