
Geoffrey M. Voelker
Geoff Voelker
Person information
- affiliation: University of California, San Diego, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j31]Geoffrey M. Voelker:
Technical perspective: Fake 'likes' and targeting collusion networks. Commun. ACM 63(5): 102 (2020) - [c119]Shelby Thomas, Lixiang Ao, Geoffrey M. Voelker, George Porter:
Particle: ephemeral endpoints for serverless networking. SoCC 2020: 16-29 - [c118]Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. Internet Measurement Conference 2020: 50-64 - [c117]Gautam Akiwate, Mattijs Jonker, Raffaele Sommese, Ian D. Foster, Geoffrey M. Voelker, Stefan Savage, kc claffy:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. Internet Measurement Conference 2020: 281-294
2010 – 2019
- 2019
- [j30]Andrea C. Arpaci-Dusseau, Geoffrey M. Voelker:
Introduction to the Special Section on OSDI'18. ACM Trans. Storage 15(2): 12:1 (2019) - [c116]Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, Geoffrey M. Voelker:
Web feature deprecation: a case study for chrome. ICSE (SEIP) 2019: 302-311 - [c115]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring Security Practices and How They Impact Security. Internet Measurement Conference 2019: 36-49 - [c114]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c113]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [c112]Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Kurt Thomas:
Hack for Hire: Exploring the Emerging Market for Account Hijacking. WWW 2019: 1279-1289 - [i2]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [c111]Shelby Thomas, Rob McGuinness, Geoffrey M. Voelker, George Porter:
Dark packets and the end of network scaling. ANCS 2018: 1-14 - [c110]Lixiang Ao, Liz Izhikevich, Geoffrey M. Voelker, George Porter:
Sprocket: A Serverless Video Processing Framework. SoCC 2018: 263-274 - [c109]Shelby Thomas, Geoffrey M. Voelker, George Porter:
CacheCloud: Towards Speed-of-light Datacenter Communication. HotCloud 2018 - [c108]Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses. Internet Measurement Conference 2018: 43-55 - [c107]Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez:
An Empirical Analysis of the Commercial VPN Ecosystem. Internet Measurement Conference 2018: 443-456 - [e4]Andrea C. Arpaci-Dusseau, Geoff Voelker:
13th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2018, Carlsbad, CA, USA, October 8-10, 2018. USENIX Association 2018 [contents] - 2017
- [c106]Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, Alex C. Snoeren:
Exploring the dynamics of search advertiser fraud. Internet Measurement Conference 2017: 157-170 - [c105]Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren:
Tripwire: inferring internet site compromise. Internet Measurement Conference 2017: 341-354 - [c104]Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. CSET @ USENIX Security Symposium 2017 - 2016
- [j29]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - 2015
- [j28]Patrick Ling, Feng Lu, Alex C. Snoeren, Geoffrey M. Voelker:
Enfold: Downclocking OFDM in Wi-Fi. GetMobile Mob. Comput. Commun. 19(2): 10-13 (2015) - [j27]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
Managing Contention with Medley. IEEE Trans. Mob. Comput. 14(3): 579-591 (2015) - [c103]He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, Alex C. Snoeren:
Scheduling techniques for hybrid circuit/packet networks. CoNEXT 2015: 41:1-41:13 - [c102]Neha Chachra, Stefan Savage, Geoffrey M. Voelker:
Affiliate Crookies: Characterizing Affiliate Marketing Abuse. Internet Measurement Conference 2015: 41-47 - [c101]Suqi Liu, Ian D. Foster, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul:
Who is .com?: Learning to Parse WHOIS Records. Internet Measurement Conference 2015: 369-380 - [c100]Tristan Halvorson, Matthew F. Der, Ian D. Foster, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker:
From .academy to .zone: An Analysis of the New TLD Land Rush. Internet Measurement Conference 2015: 381-394 - [c99]Feng Lu, Hao Du, Ankur Jain, Geoffrey M. Voelker, Alex C. Snoeren, Andreas Terzis:
CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks. HotMobile 2015: 45-50 - 2014
- [c98]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c97]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c96]Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Knock it off: profiling the online storefronts of counterfeit merchandise. KDD 2014: 1759-1768 - [c95]Feng Lu, Patrick Ling, Geoffrey M. Voelker, Alex C. Snoeren:
Enfold: downclocking OFDM in WiFi. MobiCom 2014: 129-140 - [c94]Qing Zhang, David Y. Wang, Geoffrey M. Voelker:
DSpin: Detecting Automatically Spun Content on the Web. NDSS 2014 - [c93]He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, George Porter:
Circuit Switching Under the Radar with REACToR. NSDI 2014: 1-15 - [c92]Tristan Halvorson, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
XXXtortion?: inferring registration intent in the .XXX TLD. WWW 2014: 901-912 - [i1]Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul:
Topic Modeling of Hierarchical Corpora. CoRR abs/1409.3518 (2014) - 2013
- [j26]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c91]Rishi Kapoor, Alex C. Snoeren, Geoffrey M. Voelker, George Porter:
Bullet trains: a study of NIC burst behavior at microsecond timescales. CoNEXT 2013: 133-138 - [c90]Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul:
A Variational Approximation for Topic Modeling of Hierarchical Corpora. ICML (2) 2013: 55-63 - [c89]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c88]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Juice: A Longitudinal Study of an SEO Botnet. NDSS 2013 - [c87]Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, Geoffrey M. Voelker:
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. NSDI 2013: 57-70 - [c86]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
SloMo: Downclocking WiFi Communication. NSDI 2013: 255-268 - 2012
- [c85]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c84]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c83]Rishi Kapoor, George Porter, Malveeka Tewari, Geoffrey M. Voelker, Amin Vahdat:
Chronos: predictable low latency for data center applications. SoCC 2012: 9 - [c82]James Mitchell, Eamonn O'Neill
, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Limitations of scanned human copresence encounters for modelling proximity-borne malware. COMSNETS 2012: 1-10 - [c81]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
BlueSky: a cloud-backed file system for the enterprise. FAST 2012: 19 - [c80]Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage:
Taster's choice: a comparative analysis of spam feeds. Internet Measurement Conference 2012: 427-440 - [c79]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
Weighted fair queuing with differential dropping. INFOCOM 2012: 2981-2985 - [c78]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [j25]Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker:
Sora: high-performance software radio using general-purpose multi-core processors. Commun. ACM 54(1): 99-107 (2011) - [j24]Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. Commun. ACM 54(5): 78-87 (2011) - [j23]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3): 30:1-30:24 (2011) - [j22]Diwaker Gupta, Kashi Venkatesh Vishwanath, Marvin McNett, Amin Vahdat, Ken Yocum, Alex C. Snoeren, Geoffrey M. Voelker:
DieCast: Testing Distributed Systems with an Accurate Scale Model. ACM Trans. Comput. Syst. 29(2): 4:1-4:48 (2011) - [c77]Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul:
Topic modeling of freelance job postings to monitor web service abuse. AISec 2011: 11-20 - [c76]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Cloak and dagger: dynamics of web search cloaking. CCS 2011: 477-490 - [c75]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
An analysis of underground forums. Internet Measurement Conference 2011: 71-80 - [c74]Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, Christophe Diot:
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. INFOCOM 2011: 1179-1187 - [c73]He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker:
On the Effects of Registrar-level Intervention. LEET 2011 - [c72]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c71]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c70]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c69]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c68]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. USENIX Security Symposium 2011 - 2010
- [j21]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference engine: harnessing memory redundancy in virtual machines. Commun. ACM 53(10): 85-93 (2010) - [j20]Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren:
Usage Patterns in an Urban WiFi Network. IEEE/ACM Trans. Netw. 18(5): 1359-1372 (2010) - [c67]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c66]Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond heuristics: learning to classify vulnerabilities and predict exploits. KDD 2010: 105-114 - [c65]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [c64]Matteo Varvello, Geoffrey M. Voelker:
Second life: a social network of humans and bots. NOSSDAV 2010: 9-14 - [c63]Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. USENIX Security Symposium 2010: 435-462 - [c62]Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Neon: system support for derived data management. VEE 2010: 63-74 - [c61]Marti Motoyama, Brendan Meeder, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Measuring Online Service Availability Using Twitter. WOSN 2010 - [e3]Shivkumar Kalyanaraman, Venkata N. Padmanabhan, K. K. Ramakrishnan, Rajeev Shorey, Geoffrey M. Voelker:
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010. ACM 2010, ISBN 978-1-4503-0201-2 [contents]
2000 – 2009
- 2009
- [j19]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [j18]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem backup to the cloud. ACM Trans. Storage 5(4): 14:1-14:28 (2009) - [j17]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine. login Usenix Mag. 34(2) (2009) - [j16]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. login Usenix Mag. 34(4) (2009) - [c60]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. FAST 2009: 225-238 - [c59]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Identifying suspicious URLs: an application of large-scale online learning. ICML 2009: 681-688 - [c58]Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Defending Mobile Phones from Proximity Malware. INFOCOM 2009: 1503-1511 - [c57]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond blacklists: learning to detect malicious web sites from suspicious URLs. KDD 2009: 1245-1254 - [c56]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - [c55]Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, Geoffrey M. Voelker:
SAM: enabling practical spatial multiple access in wireless LAN. MobiCom 2009: 49-60 - [c54]Kun Tan, Jiansong Zhang, Ji Fang, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Haitao Wu, Wei Wang, Geoffrey M. Voelker:
Sora: High Performance Software Radio Using General Purpose Multi-core Processors. NSDI 2009: 75-90 - [c53]Bhavish Agarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, Geoffrey M. Voelker:
NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. NSDI 2009: 349-364 - [c52]Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Wenguang Chen, Weimin Zheng, Zheng Zhang, Geoffrey M. Voelker:
MPIWiz: subgroup reproducible replay of mpi applications. PPOPP 2009: 251-260 - [e2]Geoffrey M. Voelker, Alec Wolman:
2009 USENIX Annual Technical Conference, San Diego, CA, USA, June 14-19, 2009. USENIX Association 2009 [contents] - 2008
- [j15]Abhishek B. Sharma, Ranjita Bhagwan, Monojit Choudhury, Leana Golubchik, Ramesh Govindan, Geoffrey M. Voelker:
Automatic request categorization in internet services. SIGMETRICS Perform. Evaluation Rev. 36(2): 16-25 (2008) - [j14]Vijay Chellappa, Pamela C. Cosman
, Geoffrey M. Voelker:
Dual Frame Motion Compensation With Uneven Quality Assignment. IEEE Trans. Circuits Syst. Video Technol. 18(2): 249-256 (2008) - [j13]Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, Kirill Levchenko:
Storm: When Researchers Collide. login Usenix Mag. 33(4) (2008) - [c51]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. CCS 2008: 3-14 - [c50]Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, Geoffrey M. Voelker:
Towards Automatic Inference of Task Hierarchies in Complex Systems. HotDep 2008 - [c49]Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren:
Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan. Internet Measurement Conference 2008: 85-98 - [c48]Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage:
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. LEET 2008 - [c47]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
On the Spam Campaign Trail. LEET 2008 - [c46]Geoffrey M. Voelker:
Banal: Because Format Checking Is So Trite. WOWCS 2008 - [c45]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine: Harnessing Memory Redundancy in Virtual Machines. OSDI 2008: 309-322 - [c44]Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage:
Xl: an efficient network routing algorithm. SIGCOMM 2008: 15-26 - 2007
- [j12]Jon Crowcroft, Craig Partridge, Geoffrey M. Voelker, Ellen W. Zegura:
Report from the 2006 SIGCOMM nomination committee. Comput. Commun. Rev. 37(1): 87 (2007) - [c43]Chris Fleizach, Geoffrey M. Voelker, Stefan Savage:
Slicing Spam with Occam's Razor. CEAS 2007 - [c42]Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker:
Usher: An Extensible Framework for Managing Clusters of Virtual Machines. LISA 2007: 167-181 - [c41]Yuchung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker:
Automating cross-layer diagnosis of enterprise wireless networks. SIGCOMM 2007: 25-36 - [c40]David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker:
Spamscatter: Characterizing Internet Scam Hosting Infrastructure. USENIX Security Symposium 2007 - 2006
- [j11]Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker:
Maximizing data locality in distributed systems. J. Comput. Syst. Sci. 72(8): 1309-1316 (2006) - [j10]David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2): 115-139 (2006) - [j9]Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao:
Characterization of a Large Web Site Population with Implications for Content Delivery. World Wide Web 9(4): 505-536 (2006) - [c39]Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker:
Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64 - [c38]Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker:
Unexpected means of protocol inference. Internet Measurement Conference 2006: 313-326 - [c37]Kiran Tati, Geoffrey M. Voelker:
On Object Maintenance in Peer-to-Peer Systems. IPTPS 2006 - [c36]Diwaker Gupta, Ken Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker:
To Infinity and Beyond: Time-Warped Network Emulation. NSDI 2006 - [c35]Yuchung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM 2006: 39-50 - 2005
- [j8]Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl:
Wireless Hotspots: Current Challenges and Future Directions. Mob. Networks Appl. 10(3): 265-274 (2005) - [j7]Marvin McNett, Geoffrey M. Voelker:
Access and mobility of wireless PDA users. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(2): 40-55 (2005) - [c34]Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker:
Error Concealment for Dual Frame Video Coding with Uneven Quality. DCC 2005: 319-328 - [c33]Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SOSP 2005: 148-162 - [c32]Flavio Paiva Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, Geoffrey M. Voelker:
Surviving Internet Catastrophes. USENIX Annual Technical Conference, General Track 2005: 45-60 - [c31]Justin Ma, Geoffrey M. Voelker, Stefan Savage:
Self-stopping worms. WORM 2005: 12-21 - [e1]Geoffrey M. Voelker, Scott Shenker:
Peer-to-Peer Systems III, Third International Workshop, IPTPS 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3279, Springer 2005, ISBN 3-540-24252-X [contents] - 2004
- [c30]Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker:
Dual Frame Motion Compensation with Uneven Quality Assignment. Data Compression Conference 2004: 262-271 - [c29]Ranjita Bhagwan, Kiran Tati, Yuchung Cheng, Stefan Savage, Geoffrey M. Voelker:
Total Recall: System Support for Automated Availability Management. NSDI 2004: 337-350 - [c28]