Volgen
Margo Seltzer
Margo Seltzer
Geverifieerd e-mailadres voor cs.ubc.ca - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Provenance-aware storage systems.
KK Muniswamy-Reddy, DA Holland, U Braun, MI Seltzer
Usenix annual technical conference, general track, 43-56, 2006
7792006
Berkeley DB.
MA Olson, K Bostic, MI Seltzer
USENIX Annual Technical Conference, FREENIX Track, 183-191, 1999
6441999
Network-aware operator placement for stream-processing systems
P Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, M Seltzer
22nd International Conference on Data Engineering (ICDE'06), 49-49, 2006
6222006
Arrakis: The operating system is the control plane
S Peter, J Li, I Zhang, DRK Ports, D Woos, A Krishnamurthy, T Anderson, ...
ACM Transactions on Computer Systems (TOCS) 33 (4), 1-30, 2015
5882015
World Wide Web Cache Consistency.
J Gwertzman, MI Seltzer
USENIX annual technical conference, 141-152, 1996
5391996
An Implementation of a Log-Structured File System for UNIX.
MI Seltzer, K Bostic, MK McKusick, C Staelin
USENIX Winter, 307-326, 1993
5351993
The case for geographical push-caching
JS Gwertzman, M Seltzer
Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 51-55, 1995
5311995
Dealing with disaster: Surviving misbehaved kernel extensions
MI Seltzer, Y Endo, C Small, KA Smith
SIGOPS Operating Systems Review 30 (213-228), 10.1145, 1996
4681996
Disk scheduling revisited
M Seltzer, P Chen, J Ousterhout
Proceedings of the winter 1990 USENIX technical conference, 313-323, 1990
4651990
Learning certifiably optimal rule lists for categorical data
E Angelino, N Larus-Stone, D Alabi, M Seltzer, C Rudin
Journal of Machine Learning Research 18 (234), 1-78, 2018
4382018
Journaling versus soft updates: Asynchronous meta-data protection in file systems
MI Seltzer, GR Ganger, MK McKusic, KA Smith, CAN Soules, CA Stein
2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000
4272000
Non-volatile memory for fast, reliable file systems
M Baker, S Asami, E Deprit, J Ouseterhout, M Seltzer
ACM SIGPLAN Notices 27 (9), 10-22, 1992
3701992
Network Coordinates in the Wild.
J Ledlie, P Gardner, MI Seltzer
NSDI 7, 299-311, 2007
3632007
Improving performance isolation on chip multiprocessors via an operating system scheduler
A Fedorova, M Seltzer, MD Smith
16th International Conference on Parallel Architecture and Compilation …, 2007
3342007
Unicorn: Runtime provenance-based detector for advanced persistent threats
X Han, T Pasquier, A Bates, J Mickens, M Seltzer
arXiv preprint arXiv:2001.01525, 2020
3192020
Provenance as first class cloud data
KK Muniswamy-Reddy, M Seltzer
ACM SIGOPS Operating Systems Review 43 (4), 11-16, 2010
3092010
The first provenance challenge
L Moreau, B Ludäscher, I Altintas, RS Barga, S Bowers, S Callahan, ...
Concurrency and computation: practice and experience 20 (5), 409-418, 2008
3062008
Scalable Bayesian rule lists
H Yang, C Rudin, M Seltzer
International conference on machine learning, 3921-3930, 2017
2562017
Passive {NFS} tracing of email and research workloads
D Ellard, J Ledlie
2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003
2542003
Optimal sparse decision trees
X Hu, C Rudin, M Seltzer
Advances in Neural Information Processing Systems 32, 2019
2462019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20