Michael J. Freedman

According to our database1, Michael J. Freedman authored at least 103 papers between 2000 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2019, "For contributions to robust distributed systems for the modern cloud".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
VectorVisor: A Binary Translation Scheme for Throughput-Oriented GPU Acceleration.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Efficient Compactions between Storage Tiers with PrismDB.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

2020
VirtualFlow: Decoupling Deep Learning Model Execution from Underlying Hardware.
CoRR, 2020

PrismDB: Read-aware Log-structured Merge Trees for Heterogeneous Storage.
CoRR, 2020

Resource Elasticity in Distributed Deep Learning.
Proceedings of Machine Learning and Systems 2020, 2020

Serverless Isn't Server-Less: Measuring and Exploiting Resource Variability on Cloud FaaS Platforms.
Proceedings of the WoSC@Middleware 2020: Proceedings of the 2020 Sixth International Workshop on Serverless Computing, 2020

2019
EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments.
CoRR, 2019

Pyronia: Redesigning Least Privilege and Isolation for the Age of IoT.
CoRR, 2019

Poor Video Streaming Performance Explained (and Fixed).
CoRR, 2019

Who's Afraid of Uncorrectable Bit Errors? Online Recovery of Flash Errors with Distributed Redundancy.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

ReLAQS: Reducing Latency for Multi-Tenant Approximate Queries via Scheduling.
Proceedings of the 20th International Middleware Conference, 2019

2018
Live Recovery of Bit Corruptions in Datacenter Storage Systems.
CoRR, 2018

Riffle: optimized shuffle service for large-scale data analytics.
Proceedings of the Thirteenth EuroSys Conference, 2018

2017
Hyperbolic Caching: Flexible Caching for Web Applications.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Live Video Analytics at Scale with Approximation and Delay-Tolerance.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

vCorfu: A Cloud-Scale Object Store on a Shared Log.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

SLAQ: quality-driven scheduling for distributed machine learning.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
Bootstrapping Trust in Distributed Systems with Blockchains.
login Usenix Mag., 2016

Efficient Set Intersection with Simulation-Based Security.
J. Cryptol., 2016

Replex: A Scalable, Highly Available Multi-Index Data Store.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Blockstack: A Global Naming and Storage System Secured by Blockchains.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Be Fast, Cheap and in Control with SwitchKV.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
HONE: Joint Host-Network Traffic Management in Software-Defined Networks.
J. Netw. Syst. Manag., 2015

CONIKS: Bringing Key Transparency to End Users.
Proceedings of the 24th USENIX Security Symposium, 2015

Ravana: controller fault-tolerance in software-defined networking.
Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, 2015

2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
IACR Cryptol. ePrint Arch., 2014

A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

Don't settle for eventual consistency.
Commun. ACM, 2014

Automating Isolation and Least Privilege in Web Services.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

From Feast to Famine: Managing Mobile Network Resources Across Environments and Preferences.
Proceedings of the 2014 Conference on Timely Results in Operating Systems, 2014

Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

From application requests to virtual IOPs: provisioned key-value storage with Libra.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Algorithmic improvements for fast concurrent Cuckoo hashing.
Proceedings of the Ninth Eurosys Conference 2014, 2014

2013
A Short Primer on Causal Consistency.
login Usenix Mag., 2013

Fairness and isolation in multi-tenant storage as optimization decomposition.
ACM SIGOPS Oper. Syst. Rev., 2013

Languages for software-defined networks.
IEEE Commun. Mag., 2013

Stronger Semantics for Low-Latency Geo-Replicated Storage.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Making Every Bit Count in Wide-Area Analytics.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013


Scalable, optimal flow routing in datacenters via local link balancing.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

Scaling IP multicast on datacenter topologies.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
Commensal cuckoo: secure group partitioning for large-scale services.
ACM SIGOPS Oper. Syst. Rev., 2012

Increasing network resilience through edge diversity in NEBULA.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2012

Privacy and Integrity are Possible in the Untrusted Cloud.
IEEE Data Eng. Bull., 2012

A Provably-Correct Protocol for Seamless Communication with Mobile, Multi-Homed Hosts
CoRR, 2012

Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

A Scalable Server for 3D Metaverses.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Performance Isolation and Fairness for Multi-Tenant Cloud Storage.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Serval: An End-Host Stack for Service-Centric Networking.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Scalable Inference of Overlapping Communities.
Proceedings of the Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012

A formally-verified migration protocol for mobile, multi-homed hosts.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Unsupervised Conversion of 3D Models for Interactive Metaverses.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

2011
Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution.
IEEE/ACM Trans. Netw., 2011

Brief Announcement: Bridging the Theory-Practice Gap in Multi-commodity Flow Routing.
Proceedings of the Distributed Computing - 25th International Symposium, 2011

Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011

Don't settle for eventual: scalable causal consistency for wide-area storage with COPS.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Identifying performance bottlenecks in CDNs through TCP-level monitoring.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Going viral: flash crowds in an open CDN.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Frenetic: a network programming language.
Proceedings of the Proceeding of the 16th ACM SIGPLAN international conference on Functional Programming, 2011

Coercing clients into facilitating failover for object delivery.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Scalable flow-based networking with DIFANE.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

DONAR: decentralized server selection for cloud services.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

SPORC: Group Collaboration using Untrusted Cloud Resources.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Prophecy: Using History for High-Throughput Fault Tolerance.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Experiences with CoralCDN: A Five-Year Operational View.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Experiences with Tracing Causality in Networked Services.
Proceedings of the 2010 Internet Network Management Workshop / Workshop on Research on Enterprise Networking, 2010

Frenetic: a high-level language for OpenFlow networks.
Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow, 2010

2009
Rethinking enterprise network control.
IEEE/ACM Trans. Netw., 2009

Scaling Virtual Worlds with a Physical Metaphor.
IEEE Pervasive Comput., 2009

Collaborative, Privacy-Preserving Data Aggregation at Scale.
IACR Cryptol. ePrint Arch., 2009

Object Storage on CRAQ: High-Throughput Chain Replication for Read-Mostly Workloads.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Comparing multilateral and bilateral exchange models for content distribution.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Bringing P2P to the web: security and privacy in the firecoral network.
Proceedings of the 8th international conference on Peer-to-peer systems, 2009

2008
A Comparison of Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution.
Proceedings of the Network Control and Optimization, Second Euro-NF Workshop, 2008

Prices are right: managing resources and incentives in peer-assisted content distribution.
Proceedings of the 7th international conference on Peer-to-peer systems, 2008

Peer-assisted content distribution with prices.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Democratizing Content Distribution.
PhD thesis, 2007

Ethane: taking control of the enterprise.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Efficient Private Techniques for Verifying Social Proximity.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

2006
Automating Server Selection with OASIS.
login Usenix Mag., 2006

SANE: A Protection Architecture for Enterprise Networks.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

RE: Reliable Email.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

OASIS: Anycast for Any Service.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

Group Therapy for Systems: Using Link Attestations to Manage Failures.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

2005
Keyword Search and Oblivious Pseudorandom Functions.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Shark: Scaling File Servers via Cooperative Caching.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Locality Prediction for Oblivious Clients.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

Geographic Locality of IP Prefixes.
Proceedings of the 5th Internet Measurement Conference, 2005

Non-Transitive Connectivity and DHTs.
Proceedings of the Second USENIX Workshop on Real, Large Distributed Systems, 2005

2004
Optimal Signcryption from Any Trapdoor Permutation.
IACR Cryptol. ePrint Arch., 2004

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Democratizing Content Publication with Coral.
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), 2004

Efficient Private Matching and Set Intersection.
Proceedings of the Advances in Cryptology, 2004

Versatile padding schemes for joint signature and encryption.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Sloppy Hashing and Self-Organizing Clusters.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

2002
Efficient Peer-to-Peer Lookup Based on a Distributed Trie.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

Tarzan: a peer-to-peer anonymizing network layer.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
A Reputation System to Increase MIX-Net Reliability.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Privacy Engineering for Digital Rights Management Systems.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
The Free Haven Project: Distributed Anonymous Storage Service.
Proceedings of the Designing Privacy Enhancing Technologies, 2000


  Loading...