Publications
Determining an Appropriate Sending Rate Over an Underutilized Network Path.
51(7), 1815-1832.
(2007). The Digital Hand, Vol 2 - How Computers Changed the Work of the American Financial, Telecommunications, Media, and Entertainment Industries (book review).
IEEE Annals of the History of Computing. 29(3), 72-75.
(2007). Distributed Algorithmic Mechanism Design.
363-384.
(2007).
(2007). DDoS Defense by Offense.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
(2006).
(2006). Designing DCCP: Congestion Control Without Reliability.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 27-38.
(2006).
(2006). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Distributed Quota Enforcement for Spam Control.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
(2006). Distributed Segment Tree: Support Range Query and Cover Query over DHT.
Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
(2006). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006). Designing Extensible IP Router Software.
Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
(2005).
(2005). Dialog Act Tagging Using Graphical Models.
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1, 33-36.
(2005). A Discriminative Model for Identifying Spatial Cis-Regulatory Modules.
Journal of Computational Biology.
(2005). Does Active Learning Help Automatic Dialog Act Tagging in Meeting Data?.
Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2777-2780.
(2005). DoS: Fighting Fire with Fire.
Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
(2005). Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System.
Proceedings of IEEE ICASSP.
(2004). Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation.
Proceedings of IEEE ISCAS.
(2004). Direct Modeling of Prosody: An Overview of Applications in Automatic Speech Processing.
Proceedings of the International Conference on Speech Prosody.
(2004). A Discriminative Model for Identifying Spatial Cis-Regulatory Modules.
Proceedings of RECOMB 2004. 141-149.
(2004). Data-Centric Storage in Sensornets.
ACM SIGCOMM Computer Communication Review. 33(1), 137-142.
(2003).
(2003).
(2003).