default search action
Alec Wolman
Person information
- affiliation: Microsoft
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c63]Paramvir Bahl, Matthew Balkwill, Xenofon Foukas, Anuj Kalia, Daehyeok Kim, Manikanta Kotaru, Zhihua Lai, Sanjeev Mehrotra, Bozidar Radunovic, Stefan Saroiu, Connor Settle, Ankit Verma, Alec Wolman, Francis Y. Yan, Yongguang Zhang:
Accelerating Open RAN Research Through an Enterprise-scale 5G Testbed. MobiCom 2023: 138:1-138:3 - [c62]Wei Bai, Shanim Sainul Abdeen, Ankit Agrawal, Krishan Kumar Attre, Paramvir Bahl, Ameya Bhagat, Gowri Bhaskara, Tanya Brokhman, Lei Cao, Ahmad Cheema, Rebecca Chow, Jeff Cohen, Mahmoud Elhaddad, Vivek Ette, Igal Figlin, Daniel Firestone, Mathew George, Ilya German, Lakhmeet Ghai, Eric Green, Albert G. Greenberg, Manish Gupta, Randy Haagens, Matthew Hendel, Ridwan Howlader, Neetha John, Julia Johnstone, Tom Jolly, Greg Kramer, David Kruse, Ankit Kumar, Erica Lan, Ivan Lee, Avi Levy, Marina Lipshteyn, Xin Liu, Chen Liu, Guohan Lu, Yuemin Lu, Xiakun Lu, Vadim Makhervaks, Ulad Malashanka, David A. Maltz, Ilias Marinos, Rohan Mehta, Sharda Murthi, Anup Namdhari, Aaron Ogus, Jitendra Padhye, Madhav Pandya, Douglas Phillips, Adrian Power, Suraj Puri, Shachar Raindel, Jordan Rhee, Anthony Russo, Maneesh Sah, Ali Sheriff, Chris Sparacino, Ashutosh Srivastava, Weixiang Sun, Nick Swanson, Fuhou Tian, Lukasz Tomczyk, Vamsi Vadlamuri, Alec Wolman, Ying Xie, Joyce Yom, Lihua Yuan, Yanzhao Zhang, Brian Zill:
Empowering Azure Storage with RDMA. NSDI 2023: 49-67 - [c61]Kevin Loughlin, Jonah Rosenblum, Stefan Saroiu, Alec Wolman, Dimitrios Skarlatos, Baris Kasikci:
Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer. SOSP 2023: 417-433 - 2022
- [c60]Stefan Saroiu, Alec Wolman, Lucian Cojocar:
The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses. IRPS 2022: 2 - [c59]Kevin Loughlin, Stefan Saroiu, Alec Wolman, Yatin A. Manerkar, Baris Kasikci:
MOESI-prime: preventing coherence-induced hammering in commodity workloads. ISCA 2022: 670-684 - 2021
- [c58]Kevin Loughlin, Stefan Saroiu, Alec Wolman, Baris Kasikci:
Stop! Hammer time: rethinking our approach to rowhammer mitigations. HotOS 2021: 88-95 - [c57]Seyed Mohammadjavad Seyed Talebi, Ardalan Amiri Sani, Stefan Saroiu, Alec Wolman:
MegaMind: a platform for security & privacy extensions for voice assistants. MobiSys 2021: 109-121 - 2020
- [c56]Behnaz Arzani, Selim Ciraci, Stefan Saroiu, Alec Wolman, Jack W. Stokes, Geoff Outhred, Lechao Diwu:
PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud. NSDI 2020: 797-815 - [c55]Lucian Cojocar, Jeremie S. Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, Onur Mutlu:
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. SP 2020: 712-728 - [i1]Lucian Cojocar, Jeremie S. Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, Onur Mutlu:
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. CoRR abs/2003.04498 (2020)
2010 – 2019
- 2019
- [e4]Alec Wolman, Lin Zhong:
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, HotMobile 2019, Santa Cruz, CA, USA, February 27-28, 2019. ACM 2019, ISBN 978-1-4503-6273-3 [contents] - 2016
- [c54]Seungyeop Han, Haichen Shen, Matthai Philipose, Sharad Agarwal, Alec Wolman, Arvind Krishnamurthy:
MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints. MobiSys 2016: 123-136 - [c53]Himanshu Raj, Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork Löser, Dennis Mattoon, Magnus Nyström, David Robinson, Rob Spiger, Stefan Thom, David Wooten:
fTPM: A Software-Only Implementation of a TPM Chip. USENIX Security Symposium 2016: 841-856 - 2015
- [j5]Kyungmin Lee, David Chu, Eduardo Cuervo, Johannes Kopf, Alec Wolman, Yury Degtyarev, Sergey Grizan, Jason Flinn:
Outatime: Using Speculation to Enable Low-Latency Continuous Interaction for Mobile Cloud Gaming. GetMobile Mob. Comput. Commun. 19(3): 14-17 (2015) - [c52]Patrick Colp, Jiawen Zhang, James Gleeson, Sahil Suneja, Eyal de Lara, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Protecting Data on Smartphones and Tablets from Memory Attacks. ASPLOS 2015: 177-189 - [c51]Sergey Grizan, David Chu, Alec Wolman, Roger Wattenhofer:
dJay: enabling high-density multi-tenancy for cloud gaming servers with dynamic cost-benefit GPU load balancing. SoCC 2015: 58-70 - [c50]David Chu, Zengbin Zhang, Alec Wolman, Nicholas D. Lane:
Prime: a framework for co-located multi-device apps. UbiComp 2015: 203-214 - [c49]Eduardo Cuervo, Alec Wolman, Landon P. Cox, Kiron Lebeck, Ali Razeen, Stefan Saroiu, Madanlal Musuvathi:
Kahawai: High-Quality Mobile Gaming Using GPU Offload. MobiSys 2015: 121-135 - [c48]Kyungmin Lee, David Chu, Eduardo Cuervo, Johannes Kopf, Yury Degtyarev, Sergey Grizan, Alec Wolman, Jason Flinn:
Outatime: Using Speculation to Enable Low-Latency Continuous Interaction for Mobile Cloud Gaming. MobiSys 2015: 151-165 - [c47]Stefan Saroiu, Alec Wolman, Sharad Agarwal:
Policy-Carrying Data: A Privacy Abstraction for Attaching Terms of Service to Mobile Data. HotMobile 2015: 129-134 - 2014
- [j4]Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman:
cTPM: A Cloud TPM for Cross-Device Trusted Applications. login Usenix Mag. 39(4) (2014) - [c46]Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Using ARM trustzone to build a trusted language runtime for mobile applications. ASPLOS 2014: 67-80 - [c45]Christopher Smowton, Jacob R. Lorch, David Molnar, Stefan Saroiu, Alec Wolman:
Zero-effort payments: design, deployment, and lessons. UbiComp 2014: 763-774 - [c44]Eduardo Cuervo, Alec Wolman, Landon P. Cox, Stefan Saroiu, Madanlal Musuvathi, Ali Razeen:
Demo: Kahawai: high-quality mobile gaming using GPU offload. MobiSys 2014: 345 - [c43]Kyungmin Lee, David Chu, Eduardo Cuervo, Alec Wolman, Jason Flinn:
Demo: DeLorean: using speculation to enable low-latency continuous interaction for mobile cloud gaming. MobiSys 2014: 347 - [c42]Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman:
cTPM: A Cloud TPM for Cross-Device Trusted Applications. NSDI 2014: 187-201 - 2013
- [j3]Maria Ebling, Eyal de Lara, Alec Wolman, Ada Gavrilovska:
The Edge of the Cloud. IEEE Pervasive Comput. 12(4): 17-19 (2013) - [c41]Himanshu Raj, Stefan Saroiu, Alec Wolman, Jitendra Padhye:
Splitting the bill for mobile data with SIMlets. HotMobile 2013: 1 - 2012
- [c40]Anh Nguyen, Himanshu Raj, Shravan K. Rayanchu, Stefan Saroiu, Alec Wolman:
Delusional boot: securing hypervisors without massive re-engineering. EuroSys 2012: 141-154 - [c39]Xuan Bao, Paramvir Bahl, Aman Kansal, David Chu, Romit Roy Choudhury, Alec Wolman:
Helping mobile apps bootstrap with fewer users. UbiComp 2012: 491-500 - [c38]He Liu, Stefan Saroiu, Alec Wolman, Himanshu Raj:
Software abstractions for trusted sensors. MobiSys 2012: 365-378 - [c37]Xuan Bao, Aman Kansal, Romit Roy Choudhury, Paramvir Bahl, David Chu, Alec Wolman:
Poster: supporting collaborative sensing applications. MobiSys 2012: 511-512 - 2011
- [c36]Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Trusted language runtime (TLR): enabling trusted applications on smartphones. HotMobile 2011: 21-26 - 2010
- [c35]Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho, Alec Wolman, Stefan Saroiu, Ranveer Chandra, Paramvir Bahl:
MAUI: making smartphones last longer with code offload. MobiSys 2010: 49-62 - [c34]Atul Adya, John Dunagan, Alec Wolman:
Centrifuge: Integrated Lease Management and Partitioning for Cloud Services. NSDI 2010: 1-16 - [c33]Sharad Agarwal, John Dunagan, Navendu Jain, Stefan Saroiu, Alec Wolman:
Volley: Automated Data Placement for Geo-Distributed Cloud Services. NSDI 2010: 17-32 - [c32]Nilanjan Banerjee, Sharad Agarwal, Paramvir Bahl, Ranveer Chandra, Alec Wolman, Mark D. Corner:
Virtual Compass: Relative Positioning to Sense Mobile Social Interactions. Pervasive 2010: 1-21 - [c31]John McCullough, John Dunagan, Alec Wolman, Alex C. Snoeren:
Stout: An Adaptive Interface to Scalable Cloud Storage. USENIX ATC 2010 - [c30]Rohan Murty, Jitendra Padhye, Alec Wolman, Matt Welsh:
Dyson: An Architecture for Extensible Wireless LANs. USENIX ATC 2010 - [c29]Alec Wolman, Stefan Saroiu, Victor Bahl:
Using Trusted Sensors to Monitor Patients' Habits. HealthSec 2010 - [c28]Stefan Saroiu, Alec Wolman:
I am a sensor, and I approve this message. HotMobile 2010: 37-42 - [e3]Sujata Banerjee, Srinivasan Keshav, Alec Wolman:
Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, California, USA, June 15-18, 2010. ACM 2010, ISBN 978-1-60558-985-5 [contents] - [e2]Landon P. Cox, Alec Wolman:
Proceedings of the 2ndt ACM SIGCOMM Workshop on Networking, Systems, and Applications for Mobile Handhelds, MobiHeld 2010, New Delhi, India, August 30, 2010. ACM 2010, ISBN 978-1-4503-0197-8 [contents]
2000 – 2009
- 2009
- [c27]Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, Alec Wolman:
Lockr: better privacy for social networks. CoNEXT 2009: 169-180 - [c26]Timothy J. Smith, Stefan Saroiu, Alec Wolman:
BlueMonarch: a system for evaluating bluetooth applications in the wild. MobiSys 2009: 41-54 - [c25]Andrew G. Miklas, Stefan Saroiu, Alec Wolman, Angela Demke Brown:
Bunker: A Privacy-Oriented Platform for Network Tracing. NSDI 2009: 29-42 - [c24]Stefan Saroiu, Alec Wolman:
Enabling new mobile applications with location proofs. HotMobile 2009 - [e1]Geoffrey M. Voelker, Alec Wolman:
Proceedings of the 2009 USENIX Annual Technical Conference, USENIX ATC 2009, San Diego, CA, USA, June 14-19, 2009. USENIX Association 2009 [contents] - 2008
- [j2]Rohan Murty, Jitendra Padhye, Ranveer Chandra, Alec Wolman, Brian Zill:
Designing High-Performance Enterprise Wi-FiNetworks. login Usenix Mag. 33(4) (2008) - [c23]Troy Ronda, Stefan Saroiu, Alec Wolman:
Itrustpage: a user-assisted anti-phishing tool. EuroSys 2008: 261-272 - [c22]Rohan Narayana Murty, Jitendra Padhye, Alec Wolman, Matt Welsh:
An Architecture for Extensible Wireless LANs. HotNets 2008: 79-84 - [c21]Rohan Murty, Jitendra Padhye, Ranveer Chandra, Alec Wolman, Brian Zill:
Designing High Performance Enterprise Wi-Fi Networks. NSDI 2008: 73-88 - [c20]Stefan Saroiu, Alec Wolman:
SpySaver: using incentives to address spyware. NetEcon 2008: 37-42 - [c19]Amin Tootoonchian, Kiran K. Gollu, Stefan Saroiu, Yashar Ganjali, Alec Wolman:
Lockr: social access control for web 2.0. WOSN 2008: 43-48 - 2007
- [c18]Andrew G. Miklas, Stefan Saroiu, Alec Wolman, Angela Demke Brown:
Tamper Resistant Network Tracing. HotNets 2007 - [c17]Yuvraj Agarwal, Ranveer Chandra, Alec Wolman, Paramvir Bahl, Kevin Chin, Rajesh K. Gupta:
Wireless wakeups revisited: energy management for voip over wi-fi smartphones. MobiSys 2007: 179-191 - [c16]Ranveer Chandra, Jitendra Padhye, Alec Wolman, Brian Zill:
A Location-Based Management System for Enterprise Wireless LANs. NSDI 2007 - [c15]Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Alec Wolman:
Beacon-Stuffing: Wi-Fi without Associations. HotMobile 2007: 53-57 - 2006
- [c14]Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec Wolman, Brian Zill:
Enhancing the security of corporate Wi-Fi ntworks using DAIR. MobiSys 2006: 1-14 - 2004
- [j1]Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wolman:
Reconsidering wireless systems with multiple radios. Comput. Commun. Rev. 34(5): 39-46 (2004) - [c13]Atul Adya, Paramvir Bahl, Jitendra Padhye, Alec Wolman, Lidong Zhou:
A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. BROADNETS 2004: 344-354 - [c12]John Dunagan, Nicholas J. A. Harvey, Michael B. Jones, Dejan Kostic, Marvin Theimer, Alec Wolman:
FUSE: Lightweight Guaranteed Distributed Failure Notification. OSDI 2004: 151-166 - 2003
- [c11]Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony I. T. Rowstron, Marvin Theimer, Helen J. Wang, Alec Wolman:
An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays. INFOCOM 2003: 1510-1520 - [c10]Nicholas J. A. Harvey, Michael B. Jones, Marvin Theimer, Alec Wolman:
Efficient Recovery from Organizational Disconnects in SkipNet. IPTPS 2003: 183-196 - [c9]Nicholas J. A. Harvey, Michael B. Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman:
SkipNet: A Scalable Overlay Network with Practical Locality Properties. USENIX Symposium on Internet Technologies and Systems 2003 - 2001
- [c8]Maureen Chesire, Alec Wolman, Geoffrey M. Voelker, Henry M. Levy:
Measurement and Analysis of a Streaming Media Workload. USITS 2001: 1-12
1990 – 1999
- 1999
- [c7]Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna R. Karlin, Henry M. Levy:
On the scale and performance of cooperative Web proxy caching. SOSP 1999: 16-31 - [c6]Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Molly Brown, Tashana Landray, Denise Pinnel, Anna R. Karlin, Henry M. Levy:
Organization-Based Analysis of Web-Object Sharing and Caching. USENIX Symposium on Internet Technologies and Systems 1999 - 1996
- [c5]Theodore H. Romer, Dennis Lee, Geoffrey M. Voelker, Alec Wolman, Wayne A. Wong, Jean-Loup Baer, Brian N. Bershad, Henry M. Levy:
The Structure and Performance of Interpreters. ASPLOS 1996: 150-159 - 1994
- [c4]Alec Wolman, Geoffrey M. Voelker, Chandramohan A. Thekkath:
Latency Analysis of TCP on an ATM Network. USENIX Winter 1994: 167-179 - 1993
- [c3]G. Winfield Treese, Alec Wolman:
X Through the Firewall, and Other Application Relay. USENIX Summer 1993: 87-100 - 1992
- [c2]Rivka Ladin, Murray S. Mazer, Alec Wolman:
Replicating the Procedure Call Abstraction. Workshop on the Management of Replicated Data 1992: 86-89 - 1991
- [c1]Rivka Ladin, Murray S. Mazer, Alec Wolman:
A General Tool for Replicating Distributed Services. PDIS 1991: 172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint