Publications
Determining an Appropriate Sending Rate Over an Underutilized Network Path.
51(7), 1815-1832.
(2007). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006).
(2014).
(2009). Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).
(1999).
(2009).
On Eliminating Root Nameservers from the DNS.
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets).
(2019).
(2007).
(1999). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
(2001). On Estimating End-to-End Network Path Properties.
ACM SIGCOMM.
(1999). Estimating Loss Rates With TCP.
ACM Performance Evaluation Review.
(2003). An Evaluation of TCP with Larger Initial Windows.
ACM Computer Communication Review. 28,
(1998). An Evaluation of XML-RPC.
ACM Performance Evaluation Review.
(2003). Experimentation and Modeling of HTTP Over Satellite Channels.
International Journal of Satellite Communications.
(2001).
(2002).
(2002).
(2004).
(2012).
Fighting Coordinated Attackers with Cross-Organizational Information on Sharing.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
(2006). Findings and Implications from Data Mining the IMC Review Process.
ACM SIGCOMM Computer Communication Review. 3(1), 23-29.
(2013).
(2012). A First Look at Modern Enterprise Traffic.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 15-28.
(2005).
(1997).