A case for NOW (networks of workstations) TE Anderson, DE Culler, D Patterson IEEE micro 15 (1), 54-64, 1995 | 1424 | 1995 |
Serverless network file systems TE Anderson, MD Dahlin, JM Neefe, DA Patterson, DS Roselli, RY Wang SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems …, 1995 | 1232 | 1995 |
Serverless network file systems TE Anderson, MD Dahlin, JM Neefe, DA Patterson, DS Roselli, RY Wang ACM Transactions on Computer Systems (TOCS) 14 (1), 41-79, 1996 | 509 | 1996 |
A case for NOW (networks of workstation) DA Patterson, DE Culler, TE Anderson Proceedings of the fourteenth annual ACM symposium on Principles of …, 1995 | 350 | 1995 |
Xen and the Art of Repeated Research. B Clark, T Deshane, EM Dow, S Evanchik, M Finlayson, J Herne, ... USENIX Annual Technical Conference, FREENIX Track, 135-144, 2004 | 271 | 2004 |
Quantifying the performance isolation properties of virtualization systems JN Matthews, W Hu, M Hapuarachchi, T Deshane, D Dimatos, G Hamilton, ... Proceedings of the 2007 workshop on Experimental computer science, 6-es, 2007 | 262 | 2007 |
Improving the performance of log-structured file systems with adaptive methods JN Matthews, D Roselli, AM Costello, RY Wang, TE Anderson ACM SIGOPS Operating Systems Review 31 (5), 238-251, 1997 | 256 | 1997 |
Quantitative comparison of Xen and KVM T Deshane, Z Shepherd, J Matthews, M Ben-Yehuda, A Shah, B Rao Xen Summit, Boston, MA, USA, 1-2, 2008 | 223 | 2008 |
System boot time reduction method RL Coulson, JI Garney, JN Matthews, RJ Royer US Patent 6,920,533, 2005 | 220 | 2005 |
Managing bias in AI D Roselli, J Matthews, N Talagala Companion proceedings of the 2019 world wide web conference, 539-544, 2019 | 196 | 2019 |
The good, the bad and the ugly of consumer cloud storage W Hu, T Yang, JN Matthews ACM SIGOPS Operating Systems Review 44 (3), 110-115, 2010 | 144 | 2010 |
Intel® turbo memory: Nonvolatile disk caches in the storage hierarchy of mainstream computer systems J Matthews, S Trika, D Hensgen, R Coulson, K Grimsrud ACM Transactions on Storage (TOS) 4 (2), 1-24, 2008 | 129 | 2008 |
Running Xen: a hands-on guide to the art of virtualization JN Matthews, EM Dow, T Deshane, W Hu, J Bongio, PF Wilbur, ... Prentice Hall PTR, 2008 | 125 | 2008 |
A study of passwords and methods used in brute-force SSH attacks J Owens, J Matthews USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 8, 2008 | 119 | 2008 |
Quantitative analysis of intrusion detection systems: Snort and Suricata JS White, T Fitzsimmons, JN Matthews Cyber sensing 2013 8757, 10-21, 2013 | 115 | 2013 |
A quantitative study of virtual machine live migration W Hu, A Hicks, L Zhang, EM Dow, V Soni, H Jiang, R Bull, JN Matthews Proceedings of the 2013 ACM cloud and autonomic computing conference, 1-10, 2013 | 110 | 2013 |
Technique to write to a non-volatile memory SN Trika, RW Faber, R Coulson, JN Matthews US Patent 7,797,479, 2010 | 104 | 2010 |
Algorithmic accountability: A primer R Caplan, J Donovan, L Hanson, J Matthews Data & Society 18, 2018 | 100 | 2018 |
Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach S Gurajala, JS White, B Hudson, JN Matthews Proceedings of the 2015 international conference on social media & society, 1-7, 2015 | 100 | 2015 |
Toward algorithmic transparency and accountability S Garfinkel, J Matthews, SS Shapiro, JM Smith Communications of the ACM 60 (9), 5-5, 2017 | 97 | 2017 |