Publications
(1989).
(1992).
(2010).
Bounded branching process and AND/OR tree evaluation.
Random Structures and Algorithms. 7(2), 97-116.
(1995). Bounded Latency Spanning Tree Reconfiguration.
Computer Networks. 76, 259-274.
(2015).
(2010).
(1984).
(2000).
(1998). Bridging the GAP: towards approximate graph analytics.
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
(2018).
(2012). Brief Announcement: Prefix Hash Tree.
Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004). 367.
(2004).
(2013). A Brief History of Scanning.
77-82.
(2007).
(1991).
(2003).
(2000). BRITE: An Approach to Universal Topology Generation.
Proceedings of MASCOTS 2001.
(2001).
(2001).
(1999). Bro: A System for Detecting Network Intruders in Real-Time.
Proceedings of the 7th USENIX Security Symposium.
(1998).
(2014).
(2000). Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity.
Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
(2005).
(2012).