Understanding the Efficacy of Phishing Training in Practice, , Proceedings of the IEEE Symposium on Security and Privacy, May 2025.
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates, , Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild, , Proceedings of the IEEE European Symposium on Security and Privacy, Vienna, Austria, July 2024.
Unfiltered: Measuring Cloud-based Email Filtering Bypasses, , Proceedings of the Web Conference (WWW), Singapore, May 2024.
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates, , Proceedings of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 2023.
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender, , Proceedings of the Symposium on Usable Privacy and Security, Anaheim, CA, August 2023.
In the Line of Fire: Risks of DPI-triggered Data Collection, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), Marina del Rey, CA, August 2023.
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps, , Proceedings of the 23rd Privacy Enhancing Technologies Symposium, Lausanne, Switzerland, July 2023.
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy, , Proceedings of the IEEE European Symposium on Security and Privacy, Delft, The Netherlands, July 2023, pages 373-391. (Best paper award).
The Challenges of Blockchain-based Naming Systems for Malware Defenders, , Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), November 2022, pages 1-14. (Best Student Paper).
Retroactive Identification of Targeted DNS Infrastructure Hijacking, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 14-32.
Where .ru? Assessing the Impact of Conflict on Russian Domain Infrastructure, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 159-165.
Measuring UID Smuggling in the Wild, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 230-243.
Measuring Security Practices, , Communications of the Association for Computing Machinery 65(9):93-102, September 2022.
Domain Name Lifetimes: Baseline and Threats, , Proceedings of the 6th Network Traffic Measurement and Analysis Conference (TMA), June 2022, pages 10-18.
FaaS Made Fast Using Snapshot-based VMs, , Proceedings of the ACM European Conference on Computer Systems, Rennes, France, April 2022, pages 730-746.
Risky BIZness: Risks Derived from Registrar Name Management, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 673-686. (IRTF Applied Networking Research Prize).
Who's Got Your Mail? Characterizing Mail Service Provider Usage, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 122-136.
Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 390-397.
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure, , Proceedings of the 5th Network Traffic Measurement and Analysis Conference (TMA), September 2021, pages 1-9. (Best Paper).
Hopper: Modeling and Detecting Lateral Movement, , Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021, pages 3093-3110.
Clairvoyance: Inferring Blocklist Use on the Internet, , Proceedings of the 22nd Passive and Active Measurement Conference (PAM), Brandenburg, Germany, March 2021, pages 57-75.
Unresolved Issues: Prevalence, Persistence and Perils of Lame Nameservers, , Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 281-294.
Trufflehunter: Cache Sniffing Rare Domains at Large Public DNS Resolvers, , Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 50-64. (IRTF Applied Networking Research Prize).
Particle: Ephemeral Endpoints for Serverless Networking, , Proceedings of the 11th ACM Symposium on Cloud Computing (SOCC), October 2020, pages 16-29.
Measuring Security Practices and How They Impact Security, , Proceedings of the ACM Internet Measurement Conference (IMC), Amsterdam, The Netherlands, October 2019, pages 36-49.
Detecting and Characterizing Lateral Phishing at Scale, , Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 1273-1290. (Distinguished paper).
Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence, , Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 851-867.
Web Feature Deprecation: A Case Study for Chrome, , Proceedings of the 41st ACM/IEEE International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP) 2019, Montréal, QC, Canada, May 2019, pages 302-311.
Hack for Hire: Exploring the Emerging Market for Account Hijacking, , Proceedings of the Web Conference (WWW), San Francisco, CA, May 2019, pages 1279-1289.
An Empirical Analysis of the Commercial VPN Ecosystem, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 443-456.
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 43-55.
Sprocket: A Serverless Video Processing Framework, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Carlsbad, CA, October 2018, pages 263-274.
Dark Packets and the end of Network Scaling, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Ithaca, New York, July 2018, pages 1-14.
CacheCloud: Towards Speed-of-Light Datacenter Communication, , Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud-X), Boston, MA, July 2018.
Tripwire: Inferring Internet Site Compromise, , Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 341-354.
Exploring the Dynamics of Search Advertiser Fraud, , Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 157-170.
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, , Communications of the Association for Computing Machinery 59(4):86-93, April 2016.
Scheduling Techniques for Hybrid Circuit/Packet Networks, , Proceedings of ACM CoNEXT, Heidelberg, Germany, December 2015.
From .academy to .zone: An Analysis of the New TLD Land Rush, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Who is .com? Learning to Parse WHOIS Records, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Affiliate Crookies: Characterizing Affiliate Marketing Abuse, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Enfold: Downclocking OFDM in WiFi, , GetMobile: Mobile Computing and Communications 19(2):10-13, April 2015.
Managing Contention with Medley, , IEEE Transcations on Mobile Computing 14(3), March 2015.
CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks, , Proceedings of the 16th ACM International Workshop on Mobile Computing Systems and Applications (HotMobile), Sante Fe, NM, February 2015.
Characterizing Large-Scale Click Fraud in ZeroAccess, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns, , Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014, pages 359-372.
Enfold: Downclocking OFDM in WiFi, , Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.
Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise, , Proceedings of the ACM SIGKDD Conference, New York, NY, August 2014.
Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, , Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014, pages 4:1:1-4:1:13.
XXXtortion? Inferring Registration Intent in the .XXX TLD, , Proceedings of the International World Wide Web Conference (WWW)`, Seoul, Korea, April 2014, pages 901-912.
Circuit Switching Under the Radar with REACToR, , Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014, pages 1-15.
DSpin: Detecting Automatically Spun Content on the Web, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014, pages 4:1:1-4:1:16.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, , USENIX ;login: 38(6):10-14, December 2013.
Bullet Trains: A Study of NIC Burst Behavior at Microsecond Timescales, , Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013, pages 133-138.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, , Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013, pages 127-140.
A Variational Approximation for Topic Modeling of Hierarchical Corpora, , Proceedings of the International Conference on Machine Learning, Atlanta, GA, June 2013, pages 2:55-2:63.
SloMo: Downclocking WiFi Communication, , Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 245-258.
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones, , Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 57-70.
Juice: A Longitudinal Study of an SEO Campaign, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2013, pages 7:4:1-7:4:17.
Taster's Choice: A Comparative Analysis of Spam Feeds, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012, pages 427-440.
Chronos: Predictable Low Latency for Data Center Applications, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012, pages 9:1-9:14.
Priceless: The Role of Payments in Abuse-advertised Goods, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 845-856.
Manufacturing Compromise: The Emergence of Exploit-as-a-Service, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 821-832.
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs, , Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, August 2012.
Weighted Fair Queuing with Differential Dropping, , Proceedings of the IEEE Infocom Conference, Orlando, FL, April 2012. (Mini-conference).
BlueSky: A Cloud-Backed File System for the Enterprise, , Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012, pages 19:1-19:14.
Limitations of scanned human copresence encounters for modelling proximity-borne malware, , Proceedings of the International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, January 2012, pages F1.1.4:1--F1.1.5:10.
An Analysis of Underground Forums, , Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011, pages 71-80.
Topic Modeling of Freelance Job Postings to Monitor Web Service Abuse, , Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011, pages 11-20.
Cloak and Dagger: Dynamics of Web Search Cloaking, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011, pages 477-490.
No Plan Survives Contact: Experience with Cybercrime Measurement, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011, pages 2:1-2:8.
Show Me the Money: Characterizing Spam-advertised Revenue, , Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 219-234.
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse, , Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 203-218.
DefenestraTor: Throwing out Windows in Tor, , Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011, pages 134-154.
DieCast: Testing Distributed Systems with an Accurate Scale Model, , ACM Transactions on Computer Systems 29(2):4:1-4:48, May 2011.
Privacy-preserving Network Forensics, , Communications of the Association for Computing Machinery 54(5):78-87, May 2011.
Click Trajectories: End-to-End Analysis of the Spam Value Chain, , Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2011, pages 431-446. (Award paper).
Learning to Detect Malicious URLs, , ACM Transactions on Intelligent Systems and Technology (TIST) 2(3):30:1-30:24, April 2011.
Dissemination in Opportunistic Mobile Ad-hoc Networks: the Power of the Crowd, , Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011, pages 1179-1187.
On the Effects of Registrar-level Intervention, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011, pages 1-8.
Got Traffic? An Evaluation of Click Traffic Providers, , Proceedings of the WICOM/AIRWeb Workshop on Web Quality (WebQuality), Hyderabad, India, March 2011, pages 19-26.
Sora: High-performance Software Radio using General-purpose Multi-core Processors, , Communications of the Association for Computing Machinery 54(1):99-107, January 2011.
How to Tell an Airport from a Home: Techniques and Applications, , Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, CA, October 2010, pages 13:1-13:6.
Difference Engine: Harnessing Memory Redundancy in Virtual Machines, , Communications of the Association for Computing Machinery 53(10):85-93, October 2010.
Usage Patterns in an Urban WiFi Network, , IEEE/ACM Transactions on Networking 18(5):1359-1372, October 2010.
Re: CAPTCHAs -- Understanding CAPTCHA-Solving from an Economic Context, , Proceedings of the 19th USENIX Security Symposium, Washington, D.C., August 2010, pages 435-452.
Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits, , Proceedings of the ACM SIGKDD Conference, Washington D.C., July 2010, pages 105-114.
SecondLife: a Social Network of Humans and Bots, , Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Amsterdam, The Netherlands, June 2010, pages 9-14.
Measuring Online Service Availability Using Twitter, , Proceedings of ACM Workshop on Online Social Networks (WOSN), Boston, MA, June 2010, pages 13:1-13:9.
Neon: System Support for Derived Data Management, , Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Pittsburgh, PA, March 2010, pages 63-74.
Botnet Judo: Fighting Spam with Itself, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.
Cumulus: Filesystem Backup to the Cloud, , ACM Transaction on Storage 5(4):1-28, December 2009.
SAM: Enabling Practical Spatial Multiple Access in Wireless LAN, , Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Beijing, China, September 2009.
Spamalytics: An Empirical Analysis of Spam Marketing Conversion, , Communications of the Association for Computing Machinery 52(9):99-107, September 2009.
Cumulus: Filesystem Backup to the Cloud, , USENIX ;login: 34(4):7-13, August 2009.
Identifying Suspicious URLs: An Application of Large-Scale Online Learning, , Proceedings of the International Conference on Machine Learning, Montreal, Canada, June 2009, pages 681-688.
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs, , Proceedings of the ACM SIGKDD Conference, Paris, France, June 2009, pages 1245-1254.
Defending Mobile Phones from Proximity Malware, , Proceedings of the IEEE Infocom Conference, Rio de Janeiro, Brazil, April 2009, pages 1503-1511.
Spamcraft: An Inside Look at Spam Campaign Orchestration, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, April 2009, pages 4:1-4:9.
Difference Engine, , USENIX ;login: 34(2):24-31, April 2009.
NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 349-364.
Sora: High Performance Software Radio Using General Purpose Multi-core Processors, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 75-90. (Award paper and Test of Time award).
Cumulus: Filesystem Backup to the Cloud, , Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 225-238.
MPIWiz: Subgroup Reproducible Replay of MPI Applications, , Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), Raleigh, North Carolina, USA, February 2009, pages 251-260.
Difference Engine: Harnessing Memory Redundancy in Virtual Machines, , Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, December 2008, pages 309-322. (Award paper).
Towards Automatic Inference of Task Hierarchies in Complex Systems, , Fourth Workshop on Hot Topics in System Dependability (HotDep), San Diego, CA, USA, December 2008, pages 7:1-7:6.
Spamalytics: an Empirical Analysis of Spam Marketing Conversion, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008, pages 3-14.
Analysis of a Mixed-Use Urban WiFi Network: When Metropolitan becomes Neapolitan, , Proceedings of the ACM Internet Measurement Conference (IMC), Vouliagmeni, Greece, October 2008, pages 85-98.
XL: An Efficient Network Routing Algorithm, , Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.
Storm: When Researchers Collide, , USENIX ;login: 33(4):6-13, August 2008.
Automatic Request Categorization in Internet Services, , Proceedings of the First Workshop on Hot Topics in Measurement and Modeling of Computer Systems (HotMetrics), Annapolis, MD, June 2008.
On the Spam Campaign Trail, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
Banal: Because Format Checking Is So Trite, , Proceedings of USENIX Workshop on Organizing Workshops, Conferences and Symposia for Computer Systems (WOWCS), San Francisco, CA, April 2008.
Dual Frame Motion Compensation with Uneven Quality Assignment, , IEEE Transactions on Circuits and Systems for Video Technology 18(2):249-256, February 2008.
Can You Infect Me Now? Malware Propagation in Mobile Phone Networks, , Proceedings of the ACM Workshop on Recurring Malcode (WORM), Washington D.C., November 2007.
Usher: An Extensible Framework for Managing Clusters of Virtual Machines, , Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.
Slicing Spam with Occam's Razor, , Proceedings of Conference on Email and Anti-Spam (CEAS), Mountain View, CA, August 2007.
Automating Cross-Layer Diagnosis of Enterprise Wireless Networks, , Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure, , Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.
Characterization of a Large Web Site Population with Implications for Content Delivery, , World Wide Web Journal 9(4):505-536, December 2006.
Maximizing Data Locality in Distributed Systems, , Journal of Computer and System Sciences 72(8), December 2006.
Unexpected Means of Identifying Protocols, , Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.
Finding Diversity in Remote Code Injection Exploits, , Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.
Source and channel coding trade-offs for a pulsed quality video encoder, , Proceedings of the 40th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, October 2006.
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis, , Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006, pages 39-50.
Inferring Internet Denial-of-Service Activity, , ACM Transactions on Computer Systems 24(2):115-139, May 2006.
To Infinity and Beyond: Time-Warped Network Emulation, , Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006, pages 87-100.
On Object Maintenance in Peer-to-Peer Systems, , Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Santa Barbara, CA, February 2006.
Self-stopping Worms, , Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington D.C., November 2005, pages 12-21.
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, , Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005, pages 148-162.
Access and Mobility of Wireless PDA Users, , Mobile Computing and Communications Review (MC2R) 9(2):40-55, April 2005.
Surviving Internet Catastrophes, , Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005.
Error Concealment for Dual Frame Video Coding with Uneven Quality, , Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2005.
Wireless Hotspots: Current Challenges and Future Directions, , Mobile Networks and Applications 10(3):265-274, January 2005.
ShortCuts: Using Soft State To Improve DHT Routing, , Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004.
Towards Informed Web Content Delivery, , Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004. (Best student paper).
Network Sensitivity to Hot-Potato Disruptions, , Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.
Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004, pages 87-98.
Characterization of a Large Web Site Population with Implications for Content Delivery, , Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.
TotalRecall: System Support for Automated Availability Management, , Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004, pages 337-350.
Dual Frame Motion Compensation with Uneven Quality Assignment, , Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2004.
Dual frame motion compensation for a rate switching network, , Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, November 2003.
In Search of Path Diversity in ISP Networks, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003, pages 313-318.
End-to-End differentiation of congestion and wireless losses, , IEEE/ACM Transactions on Networking 11(5):703-717, October 2003.
Wireless Hotspots: Current Challenges and Future Directions, , Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), San Diego, CA, September 2003.
The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe, , Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS-IX), Lihue, HI, May 2003, pages 73-78.
Internet Quarantine: Requirements for Containing Self-Propagating Code, , Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003, pages 1901-1910.
Understanding Availability, , Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Berkeley, CA, February 2003, pages 256-267.
Whole Page Performance, , Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.
Characterizing User Behavior and Network Performance in a Public Wireless LAN, , Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.
Symbiotic Jobscheduling with Priorities for a Simultaneous Multithreading Processor, , Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.
Hot-Spot Congestion Relief in Public-Area Wireless Networks, , Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Callicoon, NY, June 2002.
Replication Strategies for Highly Available Peer-to-Peer Storage, , Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.
PAWNs: Satisfying the Need for Ubiquitous Secure Connectivity and Location Services, , IEEE Wireless Communications 9(1):40-48, February 2002.
End-to-end Differentiation of Congestion and Wireless Losses, , Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2002.
Inferring Internet Denial of Service Activity, , Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001, pages 9-22. (Best paper and Test of Time Awards).
The Medusa Proxy: A Tool for Exploring User-Perceived Web Performance, , Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.
On the Placement of Web Server Replicas, , Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.
Measurement and Analysis of a Streaming Media Workload, , Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001. (Best paper).
On the Scale and Performance of Cooperative Web Proxy Caching, , Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, December 1999.
Organization-Based Analysis of Web-Object Sharing and Caching, , Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.
Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages, , Proceedings of the ACM SIGMETRICS Conference, Atlanta, GA, May 1999, pages 206-207.
Detour: a Case for Informed Internet Routing and Transport, , IEEE Micro 19(1):50-59, January 1999.
Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System, , Proceedings of the ACM SIGMETRICS Conference, Madison, WI, June 1998.
Managing Server Load in Global Memory Systems, , Proceedings of the ACM SIGMETRICS Conference, Seattle, WA, June 1997.
Instrumentation and Optimization of Win32/Intel Executables, , Proceedings of the First USENIX Windows NT Workshop, Seattle, WA, USA, August 1997.
Reducing Network Latency Using Subpages in a Global Memory Environment, , Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-VII), Cambridge, MA, October 1996.
The Structure and Performance of Interpreters, , Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-VII), Cambridge, MA, October 1996.
Mobisaic: An Information System for a Mobile Wireless Computing Environment, , Master's thesis, Department of Computer Science, University of Washington, June 1995.
Mobisaic: An Information System for a Mobile Wireless Computing Environment, , Proceedings of the First IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December 1994.
Latency Analysis of TCP on an ATM network, , Proceedings of the USENIX Annual Technical Conference, San Francisco, CA, January 1994.