Publications
Data-Driven Extensions to HMM Statistical Dependencies.
Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP '98). 69-72.
(1998). Designing Mobile Applications for Endangered Languages.
The Oxford Handbook of Endangered Languages.
(2018).
(1988).
(2009).
(2001).
(1998). A digital fountain retrospective.
ACM SIGCOMM Computer Communication Review. 49(5), 82-85.
(2019).
(1998). Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering.
621-634.
(2009). Dynamic Route Recomputation Considered Harmful.
ACM Computer Communication Review. 40(2), 66-71.
(2010). A Dynamic Multilevel MPLS Protection Domain.
Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001).
(2001).
(1992).
(1991).
(2021).
(2011).
(2011).
(2006).
(2007).
(2008).
(2008). Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Distributed estimation of the inverse Hessian by determinantal averaging.
Proceedings of the 2019 NeurIPS Conference.
(2019). A deep semantic corpus-based approach to metaphor analysis: A case study of metaphoric conceptualizations of poverty.
MetaNet, Special Issue of Constructions and Frames. 8(2),
(2016).
(2014). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006).