Publications
(2000).
(1997).
On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). On the Generation and Use of TCP Acknowledgments.
ACM Computer Communication Review. 28,
(1998).
(2007).
(2000). Thoughts on Reviewing.
ACM Computer Communication Review. 38(2), 47-50.
(2008). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005).
(2008).
(2003). An Evaluation of TCP with Larger Initial Windows.
ACM Computer Communication Review. 28,
(1998). Comments on DNS Robustness.
ACM Internet Measurement Conference.
(2018). On Building Special-Purpose Social Networks for Emergency Communication.
ACM Computer Communication Review. 40,
(2010).
(1997).
(1999).
(2000).
(2008). Fighting Coordinated Attackers with Cross-Organizational Information on Sharing.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
(2006). An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003).
(1997). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). Tracking the Role of Adversaries in Measuring Unwanted Traffic.
Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
(2006).
(1999).
(2002).