Search the dblp DataBase
Stefan Savage :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Brian N. Bershad , Stefan Savage , Przemyslaw Pardyak , Emin Gün Sirer , Marc E. Fiuczynski , David Becker , Craig Chambers , Susan J. Eggers Extensibility, Safety and Performance in the SPIN Operating System. [Citation Graph (4, 0)][DBLP ] SOSP, 1995, pp:267-284 [Conf ] Stefan Savage , John Wilkes AFRAID - A Frequently Redundant Array of Independent Disks. [Citation Graph (1, 0)][DBLP ] USENIX Annual Technical Conference, 1996, pp:27-39 [Conf ] Ranjita Bhagwan , David Moore , Stefan Savage , Geoffrey M. Voelker Replication Strategies for Highly Available Peer-to-Peer Storage. [Citation Graph (0, 0)][DBLP ] Future Directions in Distributed Computing, 2003, pp:153-158 [Conf ] Alper Tugay Mizrak , Yu-Chung Cheng , Keith Marzullo , Stefan Savage Fatih: Detecting and Isolating Malicious Routers. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:538-547 [Conf ] Flavio Paiva Junqueira , Ranjita Bhagwan , Keith Marzullo , Stefan Savage , Geoffrey M. Voelker The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. [Citation Graph (0, 0)][DBLP ] HotOS, 2003, pp:73-78 [Conf ] Clifford W. Mercer , Stefan Savage , Hideyuki Tokuda Processor Capacity Reserves: An Abstraction for Managing Processor Usage. [Citation Graph (0, 0)][DBLP ] Workshop on Workstation Operating Systems, 1993, pp:129-134 [Conf ] Stefan Savage , Neal Cardwell , Thomas E. Anderson The Case for Informed Transport Protocols. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1999, pp:58-63 [Conf ] Clifford W. Mercer , Stefan Savage , Hideyuki Tokuda Processor Capacity Reserves: Operating System Support for Multimedia Applications. [Citation Graph (0, 0)][DBLP ] ICMCS, 1994, pp:90-99 [Conf ] David Ely , Neil Spring , David Wetherall , Stefan Savage , Thomas E. Anderson Robust Congestion Signaling. [Citation Graph (0, 0)][DBLP ] ICNP, 2001, pp:332-341 [Conf ] John Bellardo , Stefan Savage Measuring packet reordering. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:97-105 [Conf ] Renata Teixeira , Keith Marzullo , Stefan Savage , Geoffrey M. Voelker In search of path diversity in ISP networks. [Citation Graph (0, 0)][DBLP ] Internet Measurement Comference, 2003, pp:313-318 [Conf ] Cristian Estan , Stefan Savage , George Varghese Automated measurement of high volume traffic clusters. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:177-178 [Conf ] Justin Ma , John Dunagan , Helen J. Wang , Stefan Savage , Geoffrey M. Voelker Finding diversity in remote code injection exploits. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:53-64 [Conf ] Justin Ma , Kirill Levchenko , Christian Kreibich , Stefan Savage , Geoffrey M. Voelker Unexpected means of protocol inference. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:313-326 [Conf ] Amit Aggarwal , Stefan Savage , Thomas E. Anderson Understanding the Performance of TCP Pacing. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2000, pp:1157-1165 [Conf ] Neal Cardwell , Stefan Savage , Thomas E. Anderson Modeling TCP Latency. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2000, pp:1742-1751 [Conf ] David Moore , Colleen Shannon , Geoffrey M. Voelker , Stefan Savage Internet Quarantine: Requirements for Containing Self-Propagating Code. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Ishwar Ramani , Stefan Savage SyncScan: practical fast handoff for 802.11 infrastructure networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:675-684 [Conf ] Ranjita Bhagwan , Stefan Savage , Geoffrey M. Voelker Understanding Availability. [Citation Graph (0, 0)][DBLP ] IPTPS, 2003, pp:256-267 [Conf ] Stefan Savage , Hideyuki Tokuda Real Time - Mach Timers: Exporting Time to the User. [Citation Graph (0, 0)][DBLP ] USENIX MACH Symposium, 1993, pp:111-118 [Conf ] Ranjita Bhagwan , Kiran Tati , Yu-Chung Cheng , Stefan Savage , Geoffrey M. Voelker Total Recall: System Support for Automated Availability Management. [Citation Graph (0, 0)][DBLP ] NSDI, 2004, pp:337-350 [Conf ] Stefan Savage , Brian N. Bershad Some Issues in the Design of an Extensible Operating System (Panel Statement). [Citation Graph (0, 0)][DBLP ] OSDI, 1994, pp:196- [Conf ] Sumeet Singh , Cristian Estan , George Varghese , Stefan Savage Automated Worm Fingerprinting. [Citation Graph (0, 0)][DBLP ] OSDI, 2004, pp:45-60 [Conf ] Alper Tugay Mizrak , Keith Marzullo , Stefan Savage Brief announcement: detecting malicious routers. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:369- [Conf ] Yu-Chung Cheng , John Bellardo , Péter Benkö , Alex C. Snoeren , Geoffrey M. Voelker , Stefan Savage Jigsaw: solving the puzzle of enterprise 802.11 analysis. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:39-50 [Conf ] Cristian Estan , Stefan Savage , George Varghese Automatically inferring patterns of resource consumption in network traffic. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2003, pp:137-148 [Conf ] Stefan Savage , Andy Collins , Eric Hoffman , John Snell , Thomas E. Anderson The End-to-End Effects of Internet Path Selection. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1999, pp:289-299 [Conf ] Stefan Savage , David Wetherall , Anna R. Karlin , Thomas E. Anderson Practical network support for IP traceback. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2000, pp:295-306 [Conf ] Renata Teixeira , Keith Marzullo , Stefan Savage , Geoffrey M. Voelker Characterizing and measuring path diversity of internet topologies. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2003, pp:304-305 [Conf ] Brian N. Bershad , Craig Chambers , Susan J. Eggers , Chris Maeda , Dylan McNamee , Przemyslaw Pardyak , Stefan Savage , Emin Gün Sirer SPIN - An Extensible Microkernel for Application-specific Operating System Services. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1994, pp:68-71 [Conf ] Stefan Savage , Michael Burrows , Greg Nelson , Patrick Sobalvarro , Thomas E. Anderson Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP ] SOSP, 1997, pp:27-37 [Conf ] Michael Vrable , Justin Ma , Jay Chen , David Moore , Erik Vandekieft , Alex C. Snoeren , Geoffrey M. Voelker , Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. [Citation Graph (0, 0)][DBLP ] SOSP, 2005, pp:148-162 [Conf ] Yu-Chung Cheng , Urs Hölzle , Neal Cardwell , Stefan Savage , Geoffrey M. Voelker Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2004, pp:87-98 [Conf ] David Ely , Stefan Savage , David Wetherall Alpine: A User-Level Infrastructure for Network Protocol Development. [Citation Graph (0, 0)][DBLP ] USITS, 2001, pp:- [Conf ] Stefan Savage Sting: A TCP-based Network Measurement Tool. [Citation Graph (0, 0)][DBLP ] USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf ] Justin Ma , Geoffrey M. Voelker , Stefan Savage Self-stopping worms. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:12-21 [Conf ] Stefan Savage Scalable internet threat monitoring. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:71- [Conf ] Eric J. Anderson , Thomas E. Anderson , Steven D. Gribble , Anna R. Karlin , Stefan Savage A quantitative evaluation of traffic-aware routing strategies. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:67- [Journal ] David Moore , Vern Paxson , Stefan Savage , Colleen Shannon , Stuart Staniford-Chen , Nicholas Weaver Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal ] Fan Chung , Ronald Graham , Ranjita Bhagwan , Stefan Savage , Geoffrey M. Voelker Maximizing data locality in distributed systems. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2006, v:72, n:8, pp:1309-1316 [Journal ] Brian N. Bershad , Craig Chambers , Susan J. Eggers , Chris Maeda , Dylan McNamee , Przemyslaw Pardyak , Stefan Savage , Emin Gün Sirer SPIN - An Extensible Microkernel for Application-specific Operating System Services. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1995, v:29, n:1, pp:74-77 [Journal ] Alper Tugay Mizrak , Yu-Chung Cheng , Keith Marzullo , Stefan Savage Detecting and Isolating Malicious Routers. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:3, pp:230-244 [Journal ] Stefan Savage , Michael Burrows , Greg Nelson , Patrick Sobalvarro , Thomas E. Anderson Eraser: A Dynamic Data Race Detector for Multithreaded Programs. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1997, v:15, n:4, pp:391-411 [Journal ] David Moore , Colleen Shannon , Douglas J. Brown , Geoffrey M. Voelker , Stefan Savage Inferring Internet denial-of-service activity. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 2006, v:24, n:2, pp:115-139 [Journal ] Stefan Savage , David Wetherall , Anna R. Karlin , Thomas E. Anderson Network support for IP traceback. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2001, v:9, n:3, pp:226-237 [Journal ] Yu-Chung Cheng , Mikhail Afanasyev , Patrick Verkaik , Péter Benkö , Jennifer Chiang , Alex C. Snoeren , Stefan Savage , Geoffrey M. Voelker Automating cross-layer diagnosis of enterprise wireless networks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:25-36 [Conf ] An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] When good instructions go bad: generalizing return-oriented programming to RISC. [Citation Graph (, )][DBLP ] Reconsidering physical key secrecy: teleduplication via optical decoding. [Citation Graph (, )][DBLP ] Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [Citation Graph (, )][DBLP ] Slicing Spam with Occam's Razor. [Citation Graph (, )][DBLP ] Cumulus: Filesystem Backup to the Cloud. [Citation Graph (, )][DBLP ] Identifying suspicious URLs: an application of large-scale online learning. [Citation Graph (, )][DBLP ] When private keys are public: results from the 2008 Debian OpenSSL vulnerability. [Citation Graph (, )][DBLP ] Beyond blacklists: learning to detect malicious web sites from suspicious URLs. [Citation Graph (, )][DBLP ] Beyond heuristics: learning to classify vulnerabilities and predict exploits. [Citation Graph (, )][DBLP ] The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. [Citation Graph (, )][DBLP ] On the Spam Campaign Trail. [Citation Graph (, )][DBLP ] Difference Engine: Harnessing Memory Redundancy in Virtual Machines. [Citation Graph (, )][DBLP ] Xl: an efficient network routing algorithm. [Citation Graph (, )][DBLP ] California fault lines: understanding the causes and impact of network failures. [Citation Graph (, )][DBLP ] Experimental Security Analysis of a Modern Automobile. [Citation Graph (, )][DBLP ] Neon: system support for derived data management. [Citation Graph (, )][DBLP ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] TCP congestion control with a misbehaving receiver. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.500secs