Publications
The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2002).
(1997).
(1999). Measuring End-to-End Bulk Transfer Capacity.
ACM SIGCOMM Internet Measurement Workshop.
(2001). On the Performance of Middleboxes.
ACM SIGCOMM/Usenix Internet Measurement Conference.
(2003).
(2000).
(2008). Comments on Selecting Ephemeral Ports.
ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
(2009).
(1998).
(2010). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). Personal Namespaces.
Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
(2007). A Scalable System for Sharing Internet Measurements.
Proceedings of the Passive and Active Measurement Workshop.
(2002).
(2000).
(1997). On Changing the Culture of Empirical Internet Assessment.
ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
(2013). On the Generation and Use of TCP Acknowledgments.
ACM Computer Communication Review. 28,
(1998). A Brief History of Scanning.
77-82.
(2007). On Eliminating Root Nameservers from the DNS.
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets).
(2019).
(2008). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005). An Evaluation of TCP with Larger Initial Windows.
ACM Computer Communication Review. 28,
(1998).
(1999). Comments on Bufferbloat.
ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
(2013).