Publications
TCP Performance Over Satellite Links.
Proceedings of the Fifth International Conference on Telecommunications Systems.
(1997). Towards a Model of DNS Client Behavior.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Tracking the Role of Adversaries in Measuring Unwanted Traffic.
Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
(2006). Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem.
Proceedings of Workshop on Data and Algorithmic Transparency.
(2016).
(2010).
(2010).
(2008). Addressing Ethical Considerations in Network Measurement Papers.
Communications of the ACM. 59(10),
(2016). On Building Inexpensive Network Capabilities.
ACM SIGCOMM Computer Communication Review. 42(2), 72-79.
(2012). On Building Special-Purpose Social Networks for Emergency Communication.
ACM Computer Communication Review. 40,
(2010). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013). Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009). Determining an Appropriate Sending Rate Over an Underutilized Network Path.
51(7), 1815-1832.
(2007). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006).
(1999). Estimating Loss Rates With TCP.
ACM Performance Evaluation Review.
(2003). An Evaluation of TCP with Larger Initial Windows.
ACM Computer Communication Review. 28,
(1998). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003). Experimentation and Modeling of HTTP Over Satellite Channels.
International Journal of Satellite Communications.
(2001). Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
46(3), 343-362.
(2004). Findings and Implications from Data Mining the IMC Review Process.
ACM SIGCOMM Computer Communication Review. 3(1), 23-29.
(2013). On the Generation and Use of TCP Acknowledgments.
ACM Computer Communication Review. 28,
(1998).
(2008). A Large-Scale Empirical Analysis of Email Spam Detection Through Network Characteristics in a Stand-Alone Enterprise.
Computer Networks. 59, 101-121.
(2014).