Eric Brewer
Eric Brewer
Google and UC Berkeley
Verified email at
Cited by
Cited by
The nesC language: A holistic approach to networked embedded systems
D Gay, P Levis, R Von Behren, M Welsh, E Brewer, D Culler
Acm Sigplan Notices 38 (5), 1-11, 2003
TinyOS: An operating system for sensor networks
P Levis, S Madden, J Polastre, R Szewczyk, K Whitehouse, A Woo, D Gay, ...
Ambient intelligence, 115-148, 2005
Towards robust distributed systems
EA Brewer
PODC 7, 2000
SEDA: An architecture for well-conditioned, scalable internet services
M Welsh, D Culler, E Brewer
ACM SIGOPS operating systems review 35 (5), 230-243, 2001
Pinpoint: Problem determination in large, dynamic internet services
MY Chen, E Kiciman, E Fratkin, A Fox, E Brewer
Proceedings International Conference on Dependable Systems and Networks, 595-604, 2002
A first step towards automated detection of buffer overrun vulnerabilities.
DA Wagner, JS Foster, EA Brewer, A Aiken
NDSS 20 (0), 0, 2000
A secure environment for untrusted helper applications: Confining the wily hacker
I Goldberg, D Wagner, R Thomas, EA Brewer
Proceedings of the 1996 USENIX Security Symposium 19, 1996
Cluster-based scalable network services
A Fox, SD Gribble, Y Chawathe, EA Brewer, P Gauthier
Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997
CAP twelve years later: How the" rules" have changed
E Brewer
Computer 45 (2), 23-29, 2012
Borg, omega, and kubernetes
B Burns, B Grant, D Oppenheimer, E Brewer, J Wilkes
Communications of the ACM 59 (5), 50-57, 2016
The Emergence of Networking Abstractions and Techniques in TinyOS.
PA Levis, S Madden, D Gay, J Polastre, R Szewczyk, A Woo, EA Brewer, ...
NSDI 4, 1-1, 2004
Failure diagnosis using decision trees
M Chen, AX Zheng, J Lloyd, MI Jordan, E Brewer
International Conference on Autonomic Computing, 2004. Proceedings., 36-43, 2004
Adapting to network and client variability via on-demand dynamic distillation
A Fox, SD Gribble, EA Brewer, E Amir
ACM SIGOPS Operating Systems Review 30 (5), 160-170, 1996
Adapting to network and client variation using infrastructural proxies: Lessons and perspectives
A Fox, SD Gribble, Y Chawathe, EA Brewer
IEEE Personal Communications 5 (4), 10-19, 1998
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
The case for technology in developing regions
E Brewer, M Demmer, B Du, M Ho, M Kam, S Nedevschi, J Pal, R Patra, ...
Computer 38 (6), 25-38, 2005
Off-the-record communication, or, why not to use PGP
N Borisov, I Goldberg, E Brewer
Proceedings of the 2004 ACM workshop on Privacy in the electronic society, 77-84, 2004
Path-based failure and evolution management
YYM Chen
University of California, Berkeley, 2004
Hood: a neighborhood abstraction for sensor networks
K Whitehouse, C Sharp, E Brewer, D Culler
Proceedings of the 2nd international conference on Mobile systems …, 2004
Proteus: A high-performance parallel-architecture simulator
EA Brewer, CN Dellarocas, A Colbrook, WE Weihl
Acm Sigmetrics Performance Evaluation Review 20 (1), 247-248, 1992
The system can't perform the operation now. Try again later.
Articles 1–20