Publications
The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(1997).
(1999).
(1999).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003).
(1998). Measuring End-to-End Bulk Transfer Capacity.
ACM SIGCOMM Internet Measurement Workshop.
(2001).
(2000).
(2010). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007).
(1997). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999).
(2002). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013). On the Generation and Use of TCP Acknowledgments.
ACM Computer Communication Review. 28,
(1998).
(2000). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005). A Brief History of Scanning.
77-82.
(2007). On Eliminating Root Nameservers from the DNS.
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets).
(2019).
(2008). On the Performance of Middleboxes.
ACM SIGCOMM/Usenix Internet Measurement Conference.
(2003). An Evaluation of TCP with Larger Initial Windows.
ACM Computer Communication Review. 28,
(1998). Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013).