Follow
Michael Kaminsky
Michael Kaminsky
Intel Labs
Verified email at intel.com - Homepage
Title
Cited by
Cited by
Year
Sybilguard: defending against sybil attacks via social networks
H Yu, M Kaminsky, PB Gibbons, A Flaxman
Proceedings of the 2006 conference on Applications, technologies …, 2006
11242006
Sybillimit: A near-optimal social network defense against sybil attacks
H Yu, PB Gibbons, M Kaminsky, F Xiao
2008 IEEE Symposium on Security and Privacy (sp 2008), 3-17, 2008
9352008
c-Through: Part-time optics in data centers
G Wang, DG Andersen, M Kaminsky, K Papagiannaki, TSE Ng, M Kozuch, ...
Proceedings of the ACM SIGCOMM 2010 Conference, 327-338, 2010
7972010
Don't settle for eventual: Scalable causal consistency for wide-area storage with COPS
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
7952011
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
7482009
Cuckoo filter: Practically better than bloom
B Fan, DG Andersen, M Kaminsky, MD Mitzenmacher
Proceedings of the 10th ACM International on Conference on emerging …, 2014
5612014
{MICA}: A Holistic Approach to Fast {In-Memory}{Key-Value} Storage
H Lim, D Han, DG Andersen, M Kaminsky
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
5392014
Separating key management from file system security
D Mazieres, M Kaminsky, MF Kaashoek, E Witchel
Proceedings of the seventeenth ACM symposium on Operating systems principles …, 1999
5391999
SILT: A memory-efficient, high-performance key-value store
H Lim, B Fan, DG Andersen, M Kaminsky
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
5042011
Using RDMA efficiently for key-value services
A Kalia, M Kaminsky, DG Andersen
Proceedings of the 2014 ACM Conference on SIGCOMM, 295-306, 2014
4642014
{MemC3}: Compact and Concurrent {MemCache} with Dumber Caching and Smarter Hashing
B Fan, DG Andersen, M Kaminsky
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
4362013
There is more consensus in egalitarian parliaments
I Moraru, DG Andersen, M Kaminsky
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
3862013
Sybilguard: defending against sybil attacks via social networks
H Yu, M Kaminsky, PB Gibbons, AD Flaxman
IEEE/ACM Transactions on networking 16 (3), 576-589, 2008
3702008
Stronger Semantics for {Low-Latency}{Geo-Replicated} Storage
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
3482013
{FaSST}: Fast, Scalable and Simple Distributed Transactions with {Two-Sided}({{{{{RDMA}}}}}) Datagram {RPCs}
A Kalia, M Kaminsky, DG Andersen
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
2892016
Design guidelines for high performance {RDMA} systems
A Kalia, M Kaminsky, DG Andersen
2016 USENIX Annual Technical Conference (USENIX ATC 16), 437-450, 2016
2672016
RE: Reliable Email.
S Garriss, M Kaminsky, MJ Freedman, B Karp, D Mazieres, H Yu
NSDI 6, 22-22, 2006
1892006
Algorithmic improvements for fast concurrent cuckoo hashing
X Li, DG Andersen, M Kaminsky, MJ Freedman
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
1792014
Scalable, high performance ethernet forwarding with cuckooswitch
D Zhou, B Fan, H Lim, M Kaminsky, DG Andersen
Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013
1672013
Dsybil: Optimal sybil-resistance for recommendation systems
H Yu, C Shi, M Kaminsky, PB Gibbons, F Xiao
2009 30th IEEE Symposium on Security and Privacy, 283-298, 2009
1652009
The system can't perform the operation now. Try again later.
Articles 1–20