Publications
(2004).
Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia.
37-50.
(2008).
(2009). Practical Data-Centric Storage.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
(2006).
(2010).
(2013). Practical Comprehensive Bounds on Surreptitious Communication Over DNS.
SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
(2013). Practical Challenge-Response for DNS.
ACM Computer Communication Review. 48(3),
(2018).
(2004).
(2011).
(2012).
(2010).
(1995).
(1990). On the power of randomization in on-line algorithms.
Algorithmica. 11(1), 2-14.
(1994). On the power of randomization in online algorithms.
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. 379-386.
(1990).
(1992). On the Power and Limits of Evolutionary Conservation -- Unraveling Bacterial Gene Regulatory Networks.
Nucleic Acids Research. 38(22), 7877-7884.
(2010). On The Power and Limitations of Detecting Network Filtering via Passive Observation.
Proceedings of the Passive and Active Management Conference (PAM 2015).
(2015). Poverty of the Stimulus? A Rational Approach.
Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006).
(2006).
(1991).
(2010). On the Potential Abuse of IGMP.
ACM Computer Communication Review. 47(1),
(2017). Posted Price Profit Maximization for Multicast by Approximating Fixed Points.
Journal of Algorithms. 58(2), 150-164.
(2006).
(2003).