Publications
New Techniques for Making Transport Protocols Robust to Corruption-Based Loss.
ACM SIGCOMM Computer Communication Review. 34(5), 75-88.
(2004).
(2003).
(2002).
(2000).
(2011). Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems.
Journal of the Association for Computing Machinery. 19(2), 248-264.
(1972). The ICSI Meeting Corpus: Close-Talking and Far-Field, Multi-Channel Transcriptions for Speech and Language Researchers.
Proceedings of the Workshop on Compiling and Processing Spoken Language Corpora at the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 8-11.
(2004).
(2001).
(2006).
(2007). Practical Data-Centric Storage.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
(2006). Resolving Inter-Domain Policy Disputes.
ACM SIGCOMM Computer Communication Review. 37(4), 157-168.
(2007). Resolving Inter-Domain Policy Disputes.
157-168.
(2007).
(2007). A Modular Network Layer for Sensornets.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06). 249-262.
(2006).
(2006).
(1993).
(2012).
(1987). The Teaching Privacy Curriculum.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
(2016). Predicting Privacy and Security Attitudes.
Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
(2015). Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
(2016). Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015). The Key to Getting People to Be Safer Online: Make the Appeals More Personal.
Wall Street Journal.
(2021).