Michael Burrows

According to our database1, Michael Burrows authored at least 38 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
TpuGraphs: A Performance Prediction Dataset on Large Tensor Computational Graphs.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2021
A Learned Performance Model for Tensor Processing Units.
Proceedings of Machine Learning and Systems 2021, 2021

A Flexible Approach to Autotuning Multi-Pass Machine Learning Compilers.
Proceedings of the 30th International Conference on Parallel Architectures and Compilation Techniques, 2021

2020
A Learned Performance Model for the Tensor Processing Unit.
CoRR, 2020

2019
Zanzibar: Google's Consistent, Global Authorization System.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

2018
Dynamic control flow in large-scale machine learning.
Proceedings of the Thirteenth EuroSys Conference, 2018

2015
Distributed Authorization with Distributed Grammars.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2008
Bigtable: A Distributed Storage System for Structured Data.
ACM Trans. Comput. Syst., 2008

2006
Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!).
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

The Chubby Lock Service for Loosely-Coupled Distributed Systems.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

2005
Moderately hard, memory-bound functions.
ACM Trans. Internet Techn., 2005

2004
Finding stale-value errors in concurrent programs.
Concurr. Pract. Exp., 2004

2003
A Cooperative Internet Backup Scheme.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

Moderately Hard, Memory-Bound Functions.
Proceedings of the Network and Distributed System Security Symposium, 2003

Block-Level Security for Network-Attached Disks.
Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31, 2003

Run-Time Type Checking for Binary Programs.
Proceedings of the Compiler Construction, 12th International Conference, 2003

Bankable Postage for Network Services.
Proceedings of the Advances in Computing Science, 2003

2000
Efficient and Flexible Value Sampling.
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000

1999
Secure Network Objects.
Proceedings of the Secure Internet Programming, 1999

1997
Eraser: A Dynamic Data Race Detector for Multithreaded Programs.
ACM Trans. Comput. Syst., 1997

Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

1996
Experience with Parallel Computing on the AN2 Network.
Proceedings of IPPS '96, 1996

1995
Efficient implementation of PVM on the AN2 ATM network.
Proceedings of the High-Performance Computing and Networking, 1995

1994
Authentication in the Taos Operating System.
ACM Trans. Comput. Syst., 1994

1993
A Calculus for Access Control in Distributed Systems.
ACM Trans. Program. Lang. Syst., 1993

Authentification and Delegation with Smart-Cards.
Sci. Comput. Program., 1993

Authentication in the Taos Operating System.
Proceedings of the Fourteenth ACM Symposium on Operating System Principles, 1993

1992
Authentication in Distributed Systems: Theory and Practice.
ACM Trans. Comput. Syst., 1992

On-Line Data Compression in a Log-Structured File System.
Proceedings of the ASPLOS-V Proceedings, 1992

1991
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links.
IEEE J. Sel. Areas Commun., 1991

Authentication and Delegation with Smart-cards.
Proceedings of the Theoretical Aspects of Computer Software, 1991

1990
Performance of Firefly RPC.
ACM Trans. Comput. Syst., 1990

A Logic of Authentication.
ACM Trans. Comput. Syst., 1990

Rejoinder to Nessett.
ACM SIGOPS Oper. Syst. Rev., 1990

1989
The Scope of a Logic of Authentication.
Proceedings of the Distributed Computing And Cryptography, 1989

1988
Efficient data sharing.
PhD thesis, 1988

Locks in Distributed Systems - Observations.
ACM SIGOPS Oper. Syst. Rev., 1988

Authentication: A Practical Study in Belief and Action.
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, 1988


  Loading...