Michael Burrows
#178,569
Most Influential Person Now
Michael Burrows's AcademicInfluence.com Rankings
Michael Burrowscomputer-science Degrees
Computer Science
#11180
World Rank
#11813
Historical Rank
Big Data
#30
World Rank
#30
Historical Rank
Database
#8216
World Rank
#8570
Historical Rank

Download Badge
Computer Science
Michael Burrows's Degrees
- PhD Computer Science Stanford University
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Michael Burrows Influential?
(Suggest an Edit or Addition)Michael Burrows's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Bigtable: A Distributed Storage System for Structured Data (2006) (5587)
- A Block-sorting Lossless Data Compression Algorithm (1994) (2793)
- A logic of authentication (1989) (2398)
- A logic of authentication (1990) (1672)
- Eraser: a dynamic data race detector for multithreaded programs (1997) (1607)
- Authentication in distributed systems: theory and practice (1991) (741)
- A calculus for access control in distributed systems (1991) (729)
- Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links (1991) (711)
- Dapper, a Large-Scale Distributed Systems Tracing Infrastructure (2010) (540)
- Moderately hard, memory-bound functions (2005) (289)
- The Chubby Lock Service for Loosely-Coupled Distributed Systems (2006) (277)
- A Cooperative Internet Backup Scheme (2003) (248)
- Authentication in distributed systems: theory and practice (1991) (221)
- Authentication in the Taos operating system (1994) (219)
- Eraser: a dynamic data race detector for multi-threaded programs (1997) (216)
- Performance of the Firefly RPC (1989) (135)
- Authentication in the Taos operating system (1993) (119)
- Performance of Firefly RPC (1990) (118)
- Authentication and Delegation with Smart-cards (1991) (115)
- On-line data compression in a log-structured file system (1992) (110)
- Dynamic control flow in large-scale machine learning (2018) (94)
- Bankable Postage for Network Services (2003) (82)
- Block-Level Security for Network-Attached Disks (2003) (78)
- Authentication: A Practical Study in Belief and Action (1988) (68)
- Rejoinder to Nessett (1990) (59)
- Secure network objects (1996) (56)
- Finding stale‐value errors in concurrent programs (2004) (44)
- Efficient and flexible value sampling (2000) (42)
- Run-Time Type Checking for Binary Programs (2003) (38)
- Efficient data sharing (1988) (34)
- Authentification and Delegation with Smart-Cards (1993) (32)
- Authentication in distributed systems (1993) (26)
- A Cooperative Backup System (2003) (23)
- The Scope of a Logic of Authentication (1989) (21)
- Zanzibar: Google's Consistent, Global Authorization System (2019) (15)
- Experience with parallel computing on the AN2 network (1996) (14)
- How to Implement Unnecessary Mutexes (2004) (13)
- Peer-to-peer Cooperative Backup System (2001) (9)
- Reconciling OO with Turing Machines (1994) (5)
- Distributed Authorization with Distributed Grammars (2015) (5)
- A Calculus for Access Control in Distributed (1993) (4)
- Efficient implementation of PVM on the AN2 ATM network (1995) (4)
- Autonet: a High-speed, Self-connguring Local Area Network Using Point-to-point Links. Acknowledgment Simulation of a High-speed Wormhole Network in a Parallel Language. 1995. Submitted for Publication. 5.2.2 Man 5 Applications and Testbeds 5.1 Applications 5.2 Testbeds 5.2.1 Campus (2000) (3)
- GLOBAL SYSTEM ON THE BRINK: PATHWAYS TOWARD A NEW NORMAL (2016) (2)
- Finding stale-value errors in concurrent programs: Research Articles (2004) (2)
- Schon. Atomic: a Very-high-speed Local Area Network. in Ieee Workshop on High-speed Cray T3d (gcm Atmos Model) (1996) (0)
- 124 A Block-sorting Lossless Data Compression Algorithm (0)
- Paper : Performance of Firefly RPC (2004) (0)
- P2P Secure Collaboration between Byzantine Processes in Heterogeneous distributed-Processing Systems (2011) (0)
- USENIX Association Proceedings of the General Track : 2003 USENIX Annual (2003) (0)
- On variants of block-sorting compression using context from both the left and right (2000) (0)
- Locks in Distributed Systems - Observations (1988) (0)
- Packet receiver in a computer network and computer network with modified crypto keys between the computer and respective pairs process (1993) (0)
- 11. Paper: Performance of Firefly RPC (2006) (0)
- 8 Appendix: Symmetric Key- Distribution 7 Acknowledgements 3.5 Passphrase Quality 4 Transferring Administrative Burdens 3.3 Certiicate Revocation Lists 3.4 Private-key Management 3.1 Authenticating the User 3.2 Authenticating the Ca Compliance Defects in Public-key Cryptography (1996) (0)
This paper list is powered by the following services: