2012
96Priceless: the role of payments in abuse-advertised goods. Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage. ACM Conference on Computer and Communications Security 2012, 845-856. Web SearchBibTeXDownload
95Manufacturing compromise: the emergence of exploit-as-a-service. Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker. ACM Conference on Computer and Communications Security 2012, 821-832. Web SearchBibTeXDownload
94Limitations of scanned human copresence encounters for modelling proximity-borne malware. James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson. COMSNETS 2012, 1-10. Web SearchBibTeXDownload
93Weighted fair queuing with differential dropping. Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren. INFOCOM 2012, 2981-2985. Web SearchBibTeXDownload
92Taster's choice: a comparative analysis of spam feeds. Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage. Internet Measurement Conference 2012, 427-440. Web SearchBibTeXDownload
91Chronos: predictable low latency for data center applications. Rishi Kapoor, George Porter, Malveeka Tewari, Geoffrey M. Voelker, Amin Vahdat. SoCC 2012, 9. Web SearchBibTeXDownload
2011
90Cloak and dagger: dynamics of web search cloaking. David Y. Wang, Stefan Savage, Geoffrey M. Voelker. ACM Conference on Computer and Communications Security 2011, 477-490. Web SearchBibTeXDownload
89Learning to detect malicious URLs. Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. ACM TIST (2): 30 (2011). Web SearchBibTeXDownload
88DieCast: Testing Distributed Systems with an Accurate Scale Model. Diwaker Gupta, Kashi Venkatesh Vishwanath, Marvin McNett, Amin Vahdat, Ken Yocum, Alex C. Snoeren, Geoffrey M. Voelker. ACM Trans. Comput. Syst. (29): 4 (2011). Web SearchBibTeXDownload
87Topic modeling of freelance job postings to monitor web service abuse. Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul. AISec 2011, 11-20. Web SearchBibTeXDownload
86Privacy-preserving network forensics. Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker. Commun. ACM (54): 78-87 (2011). Web SearchBibTeXDownload
85Sora: high-performance software radio using general-purpose multi-core processors. Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker. Commun. ACM (54): 99-107 (2011). Web SearchBibTeXDownload
84Click Trajectories: End-to-End Analysis of the Spam Value Chain. Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyhárkzi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage. IEEE Symposium on Security and Privacy 2011, 431-446. Web SearchBibTeXDownload
83Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, Christophe Diot. INFOCOM 2011, 1179-1187. Web SearchBibTeXDownload
82An analysis of underground forums. Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Conference 2011, 71-80. Web SearchBibTeXDownload
81DefenestraTor: Throwing Out Windows in Tor. Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker. PETS 2011, 134-154. Web SearchBibTeXDownload
80Show Me the Money: Characterizing Spam-advertised Revenue. Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage. USENIX Security Symposium 2011. Web SearchBibTeXDownload
79Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker. USENIX Security Symposium 2011. Web SearchBibTeXDownload
2010
78Difference engine: harnessing memory redundancy in virtual machines. Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat. Commun. ACM (53): 85-93 (2010). Web SearchBibTeXDownload
77How to tell an airport from a home: techniques and applications. Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage. HotNets 2010, 13. Web SearchBibTeXDownload
76Usage Patterns in an Urban WiFi Network. Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren. IEEE/ACM Trans. Netw. (18): 1359-1372 (2010). Web SearchBibTeXDownload
75Beyond heuristics: learning to classify vulnerabilities and predict exploits. Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. KDD 2010, 105-114. Web SearchBibTeXDownload
74Botnet Judo: Fighting Spam with Itself. Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage. NDSS 2010. Web SearchBibTeXDownload
73Second life: a social network of humans and bots. Matteo Varvello, Geoffrey M. Voelker. NOSSDAV 2010, 9-14. Web SearchBibTeXDownload
72Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. USENIX Security Symposium 2010, 435-462. Web SearchBibTeXDownload
71Neon: system support for derived data management. Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. VEE 2010, 63-74. Web SearchBibTeXDownload
2009
70Spamalytics: an empirical analysis of spam marketing conversion. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. Commun. ACM (52): 99-107 (2009). Web SearchBibTeXDownload
69Cumulus: Filesystem Backup to the Cloud. Michael Vrable, Stefan Savage, Geoffrey M. Voelker. FAST 2009, 225-238. Web SearchBibTeXDownload
68Identifying suspicious URLs: an application of large-scale online learning. Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. ICML 2009, 86. Web SearchBibTeXDownload
67Defending Mobile Phones from Proximity Malware. Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson. INFOCOM 2009, 1503-1511. Web SearchBibTeXDownload
66Beyond blacklists: learning to detect malicious web sites from suspicious URLs. Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. KDD 2009, 1245-1254. Web SearchBibTeXDownload
65SAM: enabling practical spatial multiple access in wireless LAN. Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, Geoffrey M. Voelker. MOBICOM 2009, 49-60. Web SearchBibTeXDownload
64NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. Bhavish Agarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, Geoffrey M. Voelker. NSDI 2009, 349-364. Web SearchBibTeXDownload
63Sora: High Performance Software Radio Using General Purpose Multi-core Processors. Kun Tan, Jiansong Zhang, Ji Fang, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Haitao Wu, Wei Wang, Geoffrey M. Voelker. NSDI 2009, 75-90. Web SearchBibTeXDownload
62MPIWiz: subgroup reproducible replay of mpi applications. Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Wenguang Chen, Weimin Zheng, Zheng Zhang, Geoffrey M. Voelker. PPOPP 2009, 251-260. Web SearchBibTeXDownload
61Cumulus: Filesystem backup to the cloud. Michael Vrable, Stefan Savage, Geoffrey M. Voelker. TOS (5) (2009). Web SearchBibTeXDownload
2008
60Spamalytics: an empirical analysis of spam marketing conversion. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. ACM Conference on Computer and Communications Security 2008, 3-14. Web SearchBibTeXDownload
59Towards Automatic Inference of Task Hierarchies in Complex Systems. Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, Geoffrey M. Voelker. HotDep 2008. Web SearchBibTeXDownload
58Dual Frame Motion Compensation With Uneven Quality Assignment. Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker. IEEE Trans. Circuits Syst. Video Techn. (18): 249-256 (2008). Web SearchBibTeXDownload
57Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan. Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren. Internet Measurement Comference 2008, 85-98. Web SearchBibTeXDownload
56The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage. LEET 2008. Web SearchBibTeXDownload
55On the Spam Campaign Trail. Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. LEET 2008. Web SearchBibTeXDownload
54Difference Engine: Harnessing Memory Redundancy in Virtual Machines. Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat. OSDI 2008, 309-322. Web SearchBibTeXDownload
53Xl: an efficient network routing algorithm. Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage. SIGCOMM 2008, 15-26. Web SearchBibTeXDownload
52Automatic request categorization in internet services. Abhishek Sharma, Ranjita Bhagwan, Monojit Choudhury, Leana Golubchik, Ramesh Govindan, Geoffrey M. Voelker. SIGMETRICS Performance Evaluation Review (36): 16-25 (2008). Web SearchBibTeXDownload
51Banal: Because Format Checking Is So Trite. Geoffrey M. Voelker. WOWCS 2008. Web SearchBibTeXDownload
2007
50Slicing Spam with Occam's Razor. Chris Fleizach, Geoffrey M. Voelker, Stefan Savage. CEAS 2007. Web SearchBibTeXDownload
49Report from the 2006 SIGCOMM nomination committee. Jon Crowcroft, Craig Partridge, Geoffrey M. Voelker, Ellen W. Zegura. Computer Communication Review (37): 87 (2007). Web SearchBibTeXDownload
48Usher: An Extensible Framework for Managing Clusters of Virtual Machines. Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker. LISA 2007, 167-181. Web SearchBibTeXDownload
47Automating cross-layer diagnosis of enterprise wireless networks. Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker. SIGCOMM 2007, 25-36. Cited by 23Web SearchBibTeXDownload
2006
46Inferring Internet denial-of-service activity. David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage. ACM Trans. Comput. Syst. (24): 115-139 (2006). Web SearchBibTeXDownload
45Unexpected means of protocol inference. Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Conference 2006, 313-326. Web SearchBibTeXDownload
44Finding diversity in remote code injection exploits. Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Conference 2006, 53-64. Web SearchBibTeXDownload
43On Object Maintenance in Peer-to-Peer Systems. Kiran Tati, Geoffrey M. Voelker. IPTPS 2006. Web SearchBibTeXDownload
42Maximizing data locality in distributed systems. Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker. J. Comput. Syst. Sci. (72): 1309-1316 (2006). Web SearchBibTeXDownload
41To Infinity and Beyond: Time-Warped Network Emulation. Diwaker Gupta, Ken Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker. NSDI 2006. Web SearchBibTeXDownload
40Jigsaw: solving the puzzle of enterprise 802.11 analysis. Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. SIGCOMM 2006, 39-50. Web SearchBibTeXDownload
39Characterization of a Large Web Site Population with Implications for Content Delivery. Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao. World Wide Web (9): 505-536 (2006). Web SearchBibTeXDownload
2005
38Error Concealment for Dual Frame Video Coding with Uneven Quality. Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker. DCC 2005, 319-328. Web SearchBibTeXDownload
37Access and mobility of wireless PDA users. Marvin McNett, Geoffrey M. Voelker. Mobile Computing and Communications Review (9): 40-55 (2005). Web SearchBibTeXDownload
36Wireless Hotspots: Current Challenges and Future Directions. Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl. MONET (10): 265-274 (2005). Web SearchBibTeXDownload
35Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. SOSP 2005, 148-162. Web SearchBibTeXDownload
34Surviving Internet Catastrophes. Flavio Paiva Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, Geoffrey M. Voelker. USENIX Annual Technical Conference, General Track 2005, 45-60. Web SearchBibTeXDownload
33Self-stopping worms. Justin Ma, Geoffrey M. Voelker, Stefan Savage. WORM 2005, 12-21. Web SearchBibTeXDownload
2004
32Dual Frame Motion Compensation with Uneven Quality Assignment. Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker. Data Compression Conference 2004, 262-271. Web SearchBibTeXDownload
31Total Recall: System Support for Automated Availability Management. Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, Geoffrey M. Voelker. NSDI 2004, 337-350. Web SearchBibTeXDownload
30Network sensitivity to hot-potato disruptions. Renata Teixeira, Aman Shaikh, Timothy Griffin, Geoffrey M. Voelker. SIGCOMM 2004, 231-244. Web SearchBibTeXDownload
29Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. Yu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker. USENIX Annual Technical Conference, General Track 2004, 87-98. Web SearchBibTeXDownload
28ShortCuts: Using Soft State to Improve DHT Routing. Kiran Tati, Geoffrey M. Voelker. WCW 2004, 44-62. Web SearchBibTeXDownload
27Towards Informed Web Content Delivery. Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao. WCW 2004, 232-248. Web SearchBibTeXDownload
26Characterization of a large web site population with implications for content delivery. Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao. WWW 2004, 522-533. Web SearchBibTeXDownload
2003
25Replication Strategies for Highly Available Peer-to-Peer Storage. Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker. Future Directions in Distributed Computing 2003, 153-158. Web SearchBibTeXDownload
24The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker. HotOS 2003, 73-78. Web SearchBibTeX
23End-to-end differentiation of congestion and wireless losses. Song Cen, Pamela C. Cosman, Geoffrey M. Voelker. IEEE/ACM Trans. Netw. (11): 703-717 (2003). Web SearchBibTeXDownload
22Internet Quarantine: Requirements for Containing Self-Propagating Code. David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage. INFOCOM 2003. Web SearchBibTeXDownload
21In search of path diversity in ISP networks. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Comference 2003, 313-318. Web SearchBibTeXDownload
20Understanding Availability. Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker. IPTPS 2003, 256-267. Web SearchBibTeXDownload
19Access and mobility of wireless PDA users. Marvin McNett, Geoffrey M. Voelker. Mobile Computing and Communications Review (7): 55-57 (2003). Web SearchBibTeXDownload
18Characterizing and measuring path diversity of internet topologies. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker. SIGMETRICS 2003, 304-305. Web SearchBibTeXDownload
17Wireless hotspots: current challenges and future directions. Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl. WMASH 2003, 1-9. Web SearchBibTeXDownload
2002
16Hot-spot congestion relief and service guarantees in public-area wireless networks. Anand Balachandran, Paramvir Bahl, Geoffrey M. Voelker. Computer Communication Review (32): 59 (2002). Web SearchBibTeXDownload
15Characterizing user behavior and network performance in a public wireless LAN. Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, P. Venkat Rangan. SIGMETRICS 2002, 195-205. Web SearchBibTeXDownload
14Symbiotic jobscheduling with priorities for a simultaneous multithreading processor. Allan Snavely, Dean M. Tullsen, Geoffrey M. Voelker. SIGMETRICS 2002, 66-76. Web SearchBibTeXDownload
13Hot-Spot Congestion Relief in Public-Area Wireless Network. Anand Balachandran, Paramvir Bahl, Geoffrey M. Voelker. WMCSA 2002, 70. Web SearchBibTeXDownload
2001
12On the Placement of Web Server Replicas. Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker. INFOCOM 2001, 1587-1596. Web SearchBibTeXDownload
11Inferring Internet Denial-of-Service Activity. David Moore, Geoffrey M. Voelker, Stefan Savage. USENIX Security Symposium 2001. Web SearchBibTeXDownload
10Measurement and Analysis of a Streaming Media Workload. Maureen Chesire, Alec Wolman, Geoffrey M. Voelker, Henry M. Levy. USITS 2001, 1-12. Web SearchBibTeXDownload
1999
9Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages. Gretta Bartels, Anna R. Karlin, Darrell C. Anderson, Jeffrey S. Chase, Henry M. Levy, Geoffrey M. Voelker. SIGMETRICS 1999, 206-207. Web SearchBibTeXDownload
8On the scale and performance of cooperative Web proxy caching. Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna R. Karlin, Henry M. Levy. SOSP 1999, 16-31. Cited by 400Web SearchBibTeXDownload
7Organization-Based Analysis of Web-Object Sharing and Caching. Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Molly Brown, Tashana Landray, Denise Pinnel, Anna R. Karlin, Henry M. Levy. USENIX Symposium on Internet Technologies and Systems 1999. Cited by 120Web SearchBibTeXDownload
1998
6Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems. Geoffrey M. Voelker. Operating Systems Review (32): 3-8 (1998). Web SearchBibTeXDownload
5Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System. Geoffrey M. Voelker, Eric J. Anderson, Tracy Kimbrel, Michael J. Feeley, Jeffrey S. Chase, Anna R. Karlin, Henry M. Levy. SIGMETRICS 1998, 33-43. Web SearchBibTeXDownload
1997
4Managing Server Load in Global Memory Systems. Geoffrey M. Voelker, Hervé A. Jamrozik, Mary K. Vernon, Henry M. Levy, Edward D. Lazowska. SIGMETRICS 1997, 127-138. Web SearchBibTeXDownload
1996
3Reducing Network Latency Using Subpages in a Global Memory Environment. Hervé A. Jamrozik, Michael J. Feeley, Geoffrey M. Voelker, James Evans II, Anna R. Karlin, Henry M. Levy, Mary K. Vernon. ASPLOS 1996, 258-267. Web SearchBibTeXDownload
2The Structure and Performance of Interpreters. Theodore H. Romer, Dennis Lee, Geoffrey M. Voelker, Alec Wolman, Wayne A. Wong, Jean-Loup Baer, Brian N. Bershad, Henry M. Levy. ASPLOS 1996, 150-159. Web SearchBibTeXDownload
1994
1Latency Analysis of TCP on an ATM Network. Alec Wolman, Geoffrey M. Voelker, Chandramohan A. Thekkath. USENIX Winter 1994, 167-179. Web SearchBibTeX
from DBLP and Google Scholar

Services

Related Organizations

References
1. ^ WWW2002 CFP: Performance Area - Retrieved 2011-03-19 - details
Developed by the Database Group at the University of Wisconsin and Yahoo! Research