Follow
David G. Andersen
David G. Andersen
Professor of Computer Science, Carnegie Mellon University
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Resilient overlay networks
D Andersen, H Balakrishnan, F Kaashoek, R Morris
Proceedings of the eighteenth ACM symposium on Operating systems principles …, 2001
29952001
Scaling distributed machine learning with the parameter server
M Li, DG Andersen, JW Park, AJ Smola, A Ahmed, V Josifovski, J Long, ...
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
16312014
c-Through: Part-time optics in data centers
G Wang, DG Andersen, M Kaminsky, K Papagiannaki, TSE Ng, M Kozuch, ...
Proceedings of the ACM SIGCOMM 2010 Conference, 327-338, 2010
7992010
Don't settle for eventual: Scalable causal consistency for wide-area storage with COPS
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
7932011
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
7452009
Cuckoo filter: Practically better than bloom
B Fan, DG Andersen, M Kaminsky, MD Mitzenmacher
Proceedings of the 10th ACM International on Conference on emerging …, 2014
5572014
Safe and effective fine-grained TCP retransmissions for datacenter communication
V Vasudevan, A Phanishayee, H Shah, E Krevat, DG Andersen, ...
ACM SIGCOMM computer communication review 39 (4), 303-314, 2009
5532009
{MICA}: A Holistic Approach to Fast {In-Memory}{Key-Value} Storage
H Lim, D Han, DG Andersen, M Kaminsky
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
5352014
The Flask Security Architecture: System Support for Diverse Security Policies
R Spencer, S Smalley, P Loscocco, M Hibler, D Andersen, J Lepreau
Usenix Security Symposium, 1999
5231999
Communication efficient distributed machine learning with the parameter server
M Li, DG Andersen, AJ Smola, K Yu
Advances in Neural Information Processing Systems 27, 2014
5052014
SILT: A memory-efficient, high-performance key-value store
H Lim, B Fan, DG Andersen, M Kaminsky
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
4962011
Accountable internet protocol (AIP)
DG Andersen, H Balakrishnan, N Feamster, T Koponen, D Moon, ...
Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 339-350, 2008
4852008
Using RDMA efficiently for key-value services
A Kalia, M Kaminsky, DG Andersen
Proceedings of the 2014 ACM Conference on SIGCOMM, 295-306, 2014
4562014
{MemC3}: Compact and Concurrent {MemCache} with Dumber Caching and Smarter Hashing
B Fan, DG Andersen, M Kaminsky
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
4322013
An empirical evaluation of entropy-based traffic anomaly detection
G Nychis, V Sekar, DG Andersen, H Kim, H Zhang
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, 151-156, 2008
4312008
There is more consensus in egalitarian parliaments
I Moraru, DG Andersen, M Kaminsky
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
3832013
Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems.
A Phanishayee, E Krevat, V Vasudevan, DG Andersen, GR Ganger, ...
FAST 8, 1-14, 2008
3542008
Stronger Semantics for {Low-Latency}{Geo-Replicated} Storage
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
3482013
Perspectives: Improving {SSH-style} Host Authentication with {Multi-Path} Probing
D Wendlandt, A Perrig
2008 USENIX Annual Technical Conference (USENIX ATC 08), 2008
3452008
Theoretical approaches to node assignment
DG Andersen
Carnegie Mellon University, 2002
3442002
The system can't perform the operation now. Try again later.
Articles 1–20