Keith Marzullo
#50,307
Most Influential Person Now
American computer scientist
Keith Marzullo's AcademicInfluence.com Rankings
Keith Marzullocomputer-science Degrees
Computer Science
#2065
World Rank
#2144
Historical Rank
#952
USA Rank
Database
#7665
World Rank
#7961
Historical Rank
#957
USA Rank
Download Badge
Computer Science
Keith Marzullo's Degrees
- PhD Computer Science University of Washington
- Masters Computer Science University of Washington
- Bachelors Computer Science University of California, San Diego
Similar Degrees You Can Earn
Why Is Keith Marzullo Influential?
(Suggest an Edit or Addition)According to Wikipedia, Keith Marzullo is the inventor of Marzullo's algorithm, which is part of the basis of the Network Time Protocol and the Windows Time Service. On August 1, 2016 he became the Dean of the University of Maryland College of Information Studies after serving as the Director of the NITRD National Coordination Office. Prior to this he was a Professor in the Department of Computer Science and Engineering at University of California, San Diego. In 2011 he was inducted as a Fellow of the Association for Computing Machinery.
Keith Marzullo's Published Works
Published Works
- The primary-backup approach (1993) (416)
- Consistent detection of global predicates (1991) (340)
- Consistent global states of distributed systems: fundamental concepts and mechanisms (1993) (323)
- Mencius: Building Efficient Replicated State Machine for WANs (2008) (309)
- Tolerating failures of continuous-valued sensors (1990) (303)
- Message Logging: Pessimistic, Optimistic, Causal, and Optimal (1998) (243)
- Directional Gossip: Gossip in a Wide Area Network (1999) (195)
- In search of path diversity in ISP networks (2003) (183)
- Maintaining the time in a distributed system (1985) (165)
- Tools for distributed application management (1991) (138)
- Wrapping server-side TCP to mask connection failures (2001) (118)
- Message logging: pessimistic, optimistic, and causal (1995) (116)
- Multicast Transport Protocol (1992) (115)
- Gossip versus Deterministic Flooding: Low Message Overhead and High Reliability for Broadcasting on Small Networks (1999) (114)
- Deceit: a flexible distributed file system (1990) (109)
- Characterizing and measuring path diversity of internet topologies (2003) (109)
- Nonblocking and orphan-free message logging protocols (1992) (100)
- Moshe: A group membership service for WANs (2002) (95)
- Detecting and Isolating Malicious Routers (2006) (93)
- Detection of Global State Predicates (1991) (90)
- NAP: practical fault-tolerance for itinerant computations (1999) (87)
- Fatih: detecting and isolating malicious routers (2005) (85)
- Primary-Backup Protocols: Lower Bounds and Optimal Implementations (1992) (82)
- Fault-tolerant grid services using primary-backup: feasibility and performance (2004) (71)
- Gossip versus Deterministically Constrained Flooding on Small Networks (2000) (70)
- Maintaining the time in a distributed system: an example of a loosely-coupled distributed service (synchronization, fault-tolerance, debugging) (1984) (69)
- Putting Time into Proof Outlines (1991) (69)
- A client-server oriented algorithm for virtually synchronous group membership in WANs (2000) (69)
- Supplying high availability with a standard network file system (1988) (63)
- Analysis of Computer Intrusions Using Sequences of Function Calls (2007) (63)
- Computer Forensics in Forensis (2008) (63)
- Maintaining the time in a distributed system (1983) (58)
- Election Vs. Consensus in Asynchronous Systems (1995) (57)
- Surviving Internet Catastrophes (2005) (54)
- Engineering fault-tolerant TCP/IP servers using FT-TCP (2003) (53)
- Toward Models for Forensic Analysis (2007) (47)
- Highly-available services using the primary-backup approach (1992) (46)
- Masking failures of multidimensional sensors (1991) (45)
- The computational Co-op: Gathering clusters into a metacomputer (1999) (44)
- Jasmine: a software system modelling facility (1987) (43)
- Detecting Malicious Packet Losses (2009) (43)
- Aspen trees: balancing data center fault tolerance, scalability and cost (2013) (43)
- Optimal Primary-Backup Protocols (1992) (42)
- The Bancomat problem: an example of resource allocation in a partitionable asynchronous system (2003) (40)
- Nonblocking and Orphan-Free Message Logging Protocols (1995) (39)
- Designing Algorithms for Dependent Process Failures (2003) (38)
- Trade-offs in implementing causal message logging protocols (1996) (37)
- Optimistic Virtual Synchrony (2000) (35)
- Simulating fail-stop in asynchronous distributed systems (1994) (35)
- NILE: wide-area computing for high energy physics (1996) (34)
- The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe (2003) (34)
- A formalization of priority inversion (1993) (31)
- Principles-driven forensic analysis (2005) (31)
- Synchronous Consensus for dependent process failures (2003) (30)
- Detecting compromised routers via packet forwarding behavior (2008) (29)
- Practical and low-overhead masking of failures of TCP-based servers (2009) (29)
- Causality tracking in causal message-logging protocols (2002) (28)
- Towards Low Latency State Machine Replication for Uncivil Wide-area Networks (2009) (27)
- Derivation of sequential, real-time, process-control programs (1991) (26)
- Tools for Monitoring and Controlling Distributed Applications. (1991) (25)
- Customizable Service State Durability for Service Oriented Architectures (2006) (25)
- Classic Paxos vs. fast Paxos: caveat emptor (2007) (25)
- Wide-area Nile: a case study of a wide-area data-parallel application (1998) (25)
- Implementing Fault-Tolerant Sensors* (1989) (24)
- A framework for the design of dependent‐failure algorithms (2007) (24)
- Efficient detection of a class of stable properties (1994) (24)
- Tradeoffs in implementing primary-backup protocols (1995) (22)
- Tools for Constructing Distributed Reactive Systems (1991) (22)
- Proceedings of the eighteenth ACM symposium on Operating systems principles (2001) (22)
- Coterie Availability in Sites (2005) (20)
- ALIAS: scalable, decentralized label assignment for data centers (2011) (19)
- Concurrency Control for Transactions with Priorities (1989) (18)
- Tools for Constructing Distributive Reactive Systems (1990) (18)
- Scalable Causal Message Logging for Wide-Area Environments (2001) (17)
- Making real-time reactive systems reliable (1990) (17)
- Second International Workshop on Systematic Approaches to Digital Forensic Engineering (2007) (17)
- Comparing primary-backup and state machines for crash failures (1996) (16)
- The virtue of dependent failures in multi-site systems (2005) (16)
- The relative overhead of piggybacking in causal message logging protocols (1998) (16)
- A low-cost processor group membership protocol for a hard real-time distributed system (1997) (14)
- A new model for availability in the face of self-propagating attacks (1998) (13)
- MTP: An atomic multicast transport protocol (1990) (13)
- Using Consistent Subcuts for Detecting Stable Properties (1991) (13)
- Scalable causal message logging for wide‐area environments (2003) (12)
- The role of order in distributed programs (1989) (12)
- Open Grid: A User-Centric Approach for Grid Computing (2001) (10)
- When You Don't Trust Clients: Byzantine Proposer Fast Paxos (2011) (10)
- Proceedings of the 10th International Workshop on Distributed Algorithms (1996) (10)
- Detecting malicious routers (2007) (9)
- Making real-time reactive systems reliable (1991) (9)
- Replication Predicates for Dependent-Failure Algorithms (2005) (9)
- Replicating Nondeterministic Services on Grid Environments (2006) (9)
- Local Recovery for High Availability in Strongly Consistent Cloud Services (2017) (9)
- The Need for Realistic Failure Models in Protocol Design (2002) (8)
- An extensible software architecture for mobile components (2002) (8)
- TOS: kernel support for distributed systems management (2001) (8)
- Predicting physical processes in the presence of faulty sensor readings (1997) (8)
- Factoring mobile agents (2002) (8)
- Threshold protocols in survivor set systems (2010) (8)
- A framework for the design of dependent-failure algorithms: Research Articles (2007) (7)
- Multiple job scheduling in a connection-limited data parallel system (2006) (7)
- Chapter The Primary Backup Approach (1993) (7)
- Group membership and wide-area master-worker computations (2003) (6)
- Deriving optimal checkpoint protocols for distributed shared memory architectures (1994) (6)
- What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks (2010) (5)
- TOS: A Kernel of a Distributed Systems Management System (2000) (5)
- Announcing the 2012 Edsger W. Dijkstra prize in distributed computing (2012) (5)
- Scalability vs. Fault Tolerance in Aspen Trees (2013) (5)
- Managing self-inflicted nondeterminism (2005) (5)
- Priority Inversion and Its Prevention (1990) (5)
- Locality aware redundancy allocation in nanoelectronic systems (2008) (4)
- Coping with Dependent Process Failures (2002) (4)
- Brief Announcement: A Randomized Algorithm for Label Assignment in Dynamic Networks (2011) (4)
- Position Paper - Deceit: A Flexible Distributed File System (1990) (4)
- Implementing Causal Logging Using OrbixWeb Interception (1999) (3)
- Group communication services versus wide-area networks (1999) (3)
- A Simpler Proof for Paxos and Fast Paxos (2011) (3)
- Refinement for Fault-Tolerance: An Aircraft Hand-off Protocol (1994) (3)
- Engineering fault-tolerant tcp/ip services (2004) (3)
- Distributed algorithms : 10th International Workshop, WDAG '96, Bologna, Italy, October 9-11, 1996 : proceedings (1996) (3)
- Theory and Practice for Fault-Tolerant Protocols on the Internet (2002) (2)
- New Applications for Group Computing (1994) (2)
- Brief announcement: detecting malicious routers (2004) (2)
- Optimal Message Logging Protocols \\ (Preliminary Version) (1994) (2)
- Weak Leader Election in the receive-omission failure model (2005) (2)
- Trade-offs Between Replication and Availability in Distributed Databases (1989) (2)
- Fault-Tolerant Forwarding in the Face of Malicious Routers (2004) (2)
- Masking failures of multidimensional sensors (extended abstract) (1990) (2)
- Isis and META Projects: Progress Report (1990) (1)
- Primary { Backup Protocols : Lower Bounds andOptimal (1992) (1)
- Nile (2021) (1)
- Lower Bound on the Number of Rounds for Consensus with Dependent Process Failures (2003) (1)
- Dependability and the grid issues and challenges (2002) (1)
- A Performance Model and Load Balancer for a Parallel Monte-Carlo Cellular Microphysiology Simulator (2004) (1)
- High availability in a real-time system (1993) (1)
- High availability in a real-time system (1992) (1)
- Programming your way out of the past: ISIS and the META Project (1989) (1)
- Types of Editors and Specifications (2004) (1)
- Configuration Management for Modular System (1988) (0)
- Lower Bounds for a Primary–Backup Implementation of a Bofo Service (2013) (0)
- Transparent Replication for Component-Based Applications (2000) (0)
- Optimizing Threshold Protocols in Adversarial Structures (2008) (0)
- Open Research Issues in Building Dependable Middleware (Panel) (2002) (0)
- Understanding Mobile Code and Secure Execution Environments (2006) (0)
- Position summary: separating mobility from mobile agents (2001) (0)
- Scalable Causal Message Logging for Wide-Area Networks (2000) (0)
- OTIC FILE COPY ( 0 IDeceit : A Flexible Distributed File System * (0)
- The Serrano Project Final Report: Non-Invasively Retrofitting Legacy Applications to Withstand Intrusions (2003) (0)
- Real-Time Process-Control Programs (0)
- Towards Derivation of Real-Time Process-Control Programs (1990) (0)
- Evolving Methods for Evaluating and Disseminating Computing Research (2020) (0)
- CORTO: High Availability in a Real-Time System (1992) (0)
- Fault-tolerant grid services (2006) (0)
- The ISIS project: Fault-tolerance in large distributed systems (1990) (0)
- ISIS and META projects (1990) (0)
- cient Detection of a Subclass of StableProperties (1993) (0)
- USENIX Association Proceedings of HotOS IX : The 9 th Workshop on Hot Topics in Operating Systems (2003) (0)
- Scalable Technology for a New Generation of Collaborative Applications (2007) (0)
- A Toolkit for Building Reactive Systems or A Minute on Meta (1992) (0)
- Monitoring and controlling distributed applications using Lomita (position paper) (1992) (0)
- Workshop 04+08+13: Parallel and distributed algorithms (1997) (0)
- Proceedings of the 10th USENIX conference on Hot Topics in System Dependability (2014) (0)
- Combining Optimism and Intrusion (1998) (0)
- Harary Networks: Connectivity for Highly Available Real-Time Distributed Databases (1990) (0)
- A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science (2003) (0)
- A Bit of CNS (2014) (0)
- Introduction (2005) (0)
- ONR Award N00014-01-1-0981 July 2001 -December 2004 Understanding Mobile Code and Secure Execution Environments Final Report (2006) (0)
- Open Research Issues in Building Dependable Middleware (2002) (0)
- AD-A 235 580 IIIIIIiii 1 I 1 I 1 I lIIIIIIllIIIlliI DTIC 0 LMAY 15 1991 Masking Failures ofMultidimensional Sensors (0)
- On the Resilience of Broadcasting Strategies in a Failure-Propogating Environment (1999) (0)
- Monitoring and controlling distributed applications using Lomita (1993) (0)
- A Redesigned Isis and Meta System Under Mach (1993) (0)
- Kernel services for supporting hard real-time active replication (1997) (0)
- WAFT : Support for Fault-Tolerance in Wide-Area Object OrientedSystemsLorenzo (1998) (0)
This paper list is powered by the following services:
Other Resources About Keith Marzullo
What Schools Are Affiliated With Keith Marzullo?
Keith Marzullo is affiliated with the following schools: