Publications
Found 1886 results
Author [ Title] Type Year Filters: First Letter Of Last Name is S [Clear All Filters]
(2007).
(2011).
The Design and Implementation of the A^3 Application-Aware Anonymity Platform.
Computer Networks. 58, 206-227.
(2014). The Design and Implementation of the A^3 Application-Aware Anonymity Platform.
Computer Networks. 58, 206-227.
(2014). The Design and Implementation of the A^3 Application-Aware Anonymity Platform.
Computer Networks. 58, 206-227.
(2014). Design Guidelines for Robust Internet Protocols.
Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
(2002). Design Guidelines for Robust Internet Protocols.
Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
(2002). Design Guidelines for Robust Internet Protocols.
33(1), 125-130.
(2003). Design Guidelines for Robust Internet Protocols.
33(1), 125-130.
(2003).
(1993). Designing Chip-Level Nanophotonic Interconnection Networks.
IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 2(2), 137-153.
(2012). Designing Chip-Level Nanophotonic Interconnection Networks.
IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 2(2), 137-153.
(2012).
(2013).
(2009).
(2015).
(2010). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019).
(2006). Detecting Deception Using Critical Segments.
2281-2284.
(2007). Detecting Deception Using Critical Segments.
2281-2284.
(2007). Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles.
Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
(2008). Detecting Excess Radical Replacements in Phylogenetic Trees.
Gene. 127-135.
(2003). Detecting Excess Radical Replacements in Phylogenetic Trees.
Gene. 127-135.
(2003).
(2009).