The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefan Savage: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gün Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan J. Eggers
    Extensibility, Safety and Performance in the SPIN Operating System. [Citation Graph (4, 0)][DBLP]
    SOSP, 1995, pp:267-284 [Conf]
  2. Stefan Savage, John Wilkes
    AFRAID - A Frequently Redundant Array of Independent Disks. [Citation Graph (1, 0)][DBLP]
    USENIX Annual Technical Conference, 1996, pp:27-39 [Conf]
  3. Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker
    Replication Strategies for Highly Available Peer-to-Peer Storage. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:153-158 [Conf]
  4. Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage
    Fatih: Detecting and Isolating Malicious Routers. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:538-547 [Conf]
  5. Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker
    The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:73-78 [Conf]
  6. Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda
    Processor Capacity Reserves: An Abstraction for Managing Processor Usage. [Citation Graph (0, 0)][DBLP]
    Workshop on Workstation Operating Systems, 1993, pp:129-134 [Conf]
  7. Stefan Savage, Neal Cardwell, Thomas E. Anderson
    The Case for Informed Transport Protocols. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1999, pp:58-63 [Conf]
  8. Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda
    Processor Capacity Reserves: Operating System Support for Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1994, pp:90-99 [Conf]
  9. David Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson
    Robust Congestion Signaling. [Citation Graph (0, 0)][DBLP]
    ICNP, 2001, pp:332-341 [Conf]
  10. John Bellardo, Stefan Savage
    Measuring packet reordering. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:97-105 [Conf]
  11. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker
    In search of path diversity in ISP networks. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Comference, 2003, pp:313-318 [Conf]
  12. Cristian Estan, Stefan Savage, George Varghese
    Automated measurement of high volume traffic clusters. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:177-178 [Conf]
  13. Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker
    Finding diversity in remote code injection exploits. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:53-64 [Conf]
  14. Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker
    Unexpected means of protocol inference. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:313-326 [Conf]
  15. Amit Aggarwal, Stefan Savage, Thomas E. Anderson
    Understanding the Performance of TCP Pacing. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1157-1165 [Conf]
  16. Neal Cardwell, Stefan Savage, Thomas E. Anderson
    Modeling TCP Latency. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1742-1751 [Conf]
  17. David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage
    Internet Quarantine: Requirements for Containing Self-Propagating Code. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  18. Ishwar Ramani, Stefan Savage
    SyncScan: practical fast handoff for 802.11 infrastructure networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:675-684 [Conf]
  19. Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker
    Understanding Availability. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2003, pp:256-267 [Conf]
  20. Stefan Savage, Hideyuki Tokuda
    Real Time - Mach Timers: Exporting Time to the User. [Citation Graph (0, 0)][DBLP]
    USENIX MACH Symposium, 1993, pp:111-118 [Conf]
  21. Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, Geoffrey M. Voelker
    Total Recall: System Support for Automated Availability Management. [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:337-350 [Conf]
  22. Stefan Savage, Brian N. Bershad
    Some Issues in the Design of an Extensible Operating System (Panel Statement). [Citation Graph (0, 0)][DBLP]
    OSDI, 1994, pp:196- [Conf]
  23. Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
    Automated Worm Fingerprinting. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:45-60 [Conf]
  24. Alper Tugay Mizrak, Keith Marzullo, Stefan Savage
    Brief announcement: detecting malicious routers. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:369- [Conf]
  25. Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage
    Jigsaw: solving the puzzle of enterprise 802.11 analysis. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:39-50 [Conf]
  26. Cristian Estan, Stefan Savage, George Varghese
    Automatically inferring patterns of resource consumption in network traffic. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:137-148 [Conf]
  27. Stefan Savage, Andy Collins, Eric Hoffman, John Snell, Thomas E. Anderson
    The End-to-End Effects of Internet Path Selection. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1999, pp:289-299 [Conf]
  28. Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson
    Practical network support for IP traceback. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2000, pp:295-306 [Conf]
  29. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker
    Characterizing and measuring path diversity of internet topologies. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2003, pp:304-305 [Conf]
  30. Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer
    SPIN - An Extensible Microkernel for Application-specific Operating System Services. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1994, pp:68-71 [Conf]
  31. Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson
    Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:27-37 [Conf]
  32. Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage
    Scalability, fidelity, and containment in the potemkin virtual honeyfarm. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:148-162 [Conf]
  33. Yu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker
    Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2004, pp:87-98 [Conf]
  34. David Ely, Stefan Savage, David Wetherall
    Alpine: A User-Level Infrastructure for Network Protocol Development. [Citation Graph (0, 0)][DBLP]
    USITS, 2001, pp:- [Conf]
  35. Stefan Savage
    Sting: A TCP-based Network Measurement Tool. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  36. Justin Ma, Geoffrey M. Voelker, Stefan Savage
    Self-stopping worms. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:12-21 [Conf]
  37. Stefan Savage
    Scalable internet threat monitoring. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:71- [Conf]
  38. Eric J. Anderson, Thomas E. Anderson, Steven D. Gribble, Anna R. Karlin, Stefan Savage
    A quantitative evaluation of traffic-aware routing strategies. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:67- [Journal]
  39. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver
    Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal]
  40. Fan Chung, Ronald Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker
    Maximizing data locality in distributed systems. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:8, pp:1309-1316 [Journal]
  41. Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer
    SPIN - An Extensible Microkernel for Application-specific Operating System Services. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:1, pp:74-77 [Journal]
  42. Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage
    Detecting and Isolating Malicious Routers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:3, pp:230-244 [Journal]
  43. Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson
    Eraser: A Dynamic Data Race Detector for Multithreaded Programs. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1997, v:15, n:4, pp:391-411 [Journal]
  44. David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage
    Inferring Internet denial-of-service activity. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2006, v:24, n:2, pp:115-139 [Journal]
  45. Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson
    Network support for IP traceback. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2001, v:9, n:3, pp:226-237 [Journal]
  46. Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker
    Automating cross-layer diagnosis of enterprise wireless networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:25-36 [Conf]

  47. An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP]


  48. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


  49. When good instructions go bad: generalizing return-oriented programming to RISC. [Citation Graph (, )][DBLP]


  50. Reconsidering physical key secrecy: teleduplication via optical decoding. [Citation Graph (, )][DBLP]


  51. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [Citation Graph (, )][DBLP]


  52. Slicing Spam with Occam's Razor. [Citation Graph (, )][DBLP]


  53. Cumulus: Filesystem Backup to the Cloud. [Citation Graph (, )][DBLP]


  54. Identifying suspicious URLs: an application of large-scale online learning. [Citation Graph (, )][DBLP]


  55. When private keys are public: results from the 2008 Debian OpenSSL vulnerability. [Citation Graph (, )][DBLP]


  56. Beyond blacklists: learning to detect malicious web sites from suspicious URLs. [Citation Graph (, )][DBLP]


  57. Beyond heuristics: learning to classify vulnerabilities and predict exploits. [Citation Graph (, )][DBLP]


  58. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. [Citation Graph (, )][DBLP]


  59. On the Spam Campaign Trail. [Citation Graph (, )][DBLP]


  60. Difference Engine: Harnessing Memory Redundancy in Virtual Machines. [Citation Graph (, )][DBLP]


  61. Xl: an efficient network routing algorithm. [Citation Graph (, )][DBLP]


  62. California fault lines: understanding the causes and impact of network failures. [Citation Graph (, )][DBLP]


  63. Experimental Security Analysis of a Modern Automobile. [Citation Graph (, )][DBLP]


  64. Neon: system support for derived data management. [Citation Graph (, )][DBLP]


  65. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


  66. TCP congestion control with a misbehaving receiver. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.500secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002