M
Mark Lillibridge
Researcher at Hewlett-Packard
Publications - 86
Citations - 5485
Mark Lillibridge is an academic researcher from Hewlett-Packard. The author has contributed to research in topics: Data deduplication & Backup. The author has an hindex of 31, co-authored 86 publications receiving 5370 citations. Previous affiliations of Mark Lillibridge include Carnegie Mellon University.
Papers
More filters
Proceedings ArticleDOI
Extended static checking for Java
TL;DR: The Extended Static Checker for Java (ESC/Java) is introduced, an experimental compile-time program checker that finds common programming errors and provides programmers with a simple annotation language with which programmer design decisions can be expressed formally.
Proceedings Article
Sparse indexing: large scale, inline deduplication using sampling and locality
Mark Lillibridge,Kave Eshghi,Deepavali Bhagwat,Vinay Deolalikar,Greg Trezise,Peter Thomas Camble +5 more
TL;DR: Sparse indexing, a technique that uses sampling and exploits the inherent locality within backup streams to solve for large-scale backup the chunk-lookup disk bottleneck problem that inline, chunk-based deduplication schemes face, is presented.
Proceedings ArticleDOI
Extreme Binning: Scalable, parallel deduplication for chunk-based file backup
TL;DR: Extreme Binning is presented, a scalable deduplication technique for non-traditional backup workloads that are made up of individual files with no locality among consecutive files in a given window of time.
Proceedings ArticleDOI
A type-theoretic approach to higher-order modules with sharing
Robert Harper,Mark Lillibridge +1 more
TL;DR: These problems are addressed from a type-theoretic viewpoint by considering a calculus based on Girard's system Fω that provides complete control over the propagation of compile-time information between program units and is sufficient to encode in a straightforward way most users of type sharing specifications in Standard ML.
Patent
Method for selectively restricting access to computer systems
TL;DR: In this paper, a computerized method selectively accepts access requests from a client computer connected to a server computer by a network is proposed, where the server computer receives an access request from the client computer and generates a predetermined number of random characters.