default search action
Michael Burrows
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c28]Phitchaya Mangpo Phothilimthana, Sami Abu-El-Haija, Kaidi Cao, Bahare Fatemi, Michael Burrows, Charith Mendis, Bryan Perozzi:
TpuGraphs: A Performance Prediction Dataset on Large Tensor Computational Graphs. NeurIPS 2023 - 2021
- [c27]Phitchaya Mangpo Phothilimthana, Amit Sabne, Nikhil Sarda, Karthik Srinivasa Murthy, Yanqi Zhou, Christof Angermueller, Mike Burrows, Sudip Roy, Ketan Mandke, Rezsa Farahani, Yu Emma Wang, Berkin Ilbeyi, Blake A. Hechtman, Bjarke Roune, Shen Wang, Yuanzhong Xu, Samuel J. Kaufman:
A Flexible Approach to Autotuning Multi-Pass Machine Learning Compilers. PACT 2021: 1-16 - [c26]Samuel J. Kaufman, Phitchaya Mangpo Phothilimthana, Yanqi Zhou, Charith Mendis, Sudip Roy, Amit Sabne, Mike Burrows:
A Learned Performance Model for Tensor Processing Units. MLSys 2021 - 2020
- [i2]Samuel J. Kaufman, Phitchaya Mangpo Phothilimthana, Yanqi Zhou, Mike Burrows:
A Learned Performance Model for the Tensor Processing Unit. CoRR abs/2008.01040 (2020)
2010 – 2019
- 2019
- [c25]Ruoming Pang, Ramón Cáceres, Mike Burrows, Zhifeng Chen, Pratik Dave, Nathan Germer, Alexander Golynski, Kevin Graney, Nina Kang, Lea Kissner, Jeffrey L. Korn, Abhishek Parmar, Christopher D. Richards, Mengzhi Wang:
Zanzibar: Google's Consistent, Global Authorization System. USENIX ATC 2019: 33-46 - 2018
- [c24]Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Gordon Murray, Xiaoqiang Zheng:
Dynamic control flow in large-scale machine learning. EuroSys 2018: 18:1-18:15 - [i1]Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Gordon Murray, Xiaoqiang Zheng:
Dynamic Control Flow in Large-Scale Machine Learning. CoRR abs/1805.01772 (2018) - 2015
- [c23]Martín Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly:
Distributed Authorization with Distributed Grammars. Programming Languages with Applications to Biology and Security 2015: 10-26
2000 – 2009
- 2008
- [j13]Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Michael Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber:
Bigtable: A Distributed Storage System for Structured Data. ACM Trans. Comput. Syst. 26(2): 4:1-4:26 (2008) - 2006
- [c22]Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Michael Burrows, Tushar Chandra, Andrew Fikes, Robert Gruber:
Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!). OSDI 2006: 205-218 - [c21]Michael Burrows:
The Chubby Lock Service for Loosely-Coupled Distributed Systems. OSDI 2006: 335-350 - 2005
- [j12]Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber:
Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005) - 2004
- [j11]Michael Burrows, K. Rustan M. Leino:
Finding stale-value errors in concurrent programs. Concurr. Pract. Exp. 16(12): 1161-1172 (2004) - 2003
- [c20]Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber:
Bankable Postage for Network Services. ASIAN 2003: 72-90 - [c19]Michael Burrows, Stephen N. Freund, Janet L. Wiener:
Run-Time Type Checking for Binary Programs. CC 2003: 90-105 - [c18]Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibridge, John MacCormick, Erwin Oertli, David G. Andersen, Michael Burrows, Timothy P. Mann, Chandramohan A. Thekkath:
Block-Level Security for Network-Attached Disks. FAST 2003 - [c17]Martín Abadi, Michael Burrows, Ted Wobber:
Moderately Hard, Memory-Bound Functions. NDSS 2003 - [c16]Mark Lillibridge, Sameh Elnikety, Andrew Birrell, Michael Burrows, Michael Isard:
A Cooperative Internet Backup Scheme. USENIX ATC, General Track 2003: 29-41 - 2000
- [c15]Michael Burrows, Úlfar Erlingsson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl:
Efficient and Flexible Value Sampling. ASPLOS 2000: 160-167
1990 – 1999
- 1999
- [c14]Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. Secure Internet Programming 1999: 395-412 - 1997
- [j10]Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multithreaded Programs. ACM Trans. Comput. Syst. 15(4): 391-411 (1997) - [c13]Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. SOSP 1997: 27-37 - 1996
- [c12]Daniel J. Scales, Michael Burrows, Chandramohan A. Thekkath:
Experience with Parallel Computing on the AN2 Network. IPPS 1996: 94-103 - [c11]Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. S&P 1996: 211-221 - 1995
- [c10]Matthias Hausner, Michael Burrows, Chandramohan A. Thekkath:
Efficient implementation of PVM on the AN2 ATM network. HPCN Europe 1995: 562-569 - 1994
- [j9]Edward Wobber, Martín Abadi, Michael Burrows:
Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994) - 1993
- [j8]Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson:
Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993) - [j7]Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) - [c9]Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson:
Authentication in the Taos Operating System. SOSP 1993: 256-269 - 1992
- [j6]Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber:
Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comput. Syst. 10(4): 265-310 (1992) - [c8]Michael Burrows, Charles Jerian, Butler W. Lampson, Timothy P. Mann:
On-Line Data Compression in a Log-Structured File System. ASPLOS 1992: 2-9 - 1991
- [j5]Michael D. Schroeder, Andrew Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, Charles P. Thacker:
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. IEEE J. Sel. Areas Commun. 9(8): 1318-1335 (1991) - [c7]Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems. CRYPTO 1991: 1-23 - [c6]Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber:
Authentication in Distributed Systems: Theory and Practice. SOSP 1991: 165-182 - [c5]Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson:
Authentication and Delegation with Smart-cards. TACS 1991: 326-345 - 1990
- [j4]Michael Burrows, Martín Abadi, Roger M. Needham:
Rejoinder to Nessett. ACM SIGOPS Oper. Syst. Rev. 24(2): 39-40 (1990) - [j3]Michael D. Schroeder, Michael Burrows:
Performance of Firefly RPC. ACM Trans. Comput. Syst. 8(1): 1-17 (1990) - [j2]Michael Burrows, Martín Abadi, Roger M. Needham:
A Logic of Authentication. ACM Trans. Comput. Syst. 8(1): 18-36 (1990)
1980 – 1989
- 1989
- [c4]Michael Burrows, Martín Abadi, Roger M. Needham:
The Scope of a Logic of Authentication. Distributed Computing And Cryptography 1989: 119-126 - [c3]Michael Burrows, Martín Abadi, Roger M. Needham:
A Logic of Authentication. SOSP 1989: 1-13 - [c2]Michael D. Schroeder, Michael Burrows:
Performance of Firefly RPC. SOSP 1989: 83-90 - 1988
- [b1]Michael Burrows:
Efficient data sharing. University of Cambridge, UK, 1988 - [j1]Roger M. Needham, Michael Burrows:
Locks in Distributed Systems - Observations. ACM SIGOPS Oper. Syst. Rev. 22(3): 44 (1988) - [c1]Michael Burrows, Martín Abadi, Roger M. Needham:
Authentication: A Practical Study in Belief and Action. TARK 1988: 325-342
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint