Provenance-aware storage systems. KK Muniswamy-Reddy, DA Holland, U Braun, MI Seltzer Usenix annual technical conference, general track, 43-56, 2006 | 779 | 2006 |
Berkeley DB. MA Olson, K Bostic, MI Seltzer USENIX Annual Technical Conference, FREENIX Track, 183-191, 1999 | 642 | 1999 |
Network-aware operator placement for stream-processing systems P Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, M Seltzer 22nd International Conference on Data Engineering (ICDE'06), 49-49, 2006 | 621 | 2006 |
Arrakis: The operating system is the control plane S Peter, J Li, I Zhang, DRK Ports, D Woos, A Krishnamurthy, T Anderson, ... ACM Transactions on Computer Systems (TOCS) 33 (4), 1-30, 2015 | 586 | 2015 |
World Wide Web Cache Consistency. J Gwertzman, MI Seltzer USENIX annual technical conference, 141-152, 1996 | 539 | 1996 |
An Implementation of a Log-Structured File System for UNIX. MI Seltzer, K Bostic, MK McKusick, C Staelin USENIX Winter, 307-326, 1993 | 534 | 1993 |
The case for geographical push-caching JS Gwertzman, M Seltzer Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 51-55, 1995 | 531 | 1995 |
Dealing with disaster: Surviving misbehaved kernel extensions MI Seltzer, Y Endo, C Small, KA Smith SIGOPS Operating Systems Review 30 (213-228), 10.1145, 1996 | 468 | 1996 |
Disk scheduling revisited M Seltzer, P Chen, J Ousterhout Proceedings of the winter 1990 USENIX technical conference, 313-323, 1990 | 463 | 1990 |
Learning certifiably optimal rule lists for categorical data E Angelino, N Larus-Stone, D Alabi, M Seltzer, C Rudin Journal of Machine Learning Research 18 (234), 1-78, 2018 | 434 | 2018 |
Journaling versus soft updates: Asynchronous meta-data protection in file systems MI Seltzer, GR Ganger, MK McKusic, KA Smith, CAN Soules, CA Stein 2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000 | 427 | 2000 |
Non-volatile memory for fast, reliable file systems M Baker, S Asami, E Deprit, J Ouseterhout, M Seltzer ACM SIGPLAN Notices 27 (9), 10-22, 1992 | 369 | 1992 |
Network Coordinates in the Wild. J Ledlie, P Gardner, MI Seltzer NSDI 7, 299-311, 2007 | 364 | 2007 |
Improving performance isolation on chip multiprocessors via an operating system scheduler A Fedorova, M Seltzer, MD Smith 16th International Conference on Parallel Architecture and Compilation …, 2007 | 334 | 2007 |
Unicorn: Runtime provenance-based detector for advanced persistent threats X Han, T Pasquier, A Bates, J Mickens, M Seltzer arXiv preprint arXiv:2001.01525, 2020 | 311 | 2020 |
Provenance as first class cloud data KK Muniswamy-Reddy, M Seltzer ACM SIGOPS Operating Systems Review 43 (4), 11-16, 2010 | 309 | 2010 |
The first provenance challenge L Moreau, B Ludäscher, I Altintas, RS Barga, S Bowers, S Callahan, ... Concurrency and computation: practice and experience 20 (5), 409-418, 2008 | 306 | 2008 |
Scalable Bayesian rule lists H Yang, C Rudin, M Seltzer International conference on machine learning, 3921-3930, 2017 | 255 | 2017 |
Passive {NFS} tracing of email and research workloads D Ellard, J Ledlie 2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003 | 254 | 2003 |
Optimal sparse decision trees X Hu, C Rudin, M Seltzer Advances in Neural Information Processing Systems 32, 2019 | 245 | 2019 |