Michael Kaminsky

According to our database1, Michael Kaminsky authored at least 87 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
RAIZN: Redundant Array of Independent Zoned Namespaces.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2021
Succinct range filters.
Commun. ACM, 2021

2020
Fast Software Cache Design for Network Appliances.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Lightweight Preemptible Functions.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Order-Preserving Key Compression for In-Memory Search Trees.
Proceedings of the 2020 International Conference on Management of Data, 2020

High availability in cheap distributed key value storage.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

Challenges and solutions for fast remote persistent memory access.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

2019
Datacenter RPCs Can Be General and Fast.
login Usenix Mag., 2019

Accelerating Deep Learning by Focusing on the Biggest Losers.
CoRR, 2019

3LC: Lightweight and Effective Traffic Compression for Distributed Machine Learning.
Proceedings of Machine Learning and Systems 2019, 2019

Scaling Video Analytics on Constrained Edge Nodes.
Proceedings of Machine Learning and Systems 2019, 2019

2018
EDF: Ensemble, Distill, and Fuse for Easy Video Labeling.
CoRR, 2018

Mainstream: Dynamic Stem-Sharing for Multi-Tenant Video Processing.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Putting the "Micro" Back in Microservice.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

SuRF: Practical Range Query Filtering with Fast Succinct Tries.
Proceedings of the 2018 International Conference on Management of Data, 2018

Building a Bw-Tree Takes More Than Just Buzz Words.
Proceedings of the 2018 International Conference on Management of Data, 2018

2017
Cicada: Dependably Fast Multi-Core In-Memory Transactions.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Using Indirect Routing to Recover from Network Traffic Scheduling Estimation Error.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

2016
Design Guidelines for High Performance RDMA Systems.
login Usenix Mag., 2016

Full-Stack Architecting to Achieve a Billion-Requests-Per-Second Throughput on a Single Key-Value Store Server Platform.
ACM Trans. Comput. Syst., 2016

Achieving One Billion Key-Value Requests per Second on a Single Server.
IEEE Micro, 2016

Reducing the Storage Overhead of Main-Memory OLTP Databases with Hybrid Indexes.
Proceedings of the 2016 International Conference on Management of Data, 2016

FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Be Fast, Cheap and in Control with SwitchKV.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Towards Accurate and Fast Evaluation of Multi-Stage Log-structured Designs.
Proceedings of the 14th USENIX Conference on File and Storage Technologies, 2016

2015
Scaling Up Clustered Network Appliances with ScaleBricks.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Raising the Bar for Using GPUs in Software Packet Processing.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Architecting to achieve a billion requests per second throughput on a single key-value store server platform.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

Scheduling techniques for hybrid circuit/packet networks.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

2014
XIA: architecting a more trustworthy and evolvable internet.
Comput. Commun. Rev., 2014

Don't settle for eventual consistency.
Commun. ACM, 2014

Using RDMA efficiently for key-value services.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

MICA: A Holistic Approach to Fast In-Memory Key-Value Storage.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

Algorithmic improvements for fast concurrent Cuckoo hashing.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Cuckoo Filter: Practically Better Than Bloom.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

Paxos Quorum Leases: Fast Reads Without Sacrificing Writes.
Proceedings of the ACM Symposium on Cloud Computing, 2014

2013
A Short Primer on Causal Consistency.
login Usenix Mag., 2013

Cuckoo Filter: Better Than Bloom.
login Usenix Mag., 2013

Space-Efficient, High-Performance Rank and Select Structures on Uncompressed Bit Sequences.
Proceedings of the Experimental Algorithms, 12th International Symposium, 2013

Consistent, durable, and safe memory management for byte-addressable non volatile main memory.
Proceedings of the First ACM SIGOPS Conference on Timely Results in Operating Systems, 2013

There is more consensus in Egalitarian parliaments.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

Stronger Semantics for Low-Latency Geo-Replicated Storage.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

When Cycles Are Cheap, Some Tables Can Be Huge.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Scalable, high performance ethernet forwarding with CuckooSwitch.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

Memory-efficient groupby-aggregate using compressed buffer trees.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013

Practical Batch-Updatable External Hashing with Sorting.
Proceedings of the 15th Meeting on Algorithm Engineering and Experiments, 2013

2012
Using vector interfaces to deliver millions of IOPS from a networked key-value storage server.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Relationship Between Continuity of Care Document Size and Patient Age.
Proceedings of the AMIA 2012, 2012

2011
Challenges and opportunities for efficient computing with FAWN.
ACM SIGOPS Oper. Syst. Rev., 2011

IdleChat: enabling high bandwidth real-time applications in residential broadband networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

FAWN: a fast array of wimpy nodes.
Commun. ACM, 2011

Don't settle for eventual: scalable causal consistency for wide-area storage with COPS.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

SILT: a memory-efficient, high-performance key-value store.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

The hare and the tortoise: taming wireless losses by exploiting wired reliability.
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011

The Case for VOS: The Vector Operating System.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Hulu in the neighborhood.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

Small cache, big effect: provable load balancing for randomly partitioned cluster services.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

Switching the optical divide: fundamental challenges for hybrid electrical/optical datacenter networks.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

2010
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.
IEEE/ACM Trans. Netw., 2010

Wifi-Reports: Improving Wireless Network Selection with Collaboration.
IEEE Trans. Mob. Comput., 2010

c-Through: part-time optics in data centers.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Pushing the envelope of indoor wireless spatial reuse using directional access points and clients.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

Efficient Similarity Estimation for Systems Exploiting Data Redundancy.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Energy-efficient cluster computing with FAWN: workloads and implications.
Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, 2010

Balancing throughput, robustness, and in-order delivery in P2P VoD.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
DSybil: Optimal Sybil-Resistance for Recommendation Systems.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

DIRC: increasing indoor wireless capacity using directional antennas.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Access Point Localization Using Local Signal Strength Gradient.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

FAWNdamentally Power-efficient Clusters.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

Migration without Virtualization.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

Your Data Center Is a Router: The Case for Reconfigurable Optical Circuit Switched Paths.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
SybilGuard: defending against sybil attacks via social networks.
IEEE/ACM Trans. Netw., 2008

Link-alike: using wireless to share network resources in a neighborhood.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

Adaptive File Transfers for Diverse Environments.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Mark-and-sweep: getting the "inside" scoop on neighborhood networks.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
Toward an optimal social network defense against Sybil attacks.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Exploiting Similarity for Multi-Source Downloads Using File Handprints.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Defragmenting DHT-based Distributed File Systems.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
An Architecture for Internet Data Transfer.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

RE: Reliable Email.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

2004
User authentication and remote execution across administrative domains.
PhD thesis, 2004

REX: Secure, Extensible Remote Execution.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

2003
Decentralized user authentication in a global file system.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

2002
Using SFS for a Secure Network File System.
login Usenix Mag., 2002

1999
Separating key management from file system security.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

SWEETPEA: Software Tools for Programmable Embodied Agents.
Proceedings of the Proceeding of the CHI '99 Conference on Human Factors in Computing Systems: The CHI is the Limit, 1999


  Loading...