default search action
Ted Wobber
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2014
- [j6]Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan, Zhuoqing Morley Mao, Venugopalan Ramasubramanian, Doug Terry, Ted Wobber:
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones. IEEE Internet Comput. 18(5): 44-51 (2014) - 2013
- [j5]Mahesh Balakrishnan, Dahlia Malkhi, John D. Davis, Vijayan Prabhakaran, Michael Wei, Ted Wobber:
CORFU: A distributed shared log. ACM Trans. Comput. Syst. 31(4): 10 (2013) - 2012
- [j4]Dahlia Malkhi, Mahesh Balakrishnan, John D. Davis, Vijayan Prabhakaran, Ted Wobber:
From paxos to CORFU: a flash-speed shared log. ACM SIGOPS Oper. Syst. Rev. 46(1): 47-51 (2012) - 2010
- [j3]Venugopalan Ramasubramanian, Kaushik Veeraraghavan, Krishna P. N. Puttaswamy, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber:
Fidelity-Aware Replication for Mobile Devices. IEEE Trans. Mob. Comput. 9(12): 1697-1712 (2010) - 2007
- [j2]Andrew Birrell, Michael Isard, Chuck Thacker, Ted Wobber:
A design for high-performance flash disks. ACM SIGOPS Oper. Syst. Rev. 41(2): 88-93 (2007) - 2005
- [j1]Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber:
Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005)
Conference and Workshop Papers
- 2014
- [c25]Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Web PKI: Closing the Gap between Guidelines and Practices. NDSS 2014 - 2013
- [c24]Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Global Authentication in an Untrustworthy World. HotOS 2013 - [c23]Mahesh Balakrishnan, Dahlia Malkhi, Ted Wobber, Ming Wu, Vijayan Prabhakaran, Michael Wei, John D. Davis, Sriram Rao, Tao Zou, Aviad Zuck:
Tango: distributed data structures over a shared log. SOSP 2013: 325-340 - [c22]Michael Wei, John D. Davis, Ted Wobber, Mahesh Balakrishnan, Dahlia Malkhi:
Beyond block I/O: implementing a distributed shared log in hardware. SYSTOR 2013: 21:1-21:11 - 2012
- [c21]Catherine C. Marshall, Ted Wobber, Venugopalan Ramasubramanian, Douglas B. Terry:
Supporting research collaboration through bi-level file synchronization. GROUP 2012: 165-174 - [c20]Mahesh Balakrishnan, Dahlia Malkhi, Vijayan Prabhakaran, Ted Wobber, Michael Wei, John D. Davis:
CORFU: A Shared Log Design for Flash Clusters. NSDI 2012: 1-14 - 2011
- [c19]Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan, Zhuoqing Morley Mao, Venugopalan Ramasubramanian, Doug Terry, Ted Wobber:
Contrail: Enabling Decentralized Social Networks on Smartphones. Middleware 2011: 41-60 - [c18]Mahesh Balakrishnan, Dahlia Malkhi, Vijayan Prabhakaran, Ted Wobber:
DISC 2011 Invited Lecture by Dahlia Malkhi: Going beyond Paxos. DISC 2011: 208-210 - 2010
- [c17]Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry:
Policy-based access control for weakly consistent replication. EuroSys 2010: 293-306 - [c16]Gokul Soundararajan, Vijayan Prabhakaran, Mahesh Balakrishnan, Ted Wobber:
Extending SSD Lifetimes with Disk-Based Write Caches. FAST 2010: 101-114 - [c15]Vijayan Prabhakaran, Mahesh Balakrishnan, John D. Davis, Ted Wobber:
Depletable Storage Systems. HotStorage 2010 - [c14]Krishna P. N. Puttaswamy, Catherine C. Marshall, Venugopalan Ramasubramanian, Patrick Stuedi, Douglas B. Terry, Ted Wobber:
Docx2Go: collaborative editing of fidelity reduced documents on mobile devices. MobiSys 2010: 345-356 - 2009
- [c13]Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber:
Effective and efficient compromise recovery for weakly consistent replication. EuroSys 2009: 131-144 - [c12]Kaushik Veeraraghavan, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber:
Fidelity-aware replication for mobile devices. MobiSys 2009: 83-94 - [c11]Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Meg Walraed-Sullivan, Ted Wobber, Catherine C. Marshall, Amin Vahdat:
A Platform for Content-based Partial Replication. NSDI 2009: 261-276 - 2008
- [c10]Nitin Agrawal, Vijayan Prabhakaran, Ted Wobber, John D. Davis, Mark S. Manasse, Rina Panigrahy:
Design Tradeoffs for SSD Performance. USENIX ATC 2008: 57-70 - 2007
- [c9]Galen C. Hunt, Mark Aiken, Manuel Fähndrich, Chris Hawblitzel, Orion Hodson, James R. Larus, Steven Levi, Bjarne Steensgaard, David Tarditi, Ted Wobber:
Sealing OS processes to improve dependability and safety. EuroSys 2007: 341-354 - [c8]Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon:
Authorizing applications in singularity. EuroSys 2007: 355-368 - [c7]Daniel Peek, Douglas B. Terry, Venugopalan Ramasubramanian, Meg Walraed-Sullivan, Thomas L. Rodeheffer, Ted Wobber:
Fast encounter-based synchronization for mobile devices. ICDIM 2007: 750-755 - [c6]Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber:
How dynamic are IP addresses? SIGCOMM 2007: 301-312 - 2005
- [c5]Martín Abadi, Andrew Birrell, Ted Wobber:
Access Control in a World of Software Diversity. HotOS 2005 - [c4]Galen C. Hunt, James R. Larus, David Tarditi, Ted Wobber:
Broad New OS Research: Challenges and Opportunities. HotOS 2005 - 2004
- [c3]Martín Abadi, Ted Wobber:
A Logical Account of NGSCB. FORTE 2004: 1-12 - 2003
- [c2]Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber:
Bankable Postage for Network Services. ASIAN 2003: 72-90 - [c1]Martín Abadi, Michael Burrows, Ted Wobber:
Moderately Hard, Memory-Bound Functions. NDSS 2003
Editorship
- 2011
- [e1]Ted Wobber, Peter Druschel:
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, SOSP 2011, Cascais, Portugal, October 23-26, 2011. ACM 2011, ISBN 978-1-4503-0977-6 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint