default search action
Kenneth P. Birman
Person information
- affiliation: Cornell University, Ithaca, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c129]Aarushi Gupta, Yuexing Hao, Yuting Yang, Tiancheng Yuan, Matthias Wieland, Parminder S. Basran, Ken Birman:
Digital Twin-Driven Teat Localization and Shape Identification for Dairy Cow (Student Abstract). AAAI 2024: 23510-23511 - [c128]Yuting Yang, Andrea Merlina, Weijia Song, Tiancheng Yuan, Ken Birman, Roman Vitenberg:
Navigator: A Decentralized Scheduler for Latency-Sensitive AI Workflows. EDGE 2024: 35-47 - [c127]Ramana Nagasamudram, Lennart Beringer, Ken Birman, Mae Milano, David A. Naumann:
Verifying a C Implementation of Derecho's Coordination Mechanism Using VST and Coq. NFM 2024: 99-117 - [i8]Yuting Yang, Andrea Merlina, Weijia Song, Tiancheng Yuan, Ken Birman, Roman Vitenberg:
Compass: A Decentralized Scheduler for Latency-Sensitive ML Workflows. CoRR abs/2402.17652 (2024) - 2023
- [c126]Ken Birman, Sagar Jha, Mae Milano, Lorenzo Rosa, Weijia Song, Edward Tremel:
Invited Paper: Monotonicity and Opportunistically-Batched Actions in Derecho. SSS 2023: 172-190 - [c125]Yifan Wang, Weijia Song, Yuting Yang, Charif Mahmoudi, Shashank Shekhar, Kenneth P. Birman:
Dash: A Low Code Development Platform for AI Applications in Industry. UEMCON 2023: 72-81 - [i7]Weijia Song, Thiago Garrett, Yuting Yang, Mingzhao Liu, Edward Tremel, Lorenzo Rosa, Andrea Merlina, Roman Vitenberg, Ken Birman:
Cascade: A Platform for Delay-Sensitive Edge Intelligence. CoRR abs/2311.17329 (2023) - [i6]Thiago Garrett, Weijia Song, Roman Vitenberg, Ken Birman:
Low-Latency ML Inference by Grouping Correlated Data Objects and Computation. CoRR abs/2312.11488 (2023) - 2022
- [c124]Pengze Li, Lichen Pan, Xinzhe Yang, Weijia Song, Zhen Xiao, Ken Birman:
Stabilizer: Geo-Replication with User-defined Consistency. ICDCS 2022: 359-369 - [c123]Sagar Jha, Lorenzo Rosa, Ken Birman:
Spindle: Techniques for Optimizing Atomic Multicast on RDMA. ICDCS 2022: 1085-1097 - [c122]Weijia Song, Yuting Yang, Thompson Liu, Andrea Merlina, Thiago Garrett, Roman Vitenberg, Lorenzo Rosa, Aahil Awatramani, Zheng Wang, Ken Birman:
Cascade: An Edge Computing Platform for Real-time Machine Intelligence. ApPLIED@PODC 2022: 2-6 - 2021
- [c121]Lorenzo Rosa, Weijia Song, Luca Foschini, Antonio Corradi, Ken Birman:
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications. MILCOM 2021: 684-689 - [i5]Sagar Jha, Lorenzo Rosa, Ken Birman:
Spindle: Techniques for Optimizing Atomic Multicast on RDMA. CoRR abs/2110.00886 (2021) - 2020
- [c120]Edward Tremel, Sagar Jha, Weijia Song, David C. Y. Chu, Ken Birman:
Reliable, Efficient Recovery for Complex Services with Replicated Subsystems. DSN 2020: 172-183
2010 – 2019
- 2019
- [j67]Ken Birman, Bharath Hariharan, Christopher De Sa:
Cloud-Hosted Intelligence for Real-time IoT Applications. ACM SIGOPS Oper. Syst. Rev. 53(1): 7-13 (2019) - [j66]Edward Tremel, Ken Birman, Robert Kleinberg, Márk Jelasity:
Anonymous, Fault-Tolerant Distributed Queries for Smart Devices. ACM Trans. Cyber Phys. Syst. 3(2): 16:1-16:29 (2019) - [j65]David Anderson, Theo Gkountouvas, Ming Meng, Ken Birman, Anjan Bose, Carl Hauser, Eugene Litvinov, Xiaochuan Luo, Qiang Zhang:
GridCloud: Infrastructure for Cloud-Based Wide Area Monitoring of Bulk Electric Power Grids. IEEE Trans. Smart Grid 10(2): 2170-2179 (2019) - 2018
- [j64]Sagar Jha, Jonathan Behrens, Theo Gkountouvas, Mae Milano, Weijia Song, Edward Tremel, Robbert van Renesse, Sydney Zink, Kenneth P. Birman:
Derecho: Fast State Machine Replication for Cloud Services. ACM Trans. Comput. Syst. 36(2): 4:1-4:49 (2018) - [c119]Jonathan Behrens, Sagar Jha, Ken Birman, Edward Tremel:
RDMC: A Reliable RDMA Multicast for Large Objects. DSN 2018: 71-82 - 2017
- [c118]Sagar Jha, Jonathan Behrens, Theo Gkountouvas, Mae Milano, Weijia Song, Edward Tremel, Sydney Zink, Ken Birman, Robbert van Renesse:
Building smart memories and high-speed cloud services for the internet of things with derecho. SoCC 2017: 632 - 2016
- [c117]Weijia Song, Theo Gkountouvas, Ken Birman, Qi Chen, Zhen Xiao:
The Freeze-Frame File System. SoCC 2016: 307-320 - [c116]Zhiyuan Teo, Ken Birman, Robbert van Renesse:
Experience with 3 SDN Controllers in an Enterprise Setting. DSN Workshops 2016: 97-104 - [c115]Zhiyuan Teo, Kenneth P. Birman, Noah J. Apthorpe, Robbert van Renesse, Vasily Kuksenkov:
Treating software-defined networks like disk arrays. NetSoft 2016: 361-366 - 2015
- [j63]Ken Birman, Márk Jelasity, Robert Kleinberg, Edward Tremel:
Building a Secure and Privacy-Preserving Smart Grid. ACM SIGOPS Oper. Syst. Rev. 49(1): 131-136 (2015) - [c114]Ittay Eyal, Ken Birman, Robbert van Renesse:
Cache Serializability: Reducing Inconsistency in Edge Transactions. ICDCS 2015: 686-695 - [c113]Ken Birman:
Evolution of fault tolerance. SOSP History Day 2015: 7:1-7:32 - 2014
- [j62]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
A brief overview of the NEBULA future internet architecture. Comput. Commun. Rev. 44(3): 81-86 (2014) - [c112]Zhiyuan Teo, Vera Kutsenko, Ken Birman, Robbert van Renesse:
Ironstack: Performance, Stability and Security for Power Grid Data Networks. DSN 2014: 792-797 - [c111]Lonnie Princehouse, Rakesh Chenchu, Zhefu Jiang, Kenneth P. Birman, Nate Foster, Robert Soulé:
MiCA: A Compositional Architecture for Gossip Protocols. ECOOP 2014: 644-669 - [c110]Qi Huang, Helga Gudmundsdottir, Ymir Vigfusson, Daniel A. Freedman, Ken Birman, Robbert van Renesse:
Characterizing Load Imbalance in Real-World Networked Caches. HotNets 2014: 8:1-8:7 - [c109]Márk Jelasity, Kenneth P. Birman:
Distributional differential privacy for large-scale smart metering. IH&MMSec 2014: 141-146 - [c108]Parisa Jalili Marandi, Samuel Benz, Fernando Pedone, Kenneth P. Birman:
The Performance of Paxos in the Cloud. SRDS 2014: 41-50 - [p1]Thoshitha T. Gamage, David Anderson, David E. Bakken, Kenneth P. Birman, Anjan Bose, Carl Hauser, Ketan Maheshwari, Robbert van Renesse:
Mission-Critical Cloud Computing for Critical Infrastructures. Smart Grids 2014: 1-16 - [e4]Ken Birman:
2014 Conference on Timely Results in Operating Systems, TRIOS '14, Broomfield, CO, USA, October 5, 2014. USENIX Association 2014 [contents] - [i4]Parisa Jalili Marandi, Samuel Benz, Fernando Pedone, Ken Birman:
Practical Experience Report: The Performance of Paxos in the Cloud. CoRR abs/1404.6719 (2014) - [i3]Ittay Eyal, Ken Birman, Robbert van Renesse:
Controlled Transactional Consistency for Web Caching. CoRR abs/1409.8324 (2014) - 2013
- [j61]Lakshmi Ganesh, Hakim Weatherspoon, Tudor Marian, Ken Birman:
Integrated Approach to Data Center Power Management. IEEE Trans. Computers 62(6): 1086-1096 (2013) - [c107]Ketan Maheshwari, Ken Birman, Justin M. Wozniak, Devin Van Zandt:
Evaluating Cloud Computing Techniques for Smart Power Grid Design Using Parallel Scripting. CCGRID 2013: 319-326 - [c106]Robert Surton, Ken Birman, Robbert van Renesse:
Application-driven TCP recovery and non-stop BGP. DSN 2013: 1-12 - [c105]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
The NEBULA Future Internet Architecture. Future Internet Assembly 2013: 16-26 - [c104]Ketan Maheshwari, Marcus Lim, Lydia Wang, Ken Birman, Robbert van Renesse:
Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud. ISGT 2013: 1-6 - [c103]Ken Birman, Heesung Sohn:
Hosting dynamic data in the cloud with Isis2 and the Ida DHT. TRIOS@SOSP 2013: 10:1-10:15 - [c102]Qi Huang, Ken Birman, Robbert van Renesse, Wyatt Lloyd, Sanjeev Kumar, Harry C. Li:
An analysis of Facebook photo caching. SOSP 2013: 167-181 - 2012
- [b1]Kenneth P. Birman:
Guide to Reliable Distributed Systems - Building High-Assurance Applications and Cloud-Hosted Services. Texts in Computer Science, Springer 2012, ISBN 978-1-4471-2415-3, pp. I-XXII, 1-730 - [j60]Kenneth P. Birman, Daniel A. Freedman, Qi Huang, Patrick Dowell:
Overcoming CAP with Consistent Soft-State Replication. Computer 45(2): 50-58 (2012) - [c101]Ymir Vigfusson, Ken Birman, Daniel A. Freedman, Qi Huang, Kristján Valur Jónsson, Gunnar Sigurbjörnsson:
Brief announcement: live streaming with utilities, quality and cost. PODC 2012: 341-342 - 2011
- [j59]Andrei Agapi, Ken Birman, Robert M. Broberg, Chase Cotton, Thilo Kielmann, Martin Millnert, Rick Payne, Robert Surton, Robbert van Renesse:
Routers for the Cloud: Can the Internet Achieve 5-Nines Availability? IEEE Internet Comput. 15(5): 72-77 (2011) - [j58]Mahesh Balakrishnan, Tudor Marian, Kenneth P. Birman, Hakim Weatherspoon, Lakshmi Ganesh:
Maelstrom: transparent error correction for communication between data centers. IEEE/ACM Trans. Netw. 19(3): 617-629 (2011) - [c100]Lakshmi Ganesh, Hakim Weatherspoon, Ken Birman:
Beyond Power Proportionality: Designing Power-Lean Cloud Storage. NCA 2011: 147-154 - 2010
- [j57]Krzysztof Ostrowski, Ken Birman:
Storing and accessing live mashup content in the cloud. ACM SIGOPS Oper. Syst. Rev. 44(2): 7-11 (2010) - [j56]Ymir Vigfusson, Ken Birman, Qi Huang, Deepak P. Nataraj:
Optimizing information flow in the gossip objects platform. ACM SIGOPS Oper. Syst. Rev. 44(2): 71-76 (2010) - [c99]Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li:
Quilt: a patchwork of multicast regions. DEBS 2010: 184-195 - [c98]Tudor Marian, Daniel A. Freedman, Ken Birman, Hakim Weatherspoon:
Empirical characterization of uncongested optical lambda networks and 10GbE commodity endpoints. DSN 2010: 575-584 - [c97]Krzysztof Ostrowski, Chuck Sakoda, Ken Birman:
Self-Replicating Objects for Multicore Platforms. ECOOP 2010: 452-477 - [c96]Ymir Vigfusson, Hussam Abu-Libdeh, Mahesh Balakrishnan, Ken Birman, Robert Burgess, Gregory V. Chockler, Haoyuan Li, Yoav Tock:
Dr. multicast: Rx for data center communication scalability. EuroSys 2010: 349-362 - [c95]Daniel A. Freedman, Tudor Marian, Jennifer H. Lee, Ken Birman, Hakim Weatherspoon, Chris Xu:
Exact temporal characterization of 10 Gbps optical wide-area network. Internet Measurement Conference 2010: 342-355 - [c94]Dmitry Basin, Ken Birman, Idit Keidar, Ymir Vigfusson:
Sources of instability in data center multicast. LADIS 2010: 32-37 - [c93]Qi Huang, Daniel A. Freedman, Ymir Vigfusson, Ken Birman, Bo Peng:
Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications. Middleware 2010: 148-168 - [c92]Dmitry Basin, Ken Birman, Idit Keidar, Ymir Vigfusson:
Brief announcement: sources of instability in data center multicast. PODC 2010: 126 - [c91]Ken Birman:
A History of the Virtual Synchrony Replication Model. Replication 2010: 91-120
2000 – 2009
- 2009
- [j55]Ken Birman, Fred B. Schneider:
Viewpoint - Program committee overload in systems. Commun. ACM 52(5): 34-37 (2009) - [j54]Ken Birman, Jared Cantwell, Daniel A. Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski:
Edge Mashups for Service-Oriented Collaboration. Computer 42(5): 90-94 (2009) - [j53]Kenneth P. Birman, Fred B. Schneider:
The Monoculture Risk Put into Context. IEEE Secur. Priv. 7(1): 14-17 (2009) - [j52]Ken Birman, Gregory V. Chockler, Robbert van Renesse:
Toward a cloud computing research agenda. SIGACT News 40(2): 68-80 (2009) - [j51]Lonnie Princehouse, Ken Birman:
Code-partitioning gossip. ACM SIGOPS Oper. Syst. Rev. 43(4): 40-44 (2009) - [j50]Vincent Gramoli, Ymir Vigfusson, Ken Birman, Anne-Marie Kermarrec, Robbert van Renesse:
Slicing Distributed Systems. IEEE Trans. Computers 58(11): 1444-1455 (2009) - [j49]Kenneth M. Hopkinson, Kate Jenkins, Kenneth P. Birman, James S. Thorp, Gregory Toussaint, Manu Parashar:
Adaptive Gravitational Gossip: A Gossip-Based Communication Protocol with User-Selectable Rates. IEEE Trans. Parallel Distributed Syst. 20(12): 1830-1843 (2009) - [c90]Krzysztof Ostrowski, Ken Birman, Danny Dolev, Chuck Sakoda:
Implementing reliable event streams in large systems via distributed data flows and recursive delegation. DEBS 2009 - [c89]Hakim Weatherspoon, Lakshmi Ganesh, Tudor Marian, Mahesh Balakrishnan, Ken Birman:
Smoke and Mirrors: Reflecting Files at a Geographically Remote Location Without Loss of Performance. FAST 2009: 211-224 - [c88]Ken Birman:
Rethinking Multicast for Massive-Scale Platforms. ICDCS 2009: 1 - [c87]Krzysztof Ostrowski, Kenneth P. Birman:
WS-OBJECTS: Extending Service-Oriented Architecture with Hierarchical Composition of Client-Side Asynchronous Event-Processing Logic. ICWS 2009: 25-34 - [c86]Ken Birman, Jared Cantwell, Daniel A. Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski:
Building Collaboration Applications that Mix Web Services Hosted Content with P2P Protocols. ICWS 2009: 509-518 - [c85]Michael Siegenthaler, Ken Birman:
Sharing Private Information Across Distributed Databases. NCA 2009: 82-89 - [c84]Ymir Vigfusson, Ken Birman, Qi Huang, Deepak P. Nataraj:
GO: Platform Support For Gossip Applications. Peer-to-Peer Computing 2009: 222-231 - [c83]Michael Siegenthaler, Ken Birman:
Privacy enforcement for distributed healthcare queries. PervasiveHealth 2009: 1-6 - [c82]Lonnie Princehouse, Ken Birman:
Code-Partitioning Gossip. PLOS@SOSP 2009: 3:1-3:5 - [c81]Krzysztof Ostrowski, Ken Birman, Danny Dolev:
Distributed data flow language for multi-party protocols. PLOS@SOSP 2009: 7:1-7:5 - 2008
- [j48]Stefan Pleisch, Kenneth P. Birman:
SENSTRAC: scalable querying of sensor networks from mobile platforms using tracking-style queries. Int. J. Sens. Networks 3(4): 266-280 (2008) - [c80]Tudor Marian, Mahesh Balakrishnan, Ken Birman, Robbert van Renesse:
Tempest: Soft state replication in the service tier. DSN 2008: 227-236 - [c79]Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong Hoon Ahnn:
Programming with Live Distributed Objects. ECOOP 2008: 463-489 - [c78]Ymir Vigfusson, Hussam Abu-Libdeh, Mahesh Balakrishnan, Ken Birman, Yoav Tock:
Dr. Multicast: Rx for Datacenter Communication Scalability. HotNets 2008: 61-66 - [c77]Ymir Vigfusson, Hussam Abu-Libdeh, Mahesh Balakrishnan, Ken Birman, Yoav Tock:
Dr. Multicast: Rx for data center communication scalability. LADIS 2008: 10:1-10:12 - [c76]Jong Hoon Ahnn, Ken Birman, Krzysztof Ostrowski, Robbert van Renesse:
Using live distributed objects for office automation. Middleware (Companion) 2008: 30-35 - [c75]Jong Hoon Ahnn, Ken Birman, Krzysztof Ostrowski, Robbert van Renesse:
Using live distributed objects for office automation: demo proposal. Middleware (Companion) 2008: 70-73 - [c74]Krzysztof Ostrowski, Ken Birman, Danny Dolev:
Quicksilver Scalable Multicast (QSM). NCA 2008: 9-18 - [c73]Mahesh Balakrishnan, Tudor Marian, Ken Birman, Hakim Weatherspoon, Einar Vollset:
Maelstrom: Transparent Error Correction for Lambda Networks. NSDI 2008: 263-278 - [c72]Ken Birman:
Overcoming Challenges of Maturity. WOWCS 2008 - [c71]Vincent Gramoli, Ymir Vigfusson, Ken Birman, Anne-Marie Kermarrec, Robbert van Renesse:
A fast distributed slicing algorithm. PODC 2008: 427 - 2007
- [j47]Krzysztof Ostrowski, Ken Birman, Danny Dolev:
Live Distributed Objects: Enabling the Active Web. IEEE Internet Comput. 11(6): 72-78 (2007) - [j46]Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Kenneth P. Birman, Alan J. Demers:
Active and passive techniques for group size estimation in large-scale and dynamic distributed systems. J. Syst. Softw. 80(10): 1639-1658 (2007) - [j45]Krzysztof Ostrowski, Ken Birman, Danny Dolev:
Extensible Architecture for High-Performance, Scalable, Reliable Publish-Subscribe Eventing and Notification. Int. J. Web Serv. Res. 4(4): 18-58 (2007) - [j44]Ken Birman:
The promise, and limitations, of gossip protocols. ACM SIGOPS Oper. Syst. Rev. 41(5): 8-13 (2007) - [c70]Ken Birman, Mahesh Balakrishnan, Danny Dolev, Tudor Marian, Krzysztof Ostrowski, Amar Phanishayee:
Scalable Multicast Platforms for a New Generation of Robust Distributed Applications. COMSWARE 2007 - [c69]Lakshmi Ganesh, Hakim Weatherspoon, Mahesh Balakrishnan, Ken Birman:
Optimizing Power Consumption in Large Scale Storage Systems. HotOS 2007 - [c68]Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrowski, Marin Bertier, Danny Dolev, Robbert van Renesse:
Exploiting Gossip for Self-Management in Scalable Event Notification Systems. ICDCS Workshops 2007: 62 - [c67]Mahesh Balakrishnan, Kenneth P. Birman, Amar Phanishayee, Stefan Pleisch:
Ricochet: Lateral Error Correction for Time-Critical Multicast. NSDI 2007 - 2006
- [j43]Kenneth P. Birman, Robbert van Renesse, Werner Vogels:
Navigating in the Storm: Using Astrolabe to Adaptively Configure Web Services and Their Clients. Clust. Comput. 9(2): 127-139 (2006) - [j42]Ken Birman:
The Untrustworthy Web Services Revolution. Computer 39(2): 98-100 (2006) - [c66]Kenneth P. Birman:
Scalable trust: engineering challenge or complexity barrier? STC 2006: 1-2 - [c65]Krzysztof Ostrowski, Kenneth P. Birman:
Scalable group communication system for scalable trust. STC 2006: 3-6 - [c64]Krzysztof Ostrowski, Ken Birman:
Extensible Web Services Architecture for Notification in Large-Scale Systems. ICWS 2006: 383-392 - [c63]Stefan Pleisch, Ken Birman:
SENSTRAC: Scalable Querying of SENSor Networks from Mobile Platforms Using TRACking-Style Queries. MASS 2006: 306-315 - [c62]Stefan Pleisch, Mahesh Balakrishnan, Ken Birman, Robbert van Renesse:
MISTRAL: : efficient flooding in mobile ad-hoc networks. MobiHoc 2006: 1-12 - [c61]Benjamin Atkin, Kenneth P. Birman:
Network-Aware Adaptation Techniques for Mobile File Systems. NCA 2006: 181-188 - [c60]Richard Lau, Stephanie Demers, Yibei Ling, Bruce Siegell, Einar Vollset, Ken Birman, Robbert van Renesse, Howard E. Shrobe, Jonathan Bachrach, Lester Foster:
Cognitive Adaptive Radio Teams. SECON 2006: 842-847 - [c59]Mahesh Balakrishnan, Ken Birman, Amar Phanishayee:
PLATO: Predictive Latency-Aware Total Ordering. SRDS 2006: 175-188 - [c58]Tudor Marian, Ken Birman, Robbert van Renesse:
A Scalable Services Architecture. SRDS 2006: 289-300 - [e3]George Candea, Ken Birman:
Proceedings of the Second Workshop on Hot Topics in System Dependability, HotDep 2006, Seattle, WA, USA, November 8, 2006. USENIX Association 2006 [contents] - 2005
- [j41]Kenneth P. Birman:
Can Web Services Scale Up? Computer 38(10): 107-110 (2005) - [j40]Kenneth P. Birman:
In Computers We Trust. IEEE Distributed Syst. Online 6(11) (2005) - [j39]Kenneth P. Birman, Jie Chen, E. M. Hopkinson, Robert J. Thomas, James S. Thorp, Robbert van Renesse, Werner Vogels:
dcOvercoming Communications Challenges in Software for Monitoring and Controlling Power Systems. Proc. IEEE 93(5): 1028-1041 (2005) - [c57]Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Ken Birman, Alan J. Demers:
Decentralized Schemes for Size Estimation in Large and Dynamic Groups. NCA 2005: 41-48 - [c56]Mahesh Balakrishnan, Stefan Pleisch, Ken Birman:
Slingshot: Time-Critical Multicast for Clustered Applications. NCA 2005: 205-214 - [c55]Kenneth P. Birman:
Opening remarks. SOSP 2005 - [e2]Andrew Herbert, Kenneth P. Birman:
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005. ACM 2005, ISBN 1-59593-079-5 [contents] - 2004
- [j38]Kenneth P. Birman:
Like it or not, web services are distributed objects. Commun. ACM 47(12): 60-62 (2004) - [c54]Kenneth P. Birman, Robbert van Renesse, Werner Vogels:
Adding High Availability and Autonomic Behavior to Web Services. ICSE 2004: 17-26 - 2003
- [j37]Werner Vogels, Robbert van Renesse, Kenneth P. Birman:
The power of epidemics: robust communication for large-scale distributed systems. Comput. Commun. Rev. 33(1): 131-135 (2003) - [j36]Kenneth P. Birman:
IEEE Internet Computing: Peer To Peer - The League of SuperNets. IEEE Distributed Syst. Online 4(10) (2003) - [j35]Kenneth P. Birman:
The League of SuperNets. IEEE Internet Comput. 7(5): 93-96 (2003) - [j34]Robbert van Renesse, Kenneth P. Birman, Werner Vogels:
Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining. ACM Trans. Comput. Syst. 21(2): 164-206 (2003) - [c53]Kenneth P. Birman:
The Surprising Power of Epidemic Communication. Future Directions in Distributed Computing 2003: 97-102 - [c52]Indranil Gupta, Kenneth P. Birman:
Holistic Operations in Large-Scale Sensor Network Systems: A Probabilistic Peer-to-Peer Approach. Future Directions in Distributed Computing 2003: 180-185 - [c51]Prakash Linga, Indranil Gupta, Ken Birman:
A churn-resistant peer-to-peer web caching system. SSRS@CCS 2003: 1-10 - [c50]Kenneth P. Birman, Robbert van Renesse, Werner Vogels:
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation. Active Middleware Services 2003: 4-13 - [c49]Benjamin Atkin, Kenneth P. Birman:
Evaluation of an Adaptive Transport Protocol. INFOCOM 2003: 2323-2333 - [c48]Indranil Gupta, Kenneth P. Birman, Prakash Linga, Alan J. Demers, Robbert van Renesse:
Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead. IPTPS 2003: 160-169 - [c47]Kenneth M. Hopkinson, Kenneth P. Birman, Renan Giovanini, Denis Vinicius Coury, Xiaoru Wang, James S. Thorp:
Distributed simulation in manufacturing: EPOCHS: integrated commercial off-the-shelf software for agent-based electric power and communication simulation. WSC 2003: 1158-1166 - 2002
- [j33]Ohad Rodeh, Kenneth P. Birman, Danny Dolev:
Using AVL trees for fault-tolerant group key management. Int. J. Inf. Sec. 1(2): 84-99 (2002) - [c46]Zhen Xiao, Kenneth P. Birman, Robbert van Renesse:
Optimizing Buffer Management for Reliable Multicast. DSN 2002: 187-198 - [c45]Werner Vogels, Christopher Ré, Robbert van Renesse, Kenneth P. Birman:
A Collaborative Infrastructure for Scalable and Robust News Delivery. ICDCS Workshops 2002: 655-659 - [c44]Robbert van Renesse, Kenneth P. Birman, Dan Dumitriu, Werner Vogels:
Scalable Management and Data Mining Using Astrolabe. IPTPS 2002: 280-294 - 2001
- [j32]Ohad Rodeh, Kenneth P. Birman, Danny Dolev:
The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. ACM Trans. Inf. Syst. Secur. 4(3): 289-319 (2001) - [j31]Kenneth P. Birman:
Technology challenges for virtual overlay networks. IEEE Trans. Syst. Man Cybern. Part A 31(4): 319-327 (2001) - [c43]Indranil Gupta, Robbert van Renesse, Kenneth P. Birman:
Scalable Fault-Tolerant Aggregation in Large Process Groups. DSN 2001: 433-442 - [c42]Ranveer Chandra, Venugopalan Ramasubramanian, Kenneth P. Birman:
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks. ICDCS 2001: 275-283 - [c41]Kate Jenkins, Kenneth M. Hopkinson, Ken Birman:
A Gossip Protocol for Subgroup Multicast. ICDCS Workshops 2001: 25-30 - [c40]Zhen Xiao, Kenneth P. Birman:
Providing Efficient, Robust Error Recovery Through Randomization. ICDCS Workshops 2001: 31-36 - [c39]Zhen Xiao, Kenneth P. Birman:
A Randomized Error Recovery Algorithm for Reliable Multicast. INFOCOM 2001: 239-248 - [c38]Kenneth P. Birman:
Scalability Challenges and Solutions for Emerging Networks. NCA 2001: 2 - 2000
- [j30]Kenneth P. Birman:
The Next-Generation Internet: Unsafe at Any Speed? Computer 33(8): 54-60 (2000) - [j29]Luís E. T. Rodrigues, Katherine Guo, Paulo Veríssimo, Kenneth P. Birman:
A Dynamic Light-Weight Group Service. J. Parallel Distributed Comput. 60(12): 1449-1479 (2000) - [c37]Öznur Özkasap, Kenneth P. Birman:
Throughput Stability of Reliable Multicast Protocols. ADVIS 2000: 159-169 - [c36]Ohad Rodeh, Kenneth P. Birman, Danny Dolev:
Optimized Rekey for Group Communication Systems. NDSS 2000 - [c35]Indranil Gupta, Robbert van Renesse, Kenneth P. Birman:
A Probabilistically Correct Leader Election Protocol for Large Groups. DISC 2000: 89-103
1990 – 1999
- 1999
- [j28]Kenneth P. Birman:
A Review of Experiences with Reliable Multicast. Softw. Pract. Exp. 29(9): 741-774 (1999) - [j27]Kenneth P. Birman, Roy Friedman, Mark Hayden, Injong Rhee:
Middleware support for distributed multimedia and collaborative computing. Softw. Pract. Exp. 29(14): 1285-1312 (1999) - [j26]Kenneth P. Birman, Mark Hayden, Öznur Özkasap, Zhen Xiao, Mihai Budiu, Yaron Minsky:
Bimodal Multicast. ACM Trans. Comput. Syst. 17(2): 41-88 (1999) - [c34]Werner Vogels, Robbert van Renesse, Kenneth P. Birman:
Six Misconceptions about Reliable Distributed Computing. HPDC 1999: 213-215 - [c33]Michael H. Kalantar, Kenneth P. Birman:
Causally Ordered Multicast: the Conservative Approach. ICDCS 1999: 36-44 - [c32]Öznur Özkasap, Robbert van Renesse, Kenneth P. Birman, Zhen Xiao:
Efficient Buffering in Reliable Multicast Protocols. Networked Group Communication 1999: 188-203 - [c31]Xiaoming Liu, Christoph Kreitz, Robbert van Renesse, Jason Hickey, Mark Hayden, Kenneth P. Birman, Robert L. Constable:
Building reliable, high-performance communication systems from components. SOSP 1999: 80-92 - 1998
- [j25]Jon B. Weissman, Kenneth P. Birman:
Building Secure and Reliable Network Applications [Book Review]. IEEE Concurr. 6(1): 84-85 (1998) - [j24]Robbert van Renesse, Kenneth P. Birman, Mark Hayden, Alexey Vaysburd, David A. Karr:
Building Adaptive Systems Using Ensemble. Softw. Pract. Exp. 28(9): 963-979 (1998) - [j23]Alexey Vaysburd, Kenneth P. Birman:
The Maestro Approach to Building Reliable Interoperable Distributed Applications with Multiple Execution Styles. Theory Pract. Object Syst. 4(2): 73-80 (1998) - [c30]Werner Vogels, Dan Dumitriu, Kenneth P. Birman, Rod Gamache, Mike Massa, Rob Short, John Vert, Joe Barrera, Jim Gray:
The Design and Architecture of the Microsoft Cluster Service - A Practical Approach to High-Availability and Scalability. FTCS 1998: 422-431 - [c29]Werner Vogels, Robbert van Renesse, Kenneth P. Birman:
Six misconceptions about reliable distributed computing. ACM SIGOPS European Workshop 1998: 276-279 - [i2]Werner Vogels, Dan Dumitriu, Kenneth P. Birman, Rod Gamache, Mike Massa, Rob Short, John Vert, Joe Barrera:
The Design and Architecture of the Microsoft Cluster Service - A Practical Approach to High-Availability and Scalability. CoRR cs.OS/9809006 (1998) - 1997
- [c28]Kenneth P. Birman:
Building Secure and Reliable Network Applications. WWCA 1997: 15-28 - 1996
- [j22]Robbert van Renesse, Kenneth P. Birman, Silvano Maffeis:
Horus: A Flexible Group Communication System. Commun. ACM 39(4): 76-83 (1996) - [c27]Luís E. T. Rodrigues, Katherine Guo, Antonio Sargento, Robbert van Renesse, Bradford B. Glade, Paulo Veríssimo, Kenneth P. Birman:
A Transparent Light-Weight Group Service. SRDS 1996: 130-139 - 1995
- [j21]Kenneth P. Birman, Bradford B. Glade:
Reliability Through Consistency. IEEE Softw. 12(3): 29-41 (1995) - [j20]David A. Cooper, Kenneth P. Birman:
The design and implementation of a private message service for mobile computers. Wirel. Networks 1(3): 297-309 (1995) - [c26]Robbert van Renesse, Kenneth P. Birman, Roy Friedman, Mark Hayden, David A. Karr:
A Framework for Protocol Composition in Horus. PODC 1995: 80-89 - [c25]David A. Cooper, Kenneth P. Birman:
Preserving privacy in a network of mobile computers. S&P 1995: 26-38 - [e1]Kenneth P. Birman, Friedemann Mattern, André Schiper:
Theory and Practice in Distributed Systems, International Workshop, Dagstuhl Castle, Germany, September 5-9, 1994, Selected Papers. Lecture Notes in Computer Science 938, Springer 1995, ISBN 3-540-60042-6 [contents] - 1994
- [j19]Kenneth P. Birman:
Integrating Runtime Consistency Models for Distributed Computing. J. Parallel Distributed Comput. 23(2): 158-176 (1994) - [j18]Kenneth P. Birman:
A Response to Cheriton and Skeen's Criticism of Causal and Totally Ordered Communication. ACM SIGOPS Oper. Syst. Rev. 28(1): 11-21 (1994) - [j17]Kenneth P. Birman:
Editorial. ACM Trans. Comput. Syst. 12(1): 1 (1994) - [j16]Kenneth P. Birman:
Preface to the Special Issues on Computer Architecture. ACM Trans. Comput. Syst. 12(3): 173 (1994) - [j15]Michael K. Reiter, Kenneth P. Birman, Robbert van Renesse:
A Security Architecture for Fault-Toerant Systems. ACM Trans. Comput. Syst. 12(4): 340-371 (1994) - [j14]Michael K. Reiter, Kenneth P. Birman:
How to Securely Replicate Services. ACM Trans. Program. Lang. Syst. 16(3): 986-1009 (1994) - [c24]Robbert van Renesse, Kenneth P. Birman, Thorsten von Eicken, Keith Marzullo:
New Applications for Group Computing. Dagstuhl Seminar on Distributed Systems 1994: 58-63 - [c23]Kenneth P. Birman:
Merits of a Probabilistic Approach to Properties in Process Group Systems (Informal Position Paper). Dagstuhl Seminar on Distributed Systems 1994: 214-223 - [c22]Dalia Malki, Kenneth P. Birman, Aleta Ricciardi, André Schiper:
Uniform Actions in Asynchronous Distributed Systems (Extended Abstract). PODC 1994: 274-283 - [c21]Kenjiro Cho, Kenneth P. Birman:
A Group Communication Approach for Mobile Computing. WMCSA 1994: 95-102 - 1993
- [j13]Kenneth P. Birman:
The Process Group Approach to Reliable Distributed Computing. Commun. ACM 36(12): 36-53 (1993) - [j12]Bradford B. Glade, Kenneth P. Birman, Robert C. B. Cooper, Robbert van Renesse:
Light-weight process groups in the Isis system. Distributed Syst. Eng. 1(1): 29-36 (1993) - [j11]Kenneth P. Birman:
Editorial. ACM Trans. Comput. Syst. 11(2): 107-108 (1993) - [j10]Kenneth P. Birman:
Preface to the Special Issue on Architectural Support for Programming Languages and Systems. ACM Trans. Comput. Syst. 11(4): 299 (1993) - [c20]Kenneth P. Birman:
Reliable Enterprise Computing Systems. Hardware and Software Architectures for Fault Tolerance 1993: 140-150 - 1992
- [c19]Robbert van Renesse, Kenneth P. Birman, Robert Cooper, Bradford B. Glade, Pat Stephenson:
Reliable Multicast between Micro-Kernels. USENIX Workshop on Microkernels and Other Kernel Architectures 1992: 269-284 - [c18]Kenneth P. Birman:
Maintaining consistency in distributed systems. ACM SIGOPS European Workshop 1992 - [c17]Michael K. Reiter, Kenneth P. Birman, Li Gong:
Integrating security in a group oriented distributed system. S&P 1992: 18-32 - [c16]Aleta Ricciardi, Kenneth P. Birman, Pat Stephenson:
The Cost of Order in Asynchronous Systems. WDAG 1992: 329-345 - 1991
- [j9]Keith Marzullo, Robert Cooper, Mark D. Wood, Kenneth P. Birman:
Tools for Distributed Application Management. Computer 24(8): 42-51 (1991) - [j8]Pat Stephenson, Kenneth P. Birman:
Fast Causal Multicast. ACM SIGOPS Oper. Syst. Rev. 25(2): 75-79 (1991) - [j7]Kenneth P. Birman, Robert Cooper:
The ISIS Project: Real Experience with a Fault Tolerant Programming System. ACM SIGOPS Oper. Syst. Rev. 25(2): 103-107 (1991) - [j6]Kenneth P. Birman, André Schiper, Pat Stephenson:
Lightweigt Causal and Atomic Group Multicast. ACM Trans. Comput. Syst. 9(3): 272-314 (1991) - [c15]Kenneth P. Birman:
Fault-Tolerance in Sixth-Generation Operating Systems. Operating Systems of the 90s and Beyond 1991: 154-161 - [c14]Aleta Ricciardi, Kenneth P. Birman:
Using Process Groups to Implement Failure Detection in Asynchronous Environments. PODC 1991: 341-353 - 1990
- [c13]Kenneth P. Birman, Robert Cooper:
The ISIS project: real experience with a fault tolerant programming system. ACM SIGOPS European Workshop 1990 - [c12]Mesaac Makpangou, Kenneth P. Birman:
Designing application software in wide area network settings. ACM SIGOPS European Workshop 1990 - [c11]Aleta Ricciardi, Kenneth P. Birman:
A formalism for fault-tolerant applications in asynchronous systems. ACM SIGOPS European Workshop 1990 - [c10]Pat Stephenson, Kenneth P. Birman:
Fast causal multicast. ACM SIGOPS European Workshop 1990 - [c9]Alex Siegel, Kenneth P. Birman, Keith Marzullo:
Deceit: A Flexible Distributed File System. USENIX Summer 1990: 51-62 - [c8]Alex Siegel, Kenneth P. Birman, Keith Marzullo:
Position Paper - Deceit: A Flexible Distributed File System. Workshop on the Management of Replicated Data 1990: 15-17
1980 – 1989
- 1989
- [c7]Robert Cooper, Kenneth P. Birman:
Supporting large scale applications on networks of workstations. WWOS 1989: 25-28 - 1987
- [j5]Kenneth P. Birman, Thomas A. Joseph:
Reliable Communication in the Presence of Failures. ACM Trans. Comput. Syst. 5(1): 47-76 (1987) - [c6]Kenneth P. Birman, Thomas A. Joseph:
Exploiting Virtual Synchrony in Distributed Systems. SOSP 1987: 123-138 - 1986
- [j4]Thomas A. Joseph, Kenneth P. Birman:
Low Cost Management of Replicated Data in Fault-Tolerant Distributed Systems. ACM Trans. Comput. Syst. 4(1): 54-70 (1986) - [c5]Kenneth P. Birman, Thomas A. Joseph:
Communication Support for Reliable Distributed Computing. Fault-Tolerant Distributed Computing 1986: 124-137 - [i1]Kenneth P. Birman, Thomas A. Joseph:
On communication support for fault tolerant process groups. RFC 992: 1-18 (1986) - 1985
- [j3]Kenneth P. Birman, Thomas A. Joseph, Thomas Räuchle, Amr El Abbadi:
Implementing Fault-Tolerant Distributed Objects. IEEE Trans. Software Eng. 11(6): 502-508 (1985) - [c4]Kenneth P. Birman:
Replication and Fault-Tolerance in the ISIS System. SOSP 1985: 79-86 - 1984
- [c3]Kenneth P. Birman, Thomas A. Joseph, Thomas Räuchle:
Extending resilient objets efficiently. Fehlertolerierende Rechensysteme 1984: 40-51 - [c2]Kenneth P. Birman, Thomas A. Joseph, Thomas Räuchle, Amr El Abbadi:
Implementing Fault-Tolerant Distributed Objects. Symposium on Reliability in Distributed Software and Database Systems 1984: 124-133 - 1982
- [j2]Kenneth P. Birman:
Rule-Based Learning for More Accurate ECG Analysis. IEEE Trans. Pattern Anal. Mach. Intell. 4(4): 369-380 (1982) - [j1]Lawrence A. Rowe, Kenneth P. Birman:
A Local Network Based on the UNIX Operating System. IEEE Trans. Software Eng. 8(2): 137-146 (1982)
1970 – 1979
- 1979
- [c1]Lawrence A. Rowe, Kenneth P. Birman:
Network Support for a Distributed Data Base System. Berkeley Workshop 1979: 337-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint