default search action
David R. Cheriton
Person information
- affiliation: Stanford University, USA
- award (2003): SIGCOMM Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i9]Francisco Romero, Benjamin Braun, David R. Cheriton:
The TRaCaR Ratio: Selecting the Right Storage Technology for Active Dataset-Serving Databases. CoRR abs/2006.14793 (2020) - [i8]Ashutosh Saxena, David R. Cheriton:
Senior Living Communities: Made Safer by AI. CoRR abs/2007.05129 (2020)
2010 – 2019
- 2016
- [c69]Heiner Litz, Benjamin Braun, David R. Cheriton:
EXCITE-VM: Extending the Virtual Memory System to Support Snapshot Isolation Transactions. PACT 2016: 401-412 - 2014
- [j31]Heiner Litz, Ricardo J. Dias, David R. Cheriton:
Efficient Correction of Anomalies in Snapshot Isolation Transactions. ACM Trans. Archit. Code Optim. 11(4): 65:1-65:24 (2014) - [c68]Heiner Litz, David R. Cheriton, Amin Firoozshahian, Omid Azizi, John P. Stevenson:
SI-TM: reducing transactional memory abort rates through snapshot isolation. ASPLOS 2014: 383-398 - [c67]Bo Wang, Heiner Litz, David R. Cheriton:
HICAMP bitmap: space-efficient updatable bitmap index for in-memory databases. DaMoN 2014: 7:1-7:7 - 2013
- [c66]Michael Chan, Heiner Litz, David R. Cheriton:
Rethinking Network Stack Design with Memory Snapshots. HotOS 2013 - [c65]Michael Chan, David R. Cheriton:
Improving Server Application Performance via Pure TCP ACK Receive Optimization. USENIX ATC 2013: 359-364 - 2012
- [c64]David R. Cheriton, Amin Firoozshahian, Alex Solomatnikov, John P. Stevenson, Omid Azizi:
HICAMP: architectural support for efficient concurrency-safe shared structured data access. ASPLOS 2012: 287-300 - [c63]John P. Stevenson, Amin Firoozshahian, Alex Solomatnikov, Mark Horowitz, David R. Cheriton:
Sparse matrix-vector multiply on the HICAMP architecture. ICS 2012: 195-204 - 2010
- [c62]Ashley R. Kelly, Nike A. Abbott, Randy Allen Harris, Chrysanne DiMarco, David R. Cheriton:
Toward an ontology of rhetorical figures. SIGDOC 2010: 123-130
2000 – 2009
- 2009
- [j30]Katerina J. Argyraki, David R. Cheriton:
Scalable network-layer defense against internet bandwidth-flooding attacks. IEEE/ACM Trans. Netw. 17(4): 1284-1297 (2009) - 2007
- [c61]David Pariag, Tim Brecht, Ashif S. Harji, Peter A. Buhr, Amol Shukla, David R. Cheriton:
Comparing the performance of web server architectures. EuroSys 2007: 231-243 - [c60]Xian Zhang, Yu Hao, Xiaoyan Zhu, Ming Li, David R. Cheriton:
Information distance from a question to an answer. KDD 2007: 874-883 - [c59]Stefan Büttcher, Charles L. A. Clarke, Gordon V. Cormack, Thomas R. Lynam, David R. Cheriton:
MultiText Legal Experiments at TREC 2007. TREC 2007 - [i7]Athina Markopoulou, David R. Cheriton:
The Case for Redundant Arrays of Internet Links (RAIL). CoRR abs/cs/0701133 (2007) - 2006
- [c58]Thomas R. Lynam, Gordon V. Cormack, David R. Cheriton:
On-line spam filter fusion. SIGIR 2006: 123-130 - [c57]Daniel B. Faria, David R. Cheriton:
Detecting identity-based attacks in wireless networks using signalprints. Workshop on Wireless Security 2006: 43-52 - 2005
- [c56]Katerina J. Argyraki, David R. Cheriton:
Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. USENIX ATC, General Track 2005: 135-148 - [i6]Evan P. Greenberg, David R. Cheriton:
Enforcing Bulk Mail Classification. CoRR abs/cs/0501027 (2005) - [i5]Tassos Argyros, David R. Cheriton:
A Scalable Stream-Oriented Framework for Cluster Applications. CoRR abs/cs/0504051 (2005) - 2004
- [c55]Katerina J. Argyraki, David R. Cheriton:
Loose source routing as a mechanism for traffic policies. FDNA@SIGCOMM 2004: 57-64 - [i4]Katerina J. Argyraki, David R. Cheriton:
Protecting Public-Access Sites Against Distributed Denial-of-Service Attacks. CoRR cs.NI/0403042 (2004) - 2003
- [j29]Dapeng Zhu, Mark Gritter, David R. Cheriton:
Feedback based routing. Comput. Commun. Rev. 33(1): 71-76 (2003) - [j28]Daniel B. Faria, David R. Cheriton:
MobiCom poster: public-key-based secure Internet access. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(1): 44-46 (2003) - [i3]Katerina J. Argyraki, David R. Cheriton:
Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks. CoRR cs.NI/0309054 (2003) - 2002
- [c54]Sam Liang, David R. Cheriton:
TCP-SMO: Extending TCP to Support Medium-Scale Multicast Applications. INFOCOM 2002: 1356-1365 - [c53]Vincent P. Laviano, David R. Cheriton:
A Name-Based Architecture for Source-Specific Multicast Service. Networked Group Communication 2002: 81-86 - [c52]Daniel B. Faria, David R. Cheriton:
DoS and authentication in wireless public access networks. Workshop on Wireless Security 2002: 47-56 - 2001
- [c51]Fusun Ertemalp, David R. Cheriton, Andreas von Bechtolsheim:
Using Dynamic Buffer Limiting to Protect against Belligerent Flows in High-Speed Networks. ICNP 2001: 230-240 - [c50]Mark Gritter, David R. Cheriton:
An Architecture for Content Routing Support in the Internet. USITS 2001: 37-48
1990 – 1999
- 1999
- [c49]Dan Li, David R. Cheriton:
Evaluating the Utility of FEC with Reliable Multicast. ICNP 1999: 97-105 - [c48]Hugh W. Holbrook, David R. Cheriton:
IP Multicast Channels: EXPRESS Support for Large-scale Single-source Applications. SIGCOMM 1999: 65-78 - [c47]Kenneth J. Duda, David R. Cheriton:
Borrowed-virtual-time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose schedular. SOSP 1999: 261-276 - [c46]Dan Li, David R. Cheriton:
Scalable Web Caching of Frequently Updated Objects Using Reliable Multicast. USENIX Symposium on Internet Technologies and Systems 1999 - 1998
- [c45]Dan Li, David R. Cheriton:
OTERS: (On-Tree Efficient Recovery using Subcasting): A Reliable Multicast Protocol. ICNP 1998: 237-245 - 1996
- [j27]David R. Cheriton, Robert A. Kutter:
Optimized Memory-Based Messaging: Leveraging the Memory System for High-Performance Communication. Comput. Syst. 9(3): 179-215 (1996) - [c44]Matthew J. Zelesko, David R. Cheriton:
Specializing Object-Oriented RPC for Performance and Functionality. ICDCS 1996: 175-187 - [c43]Sandeep K. Singhal, David R. Cheriton:
Using Projection Aggregations to Support Scalability to Distributed Simulation. ICDCS 1996: 196-206 - [c42]Michael B. Greenwald, Sandeep K. Singhal, Jonathan Stone, David R. Cheriton:
Designing an Academic Firewall: Policy, Practice, and Experience with SURF. NDSS 1996: 79-92 - [c41]Michael Greenwald, David R. Cheriton:
The Synergy Between Non-Blocking Synchronization and Operating System Structure. OSDI 1996: 123-136 - 1995
- [j26]Sandeep K. Singhal, David R. Cheriton:
Exploring Position History for Efficient Remote Rendering in Networked Virtual Reality. Presence Teleoperators Virtual Environ. 4(2): 169-193 (1995) - [j25]David R. Cheriton, Kenneth J. Duda:
A Caching Model of Operating System Kernel Functionality. ACM SIGOPS Oper. Syst. Rev. 29(1): 83-86 (1995) - [c40]Hugh W. Holbrook, Sandeep K. Singhal, David R. Cheriton:
Log-Based Receiver-Reliable Multicast for Distributed Interactive Simulation. SIGCOMM 1995: 328-341 - [c39]David R. Cheriton, Kenneth J. Duda:
Logged Virtual Memory. SOSP 1995: 26-39 - 1994
- [j24]Hendrik A. Goosen, Anna R. Karlin, David R. Cheriton, Dieter Polzin:
Chiron parallel program performance visualization system. Comput. Aided Des. 26(12): 899-906 (1994) - [j23]David R. Cheriton, Dale Skeen:
Comments on the Respones by Birman, van Renesse and Cooper. ACM SIGOPS Oper. Syst. Rev. 28(1): 32 (1994) - [c38]David R. Cheriton, Kenneth J. Duda:
A Caching Model of Operating System Kernel Functionality. OSDI 1994: 179-193 - [c37]David R. Cheriton:
Low and High Risk Operating System Architectures (Panel Statement). OSDI 1994: 197 - [c36]David R. Cheriton, Kenneth J. Duda:
A Caching Model of Operating System Kernel Functionalities. ACM SIGOPS European Workshop 1994: 88-91 - 1993
- [c35]David R. Cheriton, Hendrik A. Goosen, Hugh W. Holbrook, Philip Machanick:
Restructuring a parallel simulation to improve cache behavior in a shared-memory multiprocessor: the value of distributed synchronization. PADS 1993: 159-162 - [c34]David R. Cheriton, Dale Skeen:
Understanding the Limitations of Causally and Totally Ordered Communication. SOSP 1993: 44-57 - 1992
- [j22]Kieran Harty, David R. Cheriton:
Application-Controlled Physical Memory using External Page-Cache Management (Abstract). ACM SIGOPS Oper. Syst. Rev. 26(2): 19 (1992) - [c33]Kieran Harty, David R. Cheriton:
Application-Controlled Physical Memory using External Page-Cache Management. ASPLOS 1992: 187-197 - [c32]David R. Cheriton:
Problem-oriented shared memory revisited. ACM SIGOPS European Workshop 1992 - 1991
- [j21]David R. Cheriton, Hendrik A. Goosen, Patrick D. Boyle:
Paradigm: A Highly Scalable Shared-Memory Multicomputer Architecture. Computer 24(2): 33-46 (1991) - [j20]Joseph Boykin, David R. Cheriton:
Operating Systems: A Vision of the Year 2000. Computer 24(9): 108-110 (1991) - [c31]Carey L. Williamson, David R. Cheriton:
Loss-Load Curves: Support for Rate-Based Congestion Control in High-Speed Datagram Networks. SIGCOMM 1991: 17-28 - 1990
- [j19]Zygmunt J. Haas, David R. Cheriton:
Blazenet: a packet-switched wide-area network with photonic data path. IEEE Trans. Commun. 38(6): 818-829 (1990) - [j18]Stephen E. Deering, David R. Cheriton:
Multicast Routing in Datagram Internetworks and Extended LANs. ACM Trans. Comput. Syst. 8(2): 85-110 (1990) - [c30]David R. Cheriton, Gregory R. Whitehead, Edward W. Sznyter:
Binary Emulation of UNIX Using the V Kernel. USENIX Summer 1990: 73-86
1980 – 1989
- 1989
- [j17]David R. Cheriton, Carey L. Williamson:
VMTP as the transport layer for high-performance distributed systems. IEEE Commun. Mag. 27(6): 37-44 (1989) - [j16]David R. Cheriton, Timothy P. Mann:
Decentralizing a Global Naming Service for Improved Performance and Fault Tolerance. ACM Trans. Comput. Syst. 7(2): 147-183 (1989) - [c29]David R. Cheriton, Hendrik A. Goosen, Patrick D. Boyle:
Multi-level Shared Caching Techniques for Scalability in VMP-M/C. ISCA 1989: 16-24 - [c28]Carey L. Williamson, David R. Cheriton:
An overview of the VMTP transport protocol. LCN 1989: 415-420 - [c27]David R. Cheriton:
Sirpent: A High-Performance Internetworking Approach. SIGCOMM 1989: 158-169 - [c26]Cary G. Gray, David R. Cheriton:
Leases: An Efficient Fault-Tolerant Mechanism for Distributed File Cache Consistency. SOSP 1989: 202-210 - 1988
- [j15]David R. Cheriton:
The V Distributed System. Commun. ACM 31(3): 314-333 (1988) - [j14]David R. Cheriton, Patrick D. Boyle, Gert Slavenburg:
Comments on "'Coherency for multiprocessor virtual addresses caches' by James R. Goodman". SIGARCH Comput. Archit. News 16(3): 3-6 (1988) - [c25]David R. Cheriton, Anoop Gupta, Patrick D. Boyle, Hendrik A. Goosen:
The VMP Multiprocessor: Initial Experience, Refinements and Performance Evlauation. ISCA 1988: 410-421 - [c24]Hemant Kanakia, David R. Cheriton:
Universal network device interface protocol (UNDIP). LCN 1988: 301-309 - [c23]David R. Cheriton:
Exploiting recursion to simplify RPC communication architectures. SIGCOMM 1988: 76-87 - [c22]Hemant Kanakia, David R. Cheriton:
The VMP network adapter board (NAB): high-performance network communication for multiprocessors. SIGCOMM 1988: 175-187 - [c21]David R. Cheriton:
The role of domains in large-scale distributed systems. ACM SIGOPS European Workshop 1988 - [i2]David R. Cheriton:
VMTP: Versatile Message Transaction Protocol: Protocol specification. RFC 1045: 1-128 (1988) - 1987
- [j13]Zygmunt J. Haas, David R. Cheriton:
A case for packet switching in high-performance wide-area networks. Comput. Commun. Rev. 17(5): 402-409 (1987) - [j12]David R. Cheriton:
UIO: A Uniform I/O System Interface for Distributed Systems. ACM Trans. Comput. Syst. 5(1): 12-46 (1987) - [c20]David R. Cheriton, Michael E. Wolf:
Extensions for Multi-Module Records in Conventional Programming Languages. POPL 1987: 296-306 - [c19]David R. Cheriton, Carey L. Williamson:
Network Measurement of the VMTP Request-Response Protocol in the V Distributed System. SIGMETRICS 1987: 216-225 - [c18]Ross S. Finlayson, David R. Cheriton:
Log Files: An Extended File Service Exploiting Write-Once Storage. SOSP 1987: 139-148 - 1986
- [j11]Edward D. Lazowska, John Zahorjan, David R. Cheriton, Willy Zwaenepoel:
File Access Performance of Diskless Workstations. ACM Trans. Comput. Syst. 4(3): 238-268 (1986) - [c17]David R. Cheriton:
Request- Response and Multicast Interprocess Communication in the V Kernel. Networking in Open Systems 1986: 296-312 - [c16]David R. Cheriton:
Problem-oriented Shared Memory: A Decentralized Approach to Distributed System Design. ICDCS 1986: 190-197 - [c15]David R. Cheriton:
Making Exceptions Simplify the Rule (and Justify their Handling). IFIP Congress 1986: 27-34 - [c14]David R. Cheriton, Gert Slavenburg, Patrick D. Boyle:
Software-Controlled Caches in the VMP Multiprocessor. ISCA 1986: 366-374 - [c13]David R. Cheriton:
VMTP: a transport protocol for the next generation of communication systems. SIGCOMM 1986: 406-415 - [c12]David R. Cheriton:
The V distributed operating system: principles and principal experiences. ACM SIGOPS European Workshop 1986 - 1985
- [j10]David R. Cheriton, Andrew Birrell:
Report of the Program Committee for the 10th SOSP. ACM SIGOPS Oper. Syst. Rev. 19(4): 2-4 (1985) - [j9]David R. Cheriton:
Preliminary Thoughts on Problem-oriented Shared Memory: A Decentralized Approach to Distributed Systems. ACM SIGOPS Oper. Syst. Rev. 19(4): 26-33 (1985) - [j8]Eric J. Berglund, David R. Cheriton:
Amaze: A Multiplayer Computer Game. IEEE Softw. 2(3): 30-39 (1985) - [j7]David R. Cheriton, Willy Zwaenepoel:
Distributed Process Groups in the V Kernel. ACM Trans. Comput. Syst. 3(2): 77-107 (1985) - [c11]David R. Cheriton, Paul Roy:
Performance of the V storage server: a preliminary report. ACM Conference on Computer Science 1985: 302-308 - [c10]David R. Cheriton, Stephen E. Deering:
Host groups: a multicast extension for datagram internetworks. SIGCOMM 1985: 172-179 - [c9]Marvin Theimer, Keith A. Lantz, David R. Cheriton:
Preemptable Remote Execution Facilities for the V-System. SOSP 1985: 2-12 - [e1]Forest Baskett, Andrew Birrell, David R. Cheriton:
Proceedings of the Tenth ACM Symposium on Operating System Principles, SOSP 1985, Orcas Island, Washington, USA, December 1-4, 1985. ACM 1985, ISBN 0-89791-174-1 [contents] - [i1]Stephen E. Deering, David R. Cheriton:
Host groups: A multicast extension to the Internet Protocol. RFC 966: 1-27 (1985) - 1984
- [j6]David R. Cheriton, Willy Zwaenepoel:
One-to-many interprocess communication in the V-system. Comput. Commun. Rev. 14(2): 64 (1984) - [j5]David R. Cheriton:
An Experiment using Registers for Fast Message-Based Interprocess Communication. ACM SIGOPS Oper. Syst. Rev. 18(4): 12-20 (1984) - [j4]David R. Cheriton:
The V Kernel: A Software Base for Distributed Systems. IEEE Softw. 1(2): 19-42 (1984) - [c8]Eric J. Berglund, David R. Cheriton:
Amaze: A Distributed Multi-Player Game Program using the Distributed V Kernel. ICDCS 1984: 248-253 - [c7]David R. Cheriton, Timothy P. Mann:
Uniform Access to Distributed Name Interpretation in the V-System. ICDCS 1984: 290-297 - 1983
- [c6]David R. Cheriton:
Local networking and internetworking in the V-system. SIGCOMM 1983: 9-16 - [c5]David R. Cheriton, Willy Zwaenepoel:
The Distributed V Kernel and its Performance for Diskless Workstations. SOSP 1983: 129-140 - 1981
- [c4]David R. Cheriton:
The design of a distributed kernel. ACM Annual Conference 1981: 46-52
1970 – 1979
- 1979
- [j3]David R. Cheriton, Michael A. Malcolm, Lawrence S. Melen, Gary R. Sager:
Thoth, a Portable Real-Time Operating System. Commun. ACM 22(2): 105-115 (1979) - 1977
- [c3]David R. Cheriton, Michael A. Malcolm, Lawrence S. Melen, Gary R. Sager:
Thoth, a Portable Real-Time Operating System (Extended Abstract). SOSP 1977: 171 - 1976
- [j2]David R. Cheriton, Robert Endre Tarjan:
Finding Minimum Spanning Trees. SIAM J. Comput. 5(4): 724-742 (1976) - [c2]David R. Cheriton, Steven S. Muchnick, Hasan H. Sayani, Robert Trueman Tomlinson, Ronnie G. Ward, Darrell L. Ward:
Sigops(Paper Session). ACM Annual Conference 1976: 361 - [c1]David R. Cheriton:
Man-machine interface design for timesharing systems. ACM Annual Conference 1976: 362-366 - 1974
- [j1]David R. Cheriton:
An extension to on-line multiplication lower bound results. SIGACT News 6(4): 24-31 (1974)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint