The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Geoffrey M. Voelker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Theodore H. Romer, Dennis Lee, Geoffrey M. Voelker, Alec Wolman, Wayne A. Wong, Jean-Loup Baer, Brian N. Bershad, Henry M. Levy
    The Structure and Performance of Interpreters. [Citation Graph (1, 0)][DBLP]
    ASPLOS, 1996, pp:150-159 [Conf]
  2. Geoffrey M. Voelker, Hervé A. Jamrozik, Mary K. Vernon, Henry M. Levy, Edward D. Lazowska
    Managing Server Load in Global Memory Systems. [Citation Graph (1, 0)][DBLP]
    SIGMETRICS, 1997, pp:127-138 [Conf]
  3. Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker
    Replication Strategies for Highly Available Peer-to-Peer Storage. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:153-158 [Conf]
  4. Hervé A. Jamrozik, Michael J. Feeley, Geoffrey M. Voelker, James Evans II, Anna R. Karlin, Henry M. Levy, Mary K. Vernon
    Reducing Network Latency Using Subpages in a Global Memory Environment. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 1996, pp:258-267 [Conf]
  5. Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker
    Dual Frame Motion Compensation with Uneven Quality Assignment. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2004, pp:262-271 [Conf]
  6. Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker
    Error Concealment for Dual Frame Video Coding with Uneven Quality. [Citation Graph (0, 0)][DBLP]
    DCC, 2005, pp:319-328 [Conf]
  7. Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker
    The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:73-78 [Conf]
  8. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker
    In search of path diversity in ISP networks. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Comference, 2003, pp:313-318 [Conf]
  9. Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker
    Finding diversity in remote code injection exploits. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:53-64 [Conf]
  10. Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker
    Unexpected means of protocol inference. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:313-326 [Conf]
  11. David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage
    Internet Quarantine: Requirements for Containing Self-Propagating Code. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  12. Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker
    On the Placement of Web Server Replicas. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1587-1596 [Conf]
  13. Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker
    Understanding Availability. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2003, pp:256-267 [Conf]
  14. Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, Geoffrey M. Voelker
    Total Recall: System Support for Automated Availability Management. [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:337-350 [Conf]
  15. Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage
    Jigsaw: solving the puzzle of enterprise 802.11 analysis. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:39-50 [Conf]
  16. Renata Teixeira, Aman Shaikh, Timothy Griffin, Geoffrey M. Voelker
    Network sensitivity to hot-potato disruptions. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:231-244 [Conf]
  17. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker
    Characterizing and measuring path diversity of internet topologies. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2003, pp:304-305 [Conf]
  18. Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, P. Venkat Rangan
    Characterizing user behavior and network performance in a public wireless LAN. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2002, pp:195-205 [Conf]
  19. Gretta Bartels, Anna R. Karlin, Darrell C. Anderson, Jeffrey S. Chase, Henry M. Levy, Geoffrey M. Voelker
    Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1999, pp:206-207 [Conf]
  20. Allan Snavely, Dean M. Tullsen, Geoffrey M. Voelker
    Symbiotic jobscheduling with priorities for a simultaneous multithreading processor. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2002, pp:66-76 [Conf]
  21. Geoffrey M. Voelker, Eric J. Anderson, Tracy Kimbrel, Michael J. Feeley, Jeffrey S. Chase, Anna R. Karlin, Henry M. Levy
    Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:33-43 [Conf]
  22. Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage
    Scalability, fidelity, and containment in the potemkin virtual honeyfarm. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:148-162 [Conf]
  23. Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna R. Karlin, Henry M. Levy
    On the scale and performance of cooperative Web proxy caching. [Citation Graph (0, 0)][DBLP]
    SOSP, 1999, pp:16-31 [Conf]
  24. Yu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker
    Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2004, pp:87-98 [Conf]
  25. Alec Wolman, Geoffrey M. Voelker, Chandramohan A. Thekkath
    Latency Analysis of TCP on an ATM Network. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1994, pp:167-179 [Conf]
  26. Flavio Paiva Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, Geoffrey M. Voelker
    Surviving Internet Catastrophes. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:45-60 [Conf]
  27. Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Molly Brown, Tashana Landray, Denise Pinnel, Anna R. Karlin, Henry M. Levy
    Organization-Based Analysis of Web-Object Sharing and Caching. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  28. Maureen Chesire, Alec Wolman, Geoffrey M. Voelker, Henry M. Levy
    Measurement and Analysis of a Streaming Media Workload. [Citation Graph (0, 0)][DBLP]
    USITS, 2001, pp:1-12 [Conf]
  29. Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao
    Towards Informed Web Content Delivery. [Citation Graph (0, 0)][DBLP]
    WCW, 2004, pp:232-248 [Conf]
  30. Kiran Tati, Geoffrey M. Voelker
    ShortCuts: Using Soft State to Improve DHT Routing. [Citation Graph (0, 0)][DBLP]
    WCW, 2004, pp:44-62 [Conf]
  31. Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl
    Wireless hotspots: current challenges and future directions. [Citation Graph (0, 0)][DBLP]
    WMASH, 2003, pp:1-9 [Conf]
  32. Anand Balachandran, Paramvir Bahl, Geoffrey M. Voelker
    Hot-Spot Congestion Relief in Public-Area Wireless Network. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2002, pp:70-0 [Conf]
  33. Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao
    Characterization of a large web site population with implications for content delivery. [Citation Graph (0, 0)][DBLP]
    WWW, 2004, pp:522-533 [Conf]
  34. Justin Ma, Geoffrey M. Voelker, Stefan Savage
    Self-stopping worms. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:12-21 [Conf]
  35. Anand Balachandran, Paramvir Bahl, Geoffrey M. Voelker
    Hot-spot congestion relief and service guarantees in public-area wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:59- [Journal]
  36. Jon Crowcroft, Craig Partridge, Geoffrey M. Voelker, Ellen W. Zegura
    Report from the 2006 SIGCOMM nomination committee. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2007, v:37, n:1, pp:87- [Journal]
  37. Fan Chung, Ronald Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker
    Maximizing data locality in distributed systems. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:8, pp:1309-1316 [Journal]
  38. Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl
    Wireless Hotspots: Current Challenges and Future Directions. [Citation Graph (0, 0)][DBLP]
    MONET, 2005, v:10, n:3, pp:265-274 [Journal]
  39. Marvin McNett, Geoffrey M. Voelker
    Access and mobility of wireless PDA users. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2003, v:7, n:4, pp:55-57 [Journal]
  40. Marvin McNett, Geoffrey M. Voelker
    Access and mobility of wireless PDA users. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2005, v:9, n:2, pp:40-55 [Journal]
  41. Geoffrey M. Voelker
    Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:4, pp:3-8 [Journal]
  42. David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage
    Inferring Internet denial-of-service activity. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2006, v:24, n:2, pp:115-139 [Journal]
  43. Song Cen, Pamela C. Cosman, Geoffrey M. Voelker
    End-to-end differentiation of congestion and wireless losses. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2003, v:11, n:5, pp:703-717 [Journal]
  44. Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao
    Characterization of a Large Web Site Population with Implications for Content Delivery. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 2006, v:9, n:4, pp:505-536 [Journal]
  45. Diwaker Gupta, Ken Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker
    To Infinity and Beyond: Time-Warped Network Emulation. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  46. Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker
    Automating cross-layer diagnosis of enterprise wireless networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:25-36 [Conf]

  47. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


  48. Slicing Spam with Occam's Razor. [Citation Graph (, )][DBLP]


  49. Cumulus: Filesystem Backup to the Cloud. [Citation Graph (, )][DBLP]


  50. Identifying suspicious URLs: an application of large-scale online learning. [Citation Graph (, )][DBLP]


  51. Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan. [Citation Graph (, )][DBLP]


  52. Defending Mobile Phones from Proximity Malware. [Citation Graph (, )][DBLP]


  53. Beyond blacklists: learning to detect malicious web sites from suspicious URLs. [Citation Graph (, )][DBLP]


  54. Beyond heuristics: learning to classify vulnerabilities and predict exploits. [Citation Graph (, )][DBLP]


  55. Usher: An Extensible Framework for Managing Clusters of Virtual Machines. [Citation Graph (, )][DBLP]


  56. SAM: enabling practical spatial multiple access in wireless LAN. [Citation Graph (, )][DBLP]


  57. Second life: a social network of humans and bots. [Citation Graph (, )][DBLP]


  58. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. [Citation Graph (, )][DBLP]


  59. On the Spam Campaign Trail. [Citation Graph (, )][DBLP]


  60. Banal: Because Format Checking Is So Trite. [Citation Graph (, )][DBLP]


  61. NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. [Citation Graph (, )][DBLP]


  62. Sora: High Performance Software Radio Using General Purpose Multi-core Processors. [Citation Graph (, )][DBLP]


  63. Difference Engine: Harnessing Memory Redundancy in Virtual Machines. [Citation Graph (, )][DBLP]


  64. MPIWiz: subgroup reproducible replay of mpi applications. [Citation Graph (, )][DBLP]


  65. Xl: an efficient network routing algorithm. [Citation Graph (, )][DBLP]


  66. Neon: system support for derived data management. [Citation Graph (, )][DBLP]


  67. Towards Automatic Inference of Task Hierarchies in Complex Systems. [Citation Graph (, )][DBLP]


  68. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]


Search in 0.046secs, Finished in 0.050secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002