dblp.uni-trier.dewww.uni-trier.de

Michael Burrows

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
34EEFay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Michael Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber: Bigtable: A Distributed Storage System for Structured Data. ACM Trans. Comput. Syst. 26(2): (2008)
2006
33EEFay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Michael Burrows, Tushar Chandra, Andrew Fikes, Robert Gruber: Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!). OSDI 2006: 205-218
32EEMichael Burrows: The Chubby Lock Service for Loosely-Coupled Distributed Systems. OSDI 2006: 335-350
2005
31EEMartín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber: Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005)
2004
30EEMichael Burrows, K. Rustan M. Leino: Finding stale-value errors in concurrent programs. Concurrency - Practice and Experience 16(12): 1161-1172 (2004)
2003
29EEMartín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber: Bankable Postage for Network Services. ASIAN 2003: 72-90
28EEMichael Burrows, Stephen N. Freund, Janet L. Wiener: Run-Time Type Checking for Binary Programs. CC 2003: 90-105
27EEMarcos Kawazoe Aguilera, Minwen Ji, Mark Lillibridge, John MacCormick, Erwin Oertli, David G. Andersen, Michael Burrows, Timothy Mann, Chandramohan A. Thekkath: Block-Level Security for Network-Attached Disks. FAST 2003
26EEMartín Abadi, Michael Burrows, Ted Wobber: Moderately Hard, Memory-Bound Functions. NDSS 2003
25EEMark Lillibridge, Sameh Elnikety, Andrew Birrell, Michael Burrows, Michael Isard: A Cooperative Internet Backup Scheme. USENIX Annual Technical Conference, General Track 2003: 29-41
2000
24EEMichael Burrows, Úlfar Erlingsson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl: Efficient and Flexible Value Sampling. ASPLOS 2000: 160-167
1999
23 Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. Secure Internet Programming 1999: 395-412
1997
22 Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson: Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. SOSP 1997: 27-37
21EEStefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson: Eraser: A Dynamic Data Race Detector for Multithreaded Programs. ACM Trans. Comput. Syst. 15(4): 391-411 (1997)
1996
20EELeendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. IEEE Symposium on Security and Privacy 1996: 211-221
19EEDaniel J. Scales, Michael Burrows, Chandramohan A. Thekkath: Experience with Parallel Computing on the AN2 Network. IPPS 1996: 94-103
1995
18 Matthias Hausner, Michael Burrows, Chandramohan A. Thekkath: Efficient implementation of PVM on the AN2 ATM network. HPCN Europe 1995: 562-569
1994
17EEEdward Wobber, Martín Abadi, Michael Burrows: Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994)
1993
16 Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson: Authentication in the Taos Operating System. SOSP 1993: 256-269
15EEMartín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993)
14 Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993)
1992
13 Michael Burrows, Charles Jerian, Butler W. Lampson, Timothy Mann: On-Line Data Compression in a Log-Structured File System. ASPLOS 1992: 2-9
12EEButler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comput. Syst. 10(4): 265-310 (1992)
1991
11EEMartín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. CRYPTO 1991: 1-23
10 Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. SOSP 1991: 165-182
9 Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentication and Delegation with Smart-cards. TACS 1991: 326-345
8 Michael D. Schroeder, Andrew Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, Charles P. Thacker: Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. IEEE Journal on Selected Areas in Communications 9(8): 1318-1335 (1991)
1990
7EEMichael D. Schroeder, Michael Burrows: Performance of Firefly RPC. ACM Trans. Comput. Syst. 8(1): 1-17 (1990)
6EEMichael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1): 18-36 (1990)
5 Michael Burrows, Martín Abadi, Roger M. Needham: Rejoinder to Nessett. Operating Systems Review 24(2): 39-40 (1990)
1989
4 Michael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. SOSP 1989: 1-13
3 Michael D. Schroeder, Michael Burrows: Performance of Firefly RPC. SOSP 1989: 83-90
1988
2 Michael Burrows, Martín Abadi, Roger M. Needham: Authentication: A Practical Study in Belief and Action. TARK 1988: 325-342
1 Roger M. Needham, Michael Burrows: Locks in Distributed Systems - Observations. Operating Systems Review 22(3): 44 (1988)

Coauthor Index

1Martín Abadi [2] [4] [5] [6] [9] [10] [11] [12] [14] [15] [16] [17] [20] [23] [26] [29] [31]
2Marcos Kawazoe Aguilera [27]
3David G. Andersen [27]
4Thomas E. Anderson [21] [22]
5Andrew Birrell [8] [25] [29]
6Tushar Chandra [33] [34]
7Fay Chang [33] [34]
8Frank Dabek [29]
9Jeffrey Dean [33] [34]
10Leendert van Doorn [20] [23]
11Sameh Elnikety [25]
12Úlfar Erlingsson [24]
13Andrew Fikes [33] [34]
14Stephen N. Freund [28]
15Sanjay Ghemawat [33] [34]
16Robert Gruber [33]
17Robert E. Gruber [34]
18Matthias Hausner [18]
19Wilson C. Hsieh [33] [34]
20Michael Isard [25]
21Charles Jerian [13]
22Minwen Ji [27]
23C. Kaufman [9] [14]
24Butler W. Lampson [9] [10] [11] [12] [13] [14] [15] [16]
25K. Rustan M. Leino [30]
26Shun-Tak Leung [24]
27Mark Lillibridge [25] [27]
28John MacCormick [27]
29Mark S. Manasse (Mark Manasse) [31]
30Timothy Mann [13] [27]
31Hal Murray [8]
32Roger M. Needham [1] [2] [4] [5] [6] [8]
33Greg Nelson [21] [22]
34Erwin Oertli [27]
35Gordon D. Plotkin [11] [15]
36Thomas L. Rodeheffer (Tom Rodeheffer) [8]
37Edwin H. Satterthwaite [8]
38Stefan Savage [21] [22]
39Daniel J. Scales [19]
40Michael D. Schroeder [3] [7] [8]
41Patrick Sobalvarro [21] [22]
42Charles P. Thacker [8]
43Chandramohan A. Thekkath [18] [19] [27]
44Mark T. Vandevoorde [24]
45Carl A. Waldspurger [24]
46Kip Walker [24]
47Deborah A. Wallach [33] [34]
48William E. Weihl [24]
49Janet L. Wiener [28]
50Edward Wobber [10] [12] [16] [17] [20] [23]
51Ted Wobber [26] [29] [31]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)