Author image not provided
 Justin Ma

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article60.19
Citation Count963
Publication count16
Publication years2005-2012
Available for download14
Average downloads per article871.86
Downloads (cumulative)12,206
Downloads (12 Months)1,042
Downloads (6 Weeks)100
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


16 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 16 of 16
Sort by:

1 published by ACM
May 2012 e-Energy '12: Proceedings of the 3rd International Conference on Future Energy Systems: Where Energy, Computing and Communication Meet
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 23,   Downloads (Overall): 185

Full text available: PDFPDF
We examine how to re-design the Internet for an energy-constrained future powered by diffuse, intermittent, and expensive power sources. We consider the types of constraints this might place upon the Internet architecture and the manner in which important network components can function in this new environment. We then attempt to ...
Keywords: energy, internet architecture

2
April 2012 NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 476

We present Resilient Distributed Datasets (RDDs), a distributed memory abstraction that lets programmers perform in-memory computations on large clusters in a fault-tolerant manner. RDDs are motivated by two types of applications that current computing frameworks handle inefficiently: iterative algorithms and interactive data mining tools. In both cases, keeping data in ...

3 published by ACM
November 2011 HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 3,   Downloads (12 Months): 38,   Downloads (Overall): 297

Full text available: PDFPDF
Recent years have seen a flurry of energy-efficient networking research. But does decreasing the energy used by the Internet actually save society much energy? To answer this question, we estimate the Internet's energy consumption. We include embodied energy (emergy)---the energy required to construct the Internet---a quantity that has often been ...
Keywords: consumption, sustainability, energy, emergy

4 published by ACM
October 2011 SOCC '11: Proceedings of the 2nd ACM Symposium on Cloud Computing
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 6,   Downloads (12 Months): 22,   Downloads (Overall): 499

Full text available: PDFPDF
We report on our experience scaling up the Mobile Millennium traffic information system using cloud computing and the Spark cluster computing framework. Mobile Millennium uses machine learning to infer traffic conditions for large metropolitan areas from crowdsourced data, and Spark was specifically designed to support such applications. Many studies of ...

5 published by ACM
August 2011 GreenNets '11: Proceedings of the 2nd ACM SIGCOMM workshop on Green networking
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 1,   Downloads (12 Months): 62,   Downloads (Overall): 158

Full text available: PDFPDF
We explore responses to a scenario in which the severity of a permanent energy crisis fundamentally limits our ability to maintain the current-day Internet architecture. In this paper, we review why this scenario---whose vague outline is known to many but whose consequences are generally understood only by the scientists who ...
Keywords: internet architecture, energy, resource limits

6 published by ACM
August 2011 SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conference
Publisher: ACM
Bibliometrics:
Citation Count: 92
Downloads (6 Weeks): 13,   Downloads (12 Months): 169,   Downloads (Overall): 1,448

Full text available: PDFPDF
Cluster computing applications like MapReduce and Dryad transfer massive amounts of data between their computation stages. These transfers can have a significant impact on job performance, accounting for more than 50% of job completion times. Despite this impact, there has been relatively little work on optimizing the performance of these ...
Keywords: data-intensive applications, datacenter networks, data transfer
Also published in:
October 2011  ACM SIGCOMM Computer Communication Review - SIGCOMM '11: Volume 41 Issue 4, August 2011

7 published by ACM
May 2011 ACM Transactions on Intelligent Systems and Technology (TIST): Volume 2 Issue 3, April 2011
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 15,   Downloads (12 Months): 157,   Downloads (Overall): 1,197

Full text available: PDFPDF
Malicious Web sites are a cornerstone of Internet criminal activities. The dangers of these sites have created a demand for safeguards that protect end-users from visiting them. This article explores how to detect malicious Web sites from the lexical and host-based features of their URLs. We show that this problem ...
Keywords: Online learning, malicious Web sites

8 published by ACM
May 2011 Communications of the ACM: Volume 54 Issue 5, May 2011
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 12,   Downloads (12 Months): 71,   Downloads (Overall): 1,348

Full text available: HtmlHtml  PDFPDF
Privacy-preserving attribution of IP packets can help balance forensics with an individual's right to privacy.

9 published by ACM
March 2010 VEE '10: Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 395

Full text available: PDFPDF
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a patchwork of mandated policies. Among these, personally identifying customer records must be carefully access-controlled, sensitive files must be encrypted on mobile computers to guard against physical theft, and intellectual ...
Keywords: memory tainting, virtualization, xen, difc, qemu
Also published in:
July 2010  ACM SIGPLAN Notices - VEE '10: Volume 45 Issue 7, July 2010

10
January 2010
Bibliometrics:
Citation Count: 0

Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwanted content ranging from spam-advertised products, to phishing sites, to dangerous “drive-by” exploits that infect a visitor's machine with malware. As a result, there has been broad interest in developing systems to prevent ...

11 published by ACM
June 2009 KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 90
Downloads (6 Weeks): 32,   Downloads (12 Months): 236,   Downloads (Overall): 2,014

Full text available: PDFPDF
Malicious Web sites are a cornerstone of Internet criminal activities. As a result, there has been broad interest in developing systems to prevent the end user from visiting such sites. In this paper, we describe an approach to this problem based on automated URL classification, using statistical methods to discover ...
Keywords: supervised learning, L1-regularization, malicious web sites

12 published by ACM
June 2009 ICML '09: Proceedings of the 26th Annual International Conference on Machine Learning
Publisher: ACM
Bibliometrics:
Citation Count: 73
Downloads (6 Weeks): 14,   Downloads (12 Months): 146,   Downloads (Overall): 1,082

Full text available: PDFPDF
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. We show that this application is particularly appropriate for online algorithms as the size of the training data is larger than can be efficiently processed ...

13 published by ACM
October 2006 IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Publisher: ACM
Bibliometrics:
Citation Count: 52
Downloads (6 Weeks): 0,   Downloads (12 Months): 14,   Downloads (Overall): 513

Full text available: PDFPDF
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions ranging from debugging and security to analytics and policy support. Traditionally, managers have relied on application adherence to a well established global port mapping: Web ...
Keywords: sequence analysis, statistical content modeling, network data mining, application signatures, traffic classification, protocol analysis, relative entropy

14 published by ACM
October 2006 IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 0,   Downloads (12 Months): 11,   Downloads (Overall): 567

Full text available: PDFPDF
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a methodology for inferring the phylogeny, or evolutionary tree, of such exploits. We have applied this methodology to traffic captured at several vantage points, and we ...
Keywords: binary emulation, bots, malware classification, worms, phylogeny

15 published by ACM
November 2005 WORM '05: Proceedings of the 2005 ACM workshop on Rapid malcode
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 355

Full text available: PDFPDF
Modern network worms spread with tremendous speed-potentially covering the planet in mere seconds. However, for most worms, this prodigious pace continues unabated long after the outbreak's incidence has peaked. Indeed, it is this ongoing infection activity that is typically used to identify compromised hosts. In principle, a stealthier worm might ...
Keywords: self-stop, distributed protocols, malware, worms

16 published by ACM
October 2005 ACM SIGOPS Operating Systems Review - SOSP '05: Volume 39 Issue 5, December 2005
Publisher: ACM
Bibliometrics:
Citation Count: 88
Downloads (6 Weeks): 3,   Downloads (12 Months): 73,   Downloads (Overall): 2,148

Full text available: PDFPDF
The rapid evolution of large-scale worms, viruses and bot-nets have made Internet malware a pressing concern. Such infections are at the root of modern scourges including DDoS extortion, on-line identity theft, SPAM, phishing, and piracy. However, the most widely used tools for gathering intelligence on new malware -- network honeypots ...
Keywords: honeyfarm, copy-on-write, honeypot, malware, virtual machine monitor
Also published in:
October 2005  SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us