default search action
Steven Hand 0001
Person information
- affiliation: Google, Mountain View, CA, USA
- affiliation (former): University of Cambridge, UK
Other persons with the same name
- Steve Hand — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c55]Jiafan Zhu, Xiao Zhang, Konstantinos Menychtas, Zhijing Gene Qin, Steven Hand, Dragos Sbirlea, Yuang Liu:
GASS: GPU Automated Sharing at Scale. CLOUD 2024: 439-445 - [c54]Yazhou Zu, Alireza Ghaffarkhah, Hoang-Vu Dang, Brian Towles, Steven Hand, Safeen Huda, Adekunle Bello, Alexander Kolbasov, Arash Rezaei, Dayou Du, Steve Lacy, Hang Wang, Aaron Wisner, Chris Lewis, Henri Bahini:
Resiliency at Scale: Managing Google's TPUv4 Machine Learning Supercomputer. NSDI 2024: 761-774 - 2022
- [c53]Paul Barham, Aakanksha Chowdhery, Jeff Dean, Sanjay Ghemawat, Steven Hand, Dan Hurt, Michael Isard, Hyeontaek Lim, Ruoming Pang, Sudip Roy, Brennan Saeta, Parker Schuh, Ryan Sepassi, Laurent El Shafey, Chandramohan A. Thekkath, Yonghui Wu:
Pathways: Asynchronous Distributed Dataflow for ML. MLSys 2022 - [i2]Paul Barham, Aakanksha Chowdhery, Jeff Dean, Sanjay Ghemawat, Steven Hand, Dan Hurt, Michael Isard, Hyeontaek Lim, Ruoming Pang, Sudip Roy, Brennan Saeta, Parker Schuh, Ryan Sepassi, Laurent El Shafey, Chandramohan A. Thekkath, Yonghui Wu:
Pathways: Asynchronous Distributed Dataflow for ML. CoRR abs/2203.12533 (2022) - 2020
- [c52]Krzysztof Rzadca, Pawel Findeisen, Jacek Swiderski, Przemyslaw Zych, Przemyslaw Broniek, Jarek Kusmierek, Pawel Nowak, Beata Strack, Piotr Witusowski, Steven Hand, John Wilkes:
Autopilot: workload autoscaling at Google. EuroSys 2020: 16:1-16:16 - [c51]Muhammad Tirmazi, Adam Barker, Nan Deng, Md E. Haque, Zhijing Gene Qin, Steven Hand, Mor Harchol-Balter, John Wilkes:
Borg: the next generation. EuroSys 2020: 30:1-30:14
2010 – 2019
- 2016
- [j10]Steve Hand:
Technical Perspective: High-performance virtualization: are we done? Commun. ACM 59(1): 107 (2016) - [c50]Ionel Gog, Malte Schwarzkopf, Adam Gleave, Robert N. M. Watson, Steven Hand:
Firmament: Fast, Centralized Cluster Scheduling at Scale. OSDI 2016: 99-115 - 2015
- [c49]Ionel Gog, Malte Schwarzkopf, Natacha Crooks, Matthew P. Grosvenor, Allen Clement, Steven Hand:
Musketeer: all for one, one for all in data processing systems. EuroSys 2015: 2:1-2:16 - [c48]Ionel Gog, Jana Giceva, Malte Schwarzkopf, Kapil Vaswani, Dimitrios Vytiniotis, Ganesan Ramalingam, Manuel Costa, Derek Gordon Murray, Steven Hand, Michael Isard:
Broom: Sweeping Out Garbage Collection from Big Data Systems. HotOS 2015 - [c47]Matthew P. Grosvenor, Malte Schwarzkopf, Ionel Gog, Robert N. M. Watson, Andrew W. Moore, Steven Hand, Jon Crowcroft:
Queues Don't Matter When You Can JUMP Them! NSDI 2015: 1-14 - [e6]Ethan L. Miller, Steven Hand:
Proceedings of the 25th Symposium on Operating Systems Principles, SOSP 2015, Monterey, CA, USA, October 4-7, 2015. ACM 2015, ISBN 978-1-4503-3834-9 [contents] - 2014
- [j9]Evangelia Kalyvianaki, Themistoklis Charalambous, Steven Hand:
Adaptive Resource Provisioning for Virtualized Servers Using Kalman Filters. ACM Trans. Auton. Adapt. Syst. 9(2): 10:1-10:35 (2014) - 2013
- [c46]Malte Schwarzkopf, Matthew P. Grosvenor, Steven Hand:
New wine in old skins: the case for distributed operating systems in the data center. APSys 2013: 9:1-9:7 - [c45]Anil Madhavapeddy, Richard Mortier, Charalampos Rotsos, David J. Scott, Balraj Singh, Thomas Gazagnaire, Steven Smith, Steven Hand, Jon Crowcroft:
Unikernels: library operating systems for the cloud. ASPLOS 2013: 461-472 - 2012
- [j8]Steven Hand:
An experiment in determinism. Commun. ACM 55(5): 110 (2012) - [j7]Hamed Haddadi, Richard Mortier, Steven Hand:
Privacy analytics. Comput. Commun. Rev. 42(2): 94-98 (2012) - [j6]Amitabha Roy, Steven Hand, Tim Harris:
Weak atomicity for the x86 memory consistency model. J. Parallel Distributed Comput. 72(10): 1306-1317 (2012) - [c44]Zubair Nabi, Toby Moncaster, Anil Madhavapeddy, Steven Hand, Jon Crowcroft:
Evolving TCP.: how hard can it be? StudentWorkshop@CoNEXT 2012: 35-36 - [c43]Malte Schwarzkopf, Steven Hand:
A down-to-earth look at the cloud host OS. HotCDP@EuroSys 2012: 3:1-3:5 - [c42]Malte Schwarzkopf, Derek Gordon Murray, Steven Hand:
The Seven Deadly Sins of Cloud Computing Research. HotCloud 2012 - [c41]Khilan Gudka, Robert N. M. Watson, Steven Hand, Ben Laurie, Anil Madhavapeddy:
Exploring Compartmentalisation Hypotheses with SOAAP. SASO Workshops 2012: 23-30 - [c40]Amir Chaudhry, Anil Madhavapeddy, Charalampos Rotsos, Richard Mortier, Andrius Aucinas, Jon Crowcroft, Sebastian Probst Eide, Steven Hand, Andrew W. Moore, Narseo Vallina-Rodriguez:
Signposts: end-to-end networking in a world of middleboxes. SIGCOMM 2012: 83-84 - [e5]Michael J. Carey, Steven Hand:
ACM Symposium on Cloud Computing, SOCC '12, San Jose, CA, USA, October 14-17, 2012. ACM 2012, ISBN 978-1-4503-1761-0 [contents] - [e4]Steven Hand, Dilma Da Silva:
Proceedings of the 8th International Conference on Virtual Execution Environments, VEE 2012, London, UK, March 3-4, 2012 (co-located with ASPLOS 2012). ACM 2012, ISBN 978-1-4503-1176-2 [contents] - [i1]Malte Schwarzkopf, Derek Gordon Murray, Steven Hand:
Please mind the gap between intra- and inter-chassis parallelism! (and how it can be closed). Tiny Trans. Comput. Sci. 1 (2012) - 2011
- [j5]Derek Gordon Murray, Steven Hand:
Skywriting on CIEL: Programming the Data Center. login Usenix Mag. 36(2) (2011) - [c39]Derek Gordon Murray, Steven Hand:
Non-Deterministic Parallelism Considered Useful. HotOS 2011 - [c38]Derek Gordon Murray, Malte Schwarzkopf, Christopher Smowton, Steven Smith, Anil Madhavapeddy, Steven Hand:
CIEL: A Universal Execution Engine for Distributed Data-Flow Computing. NSDI 2011 - [c37]Amitabha Roy, Steven Hand, Tim Harris:
Weak atomicity under the x86 memory consistency model. PPoPP 2011: 291-292 - [c36]Amitabha Roy, Steven Hand, Tim Harris:
Hybrid binary rewriting for memory access instrumentation. VEE 2011: 227-238 - [e3]Engin Kirda, Steven Hand:
Proceedings of the Fourth European Workshop on System Security, EUROSEC'11, April 10, 2011, Salzburg, Austria. ACM 2011, ISBN 978-1-4503-0613-3 [contents] - 2010
- [c35]Anil Madhavapeddy, Richard Mortier, Ripduman Sohan, Thomas Gazagnaire, Steven Hand, Tim Deegan, Derek McAuley, Jon Crowcroft:
Turning Down the LAMP: Software Specialisation for the Cloud. HotCloud 2010 - [c34]Derek Gordon Murray, Steven Hand:
Scripting the Cloud with Skywriting. HotCloud 2010 - [c33]Derek Gordon Murray, Eiko Yoneki, Jon Crowcroft, Steven Hand:
The case for crowd computing. MobiHeld 2010: 39-44
2000 – 2009
- 2009
- [c32]Amitabha Roy, Steven Hand, Tim Harris:
A runtime system for software lock elision. EuroSys 2009: 261-274 - [c31]Evangelia Kalyvianaki, Themistoklis Charalambous, Steven Hand:
Self-adaptive and self-configured CPU resource provisioning for virtualized servers using Kalman filters. ICAC 2009: 117-126 - [c30]Grzegorz Milos, Derek Gordon Murray, Steven Hand, Michael A. Fetterman:
Satori: Enlightened Page Sharing. USENIX ATC 2009 - [c29]Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand:
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. USENIX Security Symposium 2009: 51-66 - 2008
- [c28]Yu-En Lu, Pietro Liò, Steven Hand:
On low dimensional random projections and similarity search. CIKM 2008: 749-758 - [c27]Derek Gordon Murray, Steven Hand:
Privilege separation made easy: trusting small libraries not big processes. EUROSEC 2008: 40-46 - [c26]Derek Gordon Murray, Steven Hand:
Spread-Spectrum Computation. HotDep 2008 - [c25]Amitabha Roy, Keir Fraser, Steven Hand:
A transactional approach to lock scalability. SPAA 2008: 101-103 - [c24]Derek Gordon Murray, Grzegorz Milos, Steven Hand:
Improving Xen security through disaggregation. VEE 2008: 151-160 - [e2]Joseph S. Sventek, Steven Hand:
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008. ACM 2008, ISBN 978-1-60558-013-5 [contents] - 2007
- [j4]Steven Hand, Andrew Warfield, Keir Fraser:
Hardware Virtualization with Xen. login Usenix Mag. 32(1) (2007) - [c23]Yu-En Lu, Pietro Liò, Steven Hand:
Beta Random Projection. BIOWIRE 2007: 319-331 - [e1]Chandra Krintz, Steven Hand, David Tarditi:
Proceedings of the 3rd International Conference on Virtual Execution Environments, VEE 2007, San Diego, California, USA, June 13-15, 2007. ACM 2007, ISBN 978-1-59593-630-1 [contents] - 2006
- [c22]Yu-En Lu, Steven Hand, Pietro Liò:
Keyword Searching in Structured Overlays Via Content Distance Addressing. DBISP2P 2006: 259-272 - [c21]Alex Ho, Michael A. Fetterman, Christopher Clark, Andrew Warfield, Steven Hand:
Practical taint-based protection using demand emulation. EuroSys 2006: 29-41 - 2005
- [j3]Jon Crowcroft, Keir Fraser, Steven Hand, Ian Pratt, Andrew Warfield:
The Inevitability of Xen. login Usenix Mag. 30(4) (2005) - [c20]Alex Ho, Steven Hand:
On the design of a pervasive debugger. AADEBUG 2005: 117-122 - [c19]David Spence, Jon Crowcroft, Steven Hand, Tim Harris:
Location based placement of whole distributed systems. CoNEXT 2005: 124-134 - [c18]Rashid Mehmood, Jon Crowcroft, Steven Hand, Steven Smith:
Grid-level computing needs pervasive debugging. GRID 2005: 186-193 - [c17]Steven Hand, Andrew Warfield, Keir Fraser, Evangelos Kotsovinos, Daniel J. Magenheimer:
Are Virtual Machine Monitors Microkernels Done Right? HotOS 2005 - [c16]Andrew Warfield, Russ Ross, Keir Fraser, Christian Limpach, Steven Hand:
Parallax: Managing Storage for a Million Machines. HotOS 2005 - [c15]Ripduman Sohan, Steven Hand:
A User-Level Approach To Network Attached Storage. LCN 2005: 108-114 - [c14]Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield:
Live Migration of Virtual Machines. NSDI 2005 - [c13]Yu-En Lu, Steven Hand, Pietro Liò:
Keyword Searching in Hypercubic Manifolds. Peer-to-Peer Computing 2005: 150-151 - [c12]Andrew Warfield, Steven Hand, Keir Fraser, Tim Deegan:
Facilitating the Development of Soft Devices. USENIX ATC, General Track 2005: 379-382 - 2004
- [c11]Alex Ho, Steven Hand, Tim Harris:
PDB: Pervasive Debugging With Xen. GRID 2004: 260-265 - [c10]Evangelos Kotsovinos, Tim D. Moreton, Ian Pratt, Russ Ross, Keir Fraser, Steven Hand, Tim Harris:
Global-scale Service Deployment in the XenoServer Platform. WORLDS 2004 - 2003
- [j2]Timothy Roscoe, Steven Hand, Rebecca Isaacs, Richard Mortier, Paul W. Jardetzky:
Predicate routing: enabling controlled networking. Comput. Commun. Rev. 33(1): 65-70 (2003) - [j1]Jon Crowcroft, Steven Hand, Richard Mortier, Timothy Roscoe, Andrew Warfield:
Plutarch: an argument for network pluralism. Comput. Commun. Rev. 33(4): 258-266 (2003) - [c9]Steven Hand, Timothy Roscoe:
Spread Spectrum Storage with Mnemosyne. Future Directions in Distributed Computing 2003: 148-152 - [c8]Boris Dragovic, Evangelos Kotsovinos, Steven Hand, Peter R. Pietzuch:
XenoTrust: Event-based distributed trust management. DEXA Workshops 2003: 410-414 - [c7]Timothy Roscoe, Steven Hand:
Palimpsest: Soft-Capacity Storage for Planetary-Scale Services. HotOS 2003: 127-132 - [c6]Boris Dragovic, Steven Hand, Tim Harris, Evangelos Kotsovinos, Andrew Twigg:
Managing Trust and Reputation in the XenoServer Open Platform. iTrust 2003: 59-74 - [c5]Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield:
Xen and the art of virtualization. SOSP 2003: 164-177 - 2002
- [c4]Steven Hand, Timothy Roscoe:
Mnemosyne: Peer-to-Peer Steganographic Storage. IPTPS 2002: 130-140 - [c3]Timothy Roscoe, Steven Hand:
Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System. NETWORKING Workshops 2002: 335-350 - [c2]Timothy Roscoe, Richard Mortier, Paul W. Jardetzky, Steven Hand:
InfoSpect: using a logic language for system health monitoring in distributed systems. ACM SIGOPS European Workshop 2002: 31-37
1990 – 1999
- 1993
- [c1]Klaus Lenßen, Steven Hand, Arno Spinner:
Towards the Messaging System of Tomorrow. Broadband Islands 1993: 287-292
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 01:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint