Margo Seltzer
#11,723
Most Influential Person Now
American computer scientist
Margo Seltzer's AcademicInfluence.com Rankings
Margo Seltzercomputer-science Degrees
Computer Science
#717
World Rank
#739
Historical Rank
#385
USA Rank
Database
#235
World Rank
#244
Historical Rank
#113
USA Rank
Download Badge
Computer Science
Margo Seltzer's Degrees
- Masters Electrical Engineering and Computer Science University of California, Berkeley
- PhD Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Margo Seltzer Influential?
(Suggest an Edit or Addition)According to Wikipedia, Margo Ilene Seltzer is a professor and researcher in computer systems. She is currently the Canada 150 Research Chair in Computer Systems and the Cheriton Family Chair in Computer Science at the University of British Columbia. Previously, Seltzer was the Herchel Smith Professor of Computer Science at Harvard University's John A. Paulson School of Engineering and Applied Sciences and director at the Center for Research on Computation and Society.
Margo Seltzer's Published Works
Published Works
- Provenance-Aware Storage Systems (2006) (665)
- Network-Aware Operator Placement for Stream-Processing Systems (2006) (472)
- Berkeley DB (1999) (426)
- Dealing with disaster: surviving misbehaved kernel extensions (1996) (379)
- World Wide Web Cache Consistency (1996) (350)
- Disk Scheduling Revisited (1990) (333)
- An Implementation of a Log-Structured File System for UNIX (1993) (314)
- The case for geographical push-caching (1995) (311)
- Network Coordinates in the Wild (2007) (287)
- Non-volatile memory for fast, reliable file systems (1992) (243)
- Improving Performance Isolation on Chip Multiprocessors via an Operating System Scheduler (2007) (239)
- Provenance for the Cloud (2010) (206)
- Passive NFS Tracing of Email and Research Workloads (2003) (205)
- Hourglass: An Infrastructure for Connecting Sensor Networks and Applications (2004) (196)
- Learning Certifiably Optimal Rule Lists for Categorical Data (2017) (184)
- File System Logging versus Clustering: A Performance Comparison (1995) (175)
- Special Issue: The First Provenance Challenge (2008) (172)
- Layering in Provenance Systems (2009) (165)
- Scalable Bayesian Rule Lists (2016) (165)
- Securing Provenance (2008) (162)
- Using latency to evaluate interactive system performance (1996) (160)
- Journaling Versus Soft Updates: Asynchronous Meta-data Protection in File Systems (2000) (152)
- File system aging—increasing the relevance of file system benchmarks (1997) (140)
- Operating system benchmarking in the wake of lmbench: a case study of the performance of NetBSD on the Intel x86 architecture (1997) (137)
- Performance of Multithreaded Chip Multiprocessors and Implications for Operating System Design (2005) (137)
- Heuristic Cleaning Algorithms in Log-Structured File Systems (1995) (132)
- The case for application-specific benchmarking (1999) (128)
- Provenance: a future history (2009) (124)
- Self-monitoring and self-adapting operating systems (1997) (122)
- Web Facts and Fantasy (1997) (118)
- The First Provenance Challenge (2008) (116)
- Optimal Sparse Decision Trees (2019) (115)
- Distributed, secure load balancing with skew, heterogeneity and churn (2005) (108)
- LLAMA: Efficient graph analytics using Large Multiversioned Arrays (2015) (105)
- Learning Certifiably Optimal Rule Lists (2017) (104)
- A Comparison of OS Extension Technologies (1996) (104)
- Issues in Automatic Provenance Collection (2006) (104)
- Provenance as first class cloud data (2010) (104)
- File classification in self-* storage systems (2004) (102)
- Practical whole-system provenance capture (2017) (102)
- UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats (2020) (97)
- Hierarchical File Systems Are Dead (2009) (95)
- Choosing a Data Model and Query Language for Provenance (2008) (90)
- Self-organization in peer-to-peer systems (2002) (87)
- Structure and Performance of the Direct Access File System (2002) (80)
- BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure (2012) (78)
- Unifying File System Protection (2001) (76)
- A Primer on Provenance (2014) (75)
- HACC: an architecture for cluster-based web servers (1999) (72)
- Cache-Fair Thread Scheduling for Multicore Processors (2006) (71)
- Stable and Accurate Network Coordinates (2006) (71)
- A Scalable Distributed Graph Partitioner (2015) (67)
- PASSing the provenance challenge (2008) (66)
- Provenance Map Orbiter: Interactive Exploration of Large Provenance Graphs (2011) (66)
- Benchmarking File System Benchmarking: It *IS* Rocket Science (2011) (65)
- Using probabilistic reasoning to automate software tuning (2004) (64)
- The measured performance of personal computer operating systems (1995) (63)
- Flash Caching on the Storage Client (2013) (62)
- Evaluation of Filesystem Provenance Visualization Tools (2013) (62)
- Runtime Analysis of Whole-System Provenance (2018) (62)
- A new instructional operating system (2002) (61)
- Generalized and Scalable Optimal Sparse Decision Trees (2020) (61)
- Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory (2017) (61)
- Making a Cloud Provenance-Aware (2009) (60)
- Network-Aware Overlays with Network Coordinates (2006) (60)
- A Dynamic, Data-Driven, Decision Support System for Emergency Medical Services (2005) (58)
- New NFS Tracing Tools and Techniques for System Analysis (2003) (54)
- A Comparison of FFS Disk Allocation Policies (1996) (53)
- Beyond Relational Databases (2005) (53)
- A New Hashing Package for UNIX (1991) (52)
- A General-Purpose Provenance Library (2012) (51)
- Operating system scheduling for chip multithreaded processors (2006) (51)
- Virtual worlds: fast and strategyproof auctions for dynamic resource allocation (2003) (50)
- Data provenance to audit compliance with privacy policy in the Internet of Things (2018) (50)
- Isolation with Flexibility: A Resource Management Framework for Central Servers (2000) (50)
- VINO: An Integrated Platform for Operating System and Database Research (1994) (49)
- Avoiding the Top 10 Software Security Design Flaws (2014) (48)
- Strategyproof Computing: Systems Infrastructures for Self-Interested Parties (2003) (48)
- A Non-Work-Conserving Operating System Scheduler For SMT Processors (2006) (46)
- NFS Tricks and Benchmarking Traps (2003) (45)
- Transaction support in a log-structured file system (1993) (45)
- Dimetrodon: Processor-level preventive thermal management via idle cycle injection (2011) (45)
- Making the Most Out of Direct-Access Network Attached Storage (2003) (43)
- FRAPpuccino: Fault-detection through Runtime Analysis of Provenance (2017) (41)
- File System Performance and Transaction Support (1992) (41)
- Egg: An Extensible and Economics-Inspired Open Grid Computing Platform (2006) (41)
- Supporting Network Coordinates on PlanetLab (2005) (41)
- Accelerating MCMC via Parallel Predictive Prefetching (2014) (40)
- An architecture a day keeps the hacker away (2005) (40)
- If these data could talk (2017) (39)
- The measured performance of personal computer operating systems (1996) (38)
- VINO: The 1994 Fall Harvest (1994) (38)
- Scooped, Again (2003) (38)
- File Layout and File System Performance (1994) (38)
- Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs (2018) (37)
- A self-scaling and self-configuring benchmark for Web servers (extended abstract) (1998) (37)
- LIBTP: Portable, Modular Transactions for UNIX (1992) (37)
- Improving interactive performance using TIPME (2000) (36)
- MiSFIT: constructing safe extensible systems (1998) (35)
- Wired Geometric Routing (2007) (34)
- Transaction Support in Read Optimizied and Write Optimized File Systems (1990) (34)
- Chip multithreading systems need a new operating system scheduler (2004) (33)
- StarFlow: A Script-Centric Data Analysis Environment (2010) (32)
- Challenges in Embedded Database System Administration (1999) (30)
- Provenance-based Intrusion Detection: Opportunities and Challenges (2018) (29)
- Path Optimization in Stream-Based Overlay Networks (2004) (28)
- On the design of a new CPU architecture for pedagogical purposes (2002) (27)
- Tracking Back References in a Write-Anywhere File System (2010) (27)
- Performance introspection of graph databases (2013) (26)
- Evaluating windows NT terminal server performance (1999) (26)
- Structuring the kernel as a toolkit of extensible, reusable components (1995) (25)
- The Case for Browser Provenance (2009) (24)
- A Crowdsourcing Approach to Collecting Tutorial Videos -- Toward Personalized Learning-at-Scale (2016) (24)
- Towards General-Purpose Neural Network Computing (2015) (23)
- HBench:Java: an application-specific benchmarking framework for Java virtual machines (2000) (22)
- Beyond relational databases (2008) (22)
- Self-monitoring and self- adapting systems (1997) (22)
- A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays (2005) (22)
- Attribute-Based Prediction of File Properties (2003) (21)
- Operating System Support for Multi-User, Remote, Graphical Interaction (2000) (20)
- Building a reliable mutable file system on peer-to-peer storage (2002) (19)
- The Utility of File Names (2003) (19)
- Foundations for provenance-aware systems (2010) (19)
- Local clustering in provenance graphs (2013) (18)
- The Mug-Shot Search Problem (1997) (18)
- Persistent Memory Transactions (2018) (17)
- Unexpected Performance of Intel® Optane™ DC Persistent Memory (2020) (17)
- A primer on provenance (2014) (16)
- Open problems in data collection networks (2004) (16)
- SIGL: Securing Software Installations Through Deep Graph Learning (2020) (16)
- Read optimized file system designs: a performance evaluation (1991) (16)
- Scheduler Activations on BSD: Sharing Thread Management Between Kernel and Application (1995) (15)
- The mug-shot search problem: a study of the eigenface metric, search strategies, and interfaces in a system for searching facial image data (1999) (15)
- Trace-based analyses and optimizations for network storage servers (2004) (15)
- Proceedings of the 5th ACM conference on Electronic commerce (2004) (15)
- Evaluating DHT-Based Service Placement for Stream-Based Overlays (2005) (14)
- ASC: automatically scalable computation (2014) (14)
- Issues in Extensible Operating Systems (1997) (14)
- Tickets and currencies revisited: extensions to multi-resource lottery scheduling (1999) (13)
- Workload-specific file system benchmarks (2001) (13)
- Multicore OSes: Looking Forward from 1991, er, 2011 (2011) (13)
- Overcoming Rational Manipulation in Distributed Mechanism Implementations (2003) (12)
- Layering in Provenance-Aware Storage Systems (2008) (12)
- Reliability-and capacity-based selection in distributed hash tables (2003) (12)
- Application-specific benchmarking (2001) (12)
- Parking packet payload with P4 (2020) (11)
- The Case for Extensible Operating Systems (1996) (11)
- Sharing and Preserving Computational Analyses for Posterity with encapsulator (2018) (10)
- Research issues in No-Futz computing (2001) (10)
- Berkeley DB: A Retrospective (2007) (10)
- Does Systems Research Measure Up (1997) (9)
- Parallelization by simulated tunneling (2012) (9)
- Autonomous replication across wide-area internetworks (1995) (9)
- Towards Query Interoperability: PASSing PLUS (2010) (9)
- Computational caches (2013) (9)
- HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance (2001) (9)
- An NVM Carol: Visions of NVM Past, Present, and Future (2018) (9)
- Trials and Tribulations in Synthesizing Operating Systems (2019) (8)
- Mining the Web for Medical Hypotheses - A Proof-of-Concept System (2012) (8)
- ProvMark: A Provenance Expressiveness Benchmarking System (2019) (8)
- HBench:Java: An application‐specific benchmarking framework for Java Virtual Machines (2001) (7)
- I/o automaton model of operating system primitives (1999) (7)
- Proxy Network Coordinates (2008) (7)
- Data Management for Internet-Scale Single-Sign-On (2006) (7)
- Proccedings of the 7th conference on File and storage technologies (2009) (7)
- File System Aging - Increasing the Relevance of File System Benchmarks (1997) (6)
- A user‐centered, learning asthma smartphone application for patients and providers (2020) (6)
- Everything You Always Wanted to Know about NFS Trace Analysis, but Were Afraid to Ask (2002) (6)
- Recent Advances in Computer Architecture: The Opportunities and Challenges for Provenance (2015) (5)
- Coping with Cycles in Provenance (2006) (5)
- A locality-aware approach to distributed systems (2007) (5)
- Tickets and Currencies Revisited: Extending Multi-Resource Lottery Scheduling (1999) (5)
- From Here to Provtopia (2019) (5)
- Computer/Information Science (2013) (5)
- A Resource Management Framework for Central Servers (1999) (5)
- The End-to-End Provenance Project (2020) (5)
- Fast Sparse Decision Tree Optimization via Reference Ensembles (2021) (5)
- ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems (2021) (5)
- Improving Data Scientist Efficiency with Provenance (2020) (5)
- Applying KISS to Healthcare Information Technology (2013) (4)
- Exploiting direct-access networking in network-attached storage systems (2003) (4)
- Systems Optimizations for Learning Certifiably Optimal Rule Lists (2018) (4)
- An Experimental Flow-Controlled Multicast ATM Switch (1999) (4)
- Measuring windows NT: possibilities and limitations (1997) (4)
- Application performance on the Direct Access File System (2004) (4)
- Xanthus: Push-button Orchestration of Host Provenance Data Collection (2020) (4)
- Automatic Parallelization of Sequential Programs (2018) (4)
- Online mechanism and virtual currency design for distributed systems (2011) (4)
- Assuage: Assembly Synthesis Using A Guided Exploration (2021) (4)
- Assuage: Assembly Synthesis Using A Guided Exploration (2021) (4)
- The Advanced Computing Systems Association (1999) (4)
- Fast Sparse Classification for Generalized Linear and Additive Models (2022) (3)
- A Framework for Incentivizing Deep Fixes (2014) (3)
- Reliable and Fault-Tolerant Peer-to-Peer Block Storage (2002) (3)
- The Impact of Operating System Structure on Personal Computer Performance (1995) (3)
- The EuroSys 2020 Online Conference: Experience and lessons learned (2020) (3)
- Can a file system virtualize processors (2007) (3)
- Generalized Optimal Sparse Decision Trees (2020) (3)
- Exploring the Whole Rashomon Set of Sparse Decision Trees (2022) (3)
- Incentivizing Deep Fixes in Software Economies (2020) (3)
- Anomaly Detection in Multiplex Dynamic Networks: from Blockchain Security to Brain Disease Prediction (2022) (3)
- How Smart Guessing Strategies Can Yield Massive Scalability Improvements for Sparse Decision Tree Optimization (2021) (3)
- File Classification in Self-* Storage Systems (CMU-PDL-04-101) (2004) (2)
- FasterRisk: Fast and Accurate Interpretable Risk Scores (2022) (2)
- Automatically Scalable Computation (2015) (2)
- Modeling the Effects of Memory Hierarchy Performance on Throughput of Multithreaded Processors (2005) (2)
- Operating System Benchmarking in the Wake of Lmbench: A Case Study of the Performance of NetBSD on Intel x86 Architecture (1997) (2)
- Attribute-Based Prediction of File Properties (HCS-TR-14-03) (2003) (2)
- Local Clustering in Provenance Graphs (Extended Version) (2013) (2)
- Ninth Workshop on Hot Topics in Operating Systems (2003) (2)
- Aquarium: Cassiopea and Alewife Languages. (2019) (2)
- People, places, and things: the next generation web (1996) (2)
- TimberTrek: Exploring and Curating Sparse Decision Trees with Interactive Visualization (2022) (2)
- A Conversation with Margo Seltzer and Mike Olson (2021) (1)
- Collecting Data for One Hundred Years (2002) (1)
- Proceedings of the third symposium on Operating systems design and implementation (1999) (1)
- Evolving Line Drawings (2015) (1)
- Addressing Underspecified Lineage Queries on Provenance (2011) (1)
- Fast optimization of weighted sparse decision trees for use in optimal treatment regimes and optimal policy design (2022) (1)
- An Analysis of Web File Sizes : New Methods and Models (2003) (1)
- Web applications with client-side storage (2003) (1)
- Logging versus Soft Updates : Asynchronous Meta-data Protection in File Systems (1999) (1)
- PARALLELISM IN XPRS (2000) (1)
- Comment: If these data could talk (2017) (1)
- Symbiotic Systems Software : Fast Operating Systems for Fast Applications (2007) (1)
- Arming IDS Researchers with a Robotic Arm Dataset (2022) (1)
- The Measured Performance of Computer Operating Systems (1996) (1)
- Improving interactive system performance using tipme (2000) (1)
- Programmable Smart Machines: A Hybrid Neuromorphic approach to General Purpose Computation (2014) (1)
- Is achieving security a hopeless quest? (2015) (0)
- Infrastructure for Research towards Ubiquitous Information Systems (1994) (0)
- ReLUSyn: Synthesizing Stealthy Attacks for Deep Neural Network Based Cyber-Physical Systems (2021) (0)
- ProvTools painlessly provides provenance (2018) (0)
- The Present and Future of SAN/NAS: Interview with Dave Hitz and Brian Pawlowsky of NetApp (2008) (0)
- ProvBuild (2020) (0)
- Computer/lnformation science (2013) (0)
- Is the Future of Preservation Cloudy? (Dagstuhl Seminar 12472) (2012) (0)
- Minimal Economic Distributed Computing (2009) (0)
- Pcirallel Query Processing Using Shared Memory (2016) (0)
- Optimal Sparse Regression Trees (2022) (0)
- SOS Technical Report: Everything You Always Wanted to Know about NFS Trace Analysis, but Were Afraid to Ask (2002) (0)
- 3rd Usenix Workshop on Hot Topics in Security (hotsec '08) Securing Systems N Security Benchmarking Using Partial Verification Exploring New Directions (0)
- J un 2 01 8 Provenance-based Intrusion Detection : Opportunities and Challenges (2018) (0)
- ProvBuild: Improving Data Scientist Efficiency with Provenance (An Extended Abstract) (2020) (0)
- The MugShot Search Problem (1995) (0)
- Clilets: Web Applications with Secure Client-Side Storage (2002) (0)
- A Crowdsourcing Approach to Collecting 399 Tutorial Videos on Logarithms (2016) (0)
- Smooth Kronecker: Solving the Combing Problem in Kronecker Graphs (2020) (0)
- A New Hashing Package for UNIX 1 (1991) (0)
- Flipping Out in Computer Science (2017) (0)
- Rclean: A Tool for Writing Cleaner, More Transparent Code (2020) (0)
- Tinkertoy: Build Your Own Operating Systems for IoT Devices (2022) (0)
- Application Dynamic library OPUS Linux Security Module / NetFilter System call actions Audit serviceCamFlow hook CamFlow relay service camflowd auditd Audit (2019) (0)
- MOSS: A Mobile Operating System Substrate (1995) (0)
- A New Hashing Package for UNIX 1 Margo Seltzer − (1991) (0)
- Rationally motivated failure in distributed systems (2008) (0)
- Towards Accountable Systems (Dagstuhl Seminar 18181) (2018) (0)
- ProvBuild: improving data scientist efficiency with provenance (2020) (0)
- 2 Use Cases 2 . 1 Contextual History Search Scenario (2009) (0)
- Scooped, Again The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters (2019) (0)
- The Fine Line between Bold and Fringe Lunatic (2020) (0)
- Aquarium Technical Report Preprint (2019) (0)
- LIBTP: Portable, Modular Transactions for UNIX1 (1992) (0)
- Towards Porting Operating Systems with Program Synthesis (2022) (0)
- Shellac: A Compiler Synthesizer for Concurrent Programs (2022) (0)
- Adaptive parallel computation for heterogeneous processors (2007) (0)
- 7th USENIX Conference on File and Storage Technologies, February 24-27, 2009, San Francisco, CA, USA. Proceedings (2009) (0)
- Introduction to special issue FAST 2009 (2009) (0)
- Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004 (2004) (0)
- MOSS : A Mobile Operating Systems Substrate A White Paper (1995) (0)
- Lasagna Log Interceptor User Kernel VFS Layer Observer Analyzer Distributor App libpass App (2011) (0)
- Measuring computer systems: how to measure performance (1997) (0)
- Asthma Infrastructure Research (AIR) (2013) (0)
- A Comparison of Logging and Clustering (2013) (0)
- Gridiron: A Technique for Augmenting Cloud Workloads with Network Bandwidth Requirements (2022) (0)
- Understanding and Exploring the Whole Set of Good Sparse Generalized Additive Models (2023) (0)
- A Fault-Tolerant Exascale Parallel Runtime (2012) (0)
- Simplifying Resource Allocation for a Stategic World (0)
- Peer Review Process (2020) (0)
- Making Provenance Work for You (2023) (0)
- Data Structures for Modern Memory and Storage Hierarchies (Dagstuhl Seminar 21283) (2021) (0)
- Tree houses and real houses: research and commercial software (2002) (0)
- USENIX Association Proceedings of FAST ’ 03 : 2 nd USENIX Conference on File and Storage Technologies (2003) (0)
This paper list is powered by the following services:
Other Resources About Margo Seltzer
What Schools Are Affiliated With Margo Seltzer?
Margo Seltzer is affiliated with the following schools: