Publications
A Scalable Web Cache Consistency Architecture.
Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '99). 163-174.
(1999). Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law.
Proceedings of the ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM). 41-51.
(1999). Scaling Phenomena in the Internet: Critically Examining Criticality.
Proceedings of National Academy of Science of the United States of America (PNAS). 99,
(2002). Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015). Scaling Understanding Up to Mental Spaces.
Proceedings of ScaNaLU-2004.
(2004). Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks.
Special Workshop in Maui(SWIM).
(2004). Scene Intrinsics and Depth From a Single Image.
The IEEE International Conference on Computer Vision (ICCV) Workshops.
(2015). Scheduling for Reduced CPU Energy.
Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
(1994). A Scheduling Model for Reduced CPU Energy.
Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 374-382.
(1995). Scheduling parallel communication: the h-relation problem.
Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
(1995). SCL: Simplifying Distributed SDN Control Planes.
Proceedings of NSDI '17.
(2017). Seamless Multimedia Communications in Heterogeneous Mobile Access Networks.
Proceedings of the TERENA Networking Conference (TNC 2004).
(2004). Search and Replication in Unstructured Peer-to-Peer Networks.
Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
(2002). Search and Replication in Unstructured Peer-to-Peer Networks.
Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
(2002). On a Search Problem Related to Branch-and-Bound Procedures.
Proceedings of the 27th Annual Symposium on Foundations of Computer Science. 19-28.
(1986).
(2012). Secure Mobile Agent Systems Using Java - Where Are We Heading?.
Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).
(2002).
(2009). Securing Web Content.
7-12.
(2009).
(2009).
(1982). Seeing Arguments Through Transparent Structures.
Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). 787-791.
(2002). Seeking coherent explanations - a fusion of structured connectionism, temporal synchrony, and evidential reasoning.
Proceedings of the 22nd Annual Conference of the Cognitive Science Society (CogSci 2000).
(2000). SegSort: Segmentation by Discriminative Sorting of Segments.
Proceedings of the International Conference on Computer Vision.
(2019). Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle.
Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
(1995).