Publications
Replication Strategies in Unstructured Peer-to-Peer Networks.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 177-190.
(2002). The Restriction Scaffold Problem.
Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
(2002). RFC 3238: IAB Architectural and Policy Considerations for Open Pluggable Edge Services.
(Floyd, S., & Daigle L., Ed.).
(2002).
(2002).
(2002).
(2002).
(2002). The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model.
Neurocomputing. 44-46, 1009-1016.
(2002). Route Flap Dampening Exacerbates Internet Routing Convergence.
Proceedings of the ACM SIGCOMM 2002.
(2002). Routing Algorithms for DHTs: Some Open Questions.
Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 45-52.
(2002).
(2003).
(2003).
The Relationship Between Dialogue Acts and Hot Spots in Meetings.
Proceedings of IEEE Speech Recognition and Understanding Workshop.
(2003). Resolving the Question of Color Naming Universals.
Proceedings of the National Academy of Sciences of the United States of America. 100(15), 9085-9089.
(2003). The Restriction Scaffold Problem.
Journal of Computational Biology. 10(3-4), 385-398.
(2003).
(2003).
(2003). A Robust Speaker Clustering Algorithm.
Proceedings of IEEE Speech Recognition and Understanding Workshop.
(2003). The role of cortico-basal-thalamic loops in cognition: a computational model and preliminary results.
Neurocomputing. 52-54, 605-614.
(2003). Reconstructing Chain Functions in Genetic Networks.
Proceedings of the Ninth Pacific Symposium on Biocomputing (PSB'04). 498-509.
(2004).
(2004). Reduced State Routing in the Internet.
Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III).
(2004).
(2004). Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes.
Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004).
(2004). Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004).