Search the dblp DataBase
Geoffrey M. Voelker :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Theodore H. Romer , Dennis Lee , Geoffrey M. Voelker , Alec Wolman , Wayne A. Wong , Jean-Loup Baer , Brian N. Bershad , Henry M. Levy The Structure and Performance of Interpreters. [Citation Graph (1, 0)][DBLP ] ASPLOS, 1996, pp:150-159 [Conf ] Geoffrey M. Voelker , Hervé A. Jamrozik , Mary K. Vernon , Henry M. Levy , Edward D. Lazowska Managing Server Load in Global Memory Systems. [Citation Graph (1, 0)][DBLP ] SIGMETRICS, 1997, pp:127-138 [Conf ] Ranjita Bhagwan , David Moore , Stefan Savage , Geoffrey M. Voelker Replication Strategies for Highly Available Peer-to-Peer Storage. [Citation Graph (0, 0)][DBLP ] Future Directions in Distributed Computing, 2003, pp:153-158 [Conf ] Hervé A. Jamrozik , Michael J. Feeley , Geoffrey M. Voelker , James Evans II , Anna R. Karlin , Henry M. Levy , Mary K. Vernon Reducing Network Latency Using Subpages in a Global Memory Environment. [Citation Graph (0, 0)][DBLP ] ASPLOS, 1996, pp:258-267 [Conf ] Vijay Chellappa , Pamela C. Cosman , Geoffrey M. Voelker Dual Frame Motion Compensation with Uneven Quality Assignment. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 2004, pp:262-271 [Conf ] Vijay Chellappa , Pamela C. Cosman , Geoffrey M. Voelker Error Concealment for Dual Frame Video Coding with Uneven Quality. [Citation Graph (0, 0)][DBLP ] DCC, 2005, pp:319-328 [Conf ] Flavio Paiva Junqueira , Ranjita Bhagwan , Keith Marzullo , Stefan Savage , Geoffrey M. Voelker The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. [Citation Graph (0, 0)][DBLP ] HotOS, 2003, pp:73-78 [Conf ] Renata Teixeira , Keith Marzullo , Stefan Savage , Geoffrey M. Voelker In search of path diversity in ISP networks. [Citation Graph (0, 0)][DBLP ] Internet Measurement Comference, 2003, pp:313-318 [Conf ] Justin Ma , John Dunagan , Helen J. Wang , Stefan Savage , Geoffrey M. Voelker Finding diversity in remote code injection exploits. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:53-64 [Conf ] Justin Ma , Kirill Levchenko , Christian Kreibich , Stefan Savage , Geoffrey M. Voelker Unexpected means of protocol inference. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:313-326 [Conf ] David Moore , Colleen Shannon , Geoffrey M. Voelker , Stefan Savage Internet Quarantine: Requirements for Containing Self-Propagating Code. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Lili Qiu , Venkata N. Padmanabhan , Geoffrey M. Voelker On the Placement of Web Server Replicas. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:1587-1596 [Conf ] Ranjita Bhagwan , Stefan Savage , Geoffrey M. Voelker Understanding Availability. [Citation Graph (0, 0)][DBLP ] IPTPS, 2003, pp:256-267 [Conf ] Ranjita Bhagwan , Kiran Tati , Yu-Chung Cheng , Stefan Savage , Geoffrey M. Voelker Total Recall: System Support for Automated Availability Management. [Citation Graph (0, 0)][DBLP ] NSDI, 2004, pp:337-350 [Conf ] Yu-Chung Cheng , John Bellardo , Péter Benkö , Alex C. Snoeren , Geoffrey M. Voelker , Stefan Savage Jigsaw: solving the puzzle of enterprise 802.11 analysis. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:39-50 [Conf ] Renata Teixeira , Aman Shaikh , Timothy Griffin , Geoffrey M. Voelker Network sensitivity to hot-potato disruptions. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2004, pp:231-244 [Conf ] Renata Teixeira , Keith Marzullo , Stefan Savage , Geoffrey M. Voelker Characterizing and measuring path diversity of internet topologies. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2003, pp:304-305 [Conf ] Anand Balachandran , Geoffrey M. Voelker , Paramvir Bahl , P. Venkat Rangan Characterizing user behavior and network performance in a public wireless LAN. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2002, pp:195-205 [Conf ] Gretta Bartels , Anna R. Karlin , Darrell C. Anderson , Jeffrey S. Chase , Henry M. Levy , Geoffrey M. Voelker Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1999, pp:206-207 [Conf ] Allan Snavely , Dean M. Tullsen , Geoffrey M. Voelker Symbiotic jobscheduling with priorities for a simultaneous multithreading processor. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2002, pp:66-76 [Conf ] Geoffrey M. Voelker , Eric J. Anderson , Tracy Kimbrel , Michael J. Feeley , Jeffrey S. Chase , Anna R. Karlin , Henry M. Levy Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1998, pp:33-43 [Conf ] Michael Vrable , Justin Ma , Jay Chen , David Moore , Erik Vandekieft , Alex C. Snoeren , Geoffrey M. Voelker , Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. [Citation Graph (0, 0)][DBLP ] SOSP, 2005, pp:148-162 [Conf ] Alec Wolman , Geoffrey M. Voelker , Nitin Sharma , Neal Cardwell , Anna R. Karlin , Henry M. Levy On the scale and performance of cooperative Web proxy caching. [Citation Graph (0, 0)][DBLP ] SOSP, 1999, pp:16-31 [Conf ] Yu-Chung Cheng , Urs Hölzle , Neal Cardwell , Stefan Savage , Geoffrey M. Voelker Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2004, pp:87-98 [Conf ] Alec Wolman , Geoffrey M. Voelker , Chandramohan A. Thekkath Latency Analysis of TCP on an ATM Network. [Citation Graph (0, 0)][DBLP ] USENIX Winter, 1994, pp:167-179 [Conf ] Flavio Paiva Junqueira , Ranjita Bhagwan , Alejandro Hevia , Keith Marzullo , Geoffrey M. Voelker Surviving Internet Catastrophes. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2005, pp:45-60 [Conf ] Alec Wolman , Geoffrey M. Voelker , Nitin Sharma , Neal Cardwell , Molly Brown , Tashana Landray , Denise Pinnel , Anna R. Karlin , Henry M. Levy Organization-Based Analysis of Web-Object Sharing and Caching. [Citation Graph (0, 0)][DBLP ] USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf ] Maureen Chesire , Alec Wolman , Geoffrey M. Voelker , Henry M. Levy Measurement and Analysis of a Streaming Media Workload. [Citation Graph (0, 0)][DBLP ] USITS, 2001, pp:1-12 [Conf ] Leeann Bent , Michael Rabinovich , Geoffrey M. Voelker , Zhen Xiao Towards Informed Web Content Delivery. [Citation Graph (0, 0)][DBLP ] WCW, 2004, pp:232-248 [Conf ] Kiran Tati , Geoffrey M. Voelker ShortCuts: Using Soft State to Improve DHT Routing. [Citation Graph (0, 0)][DBLP ] WCW, 2004, pp:44-62 [Conf ] Anand Balachandran , Geoffrey M. Voelker , Paramvir Bahl Wireless hotspots: current challenges and future directions. [Citation Graph (0, 0)][DBLP ] WMASH, 2003, pp:1-9 [Conf ] Anand Balachandran , Paramvir Bahl , Geoffrey M. Voelker Hot-Spot Congestion Relief in Public-Area Wireless Network. [Citation Graph (0, 0)][DBLP ] WMCSA, 2002, pp:70-0 [Conf ] Leeann Bent , Michael Rabinovich , Geoffrey M. Voelker , Zhen Xiao Characterization of a large web site population with implications for content delivery. [Citation Graph (0, 0)][DBLP ] WWW, 2004, pp:522-533 [Conf ] Justin Ma , Geoffrey M. Voelker , Stefan Savage Self-stopping worms. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:12-21 [Conf ] Anand Balachandran , Paramvir Bahl , Geoffrey M. Voelker Hot-spot congestion relief and service guarantees in public-area wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:59- [Journal ] Jon Crowcroft , Craig Partridge , Geoffrey M. Voelker , Ellen W. Zegura Report from the 2006 SIGCOMM nomination committee. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2007, v:37, n:1, pp:87- [Journal ] Fan Chung , Ronald Graham , Ranjita Bhagwan , Stefan Savage , Geoffrey M. Voelker Maximizing data locality in distributed systems. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2006, v:72, n:8, pp:1309-1316 [Journal ] Anand Balachandran , Geoffrey M. Voelker , Paramvir Bahl Wireless Hotspots: Current Challenges and Future Directions. [Citation Graph (0, 0)][DBLP ] MONET, 2005, v:10, n:3, pp:265-274 [Journal ] Marvin McNett , Geoffrey M. Voelker Access and mobility of wireless PDA users. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2003, v:7, n:4, pp:55-57 [Journal ] Marvin McNett , Geoffrey M. Voelker Access and mobility of wireless PDA users. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2005, v:9, n:2, pp:40-55 [Journal ] Geoffrey M. Voelker Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:3-8 [Journal ] David Moore , Colleen Shannon , Douglas J. Brown , Geoffrey M. Voelker , Stefan Savage Inferring Internet denial-of-service activity. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 2006, v:24, n:2, pp:115-139 [Journal ] Song Cen , Pamela C. Cosman , Geoffrey M. Voelker End-to-end differentiation of congestion and wireless losses. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2003, v:11, n:5, pp:703-717 [Journal ] Leeann Bent , Michael Rabinovich , Geoffrey M. Voelker , Zhen Xiao Characterization of a Large Web Site Population with Implications for Content Delivery. [Citation Graph (0, 0)][DBLP ] World Wide Web, 2006, v:9, n:4, pp:505-536 [Journal ] Diwaker Gupta , Ken Yocum , Marvin McNett , Alex C. Snoeren , Amin Vahdat , Geoffrey M. Voelker To Infinity and Beyond: Time-Warped Network Emulation. [Citation Graph (0, 0)][DBLP ] NSDI, 2006, pp:- [Conf ] Yu-Chung Cheng , Mikhail Afanasyev , Patrick Verkaik , Péter Benkö , Jennifer Chiang , Alex C. Snoeren , Stefan Savage , Geoffrey M. Voelker Automating cross-layer diagnosis of enterprise wireless networks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:25-36 [Conf ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] Slicing Spam with Occam's Razor. [Citation Graph (, )][DBLP ] Cumulus: Filesystem Backup to the Cloud. [Citation Graph (, )][DBLP ] Identifying suspicious URLs: an application of large-scale online learning. [Citation Graph (, )][DBLP ] Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan. [Citation Graph (, )][DBLP ] Defending Mobile Phones from Proximity Malware. [Citation Graph (, )][DBLP ] Beyond blacklists: learning to detect malicious web sites from suspicious URLs. [Citation Graph (, )][DBLP ] Beyond heuristics: learning to classify vulnerabilities and predict exploits. [Citation Graph (, )][DBLP ] Usher: An Extensible Framework for Managing Clusters of Virtual Machines. [Citation Graph (, )][DBLP ] SAM: enabling practical spatial multiple access in wireless LAN. [Citation Graph (, )][DBLP ] Second life: a social network of humans and bots. [Citation Graph (, )][DBLP ] The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. [Citation Graph (, )][DBLP ] On the Spam Campaign Trail. [Citation Graph (, )][DBLP ] Banal: Because Format Checking Is So Trite. [Citation Graph (, )][DBLP ] NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. [Citation Graph (, )][DBLP ] Sora: High Performance Software Radio Using General Purpose Multi-core Processors. [Citation Graph (, )][DBLP ] Difference Engine: Harnessing Memory Redundancy in Virtual Machines. [Citation Graph (, )][DBLP ] MPIWiz: subgroup reproducible replay of mpi applications. [Citation Graph (, )][DBLP ] Xl: an efficient network routing algorithm. [Citation Graph (, )][DBLP ] Neon: system support for derived data management. [Citation Graph (, )][DBLP ] Towards Automatic Inference of Task Hierarchies in Complex Systems. [Citation Graph (, )][DBLP ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.013secs