关注
Jeanna Matthews
Jeanna Matthews
Professor, Department of Computer Science, Clarkson University
在 clarkson.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A case for NOW (networks of workstations)
TE Anderson, DE Culler, D Patterson
IEEE micro 15 (1), 54-64, 1995
14211995
Serverless network file systems
TE Anderson, MD Dahlin, JM Neefe, DA Patterson, DS Roselli, RY Wang
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems …, 1995
12371995
Serverless network file systems
TE Anderson, MD Dahlin, JM Neefe, DA Patterson, DS Roselli, RY Wang
ACM Transactions on Computer Systems (TOCS) 14 (1), 41-79, 1996
5121996
Xen and the Art of Repeated Research.
B Clark, T Deshane, EM Dow, S Evanchik, M Finlayson, J Herne, ...
USENIX Annual Technical Conference, FREENIX Track, 135-144, 2004
2742004
Quantifying the performance isolation properties of virtualization systems
JN Matthews, W Hu, M Hapuarachchi, T Deshane, D Dimatos, G Hamilton, ...
Proceedings of the 2007 workshop on Experimental computer science, 6-es, 2007
2592007
Improving the performance of log-structured file systems with adaptive methods
JN Matthews, D Roselli, AM Costello, RY Wang, TE Anderson
ACM SIGOPS Operating Systems Review 31 (5), 238-251, 1997
2561997
Quantitative comparison of Xen and KVM
T Deshane, Z Shepherd, J Matthews, M Ben-Yehuda, A Shah, B Rao
Xen Summit, Boston, MA, USA, 1-2, 2008
2212008
System boot time reduction method
RL Coulson, JI Garney, JN Matthews, RJ Royer
US Patent 6,920,533, 2005
2202005
Managing bias in AI
D Roselli, J Matthews, N Talagala
Companion proceedings of the 2019 world wide web conference, 539-544, 2019
1592019
The good, the bad and the ugly of consumer cloud storage
W Hu, T Yang, JN Matthews
ACM SIGOPS Operating Systems Review 44 (3), 110-115, 2010
1442010
Intel® turbo memory: Nonvolatile disk caches in the storage hierarchy of mainstream computer systems
J Matthews, S Trika, D Hensgen, R Coulson, K Grimsrud
ACM Transactions on Storage (TOS) 4 (2), 1-24, 2008
1292008
Running Xen: a hands-on guide to the art of virtualization
JN Matthews, EM Dow, T Deshane, W Hu, J Bongio, PF Wilbur, ...
Prentice Hall PTR, 2008
1262008
A study of passwords and methods used in brute-force SSH attacks
J Owens, J Matthews
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 8, 2008
1162008
Quantitative analysis of intrusion detection systems: Snort and Suricata
JS White, T Fitzsimmons, JN Matthews
Cyber sensing 2013 8757, 10-21, 2013
1112013
A quantitative study of virtual machine live migration
W Hu, A Hicks, L Zhang, EM Dow, V Soni, H Jiang, R Bull, JN Matthews
Proceedings of the 2013 ACM cloud and autonomic computing conference, 1-10, 2013
1102013
Technique to write to a non-volatile memory
SN Trika, RW Faber, R Coulson, JN Matthews
US Patent 7,797,479, 2010
1032010
Algorithmic accountability: A primer
R Caplan, J Donovan, L Hanson, J Matthews
Data & Society 18, 2018
982018
Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach
S Gurajala, JS White, B Hudson, JN Matthews
Proceedings of the 2015 international conference on social media & society, 1-7, 2015
982015
Toward algorithmic transparency and accountability
S Garfinkel, J Matthews, SS Shapiro, JM Smith
Communications of the ACM 60 (9), 5-5, 2017
952017
Profile characteristics of fake Twitter accounts
S Gurajala, JS White, B Hudson, BR Voter, JN Matthews
Big Data & Society 3 (2), 2053951716674236, 2016
892016
系统目前无法执行此操作,请稍后再试。
文章 1–20