Publications
(2003).
(2008).
(1999).
(2001).
(2000).
The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(1997).
(1999). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009).
(1999).
(1998). Measuring End-to-End Bulk Transfer Capacity.
ACM SIGCOMM Internet Measurement Workshop.
(2001).
(2000).
(2010).
(2002). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007).
(1997). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013). On the Generation and Use of TCP Acknowledgments.
ACM Computer Communication Review. 28,
(1998).
(2000). On the Performance of Middleboxes.
ACM SIGCOMM/Usenix Internet Measurement Conference.
(2003). A Brief History of Scanning.
77-82.
(2007).