Tom M. Kroeger

Orcid: 0000-0003-3218-6412

According to our database1, Tom M. Kroeger authored at least 21 papers between 1996 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Using advanced data structures to enable responsive security monitoring.
Clust. Comput., 2022

2021
Timely Reporting of Heavy Hitters Using External Memory.
ACM Trans. Database Syst., 2021

2019
Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Virtually the Same: Comparing Physical and Virtual Testbeds.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
The Online Event-Detection Problem.
CoRR, 2018

2017
Locally Operated Cooperative Key Sharing (LOCKS).
Proceedings of the 2017 International Conference on Computing, 2017

2016
Anti-Persistence on Persistent Storage: History-Independent Sparse Tables and Dictionaries.
Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2016

RESAR: Reliable Storage at Exabyte Scale.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database.
CoRR, 2015

Percival: A searchable secret-split datastore.
Proceedings of the IEEE 31st Symposium on Mass Storage Systems and Technologies, 2015

Tracking Network Events with Write Optimized Data Structures.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
Automatic generation of behavioral hard disk drive access time models.
Proceedings of the IEEE 30th Symposium on Mass Storage Systems and Technologies, 2014

2013
Fourier-assisted machine learning of hard disk drive access time models.
Proceedings of the 8th Parallel Data Storage Workshop, 2013

Principles of authentication.
Proceedings of the New Security Paradigms Workshop, 2013

Horus: fine-grained encryption-based security for large-scale storage.
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013

2012
A distributed approach to taming peak demand.
Proceedings of the 2012 International Green Computing Conference, 2012

2001
Design and Implementation of a Predictive File Prefetching Algorithm.
Proceedings of the General Track: 2001 USENIX Annual Technical Conference, 2001

1999
The Case for Efficient File Access Pattern Modeling.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

1997
Exploring the Bounds of Web Latency Reduction from Caching and Prefetching.
Proceedings of the 1st USENIX Symposium on Internet Technologies and Systems, 1997

1996
Predicting Future File-System Actions From Prior Events.
Proceedings of the USENIX Annual Technical Conference, 1996


  Loading...