-
Building Consistent Transactions with Inconsistent Replication
I. Zhang, N. Sharma, A. Szekeres, A. Krishnamurthy, D. Ports
SOSP, 2015
-
Rollback Recovery for Middleboxes
J. Sherry, P. Gao, S. Basu, A. Panda, A. Krishnamurthy, C. Macciocco, M. Manesh, J. Martins, S. Ratnasamy, L. Rizzo, S. Shenker
Sigcomm, 2015
-
Designing Distributed Systems Using Approximate Synchrony in Data Center Networks
D. Ports, J. Li, V. Liu, N. Sharma, A. Krishnamurthy
NSDI, 2015
-
Arrakis: The Operating System is the Control Plane
S. Peter, J. Li, I. Zhang, D. Ports, D. Woos, A. Krishnamurthy, T. Anderson, T. Roscoe
OSDI, 2014
-
Customizable and Extensible Deployment for Mobile/Cloud Applications
I. Zhang, A. Szekeres, D. Van Aken, I. Ackerman, S. Gribble, A. Krishnamurthy, H. Levy
OSDI, 2014
-
One Tunnel is (Often) Enough
S. Peter, U. Javed, Q. Zhang, D. Woos, T. Anderson, A. Krishnamurthy
Sigcomm, 2014
-
Inferring Models of Concurrent Systems from Logs of their Behavior with CSight
I. Beschastnikh, Y. Brun, M. Ernst, A. Krishnamurthy
ICSE, 2014
-
How speedy is SPDY?
X. Wang, A. Balasubramanian, A. Krishnamurthy, D. Wetherall
NSDI, 2014
-
Expressive Privacy Control with Pseudonyms
S. Han, V. Liu, Q. Pu, S. Peter, T. Anderson, A. Krishnamurthy, D. Wetherall
Sigcomm, 2013
-
PoiRoot: Investigating the Root Cause of Interdomain Path Changes
U. Javed, Í. Cunha, D. Choffnes, E. Katz-Bassett, T. Anderson, A. Krishnamurthy
Sigcomm, 2013
-
Demystifying Page Load Performance with WProf
X. Wang, A. Balasubramanian, A. Krishnamurthy, D. Wetherall
NSDI, 2013
-
F10: Fault Tolerant Engineered Networks
V. Liu, D. Halperin, A. Krishnamurthy, T. Anderson
NSDI, 2013
-
Unifying FSM-inference Algorithms through Declarative Specification
I. Beschastnikh, Y. Brun, J. Abrahamson, M. Ernst, A. Krishnamurthy
ICSE, 2013
-
FairCloud: Sharing The Network In Cloud Computing
L. Popa, G. Kumar, M. Chowdhury, A. Krishnamurthy, S. Ratnasamy, I. Stoica
Sigcomm, 2012
-
LIFEGUARD: Practical Repair of Persistent Route Failures
E. Katz-Bassett, C. Scott, D. Choffnes, I. Cunha, V. Valancius, N. Feamster, H. Madhyastha, T. Anderson, A. Krishnamurthy
Sigcomm, 2012
-
Making Middleboxes Someone Else’s Problem: Network Processing as a Cloud Service
J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, V. Sekar
Sigcomm, 2012
-
Scalable Consistency in Scatter
L. Glendenning, I. Beschastnikh, A. Krishnamurthy, T. Anderson
SOSP, 2011
-
deSEO: Combating Search-Result Poisoning
J. John, F. Yu, Y. Xie, A. Krishnamurthy, M. Abadi
Usenix Security, 2011
-
ETTM: A Scalable Fault Tolerant Network Manager
C. Dixon, H. Uppal, V. Brajkovic, D, Brandon, T. Anderson, A. Krishnamurthy
NSDI, 2011.
-
A Cost Comparison of Datacenter Network Architectures
L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, I. Stoica
CoNEXT, 2010.
Comet: An Active Distributed Key-Value Store
R. Geambasu, A. Levy, T. Kohno, A. Krishnamurthy, H. Levy
OSDI, 2010.
Privacy-preserving P2P data sharing with OneSwarm
T. Isdal, M. Piatek, A. Krishnamurthy, T. Anderson
Sigcomm, 2010.
Searching the searchers using SearchAudit
J. John, F. Yu, Y. Xie, M. Abadi, A. Krishnamurthy
Usenix Security, 2010.
Reverse Traceroute
E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wessep, T. Anderson, A. Krishnamurthy
NSDI, 2010.
Contracts: Practical Contribution Incentives for P2P Live Streaming
M. Piatek, A. Krishnamurthy, A. Venkataramani, R. Yang, D. Zhang
NSDI, 2010.
Moving Beyond End-to-End Path Information to Optimize CDN Performance
R. Krishnan, H. Madhyastha, S. Srinivasan, S. Jain, A. Krishnamurthy, T. Anderson, J. Gao
IMC, 2009.
Studying Spamming Botnets using Botlab
J. John, A. Moshchuk, S. Gribble, A. Krishnamurthy
NSDI, 2009.
iPlane Nano: Path Prediction for Peer-to-Peer Applications
H. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, A. Venkataramani
NSDI, 2009.
P4P: Provider Portal for (P2P) Applications
H. Xie, R. Yang, A. Krishnamurthy, Y. Liu, A. Silberschatz
Sigcomm, 2008.Privacy-Preserving Location Tracking of Lost or Stolen Devices:
T. Ristenpart, G. Maganis, A. Krishnamurthy, and T. Kohno
Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
Usenix Security, 2008.Consensus routing: the Internet as a distributed system
J. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, A. Venkataramani
NSDI, 2008.Phalanx: Withstanding multimillion-node botnets
C. Dixon, T. Anderson, A. Krishnamurthy
NSDI, 2008.Studying blackholes in the Internet with Hubble
E. Katz-Bassett, H. Madhyastha, J. John, A. Krishnamurthy, D. Wetherall, T. Anderson
NSDI, 2008.One hop Reputations for Peer to Peer File Sharing Workloads
M. Piatek, T. Isdal, A. Krishnamurthy, T. Anderson
NSDI, 2008.Do incentives build robustness in BitTorrent?
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, A. Venkataramani
NSDI, 2007.iPlane: An Information Plane for Distributed Services
H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, A. Venkataramani
OSDI, 2006.PCP: Efficient Endpoint Congestion Control
T. Anderson, A. Collins, A. Krishnamurthy, J. Zahorjan.
NSDI, 2006.
Contact
CSE 592
arvindcs.washington.edu
Areas of interest:
Distributed systems, networks, operating systems, and security