default search action
Steve D. Gribble
Person information
- affiliation: University of Washington, Seattle, Washington, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c61]Leon Poutievski, Omid Mashayekhi, Joon Ong, Arjun Singh, Muhammad Mukarram Bin Tariq, Rui Wang, Jianan Zhang, Virginia Beauregard, Patrick Conner, Steve D. Gribble, Rishi Kapoor, Stephen Kratzer, Nanfang Li, Hong Liu, Karthik Nagaraj, Jason Ornstein, Samir Sawhney, Ryohei Urata, Lorenzo Vicisano, Kevin Yasumura, Shidong Zhang, Junlan Zhou, Amin Vahdat:
Jupiter evolving: transforming google's datacenter network via optical circuit switches and software-defined networking. SIGCOMM 2022: 66-85 - 2021
- [c60]Andrew D. Ferguson, Steve D. Gribble, Chi-Yao Hong, Charles Edwin Killian, Waqar Mohsin, Henrik Mühe, Joon Ong, Leon Poutievski, Arjun Singh, Lorenzo Vicisano, Richard Alimi, Shawn Shuoshuo Chen, Mike Conley, Subhasree Mandal, Karthik Nagaraj, Kondapa Naidu Bollineni, Amr Sabaa, Shidong Zhang, Min Zhu, Amin Vahdat:
Orion: Google's Software-Defined Networking Control Plane. NSDI 2021: 83-98
2010 – 2019
- 2019
- [c59]Praveen Kumar, Nandita Dukkipati, Nathan Lewis, Yi Cui, Yaogong Wang, Chonggang Li, Valas Valancius, Jake Adriaens, Steve D. Gribble, Nate Foster, Amin Vahdat:
PicNIC: predictable virtualized NIC. SIGCOMM 2019: 351-366 - [c58]Michael Marty, Marc de Kruijf, Jacob Adriaens, Christopher Alfeld, Sean Bauer, Carlo Contavalli, Michael Dalton, Nandita Dukkipati, William C. Evans, Steve D. Gribble, Nicholas Kidd, Roman Kononov, Gautam Kumar, Carl Mauer, Emily Musick, Lena E. Olson, Erik Rubow, Michael Ryan, Kevin Springborn, Paul Turner, Valas Valancius, Xi Wang, Amin Vahdat:
Snap: a microkernel approach to host networking. SOSP 2019: 399-413 - 2014
- [c57]Jialin Li, Naveen Kr. Sharma, Dan R. K. Ports, Steven D. Gribble:
Tales of the Tail: Hardware, OS, and Application-level Sources of Tail Latency. SoCC 2014: 9:1-9:14 - [c56]Irene Zhang, Adriana Szekeres, Dana Van Aken, Isaac Ackerman, Steven D. Gribble, Arvind Krishnamurthy, Henry M. Levy:
Customizable and Extensible Deployment for Mobile/Cloud Applications. OSDI 2014: 97-112 - 2013
- [c55]Nicholas Hunt, Tom Bergan, Luis Ceze, Steven D. Gribble:
DDOS: taming nondeterminism in distributed systems. ASPLOS 2013: 499-508 - [c54]Katelin A. Bailey, Peter Hornyack, Luis Ceze, Steven D. Gribble, Henry M. Levy:
Exploring storage class memory with key value stores. INFLOW@SOSP 2013: 4:1-4:8 - 2012
- [j10]Steven D. Gribble:
The benefits of capability-based protection: technical perspective. Commun. ACM 55(3): 96 (2012) - [e3]Steven D. Gribble, Dina Katabi:
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012, San Jose, CA, USA, April 25-27, 2012. USENIX Association 2012 [contents] - 2011
- [c53]Roxana Geambasu, John P. John, Steven D. Gribble, Tadayoshi Kohno, Henry M. Levy:
Keypad: an auditing file system for theft-prone devices. EuroSys 2011: 1-16 - [c52]Katelin Bailey, Luis Ceze, Steven D. Gribble, Henry M. Levy:
Operating System Implications of Fast, Cheap, Non-Volatile Memory. HotOS 2011 - [c51]David W. Richardson, Steven D. Gribble:
Maverick: Providing Web Applications with Safe and Flexible Access to Local Devices. WebApps 2011 - 2010
- [c50]David W. Richardson, Steven D. Gribble, Tadayoshi Kohno:
The limits of automatic OS fingerprint generation. AISec 2010: 24-34 - [c49]Jonathan M. Hsieh, Steven D. Gribble, Henry M. Levy:
The Architecture and Implementation of an Extensible Web Crawler. NSDI 2010: 329-344 - [c48]Tom Bergan, Nicholas Hunt, Luis Ceze, Steven D. Gribble:
Deterministic Process Groups in dOS. OSDI 2010: 177-191
2000 – 2009
- 2009
- [c47]Charles Reis, Steven D. Gribble:
Isolating web programs in modern browser architectures. EuroSys 2009: 219-232 - [c46]Roxana Geambasu, Steven D. Gribble, Henry M. Levy:
CloudViews: Communal Data Sharing in Public Clouds. HotCloud 2009 - [c45]John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy:
Studying Spamming Botnets Using Botlab. NSDI 2009: 291-306 - 2008
- [c44]Alexander Moshchuk, Steven D. Gribble, Henry M. Levy:
Flashproxy: transparently enabling rich web content via remote execution. MobiSys 2008: 81-93 - [c43]Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver:
Detecting In-Flight Page Changes with Web Tripwires. NSDI 2008: 31-44 - [c42]Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008 - [c41]Roxana Geambasu, Cherie Cheung, Alexander Moshchuk, Steven D. Gribble, Henry M. Levy:
Organizing and sharing distributed personal web-service data. WWW 2008: 755-764 - [e2]Carey L. Williamson, David G. Andersen, Steve D. Gribble:
7th ACM Workshop on Hot Topics in Networks - HotNets-VII, Calgary, Alberta, Canada, October 6-7, 2008. ACM SIGCOMM 2008 [contents] - 2007
- [c40]Charles Reis, Steven D. Gribble, Henry M. Levy:
Architectural Principles for Safe Web Programs. HotNets 2007 - [c39]Richard J. Dunn, Steven D. Gribble, Henry M. Levy:
The Importance of History in a Media Delivery System. IPTPS 2007 - [c38]Roxana Geambasu, Magdalena Balazinska, Steven D. Gribble, Henry M. Levy:
Homeviews: peer-to-peer middleware for personal data sharing applications. SIGMOD Conference 2007: 235-246 - [c37]Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy:
SpyProxy: Execution-based Detection of Malicious Web Content. USENIX Security Symposium 2007 - [c36]Eytan Adar, Daniel S. Weld, Brian N. Bershad, Steven D. Gribble:
Why we search: visualizing and predicting user behavior. WWW 2007: 161-170 - 2006
- [c35]Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy:
A Crawler-based Study of Spyware in the Web. NDSS 2006 - [c34]Richard S. Cox, Steven D. Gribble, Henry M. Levy, Jacob Gorm Hansen:
A Safety-Oriented Platform for Web Applications. S&P 2006: 350-364 - [c33]Tobias Holgers, David E. Watson, Steven D. Gribble:
Cutting through the Confusion: A Measurement Study of Homograph Attacks. USENIX ATC, General Track 2006: 261-266 - 2005
- [j9]Andrew Whitaker, Richard S. Cox, Marianne Shaw, Steven D. Gribble:
Rethinking the Design of Virtual Machine Monitors. Computer 38(5): 57-62 (2005) - [c32]Richard J. Dunn, John Zahorjan, Steven D. Gribble, Henry M. Levy:
Presence-Based Availability and P2P Systems. Peer-to-Peer Computing 2005: 209-216 - [c31]David W. Richardson, Steven D. Gribble, Edward D. Lazowska:
The limits of global scanning worm detectors in the presence of background noise. WORM 2005: 60-70 - 2004
- [j8]Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall:
System support for pervasive applications. ACM Trans. Comput. Syst. 22(4): 421-486 (2004) - [c30]Stefan Saroiu, Steven D. Gribble, Henry M. Levy:
Measurement and Analysis of Spyware in a University Environment. NSDI 2004: 141-153 - [c29]Andrew Whitaker, Richard S. Cox, Marianne Shaw, Steven D. Gribble:
Constructing Services with Interposable Virtual Hardware. NSDI 2004: 169-182 - [c28]Andrew Whitaker, Richard S. Cox, Steven D. Gribble:
Configuration Debugging as Search: Finding the Needle in the Haystack. OSDI 2004: 77-90 - [c27]P. Krishna Gummadi, Harsha V. Madhyastha, Steven D. Gribble, Henry M. Levy, David Wetherall:
Improving the Reliability of Internet Paths with One-hop Source Routing. OSDI 2004: 183-198 - [c26]Andrew Whitaker, Richard S. Cox, Steven D. Gribble:
Using time travel to diagnose computer problems. ACM SIGOPS European Workshop 2004: 16 - 2003
- [j7]Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble:
Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multim. Syst. 9(2): 170-184 (2003) - [c25]Luke K. McDowell, Susan J. Eggers, Steven D. Gribble:
Improving server software support for simultaneous multithreaded processors. PPoPP 2003: 37-48 - [c24]Luke K. McDowell, Oren Etzioni, Steven D. Gribble, Alon Y. Halevy, Henry M. Levy, William Pentney, Deepak Verma, Stani Vlasseva:
Mangrove: Enticing Ordinary People onto the Semantic Web via Instant Gratification. ISWC 2003: 754-770 - [c23]P. Krishna Gummadi, Ramakrishna Gummadi, Steven D. Gribble, Sylvia Ratnasamy, Scott Shenker, Ion Stoica:
The impact of DHT routing geometry on resilience and proximity. SIGCOMM 2003: 381-394 - [c22]P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan:
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. SOSP 2003: 314-329 - [c21]Luke K. McDowell, Oren Etzioni, Steven D. Gribble, Alon Y. Halevy, Henry M. Levy, William Pentney, Deepak Verma, Stani Vlasseva:
Evolving the Semantic Web with Mangrove. WWW (Posters) 2003 - [e1]Steven D. Gribble:
4th USENIX Symposium on Internet Technologies and Systems, USITS'03, Seattle, Washington, USA, March 26-28, 2003. USENIX 2003 [contents] - 2002
- [j6]Eric J. Anderson, Thomas E. Anderson, Steven D. Gribble, Anna R. Karlin, Stefan Savage:
A quantitative evaluation of traffic-aware routing strategies. Comput. Commun. Rev. 32(1): 67 (2002) - [j5]P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble:
A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. Comput. Commun. Rev. 32(1): 82 (2002) - [j4]P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble:
King: estimating latency between arbitrary internet end hosts. Comput. Commun. Rev. 32(3): 11 (2002) - [c20]P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble:
King: estimating latency between arbitrary internet end hosts. Internet Measurement Workshop 2002: 5-18 - [c19]Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble:
Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS. IPTPS 2002: 214-224 - [c18]Jared Saia, Amos Fiat, Steven D. Gribble, Anna R. Karlin, Stefan Saroiu:
Dynamically Fault-Tolerant Content Addressable Networks. IPTPS 2002: 270-279 - [c17]Stefan Saroiu, P. Krishna Gummadi, Richard J. Dunn, Steven D. Gribble, Henry M. Levy:
An Analysis of Internet Content Delivery Systems. OSDI 2002 - [c16]Andrew Whitaker, Marianne Shaw, Steven D. Gribble:
Scale and Performance in the Denali Isolation Kernel. OSDI 2002 - [c15]Andrew Whitaker, Marianne Shaw, Steven D. Gribble:
Denali: a scalable isolation kernel. ACM SIGOPS European Workshop 2002: 10-15 - 2001
- [j3]Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, Steven J. Ross, Ben Y. Zhao:
The Ninja architecture for robust Internet-scale systems and services. Comput. Networks 35(4): 473-497 (2001) - [c14]Steven D. Gribble:
Robustness in Complex Systems. HotOS 2001: 21-26 - [c13]Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall:
Systems Directions for Pervasive Computing. HotOS 2001: 147-151 - [c12]Steven D. Gribble, Alon Y. Halevy, Zachary G. Ives, Maya Rodrig, Dan Suciu:
What Can Database Do for Peer-to-Peer? WebDB 2001: 31-36 - 2000
- [c11]Steven D. Gribble, Eric A. Brewer, Joseph M. Hellerstein, David E. Culler:
Scalable, Distributed Data Structures for Internet Service Construction. OSDI 2000: 319-332
1990 – 1999
- 1999
- [c10]Steven D. Gribble, Matt Welsh, Eric A. Brewer, David E. Culler:
The MultiSpace: An Evolutionary Platform for Infrastructural Services. USENIX ATC, General Track 1999: 157-170 - [c9]Ian Goldberg, Steven D. Gribble, David A. Wagner, Eric A. Brewer:
The Ninja Jukebox. USENIX Symposium on Internet Technologies and Systems 1999 - 1998
- [j2]Armando Fox, Steven D. Gribble, Yatin Chawathe, Eric A. Brewer:
Adapting to network and client variation using infrastructural proxies: lessons and perspectives. IEEE Wirel. Commun. 5(4): 10-19 (1998) - [j1]Eric A. Brewer, Randy H. Katz, Yatin Chawathe, Steven D. Gribble, Todd D. Hodes, Giao Thanh Nguyen, Mark Stemm, Thomas R. Henderson, Elan Amir, Hari Balakrishnan, Armando Fox, Venkata N. Padmanabhan, Srinivasan Seshan:
A network architecture for heterogeneous mobile computing. IEEE Wirel. Commun. 5(5): 8-24 (1998) - [c8]Steven D. Gribble, Gurmeet Singh Manku, Drew S. Roselli, Eric A. Brewer, Timothy J. Gibson, Ethan L. Miller:
Self-Similarity in File Systems. SIGMETRICS 1998: 141-150 - 1997
- [c7]Armando Fox, Steven D. Gribble, Yatin Chawathe, Eric A. Brewer, Paul Gauthier:
Cluster-Based Scalable Network Services. SOSP 1997: 78-91 - [c6]Armando Fox, Steven D. Gribble, Yatin Chawathe, Anthony S. Polito, Andrew C. Huang, Benjamin C. Ling, Eric A. Brewer:
Orthogonal Extensions to the WWW User Interface Using Client-Side Technologies. ACM Symposium on User Interface Software and Technology 1997: 83-84 - [c5]Steven D. Gribble, Eric A. Brewer:
System Design Issues for Internet Middleware Services: Deductions from a Large Client Trace. USENIX Symposium on Internet Technologies and Systems 1997 - 1996
- [c4]Armando Fox, Steven D. Gribble, Eric A. Brewer, Elan Amir:
Adapting to Network and Client Variability via On-Demand Dynamic Distillation. ASPLOS 1996: 160-170 - [c3]Randy H. Katz, Eric A. Brewer, Elan Amir, Hari Balakrishnan, Armando Fox, Steven D. Gribble, Todd D. Hodes, Daniel Jiang, Giao Thanh Nguyen, Venkata N. Padmanabhan, Mark Stemm:
The Bay Area Research Wireless Access Network (BARWAN). COMPCON 1996: 15-20 - [c2]Armando Fox, Steven D. Gribble:
Security on the Move: Indirect Authentication using Kerberos. MobiCom 1996: 155-164 - 1995
- [c1]Kori Inkpen, Kellogg S. Booth, Steven D. Gribble, Maria M. Klawe:
Give and take: children collaborating on one computer. CHI 95 Conference Companion 1995: 258-259
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint