Publications
An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005).
(2007). On Building Special-Purpose Social Networks for Emergency Communication.
ACM Computer Communication Review. 40,
(2010).
(1997). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). Tracking the Role of Adversaries in Measuring Unwanted Traffic.
Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
(2006). Thoughts on Reviewing.
ACM Computer Communication Review. 38(2), 47-50.
(2008).
(2000).
(2007). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013).
(2003).
(2008).
(2010). On Eliminating Root Nameservers from the DNS.
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets).
(2019). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007). TCP Performance Over Satellite Links.
Proceedings of the Fifth International Conference on Telecommunications Systems.
(1997).
(1999). Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013).
(2008).
(2000). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(1997).
(2002).
(1999).