Publications
On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005).
(1997).
(2000). Tracking the Role of Adversaries in Measuring Unwanted Traffic.
Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
(2006).
(2007). Thoughts on Reviewing.
ACM Computer Communication Review. 38(2), 47-50.
(2008).
(2003).
(2008). Comments on DNS Robustness.
ACM Internet Measurement Conference.
(2018). On Building Special-Purpose Social Networks for Emergency Communication.
ACM Computer Communication Review. 40,
(2010).
(1999). TCP Performance Over Satellite Links.
Proceedings of the Fifth International Conference on Telecommunications Systems.
(1997).
(2000).
(2008). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2002).
(1999). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
(2001).
(1997). TCP Behavior in Networks with Dynamic Propagation Delay.
Proceedings of Globecom 2000.
(2000).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009). On the Performance of Middleboxes.
ACM SIGCOMM/Usenix Internet Measurement Conference.
(2003).