default search action
Steven A. Hofmeyr
Person information
- affiliation: Lawrence Berkeley National Laboratory
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Steven A. Hofmeyr, Aydin Buluç, Robert Riley, Rob Egan, Oguz Selvitopi, Leonid Oliker, Katherine A. Yelick, Migun Shakya, Brett Youtsey, Ariful Azad:
Exabiome: Advancing Microbial Science through Exascale Computing. Comput. Sci. Eng. 26(2): 8-15 (2024) - [c34]Kirtus G. Leyba, Steven A. Hofmeyr, Stephanie Forrest, Judy L. Cannon, Melanie E. Moses:
SIMCoV-GPU: Accelerating an Agent-Based Model for Exascale. HPDC 2024: 322-333 - 2023
- [c33]Hunter McCoy, Steven A. Hofmeyr, Katherine A. Yelick, Prashant Pandey:
Singleton Sieving: Overcoming the Memory/Speed Trade-Off in Exascale κ-mer Analysis. ACDA 2023: 213-224 - [c32]Doru-Thom Popovici, Muaaz Gul Awan, Giulia Guidi, Rob Egan, Steven A. Hofmeyr, Leonid Oliker, Katherine A. Yelick:
Designing Efficient SIMD Kernels for High Performance Sequence Alignment. IPDPS Workshops 2023: 167-176 - [c31]Hunter McCoy, Steven A. Hofmeyr, Katherine A. Yelick, Prashant Pandey:
High-Performance Filters for GPUs. PPoPP 2023: 160-173 - 2022
- [c30]Jhe-Yu Liou, Muaaz Awan, Steven A. Hofmeyr, Stephanie Forrest, Carole-Jean Wu:
Understanding the Power of Evolutionary Computation for GPU Code Optimization. IISWC 2022: 185-198 - [i9]Jhe-Yu Liou, Muaaz Awan, Steven A. Hofmeyr, Stephanie Forrest, Carole-Jean Wu:
Understanding the Power of Evolutionary Computation for GPU Code Optimization. CoRR abs/2208.12350 (2022) - [i8]Hunter McCoy, Steven A. Hofmeyr, Katherine A. Yelick, Prashant Pandey:
High-Performance Filters For GPUs. CoRR abs/2212.09005 (2022) - 2021
- [j15]Melanie E. Moses, Steven A. Hofmeyr, Judy L. Cannon, Akil Andrews, Rebekah Gridley, Monica Hinga, Kirtus G. Leyba, Abigail Pribisova, Vanessa Surjadidjaja, Humayra Tasnim, Stephanie Forrest:
Spatially distributed infection increases viral load in a computational model of SARS-CoV-2 lung infection. PLoS Comput. Biol. 17(12) (2021) - [c29]Muaaz Gul Awan, Steven A. Hofmeyr, Rob Egan, Nan Ding, Aydin Buluç, Jack Deslippe, Leonid Oliker, Katherine A. Yelick:
Accelerating large scale de novo metagenome assembly using GPUs. SC 2021: 7 - 2020
- [j14]Muaaz G. Awan, Jack Deslippe, Aydin Buluç, Oguz Selvitopi, Steven A. Hofmeyr, Leonid Oliker, Katherine A. Yelick:
ADEPT: a domain independent sequence alignment strategy for gpu architectures. BMC Bioinform. 21(1): 406 (2020) - [c28]Francesco Peverelli, Lorenzo Di Tucci, Marco D. Santambrogio, Nan Ding, Steven A. Hofmeyr, Aydin Buluç, Leonid Oliker, Katherine A. Yelick:
GPU accelerated partial order multiple sequence alignment for long reads self-correction. IPDPS Workshops 2020: 174-182 - [c27]Alberto Zeni, Giulia Guidi, Marquita Ellis, Nan Ding, Marco D. Santambrogio, Steven A. Hofmeyr, Aydin Buluç, Leonid Oliker, Katherine A. Yelick:
LOGAN: High-Performance GPU-Based X-Drop Long-Read Alignment. IPDPS 2020: 462-471 - [i7]Katherine A. Yelick, Aydin Buluç, Muaaz G. Awan, Ariful Azad, Benjamin Brock, Rob Egan, Saliya Ekanayake, Marquita Ellis, Evangelos Georganas, Giulia Guidi, Steven A. Hofmeyr, Oguz Selvitopi, Cristina Teodoropol, Leonid Oliker:
The Parallelism Motifs of Genomic Data Analysis. CoRR abs/2001.06989 (2020) - [i6]Alberto Zeni, Giulia Guidi, Marquita Ellis, Nan Ding, Marco D. Santambrogio, Steven A. Hofmeyr, Aydin Buluç, Leonid Oliker, Katherine A. Yelick:
LOGAN: High-Performance GPU-Based X-Drop Long-Read Alignment. CoRR abs/2002.05200 (2020)
2010 – 2019
- 2019
- [c26]John Bachan, Scott B. Baden, Steven A. Hofmeyr, Mathias Jacquelin, Amir Kamil, Dan Bonachea, Paul H. Hargrove, Hadia Ahmed:
UPC++: A High-Performance Communication Framework for Asynchronous Computation. IPDPS 2019: 963-973 - 2018
- [j13]Matteo Ferroni, Juan A. Colmenares, Steven A. Hofmeyr, John Kubiatowicz, Marco D. Santambrogio:
Enabling power-awareness for the Xen hypervisor. SIGBED Rev. 15(1): 36-42 (2018) - [c25]Connor Imes, Steven A. Hofmeyr, Henry Hoffmann:
Energy-efficient Application Resource Scheduling using Machine Learning Classifiers. ICPP 2018: 45:1-45:11 - [c24]Lorenzo Di Tucci, Davide Conficconi, Alessandro Comodi, Steven A. Hofmeyr, David Donofrio, Marco D. Santambrogio:
A Parallel, Energy Efficient Hardware Architecture for the merAligner on FPGA Using Chisel HCL. IPDPS Workshops 2018: 214-217 - [c23]Evangelos Georganas, Rob Egan, Steven A. Hofmeyr, Eugene Goltsman, Bill Arndt, Andrew Tritt, Aydin Buluç, Leonid Oliker, Katherine A. Yelick:
Extreme scale de novo metagenome assembly. SC 2018: 10:1-10:13 - [i5]Evangelos Georganas, Rob Egan, Steven A. Hofmeyr, Eugene Goltsman, Bill Arndt, Andrew Tritt, Aydin Buluç, Leonid Oliker, Katherine A. Yelick:
Extreme Scale De Novo Metagenome Assembly. CoRR abs/1809.07014 (2018) - 2017
- [j12]Matteo Ferroni, Andrea Corna, Andrea Damiani, Rolando Brondolin, Juan A. Colmenares, Steven A. Hofmeyr, John Kubiatowicz, Marco D. Santambrogio:
Power Consumption Models for Multi-Tenant Server Infrastructures. ACM Trans. Archit. Code Optim. 14(4): 38:1-38:22 (2017) - [c22]Marquita Ellis, Evangelos Georganas, Rob Egan, Steven A. Hofmeyr, Aydin Buluç, Brandon Cook, Leonid Oliker, Katherine A. Yelick:
Performance Characterization of De Novo Genome Assembly on Leading Parallel Systems. Euro-Par 2017: 79-91 - [c21]Evangelos Georganas, Marquita Ellis, Rob Egan, Steven A. Hofmeyr, Aydin Buluç, Brandon Cook, Leonid Oliker, Katherine A. Yelick:
MerBench: PGAS Benchmarks for High Performance Genome Assembly. PAW@SC 2017: 5:1-5:4 - [c20]John Bachan, Dan Bonachea, Paul Hargrove, Steven A. Hofmeyr, Mathias Jacquelin, Amir Kamil, Brian van Straalen, Scott B. Baden:
The UPC++ PGAS library for Exascale Computing. PAW@SC 2017: 7:1-7:4 - [i4]Evangelos Georganas, Steven A. Hofmeyr, Rob Egan, Aydin Buluç, Leonid Oliker, Daniel Rokhsar, Katherine A. Yelick:
Extreme-Scale De Novo Genome Assembly. CoRR abs/1705.11147 (2017) - 2016
- [j11]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest:
Hype and heavy tails: A closer look at data breaches. J. Cybersecur. 2(1): 3-14 (2016) - [c19]Matteo Ferroni, Juan A. Colmenares, Steven A. Hofmeyr, John Kubiatowicz, Marco D. Santambrogio:
Enabling Power-Awareness for the Xen Hypervisor. EWiLi 2016 - [c18]Steven A. Hofmeyr, Costin Iancu, Juan A. Colmenares, Eric Roman, Brian Austin:
Time-Sharing Redux for Large-Scale HPC Systems. HPCC/SmartCity/DSS 2016: 301-308 - 2015
- [c17]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten:
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. ACSAC 2015: 391-400 - [c16]Evangelos Georganas, Aydin Buluç, Jarrod Chapman, Steven A. Hofmeyr, Chaitanya Aluru, Rob Egan, Leonid Oliker, Daniel Rokhsar, Katherine A. Yelick:
HipMer: an extreme-scale de novo genome assembler. SC 2015: 14:1-14:11 - [c15]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest:
Hype and Heavy Tails: A Closer Look at Data Breaches. WEIS 2015 - 2014
- [j10]Khaled Z. Ibrahim, Steven A. Hofmeyr, Costin Iancu:
The Case for Partitioning Virtual Machines on Multicore Architectures. IEEE Trans. Parallel Distributed Syst. 25(10): 2683-2696 (2014) - 2013
- [j9]Steven A. Hofmeyr, Juan A. Colmenares, Costin Iancu, John Kubiatowicz:
Juggle: addressing extrinsic load imbalances in SPMD applications on multicore computers. Clust. Comput. 16(2): 299-319 (2013) - [c14]Juan A. Colmenares, Gage Eads, Steven A. Hofmeyr, Sarah Bird, Miquel Moretó, David Chou, Brian Gluzman, Eric Roman, Davide B. Bartolini, Nitesh Mor, Krste Asanovic, John Kubiatowicz:
Tessellation: refactoring the OS around explicit resource containers with continuous adaptation. DAC 2013: 76:1-76:10 - 2012
- [c13]Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest:
Beyond the blacklist: modeling malware spread and the effect of interventions. NSPW 2012: 53-66 - [i3]Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest:
Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions. CoRR abs/1202.3987 (2012) - [i2]Benjamin Edwards, Steven A. Hofmeyr, George Stelle, Stephanie Forrest:
Internet Topology over Time. CoRR abs/1202.3993 (2012) - [i1]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. CoRR abs/1202.4008 (2012) - 2011
- [c12]Khaled Z. Ibrahim, Steven A. Hofmeyr, Costin Iancu:
Characterizing the Performance of Parallel Applications on Multi-socket Virtual Machines. CCGRID 2011: 1-12 - [c11]Juan A. Colmenares, Sarah Bird, Gage Eads, Steven A. Hofmeyr, Albert Kim, Rohit Poddar, Hilfi Alkaff, Krste Asanovic, John Kubiatowicz:
Tessellation operating system: Building a real-time, responsive, high-throughput client OS for many-core architectures. Hot Chips Symposium 2011: 1 - [c10]Steven A. Hofmeyr, Juan A. Colmenares, Costin Iancu, John Kubiatowicz:
Juggle: proactive load balancing on multicore computers. HPDC 2011: 3-14 - [c9]Khaled Z. Ibrahim, Steven A. Hofmeyr, Costin Iancu, Eric Roman:
Optimized pre-copy live migration for memory intensive applications. SC 2011: 40:1-40:11 - [c8]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. WEIS 2011 - [c7]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. WEIS (Springer Volume) 2011: 149-170 - 2010
- [c6]Costin Iancu, Steven A. Hofmeyr, Filip Blagojevic, Yili Zheng:
Oversubscription on multicore processors. IPDPS 2010: 1-11 - [c5]Steven A. Hofmeyr, Costin Iancu, Filip Blagojevic:
Load balancing on speed. PPoPP 2010: 147-158
2000 – 2009
- 2008
- [c4]Costin Iancu, Steven A. Hofmeyr:
Runtime optimization of vector operations on large scale SMP clusters. PACT 2008: 122-132 - [c3]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji:
The Evolution of System-Call Monitoring. ACSAC 2008: 418-430 - 2007
- [r1]Steven A. Hofmeyr:
Why Today. Information Security Management Handbook, 6th ed. 2007: 2623-2628 - 2005
- [j8]Steven A. Hofmeyr:
Host intrusion prevention: Part of the operating system or on top of the operating system? Comput. Secur. 24(6): 440-442 (2005) - 2004
- [j7]Steven A. Hofmeyr:
The implications of immunology for secure systems design. Comput. Secur. 23(6): 453-455 (2004) - 2003
- [j6]Steven A. Hofmeyr:
Why Today's Security Technologies Are So Inadequate: History, Implications, and New Approaches. Inf. Secur. J. A Glob. Perspect. 12(1): 17-21 (2003) - [j5]Steven A. Hofmeyr:
A New Approach to Security: Learning from Immunology. Inf. Secur. J. A Glob. Perspect. 12(4): 29-35 (2003) - 2000
- [j4]Steven A. Hofmeyr, Stephanie Forrest:
Architecture for an Artificial Immune System. Evol. Comput. 8(4): 443-473 (2000)
1990 – 1999
- 1998
- [j3]Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji:
Intrusion Detection Using Sequences of System Calls. J. Comput. Secur. 6(3): 151-180 (1998) - 1997
- [j2]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji:
Computer Immunology. Commun. ACM 40(10): 88-96 (1997) - [j1]Andrew P. Kosoresow, Steven A. Hofmeyr:
Intrusion Detection via System Call Traces. IEEE Softw. 14(5): 35-42 (1997) - [c2]Anil Somayaji, Steven A. Hofmeyr, Stephanie Forrest:
Principles of a computer immune system. NSPW 1997: 75-82 - 1996
- [c1]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff:
A Sense of Self for Unix Processes. S&P 1996: 120-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint