Pip: Detecting the Unexpected in Distributed Systems. P Reynolds, CE Killian, JL Wiener, JC Mogul, MA Shah, A Vahdat NSDI 6, 9-9, 2006 | 493 | 2006 |
Structured comparative analysis of systems logs to diagnose performance problems K Nagaraj, C Killian, J Neville 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012 | 391 | 2012 |
Life, death, and the critical transition: Finding liveness bugs in systems code C Killian, JW Anderson, R Jhala, A Vahdat Proceedings of the ACM/USENIX Symposium on Networked Systems Design and …, 2007 | 330 | 2007 |
Mace: language support for building distributed systems CE Killian, JW Anderson, R Braud, R Jhala, AM Vahdat ACM Sigplan Notices 42 (6), 179-188, 2007 | 315 | 2007 |
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks. A Rodriguez, CE Killian, S Bhat, D Kostic, A Vahdat NSDI 4, 20-20, 2004 | 180 | 2004 |
Maintaining high bandwidth under dynamic network conditions D Kostic, R Braud, C Killian, E Vandekieft, JW Anderson, AC Snoeren, ... Proceedings of the USENIX Annual Technical Conference, 2005 | 110 | 2005 |
Orion: Google's {Software-Defined} Networking Control Plane AD Ferguson, S Gribble, CY Hong, C Killian, W Mohsin, H Muehe, J Ong, ... 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2021 | 89 | 2021 |
Finding latent performance bugs in systems implementations C Killian, K Nagaraj, S Pervez, R Braud, JW Anderson, R Jhala Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010 | 88 | 2010 |
Venn diagrams and symmetric chain decompositions in the Boolean lattice J Griggs, CE Killian, CD Savage the electronic journal of combinatorics 11 (1), R2, 2004 | 64 | 2004 |
Analysis of techniques for building intrusion tolerant server systems F Wang, R Uppalli, C Killian IEEE Military Communications Conference, 2003. MILCOM 2003. 2, 729-734, 2003 | 57 | 2003 |
Live debugging of distributed systems D Dao, J Albrecht, C Killian, A Vahdat Compiler Construction: 18th International Conference, CC 2009, Held as Part …, 2009 | 44 | 2009 |
Eventwave: Programming model and runtime support for tightly-coupled elastic cloud applications WC Chuang, B Sang, S Yoo, R Gu, M Kulkarni, C Killian Proceedings of the 4th annual Symposium on Cloud Computing, 1-16, 2013 | 39 | 2013 |
High-bandwidth data dissemination for large-scale distributed systems D Kostić, AC Snoeren, A Vahdat, R Braud, C Killian, JW Anderson, ... ACM Transactions on Computer Systems (TOCS) 26 (1), 1-61, 2008 | 30 | 2008 |
Composable reliability for asynchronous systems S Yoo, C Killian, T Kelly, HK Cho, S Plite 2012 USENIX Annual Technical Conference (USENIX ATC 12), 27-40, 2012 | 29 | 2012 |
Turret: A platform for automated attack finding in unmodified distributed system implementations H Lee, J Seibert, E Hoque, C Killian, C Nita-Rotaru 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 28 | 2014 |
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. H Lee, J Seibert, CE Killian, C Nita-Rotaru NDSS, 2012 | 22 | 2012 |
Antipodal gray codes CE Killian, CD Savage Discrete mathematics 281 (1-3), 221-236, 2004 | 19 | 2004 |
Hierarchy-aware distributed overlays in data centers using DC2 K Nagaraj, H Khandelwal, C Killian, RR Kompella 2012 Fourth International Conference on Communication Systems and Networks …, 2012 | 17 | 2012 |
Incontext: simple parallelism for distributed applications S Yoo, H Lee, C Killian, M Kulkarni Proceedings of the 20th international symposium on High performance …, 2011 | 17 | 2011 |
Adversarial testing of wireless routing implementations ME Hoque, H Lee, R Potharaju, CE Killian, C Nita-Rotaru Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 12 | 2013 |