Virtual ring routing: network routing inspired by DHTs M Caesar, M Castro, EB Nightingale, G O'Shea, A Rowstron ACM SIGCOMM computer communication review 36 (4), 351-362, 2006 | 531 | 2006 |
Child-proof authentication for MIPv6 (CAM) G O'shea, M Roe ACM SIGCOMM Computer Communication Review 31 (2), 4-8, 2001 | 274 | 2001 |
Symbiotic routing in future data centers H Abu-Libdeh, P Costa, A Rowstron, G O'Shea, A Donnelly Proceedings of the ACM SIGCOMM 2010 conference, 51-62, 2010 | 267 | 2010 |
Ioflow: A software-defined storage architecture E Thereska, H Ballani, G O'Shea, T Karagiannis, A Rowstron, T Talpey, ... Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013 | 231 | 2013 |
File System Logging versus Clustering: A Performance Comparison. MI Seltzer, KA Smith, H Balakrishnan, J Chang, S McMains, ... USENIX, 249-264, 1995 | 206 | 1995 |
Camdoop: Exploiting in-network aggregation for big data applications P Costa, A Donnelly, A Rowstron, G O'Shea 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI …, 2012 | 200 | 2012 |
Service combinators for web computing L Cardelli, R Davies IEEE Transactions on Software Engineering 25 (3), 309-316, 1999 | 163 | 1999 |
Chatty tenants and the cloud network sharing problem H Ballani, K Jang, T Karagiannis, C Kim, D Gunawardena, G O’Shea 10th {USENIX} Symposium on Networked Systems Design and Implementation …, 2013 | 156 | 2013 |
End-to-end performance isolation through virtual datacenters S Angel, H Ballani, T Karagiannis, G O’Shea, E Thereska 11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014 | 110 | 2014 |
Nobody ever got fired for using Hadoop on a cluster A Rowstron, D Narayanan, A Donnelly, G O'Shea, A Douglas Proceedings of the 1st International Workshop on Hot Topics in Cloud Data …, 2012 | 103 | 2012 |
An advisor for web services security policies K Bhargavan, C Fournet, AD Gordon, G O'Shea Proceedings of the 2005 workshop on Secure web services, 1-9, 2005 | 103 | 2005 |
Enabling end-host network functions H Ballani, P Costa, C Gkantsidis, MP Grosvenor, T Karagiannis, ... ACM SIGCOMM Computer Communication Review 45 (4), 493-507, 2015 | 74 | 2015 |
Authentication of Mobile IPv6 binding updates and acknowledgments M Roe, T Aura, G O’Shea, J Arkko draft-roe-mobileip-updateauth-02 (work in progress), 2002 | 63 | 2002 |
Software-defined caching: Managing caches in multi-tenant data centers I Stefanovici, E Thereska, G O'Shea, B Schroeder, H Ballani, ... Proceedings of the Sixth ACM Symposium on Cloud Computing, 174-181, 2015 | 54 | 2015 |
A logic of access control J Crampton, G Loizou, G O'Shea The Computer Journal 44 (2), 137-149, 2001 | 44 | 2001 |
CamCube: a key-based data center P Costa, A Donnelly, G O’Shea, A Rowstron Tech. Rep. MSR TR-2010–74, 2010 | 34 | 2010 |
sRoute: Treating the storage stack like a network I Stefanovici, B Schroeder, G O'Shea, E Thereska 14th {USENIX} Conference on File and Storage Technologies ({FAST} 16), 197-212, 2016 | 30 | 2016 |
Feasibility of content dissemination between devices in moving vehicles T Zahn, G O'Shea, A Rowstron Proceedings of the 5th international conference on Emerging networking …, 2009 | 28 | 2009 |
Why should we integrate services, servers, and networking in a data center? P Costa, T Zahn, A Rowstron, G O'Shea, S Schubert Proceedings of the 1st ACM workshop on Research on enterprise networking …, 2009 | 28 | 2009 |
Camcubeos: a key-based network stack for 3d torus cluster topologies P Costa, A Donnelly, G O'Shea, A Rowstron Proceedings of the 22nd international symposium on High-performance parallel …, 2013 | 21 | 2013 |