Mark Crovella
American computer scientist
Mark Crovella's AcademicInfluence.com Rankings

Download Badge
Computer Science
Mark Crovella's Degrees
- PhD Computer Science University of California, San Diego
- Masters Computer Science University of California, San Diego
- Bachelors Computer Science University of California, San Diego
Similar Degrees You Can Earn
Why Is Mark Crovella Influential?
(Suggest an Edit or Addition)According to Wikipedia, Mark Crovella is an American computer scientist and Professor at Boston University. His research focuses on computer networks as well as data science. Much of his work has focused on improving the understanding, design, and performance of parallel and networked computer systems, mainly through the application of measurement, data mining, statistics, and performance evaluation. In the computer science arena, he has focused on the analysis of social, biological, and communication networks. He is co-author of the first text on Internet Measurement, Internet Measurement: Infrastructure, Traffic, and Applications. In 2010 he was one of the inaugural winners of the ACM SIGMETRICS Test of Time awards, which recognize "an influential performance evaluation paper whose impact is still felt 10-12 years after its initial publication." He was named ACM Fellow in 2010, and Fellow of the Institute of Electrical and Electronics Engineers in 2012, in both cases for contributions to the measurement and analysis of networks and distributed systems. He served as chair of ACM SIGCOMM from 2007 to 2009, and he served as Chair of the Department of Computer Science at Boston University from 2013 to 2018.
Mark Crovella's Published Works
Published Works
- Self-similarity in World Wide Web traffic: evidence and possible causes (1996) (2725)
- Generating representative Web workloads for network and server performance evaluation (1998) (1698)
- Mining anomalies using traffic feature distributions (2005) (1304)
- Diagnosing network-wide traffic anomalies (2004) (1292)
- Self-similarity in World Wide Web traffic: evidence and possible causes (1997) (1180)
- Characteristics of WWW Client-based Traces (1995) (672)
- Measuring Bottleneck Link Speed in Packet-Switched Networks (1996) (660)
- Characterizing reference locality in the WWW (1996) (580)
- Structural analysis of network traffic flows (2004) (579)
- On the relationship between file sizes, transport protocols, and self-similar network traffic (1996) (544)
- Characterization of network-wide anomalies in traffic flows (2004) (457)
- Heavy-tailed probability distributions in the World Wide Web (1998) (423)
- Delegation forwarding (2008) (413)
- On Choosing a Task Assignment Policy for a Distributed Server System (1998) (380)
- Changes in Web client access patterns: Characteristics and caching implications (1999) (352)
- Sampling biases in IP topology measurements (2003) (349)
- Virtual landmarks for the internet (2003) (315)
- Server selection using dynamic path characterization in wide-area networks (1997) (289)
- Constraint-Based Geolocation of Internet Hosts (2004) (287)
- Towards Detecting Anomalous User Behavior in Online Social Networks (2014) (268)
- Detection and identification of network anomalies using sketch subspaces (2006) (247)
- Graph wavelets for spatial traffic analysis (2003) (245)
- Effect of traffic self-similarity on network performance (1997) (241)
- Explaining World Wide Web Traffic Self-Similarity (1995) (239)
- Traffic matrices: balancing measurements, inference and modeling (2005) (231)
- Connection Scheduling in Web Servers (1999) (225)
- Dynamic Server Selection using Bandwidth Probing in Wide-Area Networks (1996) (218)
- Internet Measurement - Infrastructure, Traffic, and Applications (2006) (187)
- On the marginal utility of network topology measurements (2001) (187)
- Application-level document caching in the Internet (1995) (185)
- On the geographic location of internet resources (2002) (175)
- The network effects of prefetching (1998) (160)
- Describing and forecasting video access patterns (2011) (151)
- Diversity of forwarding paths in pocket switched networks (2007) (150)
- Estimating the Heavy Tail Index from Scaling Properties (1999) (146)
- Efficient algorithms for large-scale topology discovery (2004) (145)
- Dynamic Server Selection In The Internet (1995) (144)
- Hyperbolic Embedding and Routing for Dynamic Graphs (2009) (138)
- Long-lasting Transient Conditions In Simulations With Heavy-tailed Workloads (1997) (138)
- Task assignment in a distributed system (extended abstract): improving performance by unbalancing load (1997) (128)
- Critical path analysis of TCP transactions (2000) (124)
- Self-Similarity in World Wide Web Traffic: Evidence and Causes (1996) (123)
- A performance evaluation of hyper text transfer protocols (1999) (119)
- Measuring Web performance in the wide area (1999) (117)
- Going the Distance for Protein Function Prediction: A New Distance Metric for Protein Interaction Networks (2013) (112)
- Self - similarity in World Wide Web: Evidence and possible causes (1997) (111)
- End-to-End Inference of Loss Nature in a Hybrid Wired/Wireless Environment (2002) (108)
- Distributed packet rewriting and its application to scalable server architectures (1998) (105)
- Parallel performance prediction using lost cycles analysis (1994) (104)
- Constraint-based geolocation of internet hosts (2006) (95)
- Intrusion as (anti)social communication: characterization and detection (2012) (95)
- Performance Evaluation with Heavy Tailed Distributions (2000) (83)
- Selecting a characteristic set of reviews (2012) (79)
- Multiprogramming on multiprocessors (1991) (77)
- Forwarding in opportunistic networks with resource constraints (2008) (76)
- Network Kriging (2005) (71)
- On the intrinsic locality properties of Web reference streams (2003) (71)
- Understanding factors that affect response rates in twitter (2012) (69)
- Deployment of an Algorithm for Large-Scale Topology Discovery (2006) (68)
- Distributed Spatial Anomaly Detection (2008) (66)
- An independent-connection model for traffic matrices (2006) (63)
- Fighting Fire with Fire: Using Antidote Data to Improve Polarization and Fairness of Recommender Systems (2018) (62)
- Changes in Web Client Access Patterns (1998) (59)
- Improved Algorithms for Network Topology Discovery (2005) (53)
- On the network impact of dynamic server selection (1999) (53)
- On traffic matrix completion in the internet (2012) (50)
- How does TCP generate pseudo-self-similarity? (2001) (49)
- Using loss pairs to discover network properties (2001) (47)
- Computer Systems Performance Evaluation (2007) (46)
- Efficient monitoring of end-to-end network properties (2004) (43)
- Geometric Exploration of the Landmark Selection Problem (2004) (41)
- Community-oriented network measurement infrastructure (CONMI) workshop report (2006) (36)
- TCP Congestion Control and Heavy Tails (2000) (34)
- Characteristics of www client traces (1995) (34)
- Using communication-to-computation ratio in parallel program design and performance prediction (1992) (33)
- Performance debugging using parallel performance predicates (1993) (33)
- Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement (2003) (31)
- Understanding stateful vs stateless communication strategies for ad hoc networks (2011) (31)
- Modeling, measurement and performance of world wide web transactions (2001) (30)
- Bayesian packet loss detection for TCP (2005) (29)
- On the Effec t of Traffic S elf-Similarity on Network Performance (1997) (28)
- The Search for Lost Cycles: A New Approach to Parallel Program Performance Evaluation (1993) (27)
- Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies (2011) (27)
- Performance Prediction and Tuning of Parallel Programs (1994) (27)
- Learning network structure from passive measurements (2007) (27)
- Single-cell transcriptional networks in differentiating preadipocytes suggest drivers associated with tissue heterogeneity (2020) (26)
- Explaining world wide web self-similarity (1995) (25)
- Matrix Completion with Queries (2015) (25)
- Self-similarity in WWW traffic: evidence and possible causes (1997) (25)
- Internet performance modeling: the state of the art at the turn of the century (2000) (24)
- Characteristics of World Wide Web Client-based Traces (1995) (24)
- Inferring invisible traffic (2010) (24)
- On the Marginal Utility of Deploying Measurement Infrastructure (2000) (23)
- Studying interdomain routing over long timescales (2013) (23)
- An Architecture for a WWW Workload Generator (1997) (22)
- Critical path analysis of TCP transactions (2001) (22)
- The effects of multiprogramming on barrier synchronization (1991) (21)
- The Advantages of Multiple Parallelizations in Combinatorial Search (1994) (21)
- One for all and all for One: Improving replication of genetic studies through network diffusion (2018) (20)
- Detecting Distributed Attacks using Network-Wide Flow Traffic (2005) (19)
- The Protocol Stack and Its Modulating Effect on Self‐Similar Traffic (2002) (19)
- Simulations with Heavy‐Tailed Workloads (2002) (19)
- Multidimensional Scaling in the Poincaré Disk (2011) (19)
- Locality in a web of streams (2005) (18)
- Performance Characteristics of the World Wide Web (2000) (17)
- Functional protein representations from biological networks enable diverse cross-species inference (2019) (17)
- Understanding geolocation accuracy using network geometry (2013) (17)
- On the Size Distribution of Autonomous Systems (2003) (17)
- Alleviating Memory Contention in Matrix Computations on Large-Scale Shared-Memory Multiprocessors (1993) (14)
- Routing state distance: a path-based metric for network analysis (2012) (14)
- Inferring visibility: who's (not) talking to whom? (2012) (14)
- Identifying Human Interactors of SARS-CoV-2 Proteins and Drug Targets for COVID-19 using Network-Based Label Propagation (2020) (13)
- Estimating intrinsic dimension via clustering (2012) (12)
- Internet measurement (2006) (11)
- Parallel performance using lost cycles analysis (1994) (11)
- Router primitives for programmable active measurement (2009) (11)
- Identifying and Analyzing High Impact Routing Events with PathMiner (2014) (10)
- Characteristics of WWW Traces (1995) (10)
- On the intrinsic locality of web reference streams (2003) (10)
- How YouTube Leads Privacy-Seeking Users Away from Reliable Information (2020) (10)
- Low-stretch greedy embedding heuristics (2012) (9)
- BU/NSF Workshop on Internet Measurement Instrumentation and Characterization (1999) (9)
- Exploring Explanations for Matrix Factorization Recommender Systems (2017) (9)
- On the emergence of highly variable distributions in the autonomous system topology (2003) (8)
- The Network E ects of Prefetching (1998) (8)
- A Multi-Species Functional Embedding Integrating Sequence and Network Structure (2017) (8)
- The Network Eeects of Prefetching (1998) (8)
- Closed-Loop Opinion Formation (2017) (8)
- Long range mutual information (2008) (8)
- Corrections to "How Does TCP Generate Pseudo-Self-Similarity?" (2002) (7)
- Online ratings: Convergence towards a positive perspective? (2014) (7)
- On the choice of a spanning tree for greedy embedding of network graphs (2013) (7)
- Detecting Unusually-Routed ASes: Methods and Applications (2016) (6)
- Low-Stress Data Embedding in the Hyperbolic Plane Using Multidimensional Scaling (2017) (6)
- In Proceedings of the 1997 SPIE International Conference on Performance and Control of Netork Systems (1997) (6)
- Analysis of brain region-specific co-expression networks reveals clustering of established and novel genes associated with Alzheimer disease (2020) (5)
- Understanding individuals' proclivity for novelty seeking (2020) (5)
- Mobility profiling: Identifying scouters in the crowd (2019) (5)
- Memory Contention in Scalable Cache-Coherent Multiprocessors (1993) (5)
- AliasCluster: A lightweight approach to interface disambiguation (2013) (5)
- Mixture models of endhost network traffic (2012) (5)
- Network-wide traffic analysis: methods and applications (2007) (5)
- Correction: Going the Distance for Protein Function Prediction: A New Distance Metric for Protein Interaction Networks (2013) (5)
- Interpretable network propagation with application to expanding the repertoire of human proteins that interact with SARS-CoV-2 (2020) (4)
- Performance Characteristics of World Wide Web Information Systems (1997) (4)
- Parallel Solutions to the Phase Problem in X-Ray Crystallography (1990) (4)
- From movement purpose to perceptive spatial mobility prediction (2021) (4)
- Software interleaving (1994) (4)
- Targeted matrix completion (2017) (4)
- Ranking of ACM SIGCOMM computer communication review (2008) (3)
- A Passive Measurement System for Network Testbeds (2012) (3)
- Estimation of instrinsic dimension via clustering (2011) (3)
- Fair Inputs and Fair Outputs: The Incompatibility of Fairness in Privacy and Accuracy (2020) (3)
- Critical path analysis of TCP transactions (2001) (3)
- Auditing Black-Box Prediction Models for Data Minimization Compliance (2021) (3)
- To queue or not to queue?: When FCFS is better than PS in a distributed system (1997) (2)
- Frog embryos use multiple levels of temporal pattern in risk assessment for vibration-cued escape hatching (2022) (2)
- Responsive Web Computing: Resource Management, Protocol Techniques, and Applications (A research statement) (1996) (2)
- Leveraging Website Popularity Differences to Identify Performance Anomalies (2021) (2)
- Assessing Candidate Preference through Web Browsing History (2018) (2)
- To Queue or Not to Queue: When Queueing is Better Than Timesharing in a Distributed System (1997) (2)
- An Analysis of Web File Sizes : New Methods and Models (2003) (1)
- Curvature-based Analysis of Network Connectivity in Private Backbone Infrastructures (2022) (1)
- On the Connection between Power-tail Distributions and Long-range Dependencies (1997) (1)
- Case Study in KSR Programming: Finding Outliers by the Minimum Volume Ellipsoid Method (1992) (1)
- New books and multimedia (2007) (1)
- S a I S T Bo S T O N Application-level Document Caching in the Internet (1995) (1)
- The skillful interrogation of the internet (2019) (1)
- Active Positive-Definite Matrix Completion (2017) (1)
- Deployment of an Algorithm for Large-Scale (2006) (1)
- Incoming editor's message (2005) (1)
- Characterizing network elements and paths using packet loss behavior (2003) (1)
- Analysis of OD Flows (Raw Data) (2003) (1)
- Unravelling the Dynamics of Online Ratings (2018) (1)
- Exploring the subspace method for network-wide anomaly diagnosis (2004) (1)
- Secure pairing of mobile devices (MA thesis) (2012) (1)
- Analysis of Origin Destination Flows (Raw Data) (2003) (1)
- Method and apparatus for secure and scalable transmission of data files in distributed networks (2001) (0)
- AD-A 272 946 Memory Contention in Scalable Cache-Coherent Multiprocessors (0)
- Matrix (factorization) reloaded: flexible methods for imputing genetic interactions with cross-species and side information. (2020) (0)
- Exploring explanations for matrix factorization recommender systems (Position Paper) (2016) (0)
- Identifying a framework for addressing the challenges inherent in the complexity of contemporary Web architecture. Locality in a Web of Streams (2005) (0)
- Multi-scale "spatial" analysis of computer network traffic data (2003) (0)
- Single-cell transcriptional networks in differentiating preadipocytes suggest drivers associated with tissue heterogeneity (2020) (0)
- Networking 2010: 9th International IFIP-TC6 Networking Conference. Chennai, India. May 11-15, 2010 (2010) (0)
- 4.2 Mechanisms for Incremental Deployment 5. Conclusions and Future Work 6. References 4.1 Scalability through Local Communication (0)
- NETWORKING 2010, 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings (2010) (0)
- Method and apparatus for group leader selection (2001) (0)
- Proceedings of the 9th IFIP TC 6 international conference on Networking (2010) (0)
- Performance Measurement and Modeling with the Lost Cycles Toolkit (1995) (0)
- Documentation for “ On Traffic Matrix Completion in the Internet ” (2012) (0)
- Explosions in Pocket Switched Networks (0)
- Information and Software Assurance: A Coordinated Approach to Cyber-Situation Awareness Based on Traffic Anomaly Detection (2019) (0)
- A fine-grained distance metric for analyzing Internet topology (2012) (0)
- Revealing an Inherently Limiting Factor in Human Mobility Prediction (2022) (0)
- Forwarding in mobile opportunistic networks (2009) (0)
- Session details: Measurements (2007) (0)
- Resource Management for Responsive Web Computing (1996) (0)
- Extracting Location from Contact Traces (2008) (0)
- Stochastic modeling applied to detection problems in network protocols and traffic (2009) (0)
- New Books and Multimedia (2007) (0)
- Curvature-based Analysis of Network Connectivity in Private Backbone Infrastructures (2022) (0)
- Public review for secure distributed dataMining and its application largescale network measurements (2006) (0)
- BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES Dissertation NETWORK-WIDE TRAFFIC ANALYSIS: METHODS AND APPLICATIONS by ANUKOOL LAKHINA (2005) (0)
- Characterizing Covid Waves via Spatio-Temporal Decomposition (2022) (0)
- DESP: Demixing Cell State Profiles from Dynamic Bulk Molecular Measurements (2023) (0)
- Analysis of brain region-specific co-expression networks reveals clustering of established and novel genes associated with Alzheimer disease (2020) (0)
- Position Paper : Exploring Explanations for Matrix Factorization Recommender Systems (2017) (0)
- Internet Measurement: Past, Present and Future (2004) (0)
This paper list is powered by the following services:
Other Resources About Mark Crovella
What Schools Are Affiliated With Mark Crovella?
Mark Crovella is affiliated with the following schools: