Geoffrey M. Voelker
TitoloCitata daAnno
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker, S Savage
ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006
19012006
On the placement of web server replicas
L Qiu, VN Padmanabhan, GM Voelker
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
10612001
Internet quarantine: Requirements for containing self-propagating code
D Moore, C Shannon, GM Voelker, S Savage
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
9062003
On the scale and performance of cooperative web proxy caching
A Wolman, M Voelker, N Sharma, N Cardwell, A Karlin, HM Levy
ACM SIGOPS Operating Systems Review 33 (5), 16-31, 1999
8761999
Characterizing user behavior and network performance in a public wireless LAN
A Balachandran, GM Voelker, P Bahl, PV Rangan
ACM SIGMETRICS Performance Evaluation Review 30 (1), 195-205, 2002
7752002
Understanding availability
R Bhagwan, S Savage, GM Voelker
International Workshop on Peer-to-Peer Systems, 256-267, 2003
7092003
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
7052013
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
6962009
Total Recall: System Support for Automated Availability Management.
R Bhagwan, K Tati, Y Cheng, S Savage, GM Voelker
Nsdi 4, 25-25, 2004
6342004
The human and computer as a team in emergency management information systems
L Carver, M Turoff
CACM 50 (3), 33-38, 2007
536*2007
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
4982008
End-to-end differentiation of congestion and wireless losses
S Cen, PC Cosman, GM Voelker
IEEE/ACM Transactions on Networking (TON) 11 (5), 703-717, 2003
4972003
Identifying suspicious URLs: an application of large-scale online learning
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 26th annual international conference on machine learning …, 2009
4942009
Difference engine: Harnessing memory redundancy in virtual machines
D Gupta, S Lee, M Vrable, S Savage, AC Snoeren, G Varghese, ...
Communications of the ACM 53 (10), 85-93, 2010
4672010
Detour: Informed Internet routing and transport
S Savage, T Anderson, A Aggarwal, D Becker, N Cardwell, A Collins, ...
Ieee Micro 19 (1), 50-59, 1999
4621999
Sora: high-performance software radio using general-purpose multi-core processors
K Tan, H Liu, J Zhang, Y Zhang, J Fang, GM Voelker
Communications of the ACM 54 (1), 99-107, 2011
4532011
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ...
ACM SIGOPS Operating Systems Review 39 (5), 148-162, 2005
4482005
Access and mobility of wireless PDA users
M McNett, GM Voelker
ACM SIGMOBILE Mobile Computing and Communications Review 9 (2), 40-55, 2005
4082005
Measurement and analysis of a streaming media workload.
M Chesire, A Wolman, GM Voelker, HM Levy
USITS 1, 1-1, 2001
4062001
Jigsaw: Solving the puzzle of enterprise 802.11 analysis
YC Cheng, J Bellardo, P Benkö, AC Snoeren, GM Voelker, S Savage
ACM SIGCOMM Computer Communication Review 36 (4), 39-50, 2006
3922006
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20