Parents

Sign in to add mentor
Anna R. Karlin grad student 2000 University of Washington (MathTree)
 (Cooperative caching in local-area and wide -area networks.)
Henry M. Levy grad student 2000 University of Washington (Computer Science Tree)
 (Cooperative caching in local-area and wide -area networks.)

Children

Sign in to add trainee
Song Cen grad student 2002 UCSD
Anand Balachandran grad student 2003 UCSD
Leeann Bent grad student 2005 UCSD
Renata Teixeira grad student 2005 UCSD
Kiran Tati grad student 2006 UCSD
Marvin McNett grad student 2008 UCSD
Jerry Chou grad student 2009 UCSD
Gjergji Zyba grad student 2013 UCSD
Do-kyum Kim grad student 2014 UCSD
Audrey Randall grad student 2018-2023 UCSD (Computer Science Tree)
Paul Chung grad student 2024-2029 UCSD
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Tully JL, Rao S, Straw I, et al. (2025) Patient Care Technology Disruptions Associated With the CrowdStrike Outage. Jama Network Open. 8: e2530226
Voelker GM. (2020) Technical perspective: Fake 'likes' and targeting collusion networks Communications of the Acm. 63: 102-102
Meiklejohn S, Pomarole M, Jordan G, et al. (2016) A fistful of Bitcoins: characterizing payments among men with no names Communications of the Acm. 59: 86-93
Lu F, Voelker GM, Snoeren AC. (2015) Managing contention with Medley Ieee Transactions On Mobile Computing. 14: 579-591
Mitchell J, O'Neill E, Zyba G, et al. (2012) Limitations of scanned human copresence encounters for modelling proximity-borne malware 2012 4th International Conference On Communication Systems and Networks, Comsnets 2012
Gupta D, Vishwanath KV, McNett M, et al. (2011) DieCast: Testing distributed systems with an accurate scale model Acm Transactions On Computer Systems. 29
Ma J, Saul LK, Savage S, et al. (2011) Learning to detect malicious URLs Acm Transactions On Intelligent Systems and Technology. 2
Afanasyev M, Kohno T, Ma J, et al. (2011) Privacy-preserving network forensics Communications of the Acm. 54: 78-87
Tan K, Liu H, Zhang J, et al. (2011) Sora: High-performance software radio using general-purpose multi-core processors Communications of the Acm. 54: 99-107
Zyba G, Voelker GM, Ioannidis S, et al. (2011) Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd Proceedings - Ieee Infocom. 1179-1187
See more...