
Margo I. Seltzer
Person information
- affiliation: Harvard University, Cambridge, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j24]Tony Mason, Thaleia Dimitra Doudali, Margo I. Seltzer, Ada Gavrilovska:
Unexpected Performance of Intel® Optane™ DC Persistent Memory. IEEE Comput. Archit. Lett. 19(1): 55-58 (2020) - [d1]Matthew K. Lau
, Thomas F. J.-M. Pasquier
, Margo I. Seltzer
:
Rclean: A Tool for Writing Cleaner, More Transparent Code. J. Open Source Softw. 5(46): 1312 (2020) - [j23]Malvika Rao
, David F. Bacon, David C. Parkes, Margo I. Seltzer:
Incentivizing Deep Fixes in Software Economies. IEEE Trans. Software Eng. 46(1): 51-70 (2020) - [c118]Swati Goswami, Nodir Kodirov, Craig Mustard, Ivan Beschastnikh, Margo I. Seltzer:
Parking packet payload with P4. CoNEXT 2020: 274-281 - [c117]Xueyuan Han, James Mickens, Ashish Gehani, Margo I. Seltzer, Thomas F. J.-M. Pasquier
:
Xanthus: Push-button Orchestration of Host Provenance Data Collection. P-RECS@HPDC 2020: 27-32 - [c116]Jimmy Lin, Chudi Zhong, Diane Hu, Cynthia Rudin, Margo I. Seltzer:
Generalized and Scalable Optimal Sparse Decision Trees. ICML 2020: 6150-6160 - [c115]Jingmei Hu, Jiwon Joung, Maia Jacobs, Krzysztof Z. Gajos, Margo I. Seltzer:
ProvBuild: improving data scientist efficiency with provenance. ICSE (Companion Volume) 2020: 266-267 - [c114]Jingmei Hu, Jiwon Joung, Maia Jacobs, Krzysztof Z. Gajos, Margo I. Seltzer:
Improving data scientist efficiency with provenance. ICSE 2020: 1086-1097 - [c113]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. NDSS 2020 - [c112]Vaastav Anand, Puneet Mehrotra, Daniel W. Margo, Margo I. Seltzer:
Smooth Kronecker: Solving the Combing Problem in Kronecker Graphs. GRADES-NDA@SIGMOD 2020: 3:1-3:10 - [c111]Margo I. Seltzer:
The Fine Line between Bold and Fringe Lunatic. USENIX Annual Technical Conference 2020 - [e5]Angelos Bilas, Kostas Magoutis, Evangelos P. Markatos, Dejan Kostic, Margo I. Seltzer:
EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece, April 27-30, 2020. ACM 2020, ISBN 978-1-4503-6882-7 [contents] - [i22]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats. CoRR abs/2001.01525 (2020) - [i21]Xueyuan Han, James Mickens, Ashish Gehani, Margo I. Seltzer, Thomas F. J.-M. Pasquier:
Xanthus: Push-button Orchestration of Host Provenance Data Collection. CoRR abs/2005.04717 (2020) - [i20]Swati Goswami, Nodir Kodirov, Craig Mustard, Ivan Beschastnikh, Margo I. Seltzer:
Parking Packet Payload with P4. CoRR abs/2006.05182 (2020) - [i19]Jimmy Lin, Chudi Zhong, Diane Hu, Cynthia Rudin, Margo I. Seltzer:
Generalized Optimal Sparse Decision Trees. CoRR abs/2006.08690 (2020) - [i18]Angelos Bilas, Dejan Kostic, Kostas Magoutis, Evangelos P. Markatos, Dushyanth Narayanan, Peter R. Pietzuch, Margo I. Seltzer:
The EuroSys 2020 Online Conference: Experience and lessons learned. CoRR abs/2006.11068 (2020) - [i17]Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. CoRR abs/2008.11533 (2020)
2010 – 2019
- 2019
- [c110]Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas F. J.-M. Pasquier
, Ashish Gehani, Hassaan Irshad, Lucian Carata, Margo I. Seltzer:
ProvMark: A Provenance Expressiveness Benchmarking System. Middleware 2019: 268-279 - [c109]Xiyang Hu, Cynthia Rudin, Margo I. Seltzer:
Optimal Sparse Decision Trees. NeurIPS 2019: 7265-7273 - [c108]Jingmei Hu, Eric Lu, David A. Holland, Ming Kawaguchi, Stephen Chong, Margo I. Seltzer:
Trials and Tribulations in Synthesizing Operating Systems. PLOS@SOSP 2019: 67-73 - [c107]Thomas F. J.-M. Pasquier
, David M. Eyers
, Margo I. Seltzer
:
From Here to Provtopia. Poly/DMAH@VLDB 2019: 54-67 - [i16]Xiyang Hu
, Cynthia Rudin, Margo I. Seltzer:
Optimal Sparse Decision Trees. CoRR abs/1904.12847 (2019) - [i15]Ming Kawaguchi, Jingmei Hu, Eric Lu, David A. Holland, Stephen Chong, Margo I. Seltzer:
Aquarium Technical Report Preprint. CoRR abs/1908.00093 (2019) - [i14]Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas F. J.-M. Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, Margo I. Seltzer:
ProvMark: A Provenance Expressiveness Benchmarking System. CoRR abs/1909.11187 (2019) - 2018
- [j22]Thomas F. J.-M. Pasquier
, Matthew K. Lau, Xueyuan Han, Elizabeth Fong, Barbara Staudt Lerner, Emery R. Boose, Mercè Crosas, Aaron M. Ellison, Margo I. Seltzer:
Sharing and Preserving Computational Analyses for Posterity with encapsulator. Comput. Sci. Eng. 20(4): 111-124 (2018) - [j21]Thomas F. J.-M. Pasquier
, Jatinder Singh, Julia E. Powles
, David M. Eyers
, Margo I. Seltzer, Jean Bacon:
Data provenance to audit compliance with privacy policy in the Internet of Things. Pers. Ubiquitous Comput. 22(2): 333-344 (2018) - [c106]Thomas F. J.-M. Pasquier
, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers
, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CCS 2018: 1601-1616 - [c105]Margo I. Seltzer, Virendra J. Marathe, Steve Byan:
An NVM Carol: Visions of NVM Past, Present, and Future. ICDE 2018: 15-23 - [c104]Xueyuan Han, Thomas F. J.-M. Pasquier, Margo I. Seltzer:
Provenance-based Intrusion Detection: Opportunities and Challenges. TaPP 2018 - [c103]Yihe Huang, Matej Pavlovic, Virendra J. Marathe, Margo I. Seltzer, Tim Harris, Steve Byan:
Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs. USENIX Annual Technical Conference 2018: 967-979 - [i13]Thomas F. J.-M. Pasquier, Matthew K. Lau, Xueyuan Han, Elizabeth Fong, Barbara Staudt Lerner, Emery R. Boose, Mercè Crosas, Aaron M. Ellison, Margo I. Seltzer:
Sharing and Preserving Computational Analyses for Posterity with encapsulator. CoRR abs/1803.05808 (2018) - [i12]Virendra J. Marathe, Achin Mishra, Amee Trivedi, Yihe Huang, Faisal Zaghloul, Sanidhya Kashyap, Margo I. Seltzer, Tim Harris, Steve Byan, Bill Bridge, Dave Dice:
Persistent Memory Transactions. CoRR abs/1804.00701 (2018) - [i11]Xueyuan Han, Thomas F. J.-M. Pasquier, Margo I. Seltzer:
Provenance-based Intrusion Detection: Opportunities and Challenges. CoRR abs/1806.00934 (2018) - [i10]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CoRR abs/1808.06049 (2018) - [i9]Peter Kraft, Amos Waterland, Daniel Y. Fu, Anitha Gollamudi, Shai Szulanski, Margo I. Seltzer:
Automatic Parallelization of Sequential Programs. CoRR abs/1809.07684 (2018) - [i8]David M. Eyers, Christopher Millard, Margo I. Seltzer, Jatinder Singh:
Towards Accountable Systems (Dagstuhl Seminar 18181). Dagstuhl Reports 8(4): 126-163 (2018) - 2017
- [j20]Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo I. Seltzer, Cynthia Rudin:
Learning Certifiably Optimal Rule Lists for Categorical Data. J. Mach. Learn. Res. 18: 234:1-234:78 (2017) - [j19]Margo I. Seltzer:
Flipping Out in Computer Science. login Usenix Mag. 42(3) (2017) - [c102]Thomas F. J.-M. Pasquier
, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers
, Margo I. Seltzer, Jean Bacon:
Practical whole-system provenance capture. SoCC 2017: 405-418 - [c101]Xueyuan Han, Thomas F. J.-M. Pasquier, Tanvi Ranjan, Mark Goldstein, Margo I. Seltzer:
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance. HotCloud 2017 - [c100]Virendra J. Marathe, Margo I. Seltzer, Steve Byan, Tim Harris:
Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory. HotStorage 2017 - [c99]Hongyu Yang, Cynthia Rudin, Margo I. Seltzer:
Scalable Bayesian Rule Lists. ICML 2017: 3921-3930 - [c98]Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo I. Seltzer, Cynthia Rudin:
Learning Certifiably Optimal Rule Lists. KDD 2017: 35-44 - [c97]Jacob Whitehill, Margo I. Seltzer:
A Crowdsourcing Approach to Collecting Tutorial Videos - Toward Personalized Learning-at-Scale. L@S 2017: 157-160 - [i7]Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo I. Seltzer, Cynthia Rudin:
Learning Certifiably Optimal Rule Lists for Categorical Data. CoRR abs/1704.01701 (2017) - [i6]Thomas F. J.-M. Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Practical Whole-System Provenance Capture. CoRR abs/1711.05296 (2017) - [i5]Xueyuan Han, Thomas F. J.-M. Pasquier, Tanvi Ranjan, Mark Goldstein, Margo I. Seltzer:
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance. CoRR abs/1711.11487 (2017) - 2016
- [i4]Hongyu Yang, Cynthia Rudin, Margo I. Seltzer:
Scalable Bayesian Rule Lists. CoRR abs/1602.08610 (2016) - [i3]Jacob Whitehill, Margo I. Seltzer:
A Crowdsourcing Approach to Collecting 399 Tutorial Videos on Logarithms. CoRR abs/1606.09610 (2016) - 2015
- [j18]Daniel W. Margo, Margo I. Seltzer:
A Scalable Distributed Graph Partitioner. Proc. VLDB Endow. 8(12): 1478-1489 (2015) - [c96]Schuyler Eldridge
, Amos Waterland, Margo I. Seltzer, Jonathan Appavoo, Ajay Joshi:
Towards General-Purpose Neural Network Computing. PACT 2015: 99-112 - [c95]Peter Macko, Virendra J. Marathe, Daniel W. Margo, Margo I. Seltzer:
LLAMA: Efficient graph analytics using Large Multiversioned Arrays. ICDE 2015: 363-374 - [c94]Margo I. Seltzer:
Automatically Scalable Computation. ICS 2015: 283 - [c93]Margo I. Seltzer, Mark Miller, David Mazières, Yuanyuan Zhou:
Is achieving security a hopeless quest? SOSP History Day 2015: 13:1 - [c92]Nikilesh Balakrishnan, Thomas Bytheway, Lucian Carata, Oliver R. A. Chick, James Snee, Sherif Akoush, Ripduman Sohan, Margo I. Seltzer, Andy Hopper:
Recent Advances in Computer Architecture: The Opportunities and Challenges for Provenance. TaPP 2015 - 2014
- [j17]Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway
, Ripduman Sohan, Margo I. Seltzer, Andy Hopper:
A primer on provenance. Commun. ACM 57(5): 52-60 (2014) - [j16]Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway
, Ripduman Sohan, Margo I. Seltzer, Andy Hopper:
A Primer on Provenance. ACM Queue 12(3): 10-23 (2014) - [c91]Amos Waterland, Elaine Angelino, Ryan P. Adams, Jonathan Appavoo, Margo I. Seltzer:
ASC: automatically scalable computation. ASPLOS 2014: 575-590 - [c90]Elaine Angelino, Eddie Kohler, Amos Waterland, Margo I. Seltzer, Ryan P. Adams:
Accelerating MCMC via Parallel Predictive Prefetching. UAI 2014: 22-31 - 2013
- [j15]Regina Herzlinger, Margo I. Seltzer, Mark Gaynor:
Applying KISS to Healthcare Information Technology. Computer 46(11): 72-74 (2013) - [j14]Michelle A. Borkin, Chelsea S. Yeh, Madelaine Boyd, Peter Macko, Krzysztof Z. Gajos, Margo I. Seltzer, Hanspeter Pfister
:
Evaluation of Filesystem Provenance Visualization Tools. IEEE Trans. Vis. Comput. Graph. 19(12): 2476-2485 (2013) - [j13]David A. Holland, Elaine Angelino, Gideon Wald, Margo I. Seltzer:
Flash Caching on the Storage Client. login Usenix Mag. 38(5) (2013) - [c89]Mark Gaynor, Margo I. Seltzer, David Schneider:
Asthma Infrastructure Research (AIR). AMIA 2013 - [c88]Peter Macko, Daniel W. Margo, Margo I. Seltzer:
Local clustering in provenance graphs. CIKM 2013: 835-840 - [c87]Amos Waterland, Elaine Angelino, Ekin D. Cubuk, Efthimios Kaxiras, Ryan P. Adams, Jonathan Appavoo, Margo I. Seltzer:
Computational caches. SYSTOR 2013: 8:1-8:7 - [c86]Peter Macko, Daniel W. Margo, Margo I. Seltzer:
Performance introspection of graph databases. SYSTOR 2013: 18:1-18:10 - [c85]David A. Holland, Elaine Angelino, Gideon Wald, Margo I. Seltzer:
Flash Caching on the Storage Client. USENIX Annual Technical Conference 2013: 127-138 - 2012
- [c84]Amos Waterland, Jonathan Appavoo, Margo I. Seltzer:
Parallelization by Simulated Tunneling. HotPar 2012 - [c83]Philip J. Guo, Margo I. Seltzer:
BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure. TaPP 2012 - [c82]Peter Macko, Margo I. Seltzer:
A General-Purpose Provenance Library. TaPP 2012 - [i2]Erik Elmroth, Michael Factor, Ethan L. Miller, Margo I. Seltzer:
Is the Future of Preservation Cloudy? (Dagstuhl Seminar 12472). Dagstuhl Reports 2(11): 102-134 (2012) - 2011
- [c81]Diana L. MacLean, Margo I. Seltzer:
Mining the Web for Medical Hypotheses - A Proof-of-Concept System. HEALTHINF 2011: 303-308 - [c80]Peter Bailis, Vijay Janapa Reddi, Sanjay Gandhi, David M. Brooks, Margo I. Seltzer:
Dimetrodon: processor-level preventive thermal management via idle cycle injection. DAC 2011: 89-94 - [c79]David A. Holland, Margo I. Seltzer:
Multicore OSes: Looking Forward from 1991, er, 2011. HotOS 2011 - [c78]Vasily Tarasov, Saumitra Bhanage, Erez Zadok, Margo I. Seltzer:
Benchmarking File System Benchmarking: It *IS* Rocket Science. HotOS 2011 - [c77]Peter Macko, Margo I. Seltzer:
Provenance Map Orbiter: Interactive Exploration of Large Provenance Graphs. TaPP 2011 - 2010
- [c76]Peter Macko, Margo I. Seltzer, Keith A. Smith:
Tracking Back References in a Write-Anywhere File System. FAST 2010: 15-28 - [c75]Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I. Seltzer:
Provenance for the Cloud. FAST 2010: 197-210 - [c74]Elaine Angelino, Daniel Yamins, Margo I. Seltzer:
StarFlow: A Script-Centric Data Analysis Environment. IPAW 2010: 236-250 - [c73]Uri Braun, Margo I. Seltzer, Adriane Chapman, Barbara T. Blaustein, M. David Allen, Len Seligman:
Towards Query Interoperability: PASSing PLUS. TaPP 2010 - [e4]Margo I. Seltzer, Wang-Chiew Tan:
2nd Workshop on the Theory and Practice of Provenance, TaPP'10, San Jose, CA, USA, February 22, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [j12]Kiran-Kumar Muniswamy-Reddy, Margo I. Seltzer:
Provenance as first class cloud data. ACM SIGOPS Oper. Syst. Rev. 43(4): 11-16 (2009) - [j11]Margo I. Seltzer, Richard Wheeler:
Introduction to special issue FAST 2009. ACM Trans. Storage 5(4): 11:1-11:2 (2009) - [c72]Daniel W. Margo, Margo I. Seltzer:
The Case for Browser Provenance. Workshop on the Theory and Practice of Provenance 2009 - [c71]Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I. Seltzer:
Making a Cloud Provenance-Aware. Workshop on the Theory and Practice of Provenance 2009 - [c70]Margo I. Seltzer, Nicholas Murphy:
Hierarchical File Systems Are Dead. HotOS 2009 - [c69]James Cheney, Stephen Chong, Nate Foster, Margo I. Seltzer, Stijn Vansummeren:
Provenance: a future history. OOPSLA Companion 2009: 957-964 - [c68]Kiran-Kumar Muniswamy-Reddy, Uri Braun, David A. Holland, Peter Macko, Diana L. MacLean, Daniel W. Margo, Margo I. Seltzer, Robin Smogor:
Layering in Provenance Systems. USENIX Annual Technical Conference 2009 - [e3]Margo I. Seltzer, Richard Wheeler:
7th USENIX Conference on File and Storage Technologies, February 24-27, 2009, San Francisco, CA, USA. Proceedings. USENIX 2009, ISBN 978-1-931971-66-9 [contents] - [i1]Saul Youssef, John Brunelle, John Huth, David C. Parkes, Margo I. Seltzer, Jim Shank:
Minimal Economic Distributed Computing. CoRR abs/0902.4730 (2009) - 2008
- [j10]Margo I. Seltzer:
Beyond relational databases. Commun. ACM 51(7): 52-58 (2008) - [j9]Luc Moreau
, Bertram Ludäscher, Ilkay Altintas, Roger S. Barga, Shawn Bowers, Steven P. Callahan, George Chin Jr., Ben Clifford, Shirley Cohen, Sarah Cohen Boulakia, Susan B. Davidson, Ewa Deelman, Luciano A. Digiampietri
, Ian T. Foster, Juliana Freire
, James Frew, Joe Futrelle, Tara Gibson, Yolanda Gil
, Carole A. Goble
, Jennifer Golbeck, Paul Groth
, David A. Holland, Sheng Jiang, Jihie Kim, David Koop, Ales Krenek
, Timothy M. McPhillips, Gaurang Mehta, Simon Miles
, Dominic Metzger, Steve Munroe, Jim Myers
, Beth Plale
, Norbert Podhorszki, Varun Ratnakar, Emanuele Santos, Carlos Eduardo Scheidegger, Karen Schuchardt, Margo I. Seltzer, Yogesh L. Simmhan
, Cláudio T. Silva, Peter Slaughter
, Eric G. Stephan
, Robert Stevens, Daniele Turi, Huy T. Vo, Michael Wilde, Jun Zhao, Yong Zhao:
Special Issue: The First Provenance Challenge. Concurr. Comput. Pract. Exp. 20(5): 409-418 (2008) - [j8]David A. Holland, Margo I. Seltzer, Uri Braun, Kiran-Kumar Muniswamy-Reddy:
PASSing the provenance challenge. Concurr. Comput. Pract. Exp. 20(5): 531-540 (2008) - [j7]Margo I. Seltzer:
The Present and Future of SAN/NAS: Interview with Dave Hitz and Brian Pawlowsky of NetApp. login Usenix Mag. 33(3) (2008) - [c67]Uri Braun, Avraham Shinnar, Margo I. Seltzer:
Securing Provenance. HotSec 2008 - 2007
- [j6]Margo I. Seltzer:
Berkeley DB: A Retrospective. IEEE Data Eng. Bull. 30(3): 21-28 (2007) - [c66]Alexandra Fedorova, Margo I. Seltzer, Michael D. Smith:
Improving Performance Isolation on Chip Multiprocessors via an Operating System Scheduler. PACT 2007: 25-38 - [c65]Jonathan Ledlie, Michael Mitzenmacher, Margo I. Seltzer, Peter R. Pietzuch:
Wired Geometric Routing. IPTPS 2007 - [c64]Jonathan Ledlie, Paul Gardner, Margo I. Seltzer:
Network Coordinates in the Wild. NSDI 2007 - 2006
- [c63]Jonathan Ledlie, Peter R. Pietzuch
, Margo I. Seltzer:
Stable and Accurate Network Coordinates. ICDCS 2006: 74 - [c62]Peter R. Pietzuch
, Jonathan Ledlie, Michael Mitzenmacher, Margo I. Seltzer:
Network-Aware Overlays with Network Coordinates. ICDCS Workshops 2006: 12 - [c61]Peter R. Pietzuch
, Jonathan Ledlie, Jeffrey Shneidman, Mema Roussopoulos, Matt Welsh, Margo I. Seltzer:
Network-Aware Operator Placement for Stream-Processing Systems. ICDE 2006: 49 - [c60]Uri Braun, Simson L. Garfinkel, David A. Holland, Kiran-Kumar Muniswamy-Reddy, Margo I. Seltzer:
Issues in Automatic Provenance Collection. IPAW 2006: 171-183 - [c59]Sharon E. Perl, Margo I. Seltzer:
Data Management for Internet-Scale Single-Sign-On. WORLDS 2006 - [c58]Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo I. Seltzer:
Provenance-Aware Storage Systems. USENIX Annual Technical Conference, General Track 2006: 43-56 - 2005
- [j5]Margo I. Seltzer:
Beyond relational databases. ACM Queue 3(3): 50-58 (2005) - [j4]David A. Holland, Ada T. Lim, Margo I. Seltzer:
An architecture a day keeps the hacker away. SIGARCH Comput. Archit. News 33(1): 34-41 (2005) - [c57]Peter R. Pietzuch, Jonathan Ledlie, Margo I. Seltzer:
Supporting Network Coordinates on PlanetLab. WORLDS 2005 - [c56]Mark Gaynor, Margo I. Seltzer, Steve Moulton, Jim Freedman:
A Dynamic, Data-Driven, Decision Support System for Emergency Medical Services. International Conference on Computational Science (2) 2005: 703-711 - [c55]Jeffrey Shneidman, Peter R. Pietzuch
, Matt Welsh, Margo I. Seltzer, Mema Roussopoulos:
A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays. ICDE Workshops 2005: 1182 - [c54]Jonathan Ledlie, Margo I. Seltzer:
Distributed, secure load balancing with skew, heterogeneity and churn. INFOCOM 2005: 1419-1430 - [c53]Peter R. Pietzuch, Jeffrey Shneidman, Jonathan Ledlie, Matt Welsh, Margo I. Seltzer, Mema Roussopoulos:
Evaluating DHT-Based Service Placement for Stream-Based Overlays. IPTPS 2005: 275-286 - [c52]Alexandra Fedorova, Margo I. Seltzer, Christopher Small, Daniel Nussbaum:
Performance of Multithreaded Chip Multiprocessors and Implications for Operating System Design. USENIX Annual Technical Conference, General Track 2005: 395-398 - 2004
- [c51]Michael P. Mesnier, Eno Thereska, Gregory R. Ganger, Daniel Ellard, Margo I. Seltzer:
File Classification in Self-* Storage Systems. ICAC 2004: 44-51 - [c50]David G. Sullivan, Margo I. Seltzer, Avi Pfeffer:
Using probabilistic reasoning to automate software tuning. SIGMETRICS 2004: 404-405 - [c49]Alexandra Fedorova, Christopher Small, Daniel Nussbaum, Margo I. Seltzer:
Chip multithreading systems need a new operating system scheduler. ACM SIGOPS European Workshop 2004: 9 - [c48]Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Mema Roussopoulos, Margo I. Seltzer:
Open problems in data collection networks. ACM SIGOPS European Workshop 2004: 27 - [c47]Alexandra Fedorova, Margo I. Seltzer, Kostas Magoutis, Salimah Addetia:
Application performance on the Direct Access File System. WOSP 2004: 84-93 - [e2]Jack S. Breese, Joan Feigenbaum, Margo I. Seltzer:
Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004. ACM 2004, ISBN 1-58113-771-0 [contents] - 2003
- [c46]Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo I. Seltzer:
Passive NFS Tracing of Email and Research Workloads. FAST 2003 - [c45]Kostas Magoutis, Salimah Addetia, Alexandra Fedorova, Margo I. Seltzer:
Making the Most Out of Direct-Access Network Attached Storage. FAST 2003 - [c44]Jonathan Ledlie, Jeffrey Shneidman, Margo I. Seltzer, John Huth:
Scooped, Again. IPTPS 2003: 129-138 - [c43]Daniel Ellard, Margo I. Seltzer:
New NFS Tracing Tools and Techniques for System Analysis. LISA 2003: 73-86 - [c42]Chaki Ng, David C. Parkes, Margo I. Seltzer:
Virtual worlds: fast and strategyproof auctions for dynamic resource allocation. EC 2003: 238-239 - [c41]Daniel Ellard, Margo I. Seltzer:
NFS Tricks and Benchmarking Traps. USENIX Annual Technical Conference, FREENIX Track 2003: 101-114 - 2002
- [c40]