Follow
David G. Andersen
David G. Andersen
Professor of Computer Science, Carnegie Mellon University
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Resilient overlay networks
D Andersen, H Balakrishnan, F Kaashoek, R Morris
Proceedings of the eighteenth ACM symposium on Operating systems principles …, 2001
29942001
Scaling distributed machine learning with the parameter server
M Li, DG Andersen, JW Park, AJ Smola, A Ahmed, V Josifovski, J Long, ...
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
16272014
c-Through: Part-time optics in data centers
G Wang, DG Andersen, M Kaminsky, K Papagiannaki, TSE Ng, M Kozuch, ...
Proceedings of the ACM SIGCOMM 2010 Conference, 327-338, 2010
7992010
Don't settle for eventual: Scalable causal consistency for wide-area storage with COPS
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
7932011
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
7442009
Cuckoo filter: Practically better than bloom
B Fan, DG Andersen, M Kaminsky, MD Mitzenmacher
Proceedings of the 10th ACM International on Conference on emerging …, 2014
5562014
Safe and effective fine-grained TCP retransmissions for datacenter communication
V Vasudevan, A Phanishayee, H Shah, E Krevat, DG Andersen, ...
ACM SIGCOMM computer communication review 39 (4), 303-314, 2009
5532009
{MICA}: A Holistic Approach to Fast {In-Memory}{Key-Value} Storage
H Lim, D Han, DG Andersen, M Kaminsky
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
5342014
The Flask Security Architecture: System Support for Diverse Security Policies
R Spencer, S Smalley, P Loscocco, M Hibler, D Andersen, J Lepreau
Usenix Security Symposium, 1999
5231999
Communication efficient distributed machine learning with the parameter server
M Li, DG Andersen, AJ Smola, K Yu
Advances in Neural Information Processing Systems 27, 2014
5012014
SILT: A memory-efficient, high-performance key-value store
H Lim, B Fan, DG Andersen, M Kaminsky
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
4962011
Accountable internet protocol (AIP)
DG Andersen, H Balakrishnan, N Feamster, T Koponen, D Moon, ...
Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 339-350, 2008
4852008
Using RDMA efficiently for key-value services
A Kalia, M Kaminsky, DG Andersen
Proceedings of the 2014 ACM Conference on SIGCOMM, 295-306, 2014
4552014
{MemC3}: Compact and Concurrent {MemCache} with Dumber Caching and Smarter Hashing
B Fan, DG Andersen, M Kaminsky
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
4322013
An empirical evaluation of entropy-based traffic anomaly detection
G Nychis, V Sekar, DG Andersen, H Kim, H Zhang
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, 151-156, 2008
4312008
There is more consensus in egalitarian parliaments
I Moraru, DG Andersen, M Kaminsky
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
3822013
Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems.
A Phanishayee, E Krevat, V Vasudevan, DG Andersen, GR Ganger, ...
FAST 8, 1-14, 2008
3542008
Stronger Semantics for {Low-Latency}{Geo-Replicated} Storage
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
3472013
Perspectives: Improving {SSH-style} Host Authentication with {Multi-Path} Probing
D Wendlandt, A Perrig
2008 USENIX Annual Technical Conference (USENIX ATC 08), 2008
3442008
Theoretical approaches to node assignment
DG Andersen
Carnegie Mellon University, 2002
3442002
The system can't perform the operation now. Try again later.
Articles 1–20