Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Stefan Savage

Stefan Savage (born 1969) is an American computer science researcher, currently a Professor in the Systems and Networking Group at the University of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Fast non-volatile memories (NVMs) will soon appear on the processor memory bus alongside DRAM. The resulting hybrid memory… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Highly Cited
2012
Highly Cited
2012
With the proliferation of e-commerce, e-wallet, and e-health smartphone applications, the need for trusted mobile applications is… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
2012
2012
Enterprises must maintain and improve the reliability of their networks. To do this at reasonable expense, many enterprises… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2011
Highly Cited
2011
Tor is one of the most widely-used privacy enhancing technologies for achieving online anonymity and resisting censorship… Expand
  • figure 1
  • figure 2
2010
2010
We show that on the x86 it is possible to mount a return-oriented programming attack without using any return instructions. Our… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2005
Highly Cited
2005
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 4
Highly Cited
2000
Highly Cited
2000
This paper describes a tool for characterizing the TCP behavior of a remote host on the Internet. The tool allows the researcher… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1999
Highly Cited
1999
Despite its obvious success, the Internet suffers from end-to-end performance and availability problems. We believe that… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
1998
1998
Garbage collectors used in embedded systems such as Personal Java and Inferno or in operating systems such as SPIN must operate… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • table 2
1991
1991
Workstations for digital audio and video applications must support predictable processing, presentation, and transmission of… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4