Year |
Citation |
Score |
2014 |
Li J, Sharma NK, Ports DRK, Gribble SD. Tales of the tail: Hardware, OS, and application-level sources of tail latency Proceedings of the 5th Acm Symposium On Cloud Computing, Socc 2014. DOI: 10.1145/2670979.2670988 |
0.442 |
|
2011 |
Geambasu R, John JP, Gribble SD, Kohno T, Levy HM. Keypad: An auditing file system for theft-prone devices Eurosys'11 - Proceedings of the Eurosys 2011 Conference. 1-15. DOI: 10.1145/1966445.1966447 |
0.423 |
|
2008 |
Moshchuk A, Gribble SD, Levy HM. Flashproxy: Transparently enabling rich Web content via remote execution Mobisys'08 - Proceedings of the 6th International Conference On Mobile Systems, Applications, and Services. 81-93. DOI: 10.1145/1378600.1378611 |
0.346 |
|
2008 |
Geambasu R, Cheung C, Moshchuk A, Gribble SD, Levy HM. Organizing and sharing distributed personal web-service data Proceeding of the 17th International Conference On World Wide Web 2008, Www'08. 755-764. DOI: 10.1145/1367497.1367599 |
0.389 |
|
2007 |
Geambasu R, Balazinska M, Gribble SD, Levy HM. Homeviews: Peer-to-peer middleware for personal data sharing applications Proceedings of the Acm Sigmod International Conference On Management of Data. 235-246. DOI: 10.1145/1247480.1247508 |
0.361 |
|
2006 |
Cox RS, Hansen JG, Gribble SD, Levy HM. A safety-oriented platform for Web applications Proceedings - Ieee Symposium On Security and Privacy. 2006: 350-364. DOI: 10.1109/SP.2006.4 |
0.391 |
|
2005 |
Whitaker A, Cox RS, Shaw M, Gribble SD. Rethinking the design of virtual machine monitors Computer. 38: 57-62. DOI: 10.1109/Mc.2005.169 |
0.383 |
|
2004 |
Grimm R, Davis J, Lemar E, MacBeth A, Swanson S, Anderson T, Bershad B, Borriello G, Gribble S, Wetherall D. System support for pervasive applications Acm Transactions On Computer Systems. 22: 421-486. DOI: 10.1145/1035582.1035584 |
0.457 |
|
2003 |
Saroiu S, Gummadi KP, Gribble SD. Measuring and analyzing the characteristics of Napster and Gnutella hosts Multimedia Systems. 9: 170-184. DOI: 10.1007/S00530-003-0088-1 |
0.337 |
|
2002 |
Whitaker A, Shaw M, Gribble SD. Denali: A scalable isolation kernel Proceedings of the 10th Workshop On Acm Sigops European Workshop, Ew 10. 10-15. DOI: 10.1145/1133373.1133375 |
0.31 |
|
2002 |
Saia J, Fiat A, Gribble S, Karlin AR, Saroiu S. Dynamically fault-tolerant content addressable networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2429: 270-279. |
0.307 |
|
2001 |
Gribble SD, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B. Ninja architecture for robust Internet-scale systems and services Computer Networks. 35: 473-497. DOI: 10.1016/S1389-1286(00)00179-1 |
0.708 |
|
2001 |
Grimm R, Davis J, Hendrickson B, Lemar E, MacBeth A, Swanson S, Anderson T, Bershad B, Borriello G, Gribble S, Wetherall D. Systems directions for pervasive computing Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 147-151. |
0.369 |
|
2000 |
Gribble SD, Brewer EA, Culler D, Hellerstein JM. Persistent distributed data structures to simplify cluster-based Internet services Acm Sigops Operating Systems Review. 34: 37-38. DOI: 10.1145/346152.346260 |
0.661 |
|
1998 |
Brewer EA, Katz RH, Chawathe Y, Gribble SD, Hodes T, Nguyen G, Stemm M, Henderson T, Amir E, Balakrishnan H, Fox A, Padmanabhan VN, Seshan S. A network architecture for heterogeneous mobile computing Ieee Personal Communications. 5: 8-24. DOI: 10.1109/98.729719 |
0.397 |
|
1998 |
Fox A, Gribble SD, Chawathe Y, Brewer EA. Adapting to network and client variation using infrastructural proxies: Lessons and perspectives Ieee Personal Communications. 5: 10-19. DOI: 10.1109/98.709365 |
0.72 |
|
1997 |
Fox A, Gribble SD, Chawathe Y, Brewer EA, Gauthier P. Cluster-Based Scalable Network Services Operating Systems Review (Acm). 31: 78-91. |
0.526 |
|
1997 |
Fox A, Gribble SD, Chawathe Y, Polito AS, Huang A, Ling B, Brewer EA. Orthogonal extensions to the WWW user interface using client-side technologies Uist (User Interface Software and Technology): Proceedings of the Acm Symposium. 83-84. |
0.322 |
|
1996 |
Fox A, Gribble SD, Brewer EA, Amir E. Adapting to network and client variability via on-demand dynamic distillation Operating Systems Review (Acm). 30: 160-170. |
0.39 |
|
1996 |
Fox A, Gribble SD. Security on the move: Indirect authentication using Kerberos Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 155-164. |
0.519 |
|
1996 |
Katz RH, Brewer EA, Amir E, Balakrishnan H, Fox A, Gribble S, Hodes T, Jiang D, Nguyen GT, Padmanabhan V, Stemm M. Bay area research wireless access network (BARWAN) Digest of Papers - Compcon - Ieee Computer Society International Conference. 15-20. |
0.527 |
|
Show low-probability matches. |