Publications
2023 │ 2022 │ 2021 │ 2020 │ 2019 │ 2018 │ 2017 │ 2016 │ 2015 │ 2014 │ 2013 │ 2012 │ 2011 │ 2010
2009 │ 2008 │ 2007 │ 2006 │ 2005 │ 2004 │ 2003 │ 2002 │ 2001 │ 1999 │ 1998 │ 1997 │ 1996 │ 1995 │ 1994
2023

An Empirical Analysis of Enterprise-Wide Mandatory Password Updates, Ariana Mirian, Grant Ho, Stefan Savage, and Geoffrey M. Voelker, Proceedings of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 2023.

Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender, Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Stefan Savage, Geoffrey M. Voelker, and Imani N. S. Munyaka, Proceedings of the Symposium on Useable Privacy and Security, Anaheim, CA, August 2023.

In the Line of Fire: Risks of DPI-triggered Data Collection, Ariana Mirian, Alisha Ukani, Ian Foster, Gautam Akiwate, Taner Halicioglu, Cindy Moore, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), Marina del Rey, CA, August 2023.

No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps, Enze Liu, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, and Damon McCoy, Proceedings of the 23rd Privacy Enhancing Technologies Symposium, Lausanne, Switzerland, July 2023.

Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy, Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE European Symposium on Security and Privacy, Delft, The Netherlands, July 2023, pages 373-391. (Best paper award).

2022

The Challenges of Blockchain-based Naming Systems for Malware Defenders, Audrey Randall, Wes Hardaker, Aaron Schulman, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), November 2022, pages 1-14. (Best Student Paper).

Retroactive Identification of Targeted DNS Infrastructure Hijacking, Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc Claffy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 14-32.

Where .ru? Assessing the Impact of Conflict on Russian Domain Infrastructure, Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc Claffy, Alessio Botta, Geoffrey M. Voelker, Rolan van Rijswijk-Deij, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 159-165.

Measuring UID Smuggling in the Wild, Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 230-243.

Measuring Security Practices, Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, and Stefan Savage, Communications of the Association for Computing Machinery 65(9):93-102, September 2022.

Domain Name Lifetimes: Baseline and Threats, Antonia Affinito, Raffaele Sommese, Gautam Akiwate, Stefan Savage, KC Claffy, Geoffrey M. Voelker, Alessio Botta, and Mattijs Jonker, Proceedings of the 6th Network Traffic Measurement and Analysis Conference (TMA), June 2022, pages 10-18.

FaaS Made Fast Using Snapshot-based VMs, Lixiang Ao, George Porter, and Geoffrey M. Voelker, Proceedings of the 17th ACM European Conference on Computer Systems (EuroSys'22), Rennes, France, April 2022, pages 730-746.

2021

Risky BIZness: Risks Derived from Registrar Name Management, Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 673-686. (IRTF Applied Networking Research Prize).

Who's Got Your Mail? Characterizing Mail Service Provider Usage, Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 122-136.

Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers, Audrey Randall, Enze Liu, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 390-397.

Characterization of Anycast Adoption in the DNS Authoritative Infrastructure, Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, kc Claffy, and Anna Sperotto, Proceedings of the 5th Network Traffic Measurement and Analysis Conference (TMA), September 2021, pages 1-9. (Best Paper).

Hopper: Modeling and Detecting Lateral Movement, Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, and David Wagner, Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021, pages 3093-3110.

Clairvoyance: Inferring Blocklist Use on the Internet, Vector Guo Li, Gautam Akiwate, Kirill Levchenko, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 22nd Passive and Active Measurement Conference (PAM), Brandenburg, Germany, March 2021, pages 57-75.

2020

Unresolved Issues: Prevalence, Persistence and Perils of Lame Nameservers, Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Ian Foster, Stefan Savage, Geoffrey M. Voelker, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 281-294.

Trufflehunter: Cache Sniffing Rare Domains at Large Public DNS Resolvers, Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Stefan Savage, Geoffrey M. Voelker, and Aaron Schulman, Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 50-64. (IRTF Applied Networking Research Prize).

Particle: Ephemeral Endpoints for Serverless Networking, Shelby Thomas, Lixiang Ao, Geoffrey M. Voelker, and George Porter, Proceedings of the 11th ACM Symposium on Cloud Computing (SOCC), October 2020, pages 16-29.

2019

Measuring Security Practices and How They Impact Security, Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Amsterdam, The Netherlands, October 2019, pages 36-49.

Detecting and Characterizing Lateral Phishing at Scale, Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, and David Wagner, Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 1273-1290. (Distinguished paper).

Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence, Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko, Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 851-867.

Web Feature Deprecation: A Case Study for Chrome, Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 41st ACM/IEEE International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP) 2019, MontrĂ©al, QC, Canada, May 2019, pages 302-311.

Hack for Hire: Exploring the Emerging Market for Account Hijacking, Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Kurt Thomas, Proceedings of the Web Conference (WWW), San Francisco, CA, May 2019, pages 1279-1289.

2018

An Empirical Analysis of the Commercial VPN Ecosystem, Mohammad Taha Khan, Joe DeBlasio, Chris Kanich, Geoffrey M. Voelker, Alex C. Snoeren, and Narseo Vallina-Rodriguez, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 443-456.

Following Their Footsteps: Characterizing Account Automation Abuse and Defenses, Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, and Nektarios Leontiadis, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 43-55.

Sprocket: A Serverless Video Processing Framework, Lixiang Ao, Liz Izhikevich, Geoffrey M. Voelker, and George Porter, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Carlsbad, CA, October 2018, pages 263-274.

Dark Packets and the end of Network Scaling, Shelby Thomas, Rob McGuinness, Geoffrey M. Voelker, and George Porter, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Ithaca, New York, July 2018, pages 1-14.

CacheCloud: Towards Speed-of-Light Datacenter Communication, Shelby Thomas, Geoffrey M. Voelker, and George Porter, Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud-X), Boston, MA, July 2018.

2017

Tripwire: Inferring Internet Site Compromise, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 341-354.

Exploring the Dynamics of Search Advertiser Fraud, Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 157-170.

Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser, Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, and Nektarios Leontiadis, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017.

2016

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Communications of the Association for Computing Machinery 59(4):86-93, April 2016.

2015

Scheduling Techniques for Hybrid Circuit/Packet Networks, He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, and Alex C. Snoeren, Proceedings of ACM CoNEXT, Heidelberg, Germany, December 2015.

From .academy to .zone: An Analysis of the New TLD Land Rush, Tristan Halvorson, Matthew F. Der, Ian Foster, Stefan Savage, Lawrence K. Saul, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Who is .com? Learning to Parse WHOIS Records, Suqi Liu, Ian Foster, Stefan Savage, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Affiliate Crookies: Characterizing Affiliate Marketing Abuse, Neha Chachra, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Enfold: Downclocking OFDM in WiFi, Feng Lu, Patrick Ling, Geoffrey M. Voelker, and Alex C. Snoeren, GetMobile: Mobile Computing and Communications 19(2):10-13, April 2015.

Managing Contention with Medley, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, IEEE Transcations on Mobile Computing 14(3), March 2015.

CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks, Feng Lu, Hao Du, Ankur Jain, Geoffrey M. Voelker, Alex C. Snoeren, and Andreas Terzis, Proceedings of the 16th ACM International Workshop on Mobile Computing Systems and Applications (HotMobile), Sante Fe, NM, February 2015.

2014

Characterizing Large-Scale Click Fraud in ZeroAccess, Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns, David Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014, pages 359-372.

Enfold: Downclocking OFDM in WiFi, Feng Lu, Patrick Ling, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise, Matthew Der, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, New York, NY, August 2014.

Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014, pages 4:1:1-4:1:13.

XXXtortion? Inferring Registration Intent in the .XXX TLD, Tristan Halvorson, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International World Wide Web Conference (WWW)`, Seoul, Korea, April 2014, pages 901-912.

Circuit Switching Under the Radar with REACToR, He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, and George Porter, Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014, pages 1-15.

DSpin: Detecting Automatically Spun Content on the Web, Qing Zhang, David Wang, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014, pages 4:1:1-4:1:16.

2013

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, USENIX ;login: 38(6):10-14, December 2013.

Bullet Trains: A Study of NIC Burst Behavior at Microsecond Timescales, Rishi Kapoor, Alex C. Snoeren, Geoffrey M. Voelker, and George Porter, Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013, pages 133-138.

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013, pages 127-140.

A Variational Approximation for Topic Modeling of Hierarchical Corpora, Do-kyum Kim, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the International Conference on Machine Learning, Atlanta, GA, June 2013, pages 2:55-2:63.

SloMo: Downclocking WiFi Communication, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 245-258.

eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones, Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, and Geoffrey M. Voelker, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 57-70.

Juice: A Longitudinal Study of an SEO Campaign, David Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2013, pages 7:4:1-7:4:17.

2012

Taster's Choice: A Comparative Analysis of Spam Feeds, Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012, pages 427-440.

Chronos: Predictable Low Latency for Data Center Applications, Rishi Kapoor, George Porter, Malveeka Tewari, Geoffrey M. Voelker, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012, pages 9:1-9:14.

Priceless: The Role of Payments in Abuse-advertised Goods, Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 845-856.

Manufacturing Compromise: The Emergence of Exploit-as-a-Service, Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 821-832.

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs, Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko, Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, August 2012.

Weighted Fair Queuing with Differential Dropping, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the IEEE Infocom Conference, Orlando, FL, April 2012. (Mini-conference).

BlueSky: A Cloud-Backed File System for the Enterprise, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012, pages 19:1-19:14.

Limitations of scanned human copresence encounters for modelling proximity-borne malware, James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, and Per Johansson, Proceedings of the International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, January 2012, pages F1.1.4:1--F1.1.5:10.

2011

An Analysis of Underground Forums, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011, pages 71-80.

Topic Modeling of Freelance Job Postings to Monitor Web Service Abuse, Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011, pages 11-20.

Cloak and Dagger: Dynamics of Web Search Cloaking, David Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011, pages 477-490.

No Plan Survives Contact: Experience with Cybercrime Measurement, Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011, pages 2:1-2:8.

Show Me the Money: Characterizing Spam-advertised Revenue, Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 219-234.

Dirty Jobs: The Role of Freelance Labor in Web Service Abuse, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 203-218.

DefenestraTor: Throwing out Windows in Tor, Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011, pages 134-154.

DieCast: Testing Distributed Systems with an Accurate Scale Model, Diwaker Gupta, Kashi V. Vishwanath, Marvin McNett, Amin Vahdat, Ken Yocum, Alex C. Snoeren, and Geoffrey M. Voelker, ACM Transactions on Computer Systems 29(2):4:1-4:48, May 2011.

Privacy-preserving Network Forensics, Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, and Geoffrey M. Voelker, Communications of the Association for Computing Machinery 54(5):78-87, May 2011.

Click Trajectories: End-to-End Analysis of the Spam Value Chain, Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2011, pages 431-446. (Award paper).

Learning to Detect Malicious URLs, Justin Ma, Lawrence K Saul, Stefan Savage, and Geoffrey M Voelker, ACM Transactions on Intelligent Systems and Technology (TIST) 2(3):30:1-30:24, April 2011.

Dissemination in Opportunistic Mobile Ad-hoc Networks: the Power of the Crowd, Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, and Christophe Diot, Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011, pages 1179-1187.

On the Effects of Registrar-level Intervention, He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011, pages 1-8.

Got Traffic? An Evaluation of Click Traffic Providers, Qing Zhang, Thomas Ristenpart, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the WICOM/AIRWeb Workshop on Web Quality (WebQuality), Hyderabad, India, March 2011, pages 19-26.

Sora: High-performance Software Radio using General-purpose Multi-core Processors, Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, and Geoffrey M. Voelker, Communications of the Association for Computing Machinery 54(1):99-107, January 2011.

2010

How to Tell an Airport from a Home: Techniques and Applications, Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martin Abadi, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, CA, October 2010, pages 13:1-13:6.

Difference Engine: Harnessing Memory Redundancy in Virtual Machines, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Communications of the Association for Computing Machinery 53(10):85-93, October 2010.

Usage Patterns in an Urban WiFi Network, Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, and Alex C. Snoeren, IEEE/ACM Transactions on Networking 18(5):1359-1372, October 2010.

Re: CAPTCHAs -- Understanding CAPTCHA-Solving from an Economic Context, Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 19th USENIX Security Symposium, Washington, D.C., August 2010, pages 435-452.

Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits, Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Washington D.C., July 2010, pages 105-114.

SecondLife: a Social Network of Humans and Bots, Matteo Varvello and Geoffrey M. Voelker, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Amsterdam, The Netherlands, June 2010, pages 9-14.

Measuring Online Service Availability Using Twitter, Marti Motoyama, Brendan Meeder, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of ACM Workshop on Online Social Networks (WOSN), Boston, MA, June 2010, pages 13:1-13:9.

Neon: System Support for Derived Data Management, Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Pittsburgh, PA, March 2010, pages 63-74.

Botnet Judo: Fighting Spam with Itself, Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.

2009

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, ACM Transaction on Storage 5(4):1-28, December 2009.

SAM: Enabling Practical Spatial Multiple Access in Wireless LAN, Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Beijing, China, September 2009.

Spamalytics: An Empirical Analysis of Spam Marketing Conversion, Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Communications of the Association for Computing Machinery 52(9):99-107, September 2009.

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, USENIX ;login: 34(4):7-13, August 2009.

Identifying Suspicious URLs: An Application of Large-Scale Online Learning, Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Conference on Machine Learning, Montreal, Canada, June 2009, pages 681-688.

Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs, Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Paris, France, June 2009, pages 1245-1254.

Defending Mobile Phones from Proximity Malware, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, and Per Johansson, Proceedings of the IEEE Infocom Conference, Rio de Janeiro, Brazil, April 2009, pages 1503-1511.

Spamcraft: An Inside Look at Spam Campaign Orchestration, Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, April 2009, pages 4:1-4:9.

Difference Engine, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, USENIX ;login: 34(2):24-31, April 2009.

NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge, Bhavish Aggarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, and Geoffrey M. Voelker, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 349-364.

Sora: High Performance Software Radio Using General Purpose Multi-core Processors, Kun Tan, Jiansong Zhang, Haitao Wu, Fang Ji, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Wei Wang, and Geoffrey M. Voelker, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 75-90. (Award paper and Test of Time award).

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 225-238.

MPIWiz: Subgroup Reproducible Replay of MPI Applications, Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Wenguang Chen, Weimin Zheng, Zheng Zhang, and Geoffrey M. Voelker, Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), Raleigh, North Carolina, USA, February 2009, pages 251-260.

2008

Difference Engine: Harnessing Memory Redundancy in Virtual Machines, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, December 2008, pages 309-322. (Award paper).

Towards Automatic Inference of Task Hierarchies in Complex Systems, Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, and Geoffrey M. Voelker, Fourth Workshop on Hot Topics in System Dependability (HotDep), San Diego, CA, USA, December 2008, pages 7:1-7:6.

Spamalytics: an Empirical Analysis of Spam Marketing Conversion, Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008, pages 3-14.

Analysis of a Mixed-Use Urban WiFi Network: When Metropolitan becomes Neapolitan, Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), Vouliagmeni, Greece, October 2008, pages 85-98.

XL: An Efficient Network Routing Algorithm, Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.

Storm: When Researchers Collide, Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, and Kirill Levchenko, USENIX ;login: 33(4):6-13, August 2008.

Automatic Request Categorization in Internet Services, Abhishek Sharma, Ranjita Bhagwan, Monojit Choudhury, Leana Golubchik, Ramesh Govindan, and Geoffrey M. Voelker, Proceedings of the First Workshop on Hot Topics in Measurement and Modeling of Computer Systems (HotMetrics), Annapolis, MD, June 2008.

On the Spam Campaign Trail, Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.

The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.

Banal: Because Format Checking Is So Trite, Geoffrey M. Voelker, Proceedings of USENIX Workshop on Organizing Workshops, Conferences and Symposia for Computer Systems (WOWCS), San Francisco, CA, April 2008.

Dual Frame Motion Compensation with Uneven Quality Assignment, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, IEEE Transactions on Circuits and Systems for Video Technology 18(2):249-256, February 2008.

2007

Can You Infect Me Now? Malware Propagation in Mobile Phone Networks, Chris Fleizach, Michael Liljenstam, Per Johansson, Geoffrey M. Voelker, and András Méhes, Proceedings of the ACM Workshop on Recurring Malcode (WORM), Washington D.C., November 2007.

Usher: An Extensible Framework for Managing Clusters of Virtual Machines, Marvin McNett, Diwaker Gupta, Amin Vahdat, and Geoffrey M. Voelker, Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.

Slicing Spam with Occam's Razor, Chris Fleizach, Geoffrey M. Voelker, and Stefan Savage, Proceedings of Conference on Email and Anti-Spam (CEAS), Mountain View, CA, August 2007.

Automating Cross-Layer Diagnosis of Enterprise Wireless Networks, Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.

Spamscatter: Characterizing Internet Scam Hosting Infrastructure, David S. Anderson, Chris Fleizach, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.

2006

Characterization of a Large Web Site Population with Implications for Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, World Wide Web Journal 9(4):505-536, December 2006.

Maximizing Data Locality in Distributed Systems, Fan Chung, Ronald Graham, Ranjita Bhagwan, Geoffrey M. Voelker, and Stefan Savage, Journal of Computer and System Sciences 72(8), December 2006.

Unexpected Means of Identifying Protocols, Justin Ma, Kirill Levchenko, Cristian Kriebich, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.

Finding Diversity in Remote Code Injection Exploits, Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.

Source and channel coding trade-offs for a pulsed quality video encoder, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the 40th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, October 2006.

Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis, Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006, pages 39-50.

Inferring Internet Denial-of-Service Activity, David Moore, Colleen Shannon, Doug Brown, Geoffrey M. Voelker, and Stefan Savage, ACM Transactions on Computer Systems 24(2):115-139, May 2006.

To Infinity and Beyond: Time-Warped Network Emulation, Diwaker Gupta, Kenneth Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, and Geoffrey M. Voelker, Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006, pages 87-100.

On Object Maintenance in Peer-to-Peer Systems, Kiran Tati and Geoffrey M. Voelker, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Santa Barbara, CA, February 2006.

2005

Self-stopping Worms, Justin Ma, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington D.C., November 2005, pages 12-21.

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik VandeKieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005, pages 148-162.

Access and Mobility of Wireless PDA Users, Marvin McNett and Geoffrey M. Voelker, Mobile Computing and Communications Review (MC2R) 9(2):40-55, April 2005.

Surviving Internet Catastrophes, Flavio Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, and Geoffrey M. Voelker, Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005.

Error Concealment for Dual Frame Video Coding with Uneven Quality, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2005.

Wireless Hotspots: Current Challenges and Future Directions, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Mobile Networks and Applications 10(3):265-274, January 2005.

2004

ShortCuts: Using Soft State To Improve DHT Routing, Kiran Tati and Geoffrey M. Voelker, Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004.

Towards Informed Web Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004. (Best student paper).

Network Sensitivity to Hot-Potato Disruptions, Renata Teixeira, Aman Shaikh, Tim Griffin, and Geoffrey M. Voelker, Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.

Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying, Yu-Chung Cheng, Urs Hoelzle, Neal Cardwell, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004, pages 87-98.

Characterization of a Large Web Site Population with Implications for Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.

TotalRecall: System Support for Automated Availability Management, Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004, pages 337-350.

Dual Frame Motion Compensation with Uneven Quality Assignment, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2004.

2003

Dual frame motion compensation for a rate switching network, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, November 2003.

In Search of Path Diversity in ISP Networks, Renata Teixeira, Keith Marzullo, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003, pages 313-318.

End-to-End differentiation of congestion and wireless losses, Song Cen, Pamela C. Cosman, and Geoffrey M. Voelker, IEEE/ACM Transactions on Networking 11(5):703-717, October 2003.

Wireless Hotspots: Current Challenges and Future Directions, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), San Diego, CA, September 2003.

The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe, Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS-IX), Lihue, HI, May 2003, pages 73-78.

Internet Quarantine: Requirements for Containing Self-Propagating Code, David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003, pages 1901-1910.

Understanding Availability, Ranjita Bhagwan, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Berkeley, CA, February 2003, pages 256-267.

2002

Whole Page Performance, Leeann Bent and Geoffrey M. Voelker, Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.

Characterizing User Behavior and Network Performance in a Public Wireless LAN, Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, and Venkat Rangan, Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.

Symbiotic Jobscheduling with Priorities for a Simultaneous Multithreading Processor, Allan Snavely, Dean Tullsen, and Geoffrey M. Voelker, Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.

Hot-Spot Congestion Relief in Public-Area Wireless Networks, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Callicoon, NY, June 2002.

Replication Strategies for Highly Available Peer-to-Peer Storage, Ranjita Bhagwan, David Moore, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.

PAWNs: Satisfying the Need for Ubiquitous Secure Connectivity and Location Services, Paramvir Bahl, Wilf Russell, Yi-Min Wang, Anand Balachandran, Geoffrey M. Voelker, and Allen Miu, IEEE Wireless Communications 9(1):40-48, February 2002.

End-to-end Differentiation of Congestion and Wireless Losses, Song Cen, Pamela Cosman, and Geoffrey M. Voelker, Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2002.

2001

Inferring Internet Denial of Service Activity, David Moore, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001, pages 9-22. (Best paper and Test of Time Awards).

The Medusa Proxy: A Tool for Exploring User-Perceived Web Performance, Mimika Koletsou and Geoffrey M. Voelker, Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.

On the Placement of Web Server Replicas, Lili Qiu, Venkata N. Padmanabhan, and Geoffrey M. Voelker, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Measurement and Analysis of a Streaming Media Workload, Maureen Chesire, Alec Wolman, Geoffrey M. Voelker, and Henry M. Levy, Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001. (Best paper).

1999

On the Scale and Performance of Cooperative Web Proxy Caching, Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin, and Henry M. Levy, Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, December 1999.

Organization-Based Analysis of Web-Object Sharing and Caching, Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Molly Brown, Tashana Landray, Denise Pinnel, Anna Karlin, and Henry Levy, Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.

Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages, Gretta Bartels, Anna Karlin, Henry M. Levy, Geoffrey M. Voelker, Darrell Anderson, and Jeffrey S. Chase, Proceedings of the ACM SIGMETRICS Conference, Atlanta, GA, May 1999, pages 206-207.

Detour: a Case for Informed Internet Routing and Transport, Stefan Savage, Tom Anderson, Amit Aggarwal, David Becker, Neal Cardwell, Andy Collins, Eric Hoffman, John Snell, Amin Vahdat, Geoffrey M. Voelker, and John Zahorjan, IEEE Micro 19(1):50-59, January 1999.

1998

Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System, Geoffrey M. Voelker, Eric Anderson, Tracy Kimbrel, Michael J. Feeley, Jeffrey Chase, Anna Karlin, and Henry M. Levy, Proceedings of the ACM SIGMETRICS Conference, Madison, WI, June 1998.

1997

Managing Server Load in Global Memory Systems, Geoffrey M. Voelker, Hervé A. Jamrozik, Mary K. Vernon, Henry M. Levy, and Edward D. Lazowska, Proceedings of the ACM SIGMETRICS Conference, Seattle, WA, June 1997.

Instrumentation and Optimization of Win32/Intel Executables, Ted Romer, Geoff Voelker, Dennis Lee, Alec Wolman, Wayne Wong, Hank Levy, Brian N. Bershad, and Brad Chen, Proceedings of the First USENIX Windows NT Workshop, Seattle, WA, USA, August 1997.

1996

Reducing Network Latency Using Subpages in a Global Memory Environment, Hervé A. Jamrozik, Michael J. Feeley, Geoffrey M. Voelker, James Evans II, Anna R. Karlin, Henry M. Levy, and Mary K. Vernon, Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-VII), Cambridge, MA, October 1996.

The Structure and Performance of Interpreters, Theodore H. Romer, Dennis Lee, Geoffrey M. Voelker, Alec Wolman, Wayne A. Wong, Jean-Loup Baer, Brian N. Bershad, and Henry M. Levy, Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-VII), Cambridge, MA, October 1996.

1995

Mobisaic: An Information System for a Mobile Wireless Computing Environment, Geoffrey M. Voelker, Master's thesis, Department of Computer Science, University of Washington, June 1995.

1994

Mobisaic: An Information System for a Mobile Wireless Computing Environment, Geoffrey M. Voelker and Brian N. Bershad, Proceedings of the First IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December 1994.

Latency Analysis of TCP on an ATM network, Alec Wolman, Geoffrey M. Voelker, and Chandramohan A. Thekkath, Proceedings of the USENIX Annual Technical Conference, San Francisco, CA, January 1994.