Publications
An Evaluation of TCP with Larger Initial Windows.
ACM Computer Communication Review. 28,
(1998). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2003).
(1997).
(1999).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009).
(2000). An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005).
(2010). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003).
(1997). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013).
(2002).
(1999).
(2008). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
(2001). A Brief History of Scanning.
77-82.
(2007). On Eliminating Root Nameservers from the DNS.
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets).
(2019). TCP Behavior in Networks with Dynamic Propagation Delay.
Proceedings of Globecom 2000.
(2000). Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013). On the Performance of Middleboxes.
ACM SIGCOMM/Usenix Internet Measurement Conference.
(2003). TCP Performance Over Satellite Links.
Proceedings of the Fifth International Conference on Telecommunications Systems.
(1997).