Michael J. Freedman
#174,704
Most Influential Person Now
Michael J. Freedman's AcademicInfluence.com Rankings
Michael J. Freedmanmathematics Degrees
Mathematics
#7854
World Rank
#10664
Historical Rank
Measure Theory
#2716
World Rank
#3244
Historical Rank

Download Badge
Mathematics Computer Science
Michael J. Freedman's Degrees
- PhD Computer Science University of California, Berkeley
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Michael J. Freedman Influential?
(Suggest an Edit or Addition)Michael J. Freedman's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Efficient Private Matching and Set Intersection (2004) (1256)
- Ethane: taking control of the enterprise (2007) (1012)
- Tarzan: a peer-to-peer anonymizing network layer (2002) (811)
- Frenetic: a network programming language (2011) (733)
- Scalable flow-based networking with DIFANE (2010) (660)
- Don't settle for eventual: scalable causal consistency for wide-area storage with COPS (2011) (654)
- Democratizing Content Publication with Coral (2004) (567)
- The Free Haven Project: Distributed Anonymous Storage Service (2000) (441)
- Blockstack: A Global Naming and Storage System Secured by Blockchains (2016) (427)
- On-the-fly verification of rateless erasure codes for efficient content distribution (2004) (405)
- Keyword Search and Oblivious Pseudorandom Functions (2005) (386)
- Live Video Analytics at Scale with Approximation and Delay-Tolerance (2017) (311)
- Stronger Semantics for Low-Latency Geo-Replicated Storage (2013) (290)
- SPORC: Group Collaboration using Untrusted Cloud Resources (2010) (288)
- Performance Isolation and Fairness for Multi-Tenant Cloud Storage (2012) (280)
- SANE: A Protection Architecture for Enterprise Networks (2006) (271)
- DONAR: decentralized server selection for cloud services (2010) (235)
- CONIKS: Bringing Key Transparency to End Users (2015) (220)
- Languages for software-defined networks (2013) (197)
- Rethinking Enterprise Network Control (2009) (193)
- Shark: scaling file servers via cooperative caching (2005) (184)
- RE: Reliable Email (2006) (170)
- OASIS: Anycast for Any Service (2006) (161)
- Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area (2014) (160)
- Serval: An End-Host Stack for Service-Centric Networking (2012) (154)
- Ravana: controller fault-tolerance in software-defined networking (2015) (151)
- Algorithmic improvements for fast concurrent Cuckoo hashing (2014) (149)
- Sloppy Hashing and Self-Organizing Clusters (2003) (146)
- Geographic locality of IP prefixes (2005) (131)
- Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification (2007) (121)
- Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer (2002) (113)
- Non-Transitive Connectivity and DHTs (2005) (112)
- Scalable, optimal flow routing in datacenters via local link balancing (2013) (112)
- Scalable Inference of Overlapping Communities (2012) (109)
- SLAQ: quality-driven scheduling for distributed machine learning (2017) (107)
- Privacy Engineering for Digital Rights Management Systems (2001) (105)
- A Reputation System to Increase MIX-Net Reliability (2001) (103)
- Experiences with CoralCDN: A Five-Year Operational View (2010) (101)
- Object Storage on CRAQ: High-Throughput Chain Replication for Read-Mostly Workloads (2009) (98)
- Be Fast, Cheap and in Control with SwitchKV (2016) (95)
- Going viral: flash crowds in an open CDN (2011) (87)
- Frenetic: a high-level language for OpenFlow networks (2010) (85)
- Scaling IP multicast on datacenter topologies (2013) (76)
- Efficient Set Intersection with Simulation-Based Security (2014) (73)
- Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider (2012) (71)
- Hyperbolic Caching: Flexible Caching for Web Applications (2017) (67)
- Collaborative, Privacy-Preserving Data Aggregation at Scale (2010) (63)
- Peer-assisted content distribution with prices (2008) (61)
- The Nebula Future Internet Architecture (2013) (59)
- A peer-to-peer anonymizing network layer (2002) (57)
- Riffle: optimized shuffle service for large-scale data analytics (2018) (49)
- Efficient Peer-to-Peer Lookup Based on a Distributed Trie (2002) (42)
- HONE: Joint Host-Network Traffic Management in Software-Defined Networks (2015) (40)
- vCorfu: A Cloud-Scale Object Store on a Shared Log (2017) (39)
- Resource Elasticity in Distributed Deep Learning (2020) (39)
- Identifying performance bottlenecks in CDNs through TCP-level monitoring (2011) (37)
- Experiences with Tracing Causality in Networked Services (2010) (36)
- Prices are right: managing resources and incentives in peer-assisted content distribution (2008) (35)
- Versatile padding schemes for joint signature and encryption (2004) (34)
- Efficient Private Techniques for Verifying Social Proximity (2007) (33)
- Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution (2009) (33)
- Commensal cuckoo: secure group partitioning for large-scale services (2012) (33)
- A brief overview of the NEBULA future internet architecture (2014) (31)
- Service-Centric Networking with SCAFFOLD (2010) (31)
- Extending Existing Blockchains with Virtualchain (2016) (29)
- Blockstack : A New Decentralized Internet (2017) (29)
- Automating Isolation and Least Privilege in Web Services (2014) (28)
- Optimal Signcryption from Any Trapdoor Permutation (2004) (28)
- Bringing P2P to the web: security and privacy in the firecoral network (2009) (27)
- From application requests to virtual IOPs: provisioned key-value storage with Libra (2014) (26)
- Replex: A Scalable, Highly Available Multi-Index Data Store (2016) (26)
- Locality Prediction for Oblivious Clients (2005) (24)
- Blockstack: Design and Implementation of a Global Naming System with Blockchains (2016) (22)
- To Infinity and Not Beyond : Scaling Communication in Virtual Worlds with Meru (2010) (21)
- Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing (2011) (20)
- A formally-verified migration protocol for mobile, multi-homed hosts (2012) (20)
- CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication (2014) (20)
- Scaling Virtual Worlds with a Physical Metaphor (2009) (19)
- Don't settle for eventual consistency (2014) (18)
- EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments (2019) (17)
- Don’t Settle for Eventual Consistency (2014) (17)
- Bootstrapping Trust in Distributed Systems with Blockchains (2016) (17)
- Who's Afraid of Uncorrectable Bit Errors? Online Recovery of Flash Errors with Distributed Redundancy (2019) (16)
- Economic Barriers to the Deployment of Existing Privacy Technologies (2002) (16)
- Making Every Bit Count in Wide-Area Analytics (2013) (16)
- Prophecy: Using History for High-Throughput Fault Tolerance (2010) (15)
- The Compression Cache: Virtual Memory Compression for Handheld Computers (2000) (11)
- Serverless Isn't Server-Less: Measuring and Exploiting Resource Variability on Cloud FaaS Platforms (2020) (10)
- Unsupervised Conversion of 3D Models for Interactive Metaverses (2012) (10)
- A Scalable Server for 3D Metaverses (2012) (10)
- Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings (2003) (9)
- Increasing network resilience through edge diversity in NEBULA (2012) (9)
- Design and Analysis of an Anonymous Communications Channel for the Free Haven Project (2000) (9)
- Fairness and isolation in multi-tenant storage as optimization decomposition (2013) (8)
- Blockstack : A New Internet for Decentralized Applications (2017) (8)
- Pyronia: Redesigning Least Privilege and Isolation for the Age of IoT (2019) (6)
- Bringing Deployable Key Transparency to End Users (2015) (6)
- PrismDB: Read-aware Log-structured Merge Trees for Heterogeneous Storage (2020) (6)
- Proceedings of the Sixth ACM Symposium on Cloud Computing (2015) (5)
- Privacy and Integrity are Possible in the Untrusted Cloud (2012) (5)
- 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014 (2014) (5)
- Group Therapy for Systems: Using Link Attestations to Manage Failures (2006) (5)
- New systems and algorithms for scalable fault tolerance (2013) (4)
- Decentralized Server Selection Through Joint Proximity and Load Optimization (2009) (3)
- Language Abstractions for Software-Defined Networks (2012) (3)
- Democratizing Content Distribution (2007) (3)
- Coercing clients into facilitating failover for object delivery (2011) (3)
- A Short Primer on Causal Consistency (2013) (3)
- Stronger consistency and semantics for low-latency geo-replicated storage (2013) (3)
- Pyronia: Intra-Process Access Control for IoT Applications (2019) (2)
- The Role of Prices in Peer-Assisted Content Distribution (2008) (2)
- Live Recovery of Bit Corruptions in Datacenter Storage Systems (2018) (2)
- From Feast to Famine: Managing Mobile Network Resources Across Environments and Preferences (2014) (2)
- Brief Announcement: Bridging the Theory-Practice Gap in Multi-commodity Flow Routing (2011) (2)
- VirtualFlow: Decoupling Deep Learning Models from the Underlying Hardware (2020) (2)
- Automating Server Selection with OASIS (2006) (1)
- Proceedings of the Eighth USENIX conference on Hot Topics in System Dependability (2012) (1)
- Programmable Host-Network Traffic Management (2013) (1)
- A Provably-Correct Protocol for Seamless Communication with Mobile, Multi-Homed Hosts (2012) (1)
- On-the-Fly Verification of Erasure-Encoded File Transfers (Extended Abstract) (2003) (1)
- A Service Access Layer , at Your Service (2011) (1)
- A Scalable Server for 3 D Metaverses (2012) (1)
- PoX: Proof of Transfer Mining with Bitcoin (2020) (1)
- VirtualFlow: Decoupling Deep Learning Model Execution from Underlying Hardware (2020) (1)
- Efficient Set Intersection with Simulation-Based Security (2014) (0)
- Contents, Vol. 81, 1989 (1989) (0)
- Peer-‐to-‐peer in the Datacenter: Amazon Dynamo 3.3 Discussion 4. System Architecture 4.1 System Interface 4.2 Partitioning Algorithm Figure 2: Partitioning and Replication of Keys in Dynamo Ring. Problem Technique Advantage Partitioning Consistent Hashing Incremental Scalability High Availability (0)
- Efficient Compactions between Storage Tiers with PrismDB (2020) (0)
- Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage (2022) (0)
- ReLAQS: Reducing Latency for Multi-Tenant Approximate Queries via Scheduling (2019) (0)
- Poor Video Streaming Performance Explained (and Fixed) (2016) (0)
- Adjusting partitioning policies of a database system in view of storage reconfiguration (2018) (0)
- HONE: Joint Host-Network Traffic Management in Software-Defined Networks (2014) (0)
- Subject Index, Vol. 81, 1989 (1989) (0)
- A short primer on casual consistency (2013) (0)
- Comparing multilateral and bilateral exchange models for content distribution (2009) (0)
- Stronger properties for low-latency geo-replicated storage. (2014) (0)
- NSDI ’ 06 : 3 rd Symposium on Networked Systems Design & ImplementationUSENIX Association 129 OASIS : Anycast for Any Service (2006) (0)
- ReLAQS (2019) (0)
- Welcome message from the socc chairs (2015) (0)
- Content conditioning and distribution for dynamic virtual worlds (2012) (0)
- Distributed , Concurrent , and Independent Access to Encrypted Cloud Databases (2015) (0)
- Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012 (2012) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Michael J. Freedman?
Michael J. Freedman is affiliated with the following schools: