Publications
Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004).
(2010). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004). The Death of Cryptocurrency: The Case for Regulation.
Yale Law School Information Society Project. Digital Future Whitepaper Series,
(2022).
(2020).
(2010).
(2009).
(2003). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007).
(2021). The SFRA: A Corner-Turn FPGA Architecture.
Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
(2004).
(2007).
(1990). Using Prosodic and Lexical Information for Speaker Identification.
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
(2002).
(2004).
(2006).
(2013).
(2010).
(1992). Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems.
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
(1988). Scheduling for Reduced CPU Energy.
Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
(1994).
(2008).
(1997).
(1997). The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model.
Neurocomputing. 44-46, 1009-1016.
(2002).