Margo Seltzer
Margo Seltzer
Verified email at - Homepage
Cited by
Cited by
Provenance-aware storage systems.
KK Muniswamy-Reddy, DA Holland, U Braun, MI Seltzer
Usenix annual technical conference, general track, 43-56, 2006
Berkeley DB.
MA Olson, K Bostic, MI Seltzer
USENIX Annual Technical Conference, FREENIX Track, 183-191, 1999
Network-aware operator placement for stream-processing systems
P Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, M Seltzer
22nd International Conference on Data Engineering (ICDE'06), 49-49, 2006
Arrakis: The operating system is the control plane
S Peter, J Li, I Zhang, DRK Ports, D Woos, A Krishnamurthy, T Anderson, ...
ACM Transactions on Computer Systems (TOCS) 33 (4), 1-30, 2015
World Wide Web Cache Consistency.
J Gwertzman, MI Seltzer
USENIX annual technical conference, 141-152, 1996
An Implementation of a Log-Structured File System for UNIX.
MI Seltzer, K Bostic, MK McKusick, C Staelin
USENIX Winter, 307-326, 1993
The case for geographical push-caching
JS Gwertzman, M Seltzer
Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 51-55, 1995
Dealing with disaster: Surviving misbehaved kernel extensions
MI Seltzer, Y Endo, C Small, KA Smith
SIGOPS Operating Systems Review 30 (213-228), 10.1145, 1996
Disk scheduling revisited
M Seltzer, P Chen, J Ousterhout
Proceedings of the winter 1990 USENIX technical conference, 313-323, 1990
Journaling versus soft updates: Asynchronous meta-data protection in file systems
MI Seltzer, GR Ganger, MK McKusic, KA Smith, CAN Soules, CA Stein
2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000
Learning certifiably optimal rule lists for categorical data
E Angelino, N Larus-Stone, D Alabi, M Seltzer, C Rudin
Journal of Machine Learning Research 18 (234), 1-78, 2018
Non-volatile memory for fast, reliable file systems
M Baker, S Asami, E Deprit, J Ouseterhout, M Seltzer
ACM SIGPLAN Notices 27 (9), 10-22, 1992
Network Coordinates in the Wild.
J Ledlie, P Gardner, MI Seltzer
NSDI 7, 299-311, 2007
Improving performance isolation on chip multiprocessors via an operating system scheduler
A Fedorova, M Seltzer, MD Smith
16th International Conference on Parallel Architecture and Compilation …, 2007
Provenance as first class cloud data
KK Muniswamy-Reddy, M Seltzer
ACM SIGOPS Operating Systems Review 43 (4), 11-16, 2010
The first provenance challenge
L Moreau, B Ludäscher, I Altintas, RS Barga, S Bowers, S Callahan, ...
Concurrency and computation: practice and experience 20 (5), 409-418, 2008
Passive {NFS} tracing of email and research workloads
D Ellard, J Ledlie
2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003
Unicorn: Runtime provenance-based detector for advanced persistent threats
X Han, T Pasquier, A Bates, J Mickens, M Seltzer
arXiv preprint arXiv:2001.01525, 2020
Scalable Bayesian rule lists
H Yang, C Rudin, M Seltzer
International conference on machine learning, 3921-3930, 2017
Hourglass: An infrastructure for connecting sensor networks and applications
J Shneidman, P Pietzuch, J Ledlie, M Roussopoulos, M Seltzer, M Welsh
Harvard Technical Report TR-21-04, 2004
The system can't perform the operation now. Try again later.
Articles 1–20