Publications
Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps.
Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
(2022). Dissecting DNS Stakeholders in Mobile Networks.
Proceedings of CoNEXT.
(2017).
(2001). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2000). An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005).
(1999).
(1997). Estimating Loss Rates With TCP.
ACM Performance Evaluation Review.
(2003).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009).
(2010).
(1999). Measuring End-to-End Bulk Transfer Capacity.
ACM SIGCOMM Internet Measurement Workshop.
(2001). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007).
(2000). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). TCP Performance Over Satellite Links.
Proceedings of the Fifth International Conference on Telecommunications Systems.
(1997).
(2003).
(2008). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005). A Brief History of Scanning.
77-82.
(2007). On Eliminating Root Nameservers from the DNS.
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets).
(2019).
(2000).