Publications
(1999).
Tracking the Role of Adversaries in Measuring Unwanted Traffic.
Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
(2006). Measuring End-to-End Bulk Transfer Capacity.
ACM SIGCOMM Internet Measurement Workshop.
(2001).
(1997).
(2007). On the Generation and Use of TCP Acknowledgments.
ACM Computer Communication Review. 28,
(1998). Thoughts on Reviewing.
ACM Computer Communication Review. 38(2), 47-50.
(2008).
(2000).
(2008). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). Comments on DNS Robustness.
ACM Internet Measurement Conference.
(2018). Estimating Loss Rates With TCP.
ACM Performance Evaluation Review.
(2003).
(1998). On Building Special-Purpose Social Networks for Emergency Communication.
ACM Computer Communication Review. 40,
(2010).
(2000).
(1997).
(2008).
(1999). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2003). An Evaluation of TCP with Larger Initial Windows.
ACM Computer Communication Review. 28,
(1998).
(2000).
(1997).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009).