Margo Seltzer
Margo Seltzer
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Provenance-aware storage systems.
KK Muniswamy-Reddy, DA Holland, U Braun, MI Seltzer
Usenix annual technical conference, general track, 43-56, 2006
Berkeley DB.
MA Olson, K Bostic, MI Seltzer
USENIX Annual Technical Conference, FREENIX Track, 183-191, 1999
Network-Aware Operator Placement for Stream-Processing Systems.
PR Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, ...
ICDE 6, 49, 2006
World Wide Web Cache Consistency.
J Gwertzman, MI Seltzer
USENIX annual technical conference 141, 152, 1996
The case for geographical push-caching
JS Gwertzman, M Seltzer
Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 51-55, 1995
An Implementation of a Log-Structured File System for UNIX.
MI Seltzer, K Bostic, MK McKusick, C Staelin
USENIX Winter, 307-326, 1993
Dealing with disaster: Surviving misbehaved kernel extensions
MI Seltzer, Y Endo, C Small, KA Smith
SIGOPS Operating Systems Review 30 (213-228), 10.1145, 1996
Disk scheduling revisited
M Seltzer, P Chen, J Ousterhout
Proceedings of the winter 1990 USENIX technical conference, 313-323, 1990
Journaling versus soft updates: Asynchronous meta-data protection in file systems
MI Seltzer, GR Ganger, MK McKusic, KA Smith, CAN Soules, CA Stein
2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000
Network Coordinates in the Wild.
J Ledlie, P Gardner, MI Seltzer
NSDI 7, 299-311, 2007
Non-volatile memory for fast, reliable file systems
M Baker, S Asami, E Deprit, J Ouseterhout, M Seltzer
ACM SIGPLAN Notices 27 (9), 10-22, 1992
Improving performance isolation on chip multiprocessors via an operating system scheduler
A Fedorova, M Seltzer, MD Smith
16th International Conference on Parallel Architecture and Compilation …, 2007
The first provenance challenge
L Moreau, B Ludäscher, I Altintas, RS Barga, S Bowers, S Callahan, ...
Concurrency and computation: practice and experience 20 (5), 409-418, 2008
Passive {NFS} Tracing of Email and Research Workloads
D Ellard, J Ledlie
2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003
Learning certifiably optimal rule lists for categorical data
E Angelino, N Larus-Stone, D Alabi, M Seltzer, C Rudin
arXiv preprint arXiv:1704.01701, 2017
Provenance for the Cloud.
KK Muniswamy-Reddy, P Macko, MI Seltzer
FAST 10, 15-14, 2010
Hourglass: An infrastructure for connecting sensor networks and applications
J Shneidman, P Pietzuch, J Ledlie, M Roussopoulos, M Seltzer, M Welsh
Harvard Technical Report TR-21-04, 2004
File System Logging versus Clustering: A Performance Comparison.
MI Seltzer, KA Smith, H Balakrishnan, J Chang, S McMains, ...
USENIX, 249-264, 1995
Layering in provenance systems
KK Muniswamy-Reddy, UJ Braun, DA Holland, P Macko, D Maclean, ...
Proceedings of the 2009 USENIX Annual Technical Conference (USENIX'09), 2009
Securing provenance
UJ Braun, A Shinnar, MI Seltzer
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec'08), 2008
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20