Publications
(2013).
(2003).
Designing DCCP: Congestion Control Without Reliability.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 27-38.
(2006). Designing Extensible IP Router Software.
Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
(2005). Designing Mobile Applications for Endangered Languages.
The Oxford Handbook of Endangered Languages.
(2018).
(2009).
(2015).
(1988).
(2010).
(2009).
(2010). Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System.
Proceedings of IEEE ICASSP.
(2004).
(2011). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019). Detecting Backdoors.
Proceedings of the Ninth USENIX Security Symposium.
(2000).
(2006). Detecting Deception Using Critical Segments.
2281-2284.
(2007). Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles.
Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
(2008). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Detecting Excess Radical Replacements in Phylogenetic Trees.
Gene. 127-135.
(2003).
(2009).
(2005).
(2008).
(2010).
(2008).