Michael Burrows
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Michael Burrows.
ACM Transactions on Computer Systems | 2008
Fay W. Chang; Jeffrey Dean; Sanjay Ghemawat; Wilson C. Hsieh; Deborah A. Wallach; Michael Burrows; Tushar Deepak Chandra; Andrew Fikes; Robert Gruber
Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. Many projects at Google store data in Bigtable, including web indexing, Google Earth, and Google Finance. These applications place very different demands on Bigtable, both in terms of data size (from URLs to web pages to satellite imagery) and latency requirements (from backend bulk processing to real-time data serving). Despite these varied demands, Bigtable has successfully provided a flexible, high-performance solution for all of these Google products. In this article, we describe the simple data model provided by Bigtable, which gives clients dynamic control over data layout and format, and we describe the design and implementation of Bigtable.
ACM Transactions on Internet Technology | 2005
Martín Abadi; Michael Burrows; Mark S. Manasse; Ted Wobber
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been suggested that such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we research moderately hard functions that most recent systems will evaluate at about the same speed. For this purpose, we rely on memory-bound computations. We describe and analyze a family of moderately hard, memory-bound functions, and we explain how to use them for protecting against abuses.
Concurrency and Computation: Practice and Experience | 2004
Michael Burrows; K. Rustan M. Leino
Concurrent programs can suffer from many types of errors, not just the well‐studied problems of deadlocks and simple race conditions on variables. This paper addresses a kind of race condition that arises from reading a variable whose value is possibly out of date. The paper introduces a simple technique for detecting such stale values, and reports on the encouraging experience with a compile‐time checker that uses the technique. Copyright
operating systems design and implementation | 2006
Fay W. Chang; Jeffrey Dean; Sanjay Ghemawat; Wilson C. Hsieh; Deborah A. Wallach; Michael Burrows; Tushar Deepak Chandra; Andrew Fikes; Robert Gruber
operating systems design and implementation | 2006
Michael Burrows
Archive | 1991
Martín Abadi; Michael Burrows; Edward P. Wobber
Annual Asian Computing Science Conference | 2003
Martín Abadi; Andrew Birrell; Michael Burrows; Frank Dabek; Ted Wobber
Archive | 1992
Martín Abadi; Michael Burrows; Butler W. Lampson
operating systems design and implementation | 2006
Fay W. Chang; Jeffrey Dean; Sanjay Ghemawat; Wilson C. Hsieh; Deborah A. Wallach; Michael Burrows; Tushar Deepak Chandra; Andrew Fikes; Robert Gruber
Archive | 2005
Michael Burrows; Fay W. Chang; Jeffrey A. Dean; Andrew Fikes; Sanjay Ghemawat; Wilson C. Hsieh; Deborah A. Wallach