Peter Druschel
#25,724
Most Influential Person Now
German computer scientist
Peter Druschel's AcademicInfluence.com Rankings
Peter Druschelcomputer-science Degrees
Computer Science
#1333
World Rank
#1378
Historical Rank
Database
#2039
World Rank
#2143
Historical Rank
Download Badge
Computer Science
Why Is Peter Druschel Influential?
(Suggest an Edit or Addition)According to Wikipedia, Peter Druschel is a German computer scientist and founding director of the Max Planck Institute for Software Systems in Saarbrücken. Education and career Druschel studied electrical engineering specializing on data technology at the Munich University of Applied Sciences and completed his studies as a graduate engineer. He graduated in 1994 from the University of Arizona under Larry L. Peterson. In the same year he became Assistant Professor of Computer Science at Rice University. In 2000 he became Associate Professor, followed in 2002 by a full professorship.
Peter Druschel's Published Works
Published Works
- Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems (2001) (8089)
- Measurement and analysis of online social networks (2007) (3261)
- Pastry: Scalable, distributed object location and routing for large-scale peer-to- (2001) (3066)
- PAST: a large-scale, persistent peer-to-peer storage utility (2001) (1944)
- Scribe: a large-scale and decentralized application-level multicast infrastructure (2002) (1669)
- SplitStream: high-bandwidth multicast in cooperative environments (2003) (1606)
- Secure routing for structured peer-to-peer overlay networks (2002) (919)
- Resource containers: a new facility for resource management in server systems (1999) (816)
- You are who you know: inferring user profiles in online social networks (2010) (767)
- SCRIBE: The Design of a Large-Scale Event Notification Infrastructure (2001) (669)
- Locality-aware request distribution in cluster-based network servers (1998) (655)
- Towards a Common API for Structured Peer-to-Peer Overlays (2003) (609)
- Peer-to-peer systems (2010) (473)
- Growth of the flickr social network (2008) (455)
- SplitStream: High-Bandwidth Content Distribution in Cooperative Environments (2003) (442)
- Fbufs: a high-bandwidth cross-domain transfer facility (1994) (438)
- Squirrel: a decentralized peer-to-peer web cache (2002) (435)
- Flash: An efficient and portable Web server (1999) (427)
- PeerReview: practical accountability for distributed systems (2007) (413)
- Eclipse Attacks on Overlay Networks: Threats and Defenses (2006) (349)
- IO-Lite: a unified I/O buffering and caching system (1999) (343)
- Glacier: highly durable, decentralized storage despite massive correlated failures (2005) (317)
- Ants and Reinforcement Learning: A Case Study in Routing in Dynamic Networks (1997) (298)
- Anticipatory scheduling: a disk scheduling framework to overcome deceptive idleness in synchronous I/O (2001) (282)
- Lazy receiver processing (LRP): a network subsystem architecture for server systems (1996) (277)
- Cluster reserves: a mechanism for resource management in cluster-based network servers (2000) (273)
- Scalable Content-aware Request Distribution in Cluster-based Network Servers (2000) (270)
- Experiences with a high-speed network adaptor: a software perspective (1994) (243)
- Exploiting network proximity in peer-to-peer overlay networks (2002) (221)
- The IceCube approach to the reconciliation of divergent replicas (2001) (211)
- Measuring the Capacity of a Web Server (1997) (209)
- Exploiting Social Networks for Internet Search (2006) (209)
- Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks (2003) (202)
- Ostra: Leveraging Trust to Thwart Unwanted Communication (2008) (200)
- Enforcing Fair Sharing of Peer-to-Peer Resources (2003) (198)
- Defending against eclipse attacks on overlay networks (2004) (190)
- Practical, transparent operating system support for superpages (2002) (189)
- Performance analysis of TLS Web servers (2006) (167)
- Measurement-Based Analysis, Modeling, and Synthesis of the Internet Delay Space (2006) (145)
- Exploiting Network Proximity in Distributed Hash Tables (2002) (140)
- Online social networks: measurement, analysis, and applications to distributed information systems (2009) (134)
- A Scalable and Explicit Event Delivery Mechanism for UNIX (1999) (129)
- AP3: cooperative, decentralized anonymous communication (2004) (127)
- Storage management and caching in PAST (2001) (124)
- BFT Protocols Under Fire (2008) (122)
- Network subsystem design (1993) (119)
- Efficient Support for P-HTTP in Cluster-Based Web Servers (1999) (117)
- Accountable Virtual Machines (2010) (115)
- One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networks (2002) (114)
- Scribe: A Large-Scale and Decentralized (2002) (111)
- Measuring the capacity of a Web server under realistic loads (1999) (109)
- Scalable Application-Level Anycast for Highly Dynamic Groups (2003) (108)
- ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK) (2019) (106)
- FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification (2005) (103)
- Peer-assisted content distribution in Akamai netsession (2013) (101)
- I-Pic: A Platform for Privacy-Compliant Image Capture (2016) (100)
- An efficient multipath forwarding method (1998) (90)
- Light-Weight Contexts: An OS Abstraction for Safety and Performance (2016) (89)
- Soft timers: efficient microsecond software timer support for network processing (1999) (89)
- Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays (2004) (88)
- Incentives-Compatible Peer-to-Peer Multicast (2004) (88)
- Proximity Neighbor Selection in Tree-Based Structured Peer-to-Peer Overlays (2003) (84)
- The Case for Byzantine Fault Detection (2006) (82)
- Using queries for distributed monitoring and forensics (2006) (82)
- Towards efficient traffic-analysis resistant anonymity networks (2013) (80)
- Scrivener: Providing Incentives in Cooperative Content Distribution Systems (2005) (80)
- POST: A Secure, Resilient, Cooperative Messaging System (2003) (77)
- NetReview: Detecting When Interdomain Routing Goes Wrong (2009) (75)
- Better operating system features for faster network servers (1998) (71)
- Experiences in building and operating ePOST, a reliable peer-to-peer application (2006) (59)
- Exploring the design space of social network-based Sybil defenses (2012) (57)
- TCP: Improving Startup Dynamics by Adaptive Timers and Congestion Control (1998) (52)
- Beyond micro-kernel design: decoupling modularity and protection in Lipto (1992) (52)
- Practical, transparent operating system support for superpages (2002) (51)
- SeCloak: ARM Trustzone-based Mobile Peripheral Control (2018) (49)
- Fallacies in Evaluating Decentralized Systems (2006) (46)
- CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable (2009) (46)
- EnCore: private, context-based communication for mobile social apps (2014) (46)
- Past: persistent and anonymous storage in a peer-to-peer networking environment (2001) (45)
- Soft timers: efficient microsecond software timer support for network processing (2000) (38)
- Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (2011) (37)
- Defending against large-scale crawls in online social networks (2012) (37)
- Operating system support for high-speed communication (1996) (36)
- Transparent operating system support for superpages (2004) (35)
- Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking (2005) (35)
- Extensible kernels are leading OS research astray (1997) (35)
- Measurement-based analysis, modeling, and synthesis of the internet delay space (2010) (35)
- Qapla: Policy compliance for database-backed systems (2017) (34)
- Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking (2008) (33)
- TCP Implementation Enhancements for Improving Webserver Performance (1999) (33)
- New approaches to routing for large-scale data networks (2000) (32)
- Operating system support for high-speed networking (1994) (31)
- Guardat: enforcing data policies at the storage layer (2015) (31)
- On designing incentives-compatible peer-to-peer systems (2004) (30)
- Soft timers: efficient microsecond software timer support for network processing (2000) (30)
- Reliable Client Accounting for P2P-Infrastructure Hybrids (2012) (30)
- Beyond Access Control: Managing Online Privacy via Exposure (2014) (30)
- Differentiated and predictable quality of service in web server systems (2001) (29)
- Efficient support for incremental customization of OS services (1993) (28)
- A new approach to routing with dynamic metrics (1999) (28)
- Scribe: a large-scale and decentralized publish-subscribe infrastructure (2001) (26)
- The right to be forgotten- between expectations and practice (2013) (26)
- Thoth: Comprehensive Policy Compliance in Data Retrieval Systems (2016) (26)
- Implementing Atomic Sequences on Uniprocessors Using Rollforward (1996) (25)
- SAAR: A Shared Control Plane for Overlay Multicast (2007) (25)
- SDDR: Light-Weight, Secure Mobile Encounters (2014) (24)
- Proceedings of the 5th symposium on Operating systems design and implementation (2002) (24)
- ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys (2018) (22)
- Consistent Key Mapping in Structured Overlays (2005) (22)
- An Efficient and Portable Web Server (1999) (22)
- Peer-to-peer systems : First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002 : revised papers (2002) (20)
- Privacy Capsules: Preventing Information Leaks by Mobile Apps (2016) (20)
- Brave New World: Privacy Risks for Mobile Users (2015) (20)
- A Resource Management Framework for Predictable Quality of Service in Web Servers (2003) (20)
- Secure routing for structured peer-to-peer overlay networks (2002) (18)
- A Simple, Practical Distributed Multi-Path Routing Algorithm (1998) (16)
- PodBase: transparent storage management for personal devices (2008) (15)
- Reliable Client Accounting for Hybrid Content-Distribution Networks (2012) (15)
- Network Subsystem Design : A Case for an Integrated Data Path (1993) (15)
- Autonomous Storage Management for Personal Devices with PodBase (2011) (15)
- Limiting large-scale crawls of social networking sites (2011) (15)
- Falling Off the Cliff: When Systems Go Nonlinear (2005) (13)
- PAST: A Persistent and Anonymous Store (2001) (13)
- Analysis of I/O Subsystem Design for Multimedia Workstations (1992) (12)
- Pretty Good Packet Authentication (2008) (12)
- Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems (2015) (11)
- Sonoloc: Scalable positioning of commodity mobile devices (2018) (11)
- Fighting Cybercrime with Packet Attestation (2011) (10)
- Proceedings of the Ninth European Conference on Computer Systems (2014) (10)
- ERIM: Secure, Efficient In-process Isolation with Memory Protection Keys (MPK) (2018) (9)
- Finding Safety in Numbers with Secure Allegation Escrows (2018) (9)
- Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information (2015) (9)
- Design and scalability of NLS, a scalable naming and location service (2002) (8)
- IO-lite: a unified I/O buffering and caching system (1999) (8)
- What a mesh (2009) (8)
- BackRef: Accountability in Anonymous Communication Networks (2014) (8)
- enClosure: Group Communication via Encounter Closures (2019) (8)
- Analysis of cache and tlb effectiveness in processing network i/o (1994) (8)
- Listening to bluetooth beacons for epidemic risk mitigation (2020) (7)
- Cache and TLB Effectiveness in the Processing of Network Data (1993) (7)
- Optimizing routing in structured peer-to-peer overlay networks using routing table redundancy (2003) (7)
- Service composition in Lipto (1991) (6)
- Lipto: a dynamically configurable object-oriented kernel (1991) (6)
- Operating system support for server applications (1999) (6)
- An Empirical Validation of Growth Models for Complex Networks (2013) (6)
- Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead (2018) (4)
- Advanced memory management and disk scheduling techniques for general-purpose operating systems (2006) (4)
- Fostering Systems Research in Europe (2006) (4)
- Operating systems and network interfaces (1998) (4)
- Modularity and protection should be decoupled (1992) (4)
- Revised Papers from the First International Workshop on Peer-to-Peer Systems (2002) (4)
- Extensible Systems are Leading OS Research Astray. (1997) (3)
- Demo: I-Pic: A Platform for Privacy-Compliant Image Capture (2016) (3)
- Guardat: A foundation for policy-protected data (2014) (3)
- Brave new world: privacy risks for mobile users (2014) (3)
- SeCloak (2018) (3)
- Accountability for distributed systems (2008) (3)
- Introducing Accountability to Anonymity Networks (2013) (2)
- Understanding the design tradeoffs for cooperative streaming multicast (2009) (2)
- Operating system support for high-speed communication : Latest developments in operating systems (1996) (2)
- What is a Glacier? (2)
- Accountability and Trust in Cooperative Information Systems (2012) (2)
- SATE: Robust and Private Allegation Escrows (2018) (2)
- Pacer: Network Side-Channel Mitigation in the Cloud (2019) (2)
- A Fast and General Software Solution to Mutual Exclusion on Uniprocessors (2005) (2)
- Technical perspectiveNarrowing the semantic gap in distributed programming (2009) (1)
- Abstracting out Byzantine Behavior (2006) (1)
- Fostering Systems Research in Europe A White Paper by EuroSys , the European Professional Society in Systems (2006) (1)
- “ A P 2 P Storage System Based on Erasure Codes (2003) (1)
- Keynote The Renaissance of Decentralized Systems (2006) (1)
- Modularity and Protection are Orthogonal, or “Why μ-kernel Architectures are Flawed” (1992) (1)
- Safari : A Scalable Architecture for Ad Hoc Networking and Services (1)
- Implementation and evaluation of secure routing primitives (2006) (1)
- Composing Abstractions using the null-Kernel (2019) (1)
- An Eecient Multipath Forwarding Method (1998) (1)
- Sonoloc (2018) (1)
- PolSim: Automatic Policy Validation via Meta-Data Flow Simulation (2016) (1)
- enClosure: Group Communication via Encounter Closures (poster) (2019) (1)
- Operating System Support for High-Speed Communication: Techniques to Eliminate Processing Bottlenecks in High-Speed Networking are Present. (1996) (1)
- CoVault: A Secure Analytics Platform (2022) (1)
- En-Route Web Caching in Trustworthy Structured Peer-to-Peer Networks (2020) (0)
- Cache and TLB Effectiveness in Processing Network (2019) (0)
- Detecting communities in online social networks (2008) (0)
- Read Request Find File Read File Send DataStart End Accept (2002) (0)
- enClosure (2019) (0)
- Application-assisted physical memor y management for general-purpose operating systems (2003) (0)
- RR: A Fault Model for Efficient TEE Replication (2023) (0)
- P2p: still worthless? (2005) (0)
- Peer-to-peer Systems Originally Invented for Music/data Sharing and Volunteer Computing, P2p Systems Now Enjoy Widespread Commercial and Non-commercial Use in Content Distribution, Iptv, and Ip Telephony (2013) (0)
- Towards Fair Sharing of Peer-to-Peer Resources (2003) (0)
- Within a decade , P 2 P (2010) (0)
- Passenger Travel behavior Model in Railway Network Simulation (2017) (0)
- Client Replicas Collect Grants Write-back Response Phase I Phase II Client Replicas Collect Grants Write-back Response Phase I Phase II Preserialization (2007) (0)
- Session details: Session 8: Waiting for 7G (2019) (0)
- Protecting Data Integrity with Storage Leases (2013) (0)
- Topic 09: Distributed Systems and Algorithms (2001) (0)
- Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud (2019) (0)
- Design and Implementation of a Collaborative Content Downloading System (2005) (0)
- Understanding, evaluating, and improving the availability of bft protocols (2009) (0)
- Exploring the design space of cooperative streaming multicast (2009) (0)
- CoVault: Secure Selective Analytics of Sensitive Data for the Public Good (2022) (0)
- End-to-end Tcp Congestion Control over Atm Networks (2007) (0)
- Narrowing the semantic gap in distributed programming (2009) (0)
- Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties Game (2017) (0)
- Lazy Receivevr Processing (LRP) : A Network Subsystem Architecture for Server System (1996) (0)
- Groundhog: Efficient Request Isolation in FaaS (2022) (0)
- Reconciling Security and Utility in Next-Generation Epidemic Risk Mitigation Systems (2020) (0)
- high-speed networking are presented. (1996) (0)
- Control : Managing Online Privacy via Exposure (2014) (0)
- オペレ-ティングシステム開発における最近の話題--高速通信のためのオペレ-ティングシステムのサポ-ト--高速ネットワ-クにおけるプログラム処理ボトルネック解消の技術 (1997) (0)
- Reliable Client Accounting for P 2 P-Infrastructure Hybrids Paarijaat Aditya (2015) (0)
- Trusted storage (2012) (0)
- An e cient and portable Web server (1999) (0)
- Towards accountable information systems (2014) (0)
- Read Request Find File Read File Send Data Get Conn Accept Con Get Conn Send Header Process 1 Read Request Find File Read File Send Data Get (1999) (0)
This paper list is powered by the following services:
Other Resources About Peter Druschel
What Schools Are Affiliated With Peter Druschel?
Peter Druschel is affiliated with the following schools: