Publications

2009
Cheney, James, Stephen Chong, Nate Foster, Margo Seltzer, and Stijn Vansummeren. 2009. “Provenance: a future history.” Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, 957–964. ACM.
Patel, Shyamal, Konrad Lorincz, Richard Hughes, Nancy Huggins, John Growden, David Standaert, Metin Akay, Jennifer Dy, Matt Welsh, and Paolo Bonato. 2009. “Monitoring Motor Fluctuations in Patients With Parkinson’s Disease Using Wearable Sensors.” IEEE Transactions on Information Technology in Biomedicine 13 (6). Publisher's Version
Margo, Daniel, and Margo Seltzer. 2009. “The Case for Browser Provenance.” 1st Workshop on the Theory and Practice of Provenance (TaPP’09).
Muniswamy-Reddy, Kiran-Kumar, and David A. Holland. 2009. “Causality-Based Versioning.” 7th USENIX Conference on File and Storage Technologies (FAST ’09). Publisher's Version
Muniswamy-Reddy, Kiran-Kumar, Uri Braun, David A. Holland, Peter Macko, Diana Maclean, Daniel Margo, Margo Seltzer, and Robin Smogor. 2009. “Layering in Provenance Systems.” 2009 USENIX Annual Technical Conference. San Diego, California. Publisher's Version Abstract
Digital provenance describes the ancestry or history of a digital object. Most existing provenance systems, however, operate at only one level of abstraction: the system call layer, a workflow specification, or the high-level constructs of a particular application. The provenance collectable in each of these layers is different, and all of it can be important. Single-layer systems fail to account for the different levels of abstraction at which users need to reason about their data and processes. These systems cannot integrate data provenance across layers and cannot answer questions that require an integrated view of the provenance. We have designed a provenance collection structure facilitating the integration of provenance across multiple levels of abstraction, including a workflow engine, a web browser, and an initial runtime Python provenance tracking wrapper. We layer these components atop provenance-aware network storage (NFS) that builds upon a Provenance-Aware Storage System (PASS). We discuss the challenges of building systems that integrate provenance across multiple layers of abstraction, present how we augmented systems in each layer to ntegrate provenance, and present use cases that demonstrate how provenance spanning multiple layers provides functionality not available in existing systems.Our evaluation shows that the overheads imposed by layering provenance systems are reasonable.
Muniswamy-Reddy, Kiran-Kumar, Peter Macko, and Margo Seltzer. 2009. “Making a Cloud Provenance-Aware.” 1st Workshop on the Theory and Practice of Provenance (TaPP’09). Publisher's Version
Lorincz, Konrad, Bor-Rong Chen, Geoffrey Werner Challen, Atanu Roy Chowdhury, Shyamal Patel, Paolo Bonato, and Matt Welsh. 2009. “Mercury: A Wearable Sensor Network Platform for High-Fidelity Motion Analysis.” Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys’09). Berkeley, CA.
Waterman, Jason, Geoffrey Werner Challen, and Matt Welsh. 2009. “Peloton: Coordinated Resource Management for Sensor Networks.” 12th Workshop on Hot Topics in Operating Systems (HotOS-XII) (2009). Publisher's Version
Bahl, Paramvir, Ranveer Chandra, Thomas Moscibroda, Rohan Murty, and Matt Welsh. 2009. “White Space Networking with Wi-Fi like Connectivity.” ACM SIGCOMM 2009. Barcelona. Publisher's Version
2008
Seltzer, Margo. 2008. “Beyond relational databases.” Communications of the ACM 51 (7). ACM: 52–58.
Seltzer, Margo. 2008. “The present and future of SAN/NAS: interview with Dave Hitz and Brian Pawlowsky of NetApp.” ; login:: the magazine of USENIX & SAGE 33 (3). USENIX Association: 39–44.
Moreau, Luc, Bertram Ludäscher, Ilkay Altintas, Roger S Barga, Shawn Bowers, Steven Callahan, George Chin, et al. 2008. “Special issue: The first provenance challenge.” Concurrency and computation: practice and experience 20 (5). Wiley Online Library: 409–418.
Ledlie, Jonathan, Margo Seltzer, and Peter Pietzuch. 2008. “Proxy network coordinates.” Target 22: 25.
Holland, David A., Uri Braun, Diana Maclean, Kiran-Kumar Muniswamy-Reddy, and Margo Seltzer. 2008. “Choosing a Data Model and Query Language for Provenance.” Proceedings of the 2nd International Provenance and Annotation Workshop. Salt Lake City, Utah. Publisher's Version
Muniswamy-Reddy, Kiran-Kumar, Joseph Barillari, Uri Braun, David A. Holland, Diana Maclean, Margo Seltzer, and Stephen D. Holland. 2008. “Layering in Provenance-Aware Storage Systems,” no. TR-04-08. Publisher's Version
Holland, David A., Margo Seltzer, Uri Braun, and Kiran-Kumar Muniswamy-Reddy. 2008. “PASSing the provenance challenge.” Concurrency and Control: Practice and Experience 20. Publisher's Version
Braun, Uri, Avraham Shinnar, and Margo Seltzer. 2008. “Securing Provenance.” Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec). San Jose, California. Publisher's Version
Murty, Rohan, Jitendra Padhye, Alec Wolman, and Matt Welsh. 2008. “An Architecture for Extensible Wireless LANs.” Proc. Seventh ACM Workshop on Hot Topics in Networks (HotNets-VII). Publisher's Version
Murty, Rohan, Geoffrey Mainland, Ian Rose, Atanu Roy Chowdhury, Abhimanyu Gosain, Josh Bers, and Matt Welsh. 2008. “CitySense: An Urban-Scale Wireless Sensor Network and Testbed.” 2008 IEEE International Conference on Technologies for Homeland Security. Publisher's Version
Murty, Rohan, Jitendra Padhye, Alec Wolman, and Brian Zill. 2008. “Designing High Performance Enterprise Wi-Fi Networks.” 5th USENIX/ACM Symposium on Networked Design and Implementation (NSDI’08).

Pages