| 2008 |
| 34 | EE | Fay Chang,
Jeffrey Dean,
Sanjay Ghemawat,
Wilson C. Hsieh,
Deborah A. Wallach,
Michael Burrows,
Tushar Chandra,
Andrew Fikes,
Robert E. Gruber:
Bigtable: A Distributed Storage System for Structured Data.
ACM Trans. Comput. Syst. 26(2): (2008) |
| 2006 |
| 33 | EE | Fay Chang,
Jeffrey Dean,
Sanjay Ghemawat,
Wilson C. Hsieh,
Deborah A. Wallach,
Michael Burrows,
Tushar Chandra,
Andrew Fikes,
Robert Gruber:
Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!).
OSDI 2006: 205-218 |
| 32 | EE | Michael Burrows:
The Chubby Lock Service for Loosely-Coupled Distributed Systems.
OSDI 2006: 335-350 |
| 2005 |
| 31 | EE | Martín Abadi,
Michael Burrows,
Mark S. Manasse,
Ted Wobber:
Moderately hard, memory-bound functions.
ACM Trans. Internet Techn. 5(2): 299-327 (2005) |
| 2004 |
| 30 | EE | Michael Burrows,
K. Rustan M. Leino:
Finding stale-value errors in concurrent programs.
Concurrency - Practice and Experience 16(12): 1161-1172 (2004) |
| 2003 |
| 29 | EE | Martín Abadi,
Andrew Birrell,
Michael Burrows,
Frank Dabek,
Ted Wobber:
Bankable Postage for Network Services.
ASIAN 2003: 72-90 |
| 28 | EE | Michael Burrows,
Stephen N. Freund,
Janet L. Wiener:
Run-Time Type Checking for Binary Programs.
CC 2003: 90-105 |
| 27 | EE | Marcos Kawazoe Aguilera,
Minwen Ji,
Mark Lillibridge,
John MacCormick,
Erwin Oertli,
David G. Andersen,
Michael Burrows,
Timothy Mann,
Chandramohan A. Thekkath:
Block-Level Security for Network-Attached Disks.
FAST 2003 |
| 26 | EE | Martín Abadi,
Michael Burrows,
Ted Wobber:
Moderately Hard, Memory-Bound Functions.
NDSS 2003 |
| 25 | EE | Mark Lillibridge,
Sameh Elnikety,
Andrew Birrell,
Michael Burrows,
Michael Isard:
A Cooperative Internet Backup Scheme.
USENIX Annual Technical Conference, General Track 2003: 29-41 |
| 2000 |
| 24 | EE | Michael Burrows,
Úlfar Erlingsson,
Shun-Tak Leung,
Mark T. Vandevoorde,
Carl A. Waldspurger,
Kip Walker,
William E. Weihl:
Efficient and Flexible Value Sampling.
ASPLOS 2000: 160-167 |
| 1999 |
| 23 | | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
Secure Internet Programming 1999: 395-412 |
| 1997 |
| 22 | | Stefan Savage,
Michael Burrows,
Greg Nelson,
Patrick Sobalvarro,
Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs.
SOSP 1997: 27-37 |
| 21 | EE | Stefan Savage,
Michael Burrows,
Greg Nelson,
Patrick Sobalvarro,
Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multithreaded Programs.
ACM Trans. Comput. Syst. 15(4): 391-411 (1997) |
| 1996 |
| 20 | EE | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
IEEE Symposium on Security and Privacy 1996: 211-221 |
| 19 | EE | Daniel J. Scales,
Michael Burrows,
Chandramohan A. Thekkath:
Experience with Parallel Computing on the AN2 Network.
IPPS 1996: 94-103 |
| 1995 |
| 18 | | Matthias Hausner,
Michael Burrows,
Chandramohan A. Thekkath:
Efficient implementation of PVM on the AN2 ATM network.
HPCN Europe 1995: 562-569 |
| 1994 |
| 17 | EE | Edward Wobber,
Martín Abadi,
Michael Burrows:
Authentication in the Taos Operating System.
ACM Trans. Comput. Syst. 12(1): 3-32 (1994) |
| 1993 |
| 16 | | Edward Wobber,
Martín Abadi,
Michael Burrows,
Butler W. Lampson:
Authentication in the Taos Operating System.
SOSP 1993: 256-269 |
| 15 | EE | Martín Abadi,
Michael Burrows,
Butler W. Lampson,
Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems.
ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) |
| 14 | | Martín Abadi,
Michael Burrows,
C. Kaufman,
Butler W. Lampson:
Authentification and Delegation with Smart-Cards.
Sci. Comput. Program. 21(2): 93-113 (1993) |
| 1992 |
| 13 | | Michael Burrows,
Charles Jerian,
Butler W. Lampson,
Timothy Mann:
On-Line Data Compression in a Log-Structured File System.
ASPLOS 1992: 2-9 |
| 12 | EE | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
ACM Trans. Comput. Syst. 10(4): 265-310 (1992) |
| 1991 |
| 11 | EE | Martín Abadi,
Michael Burrows,
Butler W. Lampson,
Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems.
CRYPTO 1991: 1-23 |
| 10 | | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
SOSP 1991: 165-182 |
| 9 | | Martín Abadi,
Michael Burrows,
C. Kaufman,
Butler W. Lampson:
Authentication and Delegation with Smart-cards.
TACS 1991: 326-345 |
| 8 | | Michael D. Schroeder,
Andrew Birrell,
Michael Burrows,
Hal Murray,
Roger M. Needham,
Thomas L. Rodeheffer,
Edwin H. Satterthwaite,
Charles P. Thacker:
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links.
IEEE Journal on Selected Areas in Communications 9(8): 1318-1335 (1991) |
| 1990 |
| 7 | EE | Michael D. Schroeder,
Michael Burrows:
Performance of Firefly RPC.
ACM Trans. Comput. Syst. 8(1): 1-17 (1990) |
| 6 | EE | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
ACM Trans. Comput. Syst. 8(1): 18-36 (1990) |
| 5 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Rejoinder to Nessett.
Operating Systems Review 24(2): 39-40 (1990) |
| 1989 |
| 4 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
SOSP 1989: 1-13 |
| 3 | | Michael D. Schroeder,
Michael Burrows:
Performance of Firefly RPC.
SOSP 1989: 83-90 |
| 1988 |
| 2 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Authentication: A Practical Study in Belief and Action.
TARK 1988: 325-342 |
| 1 | | Roger M. Needham,
Michael Burrows:
Locks in Distributed Systems - Observations.
Operating Systems Review 22(3): 44 (1988) |