Follow
Margo Seltzer
Margo Seltzer
Verified email at cs.ubc.ca - Homepage
Title
Cited by
Cited by
Year
Provenance-aware storage systems.
KK Muniswamy-Reddy, DA Holland, U Braun, MI Seltzer
Usenix annual technical conference, general track, 43-56, 2006
7332006
Berkeley DB.
MA Olson, K Bostic, MI Seltzer
USENIX Annual Technical Conference, FREENIX Track, 183-191, 1999
5981999
Network-Aware Operator Placement for Stream-Processing Systems.
PR Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, ...
ICDE 6, 49, 2006
5862006
World Wide Web Cache Consistency.
J Gwertzman, MI Seltzer
USENIX annual technical conference 141, 152, 1996
5271996
The case for geographical push-caching
JS Gwertzman, M Seltzer
Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 51-55, 1995
5141995
An Implementation of a Log-Structured File System for UNIX.
MI Seltzer, K Bostic, MK McKusick, C Staelin
USENIX Winter, 307-326, 1993
5011993
Dealing with disaster: Surviving misbehaved kernel extensions
MI Seltzer, Y Endo, C Small, KA Smith
SIGOPS Operating Systems Review 30 (213-228), 10.1145, 1996
4551996
Disk scheduling revisited
M Seltzer, P Chen, J Ousterhout
Proceedings of the winter 1990 USENIX technical conference, 313-323, 1990
4501990
Journaling versus soft updates: Asynchronous meta-data protection in file systems
MI Seltzer, GR Ganger, MK McKusic, KA Smith, CAN Soules, CA Stein
2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000
4302000
Network Coordinates in the Wild.
J Ledlie, P Gardner, MI Seltzer
NSDI 7, 299-311, 2007
3552007
Non-volatile memory for fast, reliable file systems
M Baker, S Asami, E Deprit, J Ouseterhout, M Seltzer
ACM SIGPLAN Notices 27 (9), 10-22, 1992
3551992
Improving performance isolation on chip multiprocessors via an operating system scheduler
A Fedorova, M Seltzer, MD Smith
16th International Conference on Parallel Architecture and Compilation …, 2007
3262007
The first provenance challenge
L Moreau, B Ludäscher, I Altintas, RS Barga, S Bowers, S Callahan, ...
Concurrency and computation: practice and experience 20 (5), 409-418, 2008
2882008
Passive {NFS} Tracing of Email and Research Workloads
D Ellard, J Ledlie
2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003
2532003
Provenance for the Cloud.
KK Muniswamy-Reddy, P Macko, MI Seltzer
FAST 10, 15-14, 2010
2442010
Learning certifiably optimal rule lists for categorical data
E Angelino, N Larus-Stone, D Alabi, M Seltzer, C Rudin
arXiv preprint arXiv:1704.01701, 2017
2382017
Hourglass: An infrastructure for connecting sensor networks and applications
J Shneidman, P Pietzuch, J Ledlie, M Roussopoulos, M Seltzer, M Welsh
Harvard Technical Report TR-21-04, 2004
2332004
File System Logging versus Clustering: A Performance Comparison.
MI Seltzer, KA Smith, H Balakrishnan, J Chang, S McMains, ...
USENIX, 249-264, 1995
2131995
Layering in provenance systems
KK Muniswamy-Reddy, UJ Braun, DA Holland, P Macko, D Maclean, ...
Proceedings of the 2009 USENIX Annual Technical Conference (USENIX'09), 2009
1982009
Securing provenance
UJ Braun, A Shinnar, MI Seltzer
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec'08), 2008
1962008
The system can't perform the operation now. Try again later.
Articles 1–20