George Varghese
#113,397
Most Influential Person Now
American computer scientist
George Varghese's AcademicInfluence.com Rankings
George Varghesecomputer-science Degrees
Computer Science
#4759
World Rank
#5024
Historical Rank
#1494
USA Rank
Database
#2504
World Rank
#2625
Historical Rank
#537
USA Rank
Download Badge
Computer Science
George Varghese's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is George Varghese Influential?
(Suggest an Edit or Addition)According to Wikipedia, George Varghese is a Principal Researcher at Microsoft Research. Before joining MSR's lab in Silicon Valley in 2013, he was a Professor of Computer Science at the University of California San Diego, where he led the Internet Algorithms Lab and also worked with the Center for Network Systems and the Center for Internet Epidemiology. He is the author of the textbook Network Algorithmics, published by Morgan Kaufmann in 2004.
George Varghese's Published Works
Published Works
- P4: programming protocol-independent packet processors (2013) (1965)
- Efficient fair queueing using deficit round-robin (1996) (1159)
- Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN (2013) (918)
- Efficient fair queueing using deficit round robin (1995) (916)
- Header Space Analysis: Static Checking for Networks (2012) (754)
- Scalable high speed IP routing lookups (1997) (739)
- CONGA: distributed congestion-aware load balancing for datacenters (2015) (634)
- New directions in traffic measurement and accounting (2002) (631)
- Automated Worm Fingerprinting (2004) (608)
- Packet classification using tuple space search (1999) (578)
- Packet classification using multidimensional cutting (2003) (553)
- Fast and scalable layer four switching (1998) (536)
- New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice (2003) (527)
- Real Time Network Policy Checking Using Header Space Analysis (2013) (500)
- Fast address lookups using controlled prefix expansion (1999) (465)
- Deterministic memory-efficient string matching algorithms for intrusion detection (2004) (458)
- Efficient Fair Queuing Using Deficit Round - (1997) (415)
- Building a better NetFlow (2004) (414)
- MobiClique: middleware for mobile social networking (2009) (412)
- New directions in traffic measurement and accounting (2001) (386)
- IP lookups using multiway and multicolumn search (1998) (378)
- Scalable packet classification (2005) (358)
- An Improved Construction for Counting Bloom Filters (2006) (353)
- Bitmap Algorithms for Counting Active Flows on High-Speed Links (2003) (352)
- Faster IP lookups using controlled prefix expansion (1998) (329)
- Automatically inferring patterns of resource consumption in network traffic (2003) (328)
- Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications (2001) (318)
- Route flap damping exacerbates internet routing convergence (2002) (292)
- Packet classification for core routers: is there an alternative to CAMs? (2003) (286)
- Tree bitmap: hardware/software IP lookups with incremental updates (2004) (282)
- Automatic Test Packet Generation (2012) (274)
- Packet Transactions: High-Level Programming for Line-Rate Switches (2015) (266)
- Difference engine (2010) (236)
- An error control scheme for large-scale multicast applications (1998) (224)
- Network monitoring using traffic dispersion graphs (tdgs) (2007) (206)
- EndRE: An End-System Redundancy Elimination Service for Enterprises (2010) (202)
- Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia (2007) (198)
- Global Analytics in the Face of Bandwidth and Regulatory Constraints (2015) (194)
- Beyond bloom filters: from approximate membership checks to approximate state machines (2006) (191)
- Difference engine: harnessing memory redundancy in virtual machines (2008) (189)
- A reliable and scalable striping protocol (1996) (179)
- Distributed program checking: a paradigm for building self-stabilizing distributed protocols (1991) (177)
- Checking Beliefs in Dynamic Networks (2015) (169)
- Network Algorithmics-An Interdisciplinary Approach to Designing Fast Networked Devices (2004) (169)
- Compiling Packet Programs to Reconfigurable Switches (2015) (167)
- Programming Protocol-Independent Packet Processors (2013) (160)
- Fast Content-Based Packet Handling for Intrusion Detection (2001) (158)
- Leap forward virtual clock: a new fair queuing scheme with guaranteed delays and throughput fairness (1997) (158)
- Time optimal self-stabilizing synchronization (1993) (149)
- On Scalable Attack Detection in the Network (2004) (144)
- The EarlyBird System for Real-time Detection of Unknown Worms (2005) (142)
- What's the difference?: efficient set reconciliation without prior context (2011) (142)
- A lower bound for multicast key distribution (2001) (130)
- Fast and scalable conflict detection for packet classifiers (2002) (128)
- Multiway range trees: scalable IP lookup with fast updates (2001) (121)
- Hashed and hierarchical timing wheels: data structures for the efficient implementation of a timer facility (1987) (120)
- Self-stabilization by counter flushing (1994) (117)
- Compressing Genomic Sequence Fragments Using SlimGene (2010) (114)
- New directions in traffic measurement and accounting (2002) (111)
- Efficient implementation of a statistics counter architecture (2003) (109)
- Design principles for packet parsers (2013) (108)
- Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow (2004) (102)
- WANalytics: Geo-Distributed Analytics for a Data Intensive World (2015) (99)
- I seek you: searching and matching individuals in social networks (2009) (99)
- CONGA (2014) (98)
- Reliable and efficient hop-by-hop flow control (1994) (96)
- Self-Stabilization by Local Checking and Global Reset (Extended Abstract) (1994) (95)
- Efficient Network Reachability Analysis Using a Succinct Control Plane Representation (2016) (93)
- Scalable packet classification (2001) (93)
- WANalytics: Analytics for a Geo-Distributed Data-Intensive World (2015) (92)
- Netshare and stochastic netshare: predictable bandwidth allocation for data centers (2012) (90)
- Using Genome Query Language to uncover genetic variation (2014) (83)
- Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator (2009) (82)
- Scalable high-speed prefix matching (2001) (82)
- Fast packet classification for two-dimensional conflict-free filters (2001) (81)
- Hash-Based Techniques for High-Speed Packet Processing (2010) (76)
- Fast firewall implementations for software and hardware-based routers (2001) (76)
- A pipelined memory architecture for high throughput network processors (2003) (75)
- Scaling network verification using symmetry and surgery (2016) (73)
- Network algorithmics (2004) (73)
- RadioJockey: mining program execution to optimize cellular radio usage (2012) (72)
- Graption: A graph-based P2P traffic classification framework for the internet backbone (2011) (71)
- Graph-Based P2P Traffic Classification at the Internet Backbone (2009) (67)
- Trading packet headers for packet processing (1995) (66)
- High Speed Networks Need Proactive Congestion Control (2015) (66)
- On scalable attack detection in the network (2007) (66)
- Memory-efficient state lookups with fast updates (2000) (63)
- Applying Fast String Matching to Intrusion Detection (2001) (61)
- Eecient Fair Queuing Using Deecit round Robin (1995) (59)
- Fast firewall implementations for software-based and hardware-based routers (2001) (56)
- Hashed and hierarchical timing wheels: efficient data structures for implementing a timer facility (1997) (53)
- Detecting evasion attacks at high speeds without reassembly (2006) (50)
- The measurement manifesto (2004) (49)
- Constraint satisfaction as a basis for designing nonmasking fault-tolerance (1994) (49)
- On the difficulty of scalably detecting network attacks (2004) (45)
- Intrusion Response Systems: A Survey (2008) (43)
- Biff (Bloom filter) codes: Fast error correction for large data sets (2012) (42)
- Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo System (2010) (41)
- An architecture for packet-striping protocols (1999) (38)
- Fault-Tolerant Mobile IP (1998) (38)
- Automatically verifying reachability and well-formedness in P4 Networks (2016) (38)
- Cone: Augmenting DHTs to Support Distributed Resource Discovery (2003) (36)
- Bloom Filters via d-Left Hashing and Dynamic Bit Reassignment Extended Abstract (2006) (35)
- Adtributor: Revenue Debugging in Advertising Systems (2014) (35)
- A uniform projection method for motif discovery in DNA sequences (2004) (35)
- Parallelism versus Memory Allocation in Pipelined Router Forwarding Engines (2004) (34)
- A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock (2007) (34)
- Fine-grained latency and loss measurements in the presence of reordering (2011) (34)
- The impact of address allocation and routing on the structure and implementation of routing tables (2003) (33)
- Self-stabilizing end-to-end communication (1996) (32)
- Correct by Construction Networks Using Stepwise Refinement (2017) (32)
- Trading packet headers for packet processing (1996) (32)
- Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (2012) (31)
- Bitmap algorithms for counting active flows on high-speed links (2006) (31)
- Gestalt: Fast, Unified Fault Localization for Networked Systems (2014) (30)
- Crash failures can drive protocols to arbitrary states (1996) (30)
- An exercise in formal reasoning about mobile communications (1998) (29)
- The fault span of crash failures (2000) (27)
- Catching accurate profiles in hardware (2003) (27)
- Efficiently Measuring Bandwidth at All Time Scales (2011) (26)
- Pitfalls in the design of distributed routing algorithms (1988) (26)
- ddNF: An Efficient Data Structure for Header Spaces (2016) (24)
- Finding Network Misconfigurations by Automatic Template Inference (2020) (23)
- NetShare: Virtualizing Bandwidth within the Cloud (2009) (22)
- Transparent interconnection of incompatible local area networks using bridges (1987) (21)
- Light-weight multicast services (LMS): a router-assisted scheme for reliable multicast (2004) (20)
- Redesigning the BSD Callout and Timer Facilities (1995) (19)
- Experiments in Mobile Social Networking (2008) (18)
- Bounding the Unbounded. (1994) (18)
- Self-stabilization by window washing (1996) (18)
- Abstractions for genomics (2013) (17)
- Cone: A Distributed Heap-Based Approach to Resource Selection (2004) (16)
- Internet traffic measurement: what's going on in my network? (2003) (16)
- Compositional proofs of self-stabilizing protocols (1997) (16)
- Agile and scalable analysis of network events (2002) (15)
- Choosing the appropriate ISO layer for LAN interconnection (1988) (15)
- Bounding the unbounded [distributed computing protocols] (1994) (14)
- Packet filtering in high speed networks (1999) (14)
- Counting the number of active flows on a high speed link (2002) (14)
- MiG: Efficient Migration of Desktop VMs Using Semantic Compression (2013) (14)
- Leap Forward Virtual Clock: An O(loglogN) Fair Queuing Scheme with Guaranteed Delays and Throughput Fairness (1996) (13)
- Automatic test packet generation (2014) (13)
- Measuring and Troubleshooting Large Operational Multipath Networks with Gray Box Testing (2015) (12)
- Reliable and Eecient Hop-by-hop Flow Control (1995) (12)
- Network Verification in the Light of Program Verification (2013) (12)
- Ecient F Air Queuing Using Decit round Robin (1995) (12)
- Tracking Mobile Units for Dependable Message Delivery (2002) (12)
- Reconsidering fragmentation and reassembly (1998) (12)
- The complexity of object reconciliation, and open problems related to set difference and coding (2012) (11)
- A tradeoff between safety and liveness for randomized coordinated attack protocols (1992) (11)
- Reducing Web latency using reference point caching (2001) (11)
- Optical Network Survivability (2008) (11)
- Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (2011) (11)
- Queueing delays on virtual circuits using a sliding window flow control scheme (1983) (10)
- Carousel: Scalable Logging for Intrusion Prevention Systems (2010) (10)
- Fast and efficient internet lookups (1999) (10)
- GRooT: Proactive Verification of DNS Configurations (2020) (10)
- Self-Stabilization by Tree Correction (1997) (9)
- mPlane: an architecture for scalable fault localization (2009) (9)
- Resolving Policy Conflicts in Multi-Carrier Cellular Access (2018) (9)
- CrossTalk: scalably interconnecting instant messaging networks (2009) (9)
- Quantitative Network Analysis (2015) (9)
- A Tradeoff Between Safety and Liveness for Randomized Coordinated Attack (1996) (9)
- Packet Transactions: A Programming Model for Data-Plane Algorithms at Hardware Speed (2015) (8)
- A Survey of Recent IP Lookup Schemes;V (1999) (8)
- Aggregated Bit Vector Search Algorithms for Packet Filter Lookups (2001) (8)
- The complexity of crash failures (1997) (7)
- The FDDI MAC meets self-stabilization (1999) (7)
- Measurement Based Fair Queuing for Allocating Bandwidth to Virtual Machines (2016) (7)
- The pessimism behind optimistic simulation (1994) (7)
- Technical Perspective: Treating Networks Like Programs (2015) (7)
- Cone : A Distributed Heap Approach to Resource Selection (2004) (6)
- Router Support for Fine-Grained Latency Measurements (2012) (6)
- Reliable FIFO Load Balancing over Multiple FIFO Channels (1995) (6)
- Reduced state fair queuing for edge and core routers (2004) (5)
- Chapter 4 – Principles in Action (2005) (5)
- Life in the Fast Lane: Viewed from the Confluence Lens (2015) (5)
- Automated measurement of high volume traffic clusters (2002) (5)
- FineComb: Measuring Microscopic Latency and Loss in the Presence of Reordering (2014) (5)
- Congestion Control in Multicast Transport Protocols (1998) (5)
- Self-Stabilization By Local Checking and Correction (Extended Abstract) (1991) (5)
- An algorithm for message delivery to mobile units (1997) (5)
- Building a Better NetFlow: Technical Report (2004) (4)
- FTP-M: An FTP-like Multicast File Transfer Application (2001) (4)
- LIGHTYEAR: Using Modularity to Scale BGP Control Plane Verification (2022) (4)
- Scalable best matching prefix lookups (1998) (4)
- Symmetrical Routes and Reverse Path Congestion Control (1997) (4)
- Redesigning the BSD timer facilities (1998) (4)
- Lattice games and the economics of aggregators (2012) (4)
- Revelio: ML-Generated Debugging Queries for Distributed Systems (2021) (3)
- Chapter 1 – Introducing Network Algorithmics (2005) (3)
- Performance Comparison of LMS and PGM using Simulation (1999) (3)
- Curing Regular Expressions Matching Algorithms from Insomnia , Amnesia , and Acalulia Complete (2016) (3)
- An Algorithm for Message Delivery in a Micromobility Environment (1997) (3)
- Wireless backhaul for LTE - service OAM considerations (2009) (3)
- Why Http Redirect Is the Model for the Future (3)
- Campion: debugging router configuration differences (2021) (2)
- Choosing the Appropriate IS0 Layer for LAN (1988) (2)
- Virtual Switch Packet Classification (2016) (2)
- Reducing Web Latencies Using Precomputed Hints (1997) (2)
- GrassRoots: socially-driven web sites for the masses (2009) (2)
- Proposal Center for Internet Epidemiology and Defenses (2004) (2)
- Deriving Global Virtual Time Algorithms from Conservative Simulation Protocols (1995) (2)
- Formal Network Testing (2013) (2)
- Scalable Social Coordination using Enmeshed Queries (2012) (2)
- Resolving Oracle 8 i problems with changes in hardware (2004) (1)
- 10 network papers that changed the world (2007) (1)
- Chapter 1 – Network Security Overview (2008) (1)
- Search and Tracking Algorithms for Rapidly Moving Mobiles (1998) (1)
- Software Artifact for the SIGCOMM'20 Paper Titled "GRoot: Proactive Verification of DNS Configurations" (2020) (1)
- Chapter 12 – Packet Classification (2005) (1)
- Center for Internet Epidemiology and Defenses (2009) (1)
- Algorithms for Message Delivery in a Micromobility Environment (1998) (1)
- Service Portability (2006) (1)
- Self-stabilization by Local Checking: a Summary (1993) (1)
- Security in Wireless Systems (2008) (1)
- Fast Firewall Implementations for Software-based Routers (2000) (1)
- Network verification - When Clarke meets Cerf (2016) (1)
- Chapter 11 – Prefix-Match Lookups (2005) (1)
- Revelio: ML-Generated Debugging Queries for Finding Root Causes in Distributed Systems (2022) (1)
- Scalable Social Coordination with Group Constraints using Enmeshed Queries (2013) (1)
- Concepts in IP Security (2008) (1)
- Dependable Message Delivery to Mobile Units (2004) (1)
- Dijkstra's Protocols as Examples of Local Checking and Counter Flushing (1992) (1)
- Interactive Genomics: Rapidly Querying Genomes in the Cloud (2013) (0)
- How Complex is DNS? (2021) (0)
- Chapter 2 – Network Attacks (2008) (0)
- Chapter 9 – Protocol Processing (2005) (0)
- A Capacious Scrutiny on Automatic Test Packet Generation (2020) (0)
- Tracking numbers follow in a packet communication system (1992) (0)
- Gestalt: Unifying fault localization for networked systems (2013) (0)
- Reducing internet latency using precomputed hints (1999) (0)
- Chapter 5 – Copying Data (2005) (0)
- SCALE: Automatically Finding RFC Compliance Bugs in DNS Nameservers (2022) (0)
- Towards Correct-by-Construction SDN (2016) (0)
- Chapter 7 – Maintaining Timers (2005) (0)
- Keynote (2014) (0)
- A SURVEY OF RECENT IP LOOKUP SCHEMES 1 Abstract (2013) (0)
- Chapter 18 – Conclusions (2005) (0)
- Chapter 15 – Routers as Distributed Systems (2005) (0)
- Chapter 16 – Measuring Network Traffic (2005) (0)
- Chapter 13 – Switching (2005) (0)
- Chapter 14 – Scheduling Packets (2005) (0)
- Electronic Theses and Dissertations Title Scalable Real-Time DDoS Traffic Monitoring and Characterization Permalink (2018) (0)
- MashUp: Scaling TCAM-based IP Lookup to Larger Databases by Tiling Trees (2022) (0)
- Transparent burden-sharing for parallel networks. (1989) (0)
- Title New directions in traffic measurement and accounting Permalink (2021) (0)
- Chapter 2 – Network Implementation Models (2005) (0)
- Chapter 3 – Security and Privacy Architecture (2008) (0)
- Algorithms for fast packet classification (2003) (0)
- Scalable traffic management for data centers and logging devices (2013) (0)
- Packet format in hub for a data transmission system (1993) (0)
- Chapter 8 – Demultiplexing (2005) (0)
- Using Genome Query Language ( GQL ) to uncover genetic variation (2013) (0)
- Design of a Tool for Rapid Prototyping of CommunicationProtocolsAniruddha Gokhale (1995) (0)
- Chapter 3 – Fifteen Implementation Principles (2005) (0)
- Algorithmic problems in Internet research (1998) (0)
- Automatically Downloading Images to Improve Web Transfer Times (2001) (0)
- A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science (2003) (0)
- New Directionsin Traffic Measurementand Accounting CristianEstanandGeorgeVarghese (2000) (0)
- requirements for the degree Doctor of Philosophy in Electrical Engineering (Communication Theory and Systems) (2004) (0)
- Self-Stabilizing End-to-End Communication 0 (1993) (0)
- Design of a Tool for Rapid Prototyping of Communication Protocols (1995) (0)
- On Technology Transfer (2015) (0)
- Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency (2022) (0)
- Randomized token buckets: reducing the buffers required in multiplexors (1997) (0)
- Search within a database by compressed Präfixassoziation (1990) (0)
- Keynote: life in the fast lane (2015) (0)
- Catching Accurate Profiles in Hardware Satish Narayanasamy (2002) (0)
- Chapter 6 – Transferring Control (2005) (0)
- Chapter 17 – Network Security (2005) (0)
- Chapter 6 – IP Security in Practice (2008) (0)
- Chapter 8 – Mobile Security and Privacy (2008) (0)
- A Tradeo Between Safety and Liveness for RandomizedCoordinated Attack 0 (1996) (0)
- HYPERCUTS: A Decision Tree Based Algorithm for Fast Packet Classification (2002) (0)
- Chapter 10 – Exact-Match Lookups (2005) (0)
- Algorithmic problems in Internet research (abstract) (1998) (0)
- We Don't Need No Stinking Databases in Genomics (2013) (0)
- Chapter 4 – Network Security Algorithms (2008) (0)
This paper list is powered by the following services:
Other Resources About George Varghese
What Schools Are Affiliated With George Varghese?
George Varghese is affiliated with the following schools: