Jeanna Matthews' Publications/Presentations

J. Matthews,
Patterns and Anti-Patterns, Principles and Pitfalls: Accountability and Transparency in AI
Association for the Advancement of Artificial Intelligence (AAAI) AI Magazine .

M. Vigil-Hayes, J. Matthews, A. Acker, D. Carter,
Reflections on Alternative Internet Models and How They Inform More Mindful Connectivity
ITU Journal, ICT Discoveries, Special Issue 2, Data for Good.

J. Matthews
Algorithms Could Create an Even Playing Field—if We Insist on It
Future Tense, Slate, August 27 2018.
A response to Deji Olukotun's short story When We Were Patched .

J. Matthews, N. Adams, J. Greco,
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System
DEF CON 26 , Las Vegas, August 9-12 2018.
Schedule , Slides , Video

M. Goerzen, J. Matthews, J. Donovan,
Beyond the Lulz: Black-Hat Trolling, White-Hat Trolling, Attacking and Defending Our Attention Landscape
DEF CON 26, Las Vegas, August 9-12 2018.
Schedule , Slides

J. Matthews, N. Adams, J. Greco,
You're just complaining because you're guilty: A Guide for Citizens and Hackers to Adversarial Testing of Software Used In the Criminal Justice System
Bsides Las Vegas 2018, Las Vegas, August 7-8 2018.

M. Goerzen, J. Donovan, J. Matthews,
Trolling, Free Speech, and the Hacking of Our Media/Attention Landscape
Hackers on Planet Earth (HOPE) , New York, NY, July 20-22 2018.

S. Gurajala, J. Matthews
Twitter analysis to understand societal response to air quality
Proceedings of the 9th International Conference on Social Media & Society
Copenhagen, Denmark, July 18-20 2018.

J. Matthews
Statement on the AV Start Act ,
Advocates for Highway and Auto Safety Press Conference , July 23 2018.
Quoted by Ralph Nader in Wall Street Journal op-ed on August 22 2018.
Quoted in On landmark autonomous vehicle bill, dozens of safety advocates urge Congress not to rush forward
Quoted in Safety Advocates Sound Alarm on Self-Driving-Vehicle Legislation
Quoted in Critics Say Driverless Car Bill Has Shortcomings

S. Lacambra, J. Matthews and K. Walsh.
Opening the Black Box: Defendants' Rights to Confront Forensic Software
The Champion , May 2018.

J. Pinargote, R. Mpfumo, L. Madruga, X. Cueva, G. García, A. Gómez, A. Fernández , J. Matthews, and S. Kellogg.
Lessons from El Paquete, Cuba's Offline Internet
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS '18 ), June 2018.
PDF , Slides

A.I.’s HUMAN SHADOW: Bias and Error in our Algorithmic Selves , Panelist, World Science Festival, New York University, June 3 2018.

Manufactured Memory, Manufactured History , Panelist, International Center of Photography , New York, USA, May 27 2018.

Machines That Learn: Can They Also Be Taught Human Values? , Panelist, RightsCon , Toronto, Canada, May 16 2018.

R. Caplan, J. Donovan, L. Hanson, and J. Matthews
Algorithmic Accountability: A Primer ,
Data and Society Report, April 18 2018.

E. Dow and J. Matthews
A Host-Agnostic, Supervised Machine Learning Approach to Automated Overload Detection in Virtual Machine Workloads
2nd IEEE International Conference on Smart Cloud 2017 (SmartCloud 2017), New York, New York, November 3-5 2017.

The Ada Workshop/Diversity Workshop , Co-chair and panelist, Shanghai, China, Symposium on Operating Systems Principles , October 27 2017.

J. Matthews ,
Algorithmic Accountability and Transparency ,
Mujeres en Data Science , Santiago, Chile, October 16 2017.

J. Matthews
Wired in the Wild ,
Adirondack Life , September/October issue 2017.

J. Matthews ,
Big Data's Big Problems ,
Talk at Anycon 2017 , Albany, NY, June 17 2017.

S. Garfinkel, J. Matthews, S. Shapiro, J. Smith
Toward Algorithmic Transparency and Accountability ,
Communications of the ACM , Vol. 60, No. 9, Page 5, Sept. 2017, 10.1145/3125780.
Panel session at National Press Club (9/14/2017), Summary .

E. Dow and J. Matthews
A Host-Independent Supervised Machine Learning Approach to Automated Overload Detection in Virtual Machine Workloads
2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W), Automation of Cloud Configuration and Operations Workshop (ACCO 2017), , Tucson, AZ, USA, 18-22 Sept. 2017.

ACM US Public Policy Council (USACM) ,
Statement on Algorithmic Transparency and Accountability ,
January 12 2017.

R. Bull, J. Matthews, K. Trumbull
VLAN Hopping, ARP Poisoning & Man-In-The-Middle Attacks in Virtualized Environments
DEFCON24, Las Vegas, August 6-9 2016.
Paper , Video , Demos , Slides , Abstract/Bios

C. Fiandrino, B. Kantarci, F. Anjomshoa, D. Kliazovich, P. Bouvry, J. Matthews,
Sociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms
Proceedings of IEEE GLOBECOM 2016, Washington D.C., December 2016.

S. Gurajala, J White, B.Hudson, B. Voter and J. Matthews,
Profile characteristics of fake Twitter accounts
Big Data & Society, July‐December 2016: 1‐13.
DOI: 10.1177/2053951716674236

E. Dow and J. Matthews,
WAYFINDER: parallel virtual machine reallocation through A* search
Memetic Computing, 8(4), 255-267, Springer-Verlag Berlin Heidelberg, August 2016.
DOI 10.1007/s12293-016-0205-2

H. Jiang, Y. Liu, J. Matthews,
IP Geolocation Estimation using Neural Networks with Stable Landmarks
19th IEEE Global Internet Symposium, San Francisco, CA, USA, April 11, 2016.
PDF , Slides .

P. Glasser, O. Kocabas, B. Kantarci, T. Soyata, and J. Matthews,
Energy efficient VM migration revisited: SLA assurance and minimum service disruption with available hosts
Proceedings of the 12th International Conference on High-capacity Optical Networks and Emerging/Enabling Technologies (HONET), Dec 2015. Best Paper Award.

E. Dow and J. Matthews,
Virtual Machine Migration Plan Generation Through A* Search
2015 IEEE 4th International Conference on Cloud Networking (CloudNet) , Niagrara Falls, ON, October 5-7 2015.

R. Bull and J. Matthews,
Exploring Layer 2 Network Security in Virtualized Environments
DEFCON23, Las Vegas, August 6-9 2015.
Paper , Video , Other Materials , Journal Version, Journal link

R. Bull and J. Matthews
Critical analysis of layer 2 network security in virtualised environments
International Journal of Communication Networks and Distributed Systems 2016 Vol. 17 No. 3.

S. Gurajala, J. White, B. Hudson, J. Matthews,
Fake Twitter accounts: Profile characteristics obtained using an activity-based pattern detection approach
2015 Social Media & Society Conference, Toronto, Canada, July 27-29 2015.

J. White and J. Matthews
Connectors, Mavens, Salesman and More: An Actor-Based Online Social Network (OSN) Analysis Method Using Tensed Predicate Logic
ASE SocialInformatics 2014, December 2014.

J. Matthews
Strategies for Computer Security Research: Practical Strategies for Taming the Angst and Changing the World
Women in Cybersecurity Conference , Nashville, TN, April 11-12 2014.
Slides: PDF , referenced materials .

J. White and J. Matthews
It's you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit
(Malware 2013), October 2013.

W. Hu, A. Hicks, L. Zhang, E. Dow, V. Soni, H. Jiang, R. Bull, J. Matthews
A Quantitative Study of Virtual Machine Live Migration
The ACM Cloud and Autonomic Computing Conference (CAC2013), August 2013.

J. White, T. Fitzsimmons, J. Matthews
Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata
Cyber Sensing 2013, Proceedings of SPIE (8757) , April 2013.

Future of Cloud Computing Think Tank ,
Excerpt .

J. White, J. Matthews, J. Stacy
A method for the automated detection phishing websites through both site characteristics and image analysis
Cyber Sensing 2012, Proceedings of SPIE 8408/84080B(2012) , April 2012.

J. White, J. Matthews, J. Stacy
Coalmine: an experience in building a system for social media analytics
Cyber Sensing 2012, Proceedings of SPIE 8408/84080A(2012) , April 2012.

W. Hu, J. Matthews, T. Yang
The Good, the Bad and the Ugly of Consumer Cloud Storage
Operating System Review, Volume 44, Issue 3, July 2010 .

J. Matthews, T. Garfinkel, C. Hoff, J. Wheeler
Virtual Machine Contracts for Datacenter and Cloud Computing Environments
Proceedings of the First Workshop on Automated Control for Datacenters and Clouds (ACDC09 ), June 2009.

J. Matthews
Restructuring desktops to support prevention, detection and recovery
Work-In-Progress presentation at the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET09 ), April 2009.

W. Hu, T. Deshane, J. Matthews
Solaris Virtualization Options
;login: The USENIX Magazine, Volume 33, Number 5, p. 7-17, October 2008.

T. Deshane, Z. Shepherd, J. Matthews, M. Ben-Yehuda, A. Shah, B. Rao
Quantitative Comparison of Xen and KVM
Xen Summit Boston 2008 , June 23-24 2008.

J. Owens and J. Matthews
A Study of Passwords and Methods Used in Brute-Force SSH Attacks
Submitted to LEET08, February 2008.
Related SANS report
[PDF ]

J. Owens and J. Matthews
CyberCivics - A Novel Approach to Reaching K-12 Students with the Social Relevance of Computer Science
Proceedings of SIGCSE 2008, March 2008.
[PDF ]

M. Mueter, F. Freiling, T. Holz, and Jeanna Matthews
A Generic Toolkit for Converting Web Applications Into High-Interaction Honeypots
[PDF ]

J. Matthews, W. Hu, M. Hapauarachchi, T. Deshane, D. Dimatos, G. Hamilton, M. McCabe, J. Owens
Quantifying the Performance Isolation Properties of Virtualization Systems
ExpCS 2007, June 2007. [PDF ]
Earlier version of this paper: [PDF ]

S. Soltesz, M. Fiuczynski, L. Peterson, M. McCabe, J. Matthews
Virtual Doppelg(anger: On the Performance, Isolation, and Scalability of Para- and Paene- Virtualized Systems
[PDF ]

J. Matthews, J. Herne, T. Deshane, P. Jablonski, L. Cherian, M McCabe
Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances
Proceedings of the IASTED International Conference on Communication, Network and Information Security ( CNIS 2005), p. 170-181, November 2005. [PDF ]

J. Matthews
Hands-on Approach to Teaching Computer Networking Using Packet Traces
Proceedings of the ACM SIGITE Conference 2005, p. 361-367, October 2005. [PDF]

J. Matthews
Common Sense Computing: An Approach to Community Outreach with IT
Proceedings of the ACM SIGITE Conference 2005, p. 375-376, October 2005. [PDF]

T. Deshane, P.Jablonski, K. Roberts, J. Matthews
Web-Based Collaborative Exploration and Characterization of Large Databases
International Journal of Technology, Knowledge and Society, Volume 1, 2005.

B. Clark and J. Matthews
Adaptive Composition of Layers in a Multi-Layer User Interface
Proceedings of 11th International Conference on Human-Computer Interaction, Volume 7, July 2005. [PDF]

J. Matthews
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Teacher Enrichment for Computer Science Module,
College Board and Computer Science Teachers Association, July 2005.

T. Deshane, P.Jablonski, K. Roberts and J. Matthews
Web-Based Collaborative Exploration and Characterization of Large Databases
Virtual Presentation, International Conference on Technology, Knowledge and Society, February 2005.

J. Matthews
Computer Networking Internet Protocols In Action
John Wiley & Sons, ISBN 0-471-66186-4, December 2004.

B. Clark, T. Deshane, E. Dow, S. Evanchik, M. Finlayson, J. Herne and J. Matthews
Xen and the Art of Repeated Research
Proceedings of the USENIX 2004 Annual Technical Conference, FREENIX Track, p. 135-144, June 2004.

B. Clark and J. Matthews
Deciding Layers in a Multi-Layer User Interface
Accepted for the 8th ERCIM UI4All Workshop, June 2004.
[ PDF ]

K. Marzullo, G. Muller, J. Matthews, W. Waite, G. Voelker
New Types of Content in Operating Systems Review?
Operating System Review, Volume 38, Number 3, July 2004.

J. Matthews
The Case for Repeated Research In Operating Systems
Operating System Review, Volume 38, Number 2, p.5 - 7, April 2004.

J. Matthews
Hands-on experience and historical perspective on research are key to teaching Linux
IBM developerWorks, June 2002.

J. Matthews
How One Small Class Produced Three Huge Winners
Clarkson Magazine, MMI(2), Winter 2002, p. 13-14.

T. Anderson, M. Dahlin, J. Matthews, D. Patterson, D. Roselli and R. Wang
Serverless Network File Systems
Chapter in High Performance Mass Storage and Parallel I/O: Technologies and Applications
Edited by Hai Jin, Toni Cortes, and Rajkumar Buyya,
John Wiley & Sons, ISBN 047120894, November 2001.

Network of Workstations Project
U.C. Berkeley NOW Project, Collected Publications 1994-1996
University of California, Berkeley, Computer Science Division.

J. Matthews
Improving File System Performance With Adaptive Methods,
University of California, Berkeley, Ph.D. Dissertation, December 1999. [PDF]

J. Matthews, D. Roselli, A. Costello, R. Wang, and T. Anderson
Improving the Performance of Log-Structured File Systems With Adaptive Methods
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, Saint Malo, France, Volume 31, Issue 5, p. 238-251, October 1997. [PDF]

T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli and R. Wang
Serverless Network File Systems
ACM Transactions on Computer Systems, Volume 14, Issue 1, p. 41-79, February 1996.

T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli and R. Wang
Serverless Network File Systems
Proceedings of the Fifteenth ACM Symposium on Operating System Principles, Copper Mountain, Colorado, Volume 29, Issue 5, p. 109-126, December 1995.

T. Anderson, D. Culler, D. Patterson and the NOW Team
A Case for Network of Workstations
IEEE Micro, Volume 15, Issue 1, p. 54-64, February 1995.