Geoffrey M. Voelker
Affiliations: | Computer Science and Engineering | University of California, San Diego, La Jolla, CA |
Area:
Computer ScienceWebsite:
https://cseweb.ucsd.edu/~voelker/Google:
"Geoffrey M. Voelker"Bio:
https://ieeexplore.ieee.org/author/37294838300
https://www.proquest.com/openview/52c48d003c291402fe35007873d8e491/1
Parents
Sign in to add mentorAnna R. Karlin | grad student | 2000 | University of Washington (MathTree) | |
(Cooperative caching in local-area and wide -area networks.) | ||||
Henry M. Levy | grad student | 2000 | University of Washington (Computer Science Tree) | |
(Cooperative caching in local-area and wide -area networks.) |
Children
Sign in to add traineeSong Cen | grad student | 2002 | UCSD |
Anand Balachandran | grad student | 2003 | UCSD |
Leeann Bent | grad student | 2005 | UCSD |
Renata Teixeira | grad student | 2005 | UCSD |
Kiran Tati | grad student | 2006 | UCSD |
Marvin McNett | grad student | 2008 | UCSD |
Jerry Chou | grad student | 2009 | UCSD |
Gjergji Zyba | grad student | 2013 | UCSD |
Do-kyum Kim | grad student | 2014 | UCSD |
Audrey Randall | grad student | 2018-2023 | UCSD (Computer Science Tree) |
Paul Chung | grad student | 2024-2029 | UCSD |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Tully JL, Rao S, Straw I, et al. (2025) Patient Care Technology Disruptions Associated With the CrowdStrike Outage. Jama Network Open. 8: e2530226 |
Voelker GM. (2020) Technical perspective: Fake 'likes' and targeting collusion networks Communications of the Acm. 63: 102-102 |
Meiklejohn S, Pomarole M, Jordan G, et al. (2016) A fistful of Bitcoins: characterizing payments among men with no names Communications of the Acm. 59: 86-93 |
Lu F, Voelker GM, Snoeren AC. (2015) Managing contention with Medley Ieee Transactions On Mobile Computing. 14: 579-591 |
Mitchell J, O'Neill E, Zyba G, et al. (2012) Limitations of scanned human copresence encounters for modelling proximity-borne malware 2012 4th International Conference On Communication Systems and Networks, Comsnets 2012 |
Gupta D, Vishwanath KV, McNett M, et al. (2011) DieCast: Testing distributed systems with an accurate scale model Acm Transactions On Computer Systems. 29 |
Ma J, Saul LK, Savage S, et al. (2011) Learning to detect malicious URLs Acm Transactions On Intelligent Systems and Technology. 2 |
Afanasyev M, Kohno T, Ma J, et al. (2011) Privacy-preserving network forensics Communications of the Acm. 54: 78-87 |
Tan K, Liu H, Zhang J, et al. (2011) Sora: High-performance software radio using general-purpose multi-core processors Communications of the Acm. 54: 99-107 |
Zyba G, Voelker GM, Ioannidis S, et al. (2011) Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd Proceedings - Ieee Infocom. 1179-1187 |