Margo I. Seltzer

Affiliations: 
Computer Science Harvard University, Cambridge, MA, United States 
Google:
"Margo Seltzer"

Children

Sign in to add trainee
Christopher Allen Small grad student (Neurotree)
Yasuhiro Endo grad student 2000 Harvard
Xiaolan Zhang grad student 2001 Harvard
Robert P. Fischer grad student 2003 Harvard
Konstantinos Magoutis grad student 2003 Harvard
Daniel J. Ellard grad student 2004 Harvard
Alexandra Fedorova grad student 2006 Harvard
Jonathan T. Ledlie grad student 2007 Harvard
Christopher A. Stein grad student 2007 Harvard
Kiran-Kumar Muniswamy-Reddy grad student 2010 Harvard
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Han X, Mickens J, Gehani A, et al. (2020) Xanthus: Push-button Orchestration of Host Provenance Data Collection. Arxiv: Cryptography and Security. 27-32
Rao M, Bacon DF, Parkes DC, et al. (2020) Incentivizing Deep Fixes in Software Economies Ieee Transactions On Software Engineering. 46: 51-70
Mason T, Doudali TD, Seltzer M, et al. (2020) Unexpected Performance of Intel® Optane™ DC Persistent Memory Ieee Computer Architecture Letters. 1-1
Pasquier T, Lau MK, Trisovic A, et al. (2017) If these data could talk. Scientific Data. 4: 170114
Borkin MA, Yeh CS, Boyd M, et al. (2013) Evaluation of filesystem provenance visualization tools. Ieee Transactions On Visualization and Computer Graphics. 19: 2476-85
Muniswamy-Reddy K, Seltzer M. (2010) Provenance as first class cloud data Operating Systems Review. 43: 11-16
Holland DA, Seltzer MI, Braun U, et al. (2008) PASSing the provenance challenge Concurrency and Computation: Practice and Experience. 20: 531-540
Holland DA, Lim AT, Seltzer MI. (2005) An architecture a day keeps the hacker away Acm Sigarch Computer Architecture News. 33: 34-41
Zhang X, Seltzer M. (2001) HBench:Java: An application-specific benchmarking framework for Java Virtual Machines Concurrency Computation Practice and Experience. 13: 775-792
Small C, Seltzer MI. (1998) MiSFIT: Constructing safe extensible systems Ieee Concurrency. 6: 34-41
See more...