Publications
(2000).
Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003).
(1997).
(1999).
(2009).
(2002).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009).
(1999).
(1998). Measuring End-to-End Bulk Transfer Capacity.
ACM SIGCOMM Internet Measurement Workshop.
(2001).
(2000). On the Performance of Middleboxes.
ACM SIGCOMM/Usenix Internet Measurement Conference.
(2003).
(1997). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999).
(2000). On the Generation and Use of TCP Acknowledgments.
ACM Computer Communication Review. 28,
(1998). Comments on DNS Robustness.
ACM Internet Measurement Conference.
(2018). A Brief History of Scanning.
77-82.
(2007). A Scalable System for Sharing Internet Measurements.
Proceedings of the Passive and Active Measurement Workshop.
(2002).
(2008). On Building Special-Purpose Social Networks for Emergency Communication.
ACM Computer Communication Review. 40,
(2010). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005).