Margo Seltzer
Margo Seltzer
Verified email at - Homepage
Cited by
Cited by
Provenance-aware storage systems.
KK Muniswamy-Reddy, DA Holland, U Braun, MI Seltzer
Usenix annual technical conference, general track, 43-56, 2006
Berkeley DB.
MA Olson, K Bostic, MI Seltzer
USENIX Annual Technical Conference, FREENIX Track, 183-191, 1999
Network-Aware Operator Placement for Stream-Processing Systems.
PR Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, ...
ICDE 6, 49, 2006
World Wide Web Cache Consistency.
J Gwertzman, MI Seltzer
USENIX annual technical conference 141, 152, 1996
The case for geographical push-caching
JS Gwertzman, M Seltzer
Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 51-55, 1995
An Implementation of a Log-Structured File System for UNIX.
MI Seltzer, K Bostic, MK McKusick, C Staelin
USENIX Winter, 307-326, 1993
Dealing with disaster: Surviving misbehaved kernel extensions
MI Seltzer, Y Endo, C Small, KA Smith
SIGOPS Operating Systems Review 30 (213-228), 10.1145, 1996
Disk scheduling revisited
M Seltzer, P Chen, J Ousterhout
Proceedings of the winter 1990 USENIX technical conference, 313-323, 1990
Journaling versus soft updates: Asynchronous meta-data protection in file systems
MI Seltzer, GR Ganger, MK McKusic, KA Smith, CAN Soules, CA Stein
2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000
Non-volatile memory for fast, reliable file systems
M Baker, S Asami, E Deprit, J Ouseterhout, M Seltzer
ACM SIGPLAN Notices 27 (9), 10-22, 1992
Network Coordinates in the Wild.
J Ledlie, P Gardner, MI Seltzer
NSDI 7, 299-311, 2007
Improving performance isolation on chip multiprocessors via an operating system scheduler
A Fedorova, M Seltzer, MD Smith
16th International Conference on Parallel Architecture and Compilation …, 2007
The first provenance challenge
L Moreau, B Ludäscher, I Altintas, RS Barga, S Bowers, S Callahan, ...
Concurrency and computation: practice and experience 20 (5), 409-418, 2008
Learning certifiably optimal rule lists for categorical data
E Angelino, N Larus-Stone, D Alabi, M Seltzer, C Rudin
arXiv preprint arXiv:1704.01701, 2017
Passive {NFS} Tracing of Email and Research Workloads
D Ellard, J Ledlie
2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003
Provenance for the Cloud.
KK Muniswamy-Reddy, P Macko, MI Seltzer
FAST 10, 15-14, 2010
Hourglass: An infrastructure for connecting sensor networks and applications
J Shneidman, P Pietzuch, J Ledlie, M Roussopoulos, M Seltzer, M Welsh
Harvard Technical Report TR-21-04, 2004
File System Logging versus Clustering: A Performance Comparison.
MI Seltzer, KA Smith, H Balakrishnan, J Chang, S McMains, ...
USENIX, 249-264, 1995
Layering in provenance systems
KK Muniswamy-Reddy, UJ Braun, DA Holland, P Macko, D Maclean, ...
Proceedings of the 2009 USENIX Annual Technical Conference (USENIX'09), 2009
Securing provenance
UJ Braun, A Shinnar, MI Seltzer
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec'08), 2008
The system can't perform the operation now. Try again later.
Articles 1–20