Architectural support for copy and tamper resistant software D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh, J Mitchell, M Horowitz Acm Sigplan Notices 35 (11), 168-177, 2000 | 1075 | 2000 |
Petal: Distributed virtual disks EK Lee, CA Thekkath Proceedings of the seventh international conference on Architectural support …, 1996 | 967 | 1996 |
Frangipani: A scalable distributed file system CA Thekkath, T Mann, EK Lee Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997 | 743 | 1997 |
Personal data mining RE Ozzie, WH Gates III, GW Flake, TF Bergstraesser, AN Blinn, ... US Patent 7,930,197, 2011 | 678 | 2011 |
Implementing global memory management in a workstation cluster MJ Feeley, WE Morgan, EP Pighin, AR Karlin, HM Levy, CA Thekkath Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995 | 675 | 1995 |
Shasta: A low overhead, software-only approach for supporting fine-grain shared memory DJ Scales, K Gharachorloo, CA Thekkath Proceedings of the seventh international conference on Architectural support …, 1996 | 482 | 1996 |
Implementing network protocols at user level CA Thekkath, TD Nguyen, E Moy, ED Lazowska Conference proceedings on Communications architectures, protocols and …, 1993 | 398 | 1993 |
Scalable distributed file system CA Thekkath, TP Mann, EK Lee US Patent 6,173,293, 2001 | 317 | 2001 |
Implementing an untrusted operating system on trusted hardware D Lie, CA Thekkath, M Horowitz Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003 | 306 | 2003 |
Performing a deletion of a node in a tree data storage structure L Zhou, CA Thekkath US Patent 7,630,998, 2009 | 293 | 2009 |
Boxwood: Abstractions as the Foundation for Storage Infrastructure. J MacCormick, N Murphy, M Najork, CA Thekkath, L Zhou OSDI 4, 8-8, 2004 | 279 | 2004 |
Nectar: automatic management of data and computation in datacenters PK Gunda, L Ravindranath, CA Thekkath, Y Yu, L Zhuang 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 275 | 2010 |
Limits to low-latency communication on high-speed networks CA Thekkath, HM Levy ACM Transactions on Computer Systems (TOCS) 11 (2), 179-203, 1993 | 231 | 1993 |
Remote provisioning of information technology WH Gates, RE Ozzie, GW Flake, TF Bergstraesser, AN Blinn, CW Brumme, ... US Patent App. 11/536,578, 2008 | 221 | 2008 |
Using global memory information to manage memory in a computer network HM Levy, MJ Feeley, AR Karlin, WE Morgan, CA Thekkath US Patent 6,167,490, 2000 | 188 | 2000 |
Combine: leveraging the power of wireless peers through collaborative downloading G Ananthanarayanan, VN Padmanabhan, L Ravindranath, CA Thekkath Proceedings of the 5th international conference on Mobile systems …, 2007 | 179 | 2007 |
Specifying and verifying hardware for tamper-resistant software D Lie, J Mitchell, CA Thekkath, M Horowitz 2003 Symposium on Security and Privacy, 2003., 166-177, 2003 | 157 | 2003 |
SmartBridge: A scalable bridge architecture TL Rodeheffer, CA Thekkath, DC Anderson Proceedings of the conference on Applications, Technologies, Architectures …, 2000 | 141 | 2000 |
Pathways: Asynchronous distributed dataflow for ml P Barham, A Chowdhery, J Dean, S Ghemawat, S Hand, D Hurt, M Isard, ... arXiv preprint arXiv:2203.12533, 2022 | 139 | 2022 |
Recommendation system that identifies a valuable user action by mining data supplied by a plurality of users to find a correlation that suggests one or more actions for … HJM Meijer, WH Gates III, RE Ozzie, GW Flake, TF Bergstraesser, ... US Patent 7,657,493, 2010 | 128 | 2010 |