Sybilguard: defending against sybil attacks via social networks H Yu, M Kaminsky, PB Gibbons, A Flaxman Proceedings of the 2006 conference on Applications, technologies …, 2006 | 1182 | 2006 |
Sybillimit: A near-optimal social network defense against sybil attacks H Yu, PB Gibbons, M Kaminsky, F Xiao 2008 IEEE Symposium on Security and Privacy (sp 2008), 3-17, 2008 | 989 | 2008 |
Don't settle for eventual: Scalable causal consistency for wide-area storage with COPS W Lloyd, MJ Freedman, M Kaminsky, DG Andersen Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 905 | 2011 |
Cuckoo filter: Practically better than bloom B Fan, DG Andersen, M Kaminsky, MD Mitzenmacher Proceedings of the 10th ACM International on Conference on emerging …, 2014 | 885 | 2014 |
c-Through: Part-time optics in data centers G Wang, DG Andersen, M Kaminsky, K Papagiannaki, TSE Ng, M Kozuch, ... Proceedings of the ACM SIGCOMM 2010 Conference, 327-338, 2010 | 878 | 2010 |
FAWN: A fast array of wimpy nodes DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ... Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009 | 801 | 2009 |
{MICA}: A holistic approach to fast {In-Memory}{Key-Value} storage H Lim, D Han, DG Andersen, M Kaminsky 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014 | 640 | 2014 |
Using RDMA efficiently for key-value services A Kalia, M Kaminsky, DG Andersen Proceedings of the 2014 ACM Conference on SIGCOMM, 295-306, 2014 | 611 | 2014 |
Separating key management from file system security D Mazieres, M Kaminsky, MF Kaashoek, E Witchel Proceedings of the seventeenth ACM symposium on Operating systems principles …, 1999 | 554 | 1999 |
SILT: A memory-efficient, high-performance key-value store H Lim, B Fan, DG Andersen, M Kaminsky Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 552 | 2011 |
{MemC3}: Compact and concurrent {MemCache} with dumber caching and smarter hashing B Fan, DG Andersen, M Kaminsky 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013 | 525 | 2013 |
There is more consensus in egalitarian parliaments I Moraru, DG Andersen, M Kaminsky Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013 | 492 | 2013 |
Design guidelines for high performance {RDMA} systems A Kalia, M Kaminsky, DG Andersen 2016 USENIX Annual Technical Conference (USENIX ATC 16), 437-450, 2016 | 422 | 2016 |
{FaSST}: Fast, Scalable and Simple Distributed Transactions with {Two-Sided}({{{{{RDMA}}}}}) Datagram {RPCs} A Kalia, M Kaminsky, DG Andersen 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016 | 408 | 2016 |
Sybilguard: defending against sybil attacks via social networks H Yu, M Kaminsky, PB Gibbons, AD Flaxman IEEE/ACM Transactions on networking 16 (3), 576-589, 2008 | 396 | 2008 |
Stronger Semantics for {Low-Latency}{Geo-Replicated} Storage W Lloyd, MJ Freedman, M Kaminsky, DG Andersen 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013 | 377 | 2013 |
Datacenter {RPCs} can be general and fast A Kalia, M Kaminsky, D Andersen 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019 | 312 | 2019 |
Algorithmic improvements for fast concurrent cuckoo hashing X Li, DG Andersen, M Kaminsky, MJ Freedman Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 223 | 2014 |
Scalable, high performance ethernet forwarding with cuckooswitch D Zhou, B Fan, H Lim, M Kaminsky, DG Andersen Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013 | 194 | 2013 |
RE: Reliable Email. S Garriss, M Kaminsky, MJ Freedman, B Karp, D Mazières, H Yu NSDI 6, 22-22, 2006 | 192 | 2006 |