Understanding the Efficacy of Security Training in Practice, , Proceedings of the IEEE Symposium on Security and Privacy, May 2025.
Eden: Developer-Friendly Application-Integrated Far Memory, , Proceedings of the 22nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Philadelphia, PA, April 2025.
InferCept: Efficient Intercept Support for Augmented Large Language Model Inference, , Proceedings of the International Conference on Machine Learning, Vienna, Austria, July 2024.
Sublet Your Subnet: Inferring IP Leasing in the Wild, , Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates, , Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
Realizing RotorNet: Toward Practical Microsecond Scale Optical Networking, , Proceedings of the ACM SIGCOMM Conference, Sydney, Australia, August 2024.
Prudentia: Findings of an Internet Fairness Watchdog, , Proceedings of the ACM SIGCOMM Conference, Sydney, Australia, August 2024.
DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency, , Proceedings of the 18th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Santa Clara, CA, USA, July 2024.
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild, , Proceedings of the IEEE European Symposium on Security and Privacy, Vienna, Austria, July 2024.
Unfiltered: Measuring Cloud-based Email Filtering Bypasses, , Proceedings of the Web Conference (WWW), Singapore, May 2024.
The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior, , Proceedings of the Web Conference (WWW), Singapore, May 2024.
Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices, , Proceedings of the IEEE Symposium on Security and Privacy, May 2024.
Efficient Microsecond-scale Blind Scheduling with Tiny Quanta, , Proceedings of the 29th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), La Jolla, CA, April 2024.
Effective Bug Detection with Unused Definitions, , Proceedings of the ACM European Conference on Computer Systems (EuroSys), Athens, Greece, April 2024.
SuperNIC: An FPGA-Based, Cloud-Oriented SmartNIC, , Proceedings of the 32nd ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Montery, CA, USA, March 2024. (Best Paper Runner-Up).
Network Topology Facilitates Internet Traffic Control in Autocracies, , PNAS Nexus 3(3), March 2024.
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates, , Proceedings of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 2023.
IRRegularities in the Internet Routing Registry, , Proceedings of the ACM Internet Measurement Conference (IMC), Montreal, Canada, October 2023.
Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking, , Proceedings of the 29th ACM Symposium on Operating Systems Principles (SOSP), Koblenz, Germany, October 2023.
Mira: A Program-Behavior-Guided Far Memory System, , Proceedings of the 29th ACM Symposium on Operating Systems Principles (SOSP), Koblenz, Germany, October 2023.
A Cloud-Scale Characterization of Remote Procedure Calls, , Proceedings of the 29th ACM Symposium on Operating Systems Principles (SOSP), Koblenz, Germany, October 2023.
Limited Access: The Truth Behind Far Memory, , Proceedings of the Workshop on Resource Disaggregation and Serverless Computing (WORDS), October 2023.
Crescendo: Towards Real-time, Wide-band, High-fidelity Spectrum Sensing Systems, , Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Madrid, Spain, October 2023.
Memory Management in ActiveRMT: Towards Runtime-programmable Switches, , Proceedings of the ACM SIGCOMM Conference, New York, NY, September 2023. (Best paper award).
Destination Unreachable: Characterizing Internet Outages and Shutdowns, , Proceedings of the ACM SIGCOMM Conference, New York, NY, September 2023.
Access Denied: Assessing Physical Risks to Internet Access Networks, , Proceedings of the 31st USENIX Security Symposium, Anaheim, CA, August 2023.
Improving Logging to Reduce Permission Over-Granting Mistakes, , Proceedings of the 31st USENIX Security Symposium, Anaheim, CA, August 2023.
MultiView: Finding Blind Spots in Access-Deny Issues, , Proceedings of the 31st USENIX Security Symposium, Anaheim, CA, August 2023.
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender, , Proceedings of the Symposium on Useable Privacy and Security, Anaheim, CA, August 2023.
In the Line of Fire: Risks of DPI-triggered Data Collection, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), Marina del Rey, CA, August 2023.
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps, , Proceedings of the 23rd Privacy Enhancing Technologies Symposium, Lausanne, Switzerland, July 2023.
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy, , Proceedings of the IEEE European Symposium on Security and Privacy, Delft, The Netherlands, July 2023, pages 373-391. (Best paper award).
Out of Hand for Hardware? Within Reach for Software!, , Proceedings of the 19th ACM Workshop on Hot Topics in Operating Systems (HotOS-XIX), Providence, RI, June 2023.
Make It Real: An End-to-End Implementation of A Physically Disaggregated Data Center, , ACM SIGOPS Operating Systems Review 57(1):1-9, June 2023.
WaVe: a Verifiably Secure WebAssembly Sandboxing Runtime, , Proceedings of the IEEE Symposium on Security and Privacy, May 2023. (Distinguished Paper Award).
Ransomware Attack Associated With Disruptions at Adjacent Emergency Departments in the US, , JAMA Network Open 6(5):e2312270-e2312270, May 2023.
Disaggregating Stateful Network Functions, , Proceedings of the 20th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2023.
Canvas: Isolated and Adaptive Swapping for Multi-Applications on Remote Memory, , Proceedings of the 20th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2023.
Hermit: Low-Latency, High-Throughput, and Transparent Remote Memory via Feedback-Directed Asynchrony, , Proceedings of the 20th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2023.
Rosebud: Making FPGA-accelerated Middlebox Development More Pleasant, , Proceedings of the 28th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Vancouver, Canada, March 2023.
TagAlong: Free, Wide-Area Data-Muling and Services, , Proceedings of International Workshop on Mobile Computing Systems and Applications (HotMobile), Newport Beach, CA, February 2023.
Protecting Data Integrity of Web Applications with Database Constraints Inferred from Application Code, , Proceedings of the 28th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Vancouver, Canada, March 2023.
A metric for factoring data movement into chasing the sun, , Proceedings of the 1st Workshop on NetZero Carbon Computing (NetZero'23), Montreal, Canada, February 2023.
Zed: Leveraging Data Types to Process Eclectic Data, , Proceedings of the 13th Annual Conference on Innovative Data Systems Research (CIDR), Amsterdam, The Netherlands, January 2023.
Scaling beyond packet switch limits with multiple dataplanes, , Proceedings of ACM CoNEXT, Rome, Italy, December 2022.
The Challenges of Blockchain-based Naming Systems for Malware Defenders, , Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), November 2022, pages 1-14. (Best Student Paper).
Retroactive Identification of Targeted DNS Infrastructure Hijacking, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 14-32.
Where .ru? Assessing the Impact of Conflict on Russian Domain Infrastructure, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 159-165.
Measuring UID Smuggling in the Wild, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 230-243.
Stop, DROP, and ROA: Effectiveness of Defenses through the lens of DROP, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022.
ZDNS: A Fast DNS Toolkit for Internet Measurement, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022.
Mind Your MANRS: Measuring the MANRS Ecosystem, , Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022.
Measuring Security Practices, , Communications of the Association for Computing Machinery 65(9):93-102, September 2022.
Towards a Fully Disaggregated and Programmable Data Center, , Proceedings of the 13th ACM Asia-Pacific Workshop on Systems (APSys'22), San Diego, Calif., August 2022.
Time-division TCP for Reconfigurable Data Center Networks, , Proceedings of the ACM SIGCOMM Conference, Amsterdam, The Netherlands, August 2022. (The first two authors contributed equally).
Something Old, Something New: Extending the Life of CPUs in Datacenters, , Proceedings of the 1st Workshop on Sustainable Computer Systems Design and Implementation (HotCarbon'22), San Diego, Calif., July 2022.
Telling the Story of Climate, Sustainability, and Modern Computing to the General Public, , The Second ACM SIGEnergy Workshop on Society, Climate, and Sustainability (WeCan'22), June 2022.
Domain Name Lifetimes: Baseline and Threats, , Proceedings of the 6th Network Traffic Measurement and Analysis Conference (TMA), June 2022, pages 10-18.
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices, , Proceedings of the 43rd IEEE Symposium on Security and Privacy, May 2022.
FaaS Made Fast Using Snapshot-based VMs, , Proceedings of the ACM European Conference on Computer Systems, Rennes, France, April 2022, pages 730-746.
Quantifying Nations' Exposure to Traffic Observation and Selective Tampering, , Proceedings of the 23rd Passive and Active Measurement Conference (PAM), Virtual, March 2022.
IRR Hygiene In the RPKI Era, , Proceedings of the 23rd Passive and Active Measurement Conference (PAM), Virtual, March 2022.
Clio: A Hardware-Software Co-Designed Disaggregated Memory System, , Proceedings of the 27th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'22), February 2022. (* co-first authors).
Risky BIZness: Risks Derived from Registrar Name Management, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 673-686. (IRTF Applied Networking Research Prize).
Who's Got Your Mail? Characterizing Mail Service Provider Usage, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 122-136.
Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 390-397.
Inferring Regional Access Network Topologies: Methods and Applications, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Federated Infrastructure: Use, Patterns, and Insights from "The People's Network", , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Identifying ASes of State-owned Internet operators, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Locked-In during Lock-Down: Undergraduate Life on the Internet in a Pandemic, , Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure, , Proceedings of the 5th Network Traffic Measurement and Analysis Conference (TMA), September 2021, pages 1-9. (Best Paper).
Hopper: Modeling and Detecting Lateral Movement, , Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021, pages 3093-3110.
Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns, , Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
Jetset: Targeted Firmware Rehosting for Embedded Systems, , Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model, , Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
PYLIVE: On-the-Fly Code Change for Python-based Online Services, , Proceedings of the USENIX Annual Technical Conference, July 2021. (The first two authors contributed equally).
How new kinds of computer networks can reduce the environmental impact of cloud computing, , The First ACM SIGEnergy Workshop on Climate, Sustainability, and Society (ACM e-Energy 2021), Online event, June 2021.
Stipulated Smartphones for Students: The Requirements of Modern Technology for Academia, , ACM Seventh Workshop on Computing within Limits (LIMITS'21), Online event, June 2021.
User-Defined Cloud, , Proceedings of the 18th ACM Workshop on Hot Topics in Operating Systems (HotOS-XVIII), Online Event, June 2021.
Century-Scale Smart Infrastructure, , Proceedings of the 18th ACM Workshop on Hot Topics in Operating Systems (HotOS-XVIII), Online Event, June 2021.
In-network Contention Resolution for Disaggregated Memory, , Proceedings of the Workshop on Resource Disaggregation and Serverless Computing (WORDS), April 2021.
CoResident Evil: Covert Communications in the Cloud with Lambdas, , Proceedings of the Web Conference (WWW), Ljubljana, Solvenia, April 2021.
Clairvoyance: Inferring Blocklist Use on the Internet, , Proceedings of the 22nd Passive and Active Measurement Conference (PAM), Brandenburg, Germany, March 2021, pages 57-75.
Inferring Cloud Interconnections: Validation, Geolocation, and Routing Behavior, , Proceedings of the 22nd Passive and Active Measurement Conference (PAM), Brandenburg, Germany, March 2021.
Доверя́й, но проверя́й: SFI safety for native-compiled Wasm, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2021.
Optical networking within the Lightwave Energy-Efficient Datacenter project (Invited), , J. Opt. Commun. Netw. 12(12):378-389, December 2020.
LevelUp: A thin-cloud approach to game livestreaming, , Proceedings of the Fifth ACM/IEEE Symposium on Edge Computing, Virtual Event, November 2020.
Enabling Active Networking on RMT Hardware, , Proceedings of the 19th ACM Workshop on Hot Topics in Networks (HotNets-XIX), Chicago, IL, November 2020.
Unresolved Issues: Prevalence, Persistence and Perils of Lame Nameservers, , Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 281-294.
Trufflehunter: Cache Sniffing Rare Domains at Large Public DNS Resolvers, , Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 50-64. (IRTF Applied Networking Research Prize).
MAnycast2 -- Using Anycast to Measure Anycast: Challenges and Opportunities, , Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020.
Particle: Ephemeral Endpoints for Serverless Networking, , Proceedings of the 11th ACM Symposium on Cloud Computing (SOCC), October 2020, pages 16-29.
SmartNIC Performance Isolation with FairNIC: Programmable Networking for the Cloud, , Proceedings of the ACM SIGCOMM Conference, Virtual, August 2020. (The first two authors contributed equally).
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations, , Proceedings of the USENIX Annual Technical Conference, July 2020.
Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores, , Proceedings of the USENIX Annual Technical Conference, July 2020.
Understanding Memory and Thread Safety Practices and Issues in Real-World Rust Programs, , Proceedings of Programming Languages Design and Implementation (PLDI), June 2020. (The first two authors contributed equally).
Corundum: An Open-Source 100-Gbps NIC, , Proceedings of the 28th IEEE International Symposium On Field-Programmable Custom Computing Machines (FCCM), Fayetteville, AR, May 2020.
Dark Matter: Uncovering the DarkComet RAT Ecosystem, , Proceedings of The Web Conference (WWW), Taipei, Taiwan, April 2020.
RIPE IPmap Active Geolocation: Mechanism and Performance Evaluation, , ACM SIGCOMM Computer Communication Review 50(2), April 2020.
Expanding Across Time to Deliver Bandwidth Efficiency and Low Latency, , Proceedings of the 17th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Santa Clara, CA, February 2020.
Adapting TCP for Reconfigurable Datacenter Networks, , Proceedings of the 17th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Santa Clara, CA, February 2020.
Hack for Hire, , Communications of the Association for Computing Machinery 62(12):32-37, December 2019.
Towards Continuous Access Control Validation and Forensics, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), London, UK, November 2019.
Hack for Hire: Investigating the Black Market of Retail Email Account Hacking Services, , ACM Queue: Tomorrow's Computing Today 17(4), October 2019.
Understanding the Limits of Passive Realtime Datacenter Fault Detection and Localization, , IEEE/ACM Transactions on Networking 27(5), October 2019.
Always on Stress: The Emotive Impact of Anytime, Anywhere Discussion Boards, , Transformative Dialogues: Teaching and Learning Journal 12(2), 2019.
Measuring Security Practices and How They Impact Security, , Proceedings of the ACM Internet Measurement Conference (IMC), Amsterdam, The Netherlands, October 2019, pages 36-49.
Detecting if LTE is the Bottleneck with BurstTracker, , Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Los Cabos, Mexico, October 2019.
Residential Links Under the Weather, , Proceedings of the ACM SIGCOMM Conference, Beijing, China, August 2019.
Triton: A Software-Reconfigurable Federated Avionics Testbed, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), Santa Clara, CA, August 2019.
Pythia: Remote Oracles for the Masses, , Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019.
Detecting and Characterizing Lateral Phishing at Scale, , Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 1273-1290. (Distinguished paper).
Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence, , Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 851-867.
"Please Pay Inside": Evaluating Bluetooth-based Detection of Gas Pump Skimmers, , Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019.
Learned Operating Systems, , ACM SIGOPS Operating Systems Review 53(1):40-45, July 2019.
Ariadne: Online Provenance for Big Graph Analytics, , Proceedings of the ACM SIGMOD/PODS International Conference on Management of Data, Amsterdam, The Netherlands, July 2019.
A Double-Edged Sword: Security Threats and Opportunities in One-Sided Network Communication, , Proceedings of the 11th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), Renton, WA, July 2019.
Storm: A Fast Transactional Dataplane for Remote Data Structures, , Proceedings of the 12th ACM International Systems and Storage Conference (SYSTOR), Haifa, Israel, June 2019. (Award paper).
SparSDR: Sparsity-proportional Backhaul and Compute for SDRs, , Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Seoul, Korea, June 2019.
Web Feature Deprecation: A Case Study for Chrome, , Proceedings of the 41st ACM/IEEE International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP) 2019, Montréal, QC, Canada, May 2019, pages 302-311.
Hack for Hire: Exploring the Emerging Market for Account Hijacking, , Proceedings of the Web Conference (WWW), San Francisco, CA, May 2019, pages 1279-1289.
Understanding Real-World Concurrency Bugs in Go, , Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, RI, April 2019. (The first two authors contributed equally).
How to Find Correlated Internet Failures, , Proceedings of the Passive and Active Measurement Conference (PAM), Puerto Varas, Chile, March 2019.
LEED: A Lightwave Energy-Efficient Datacenter, , Proceedings of OFC/NFOEC, San Diego, CA, March 2019.
SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-cost SDRs, , Proceedings of the 16th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, February 2019.
Schrodinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem, , Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, August 2018.
LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation, , Proceedings of the 13th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Carlsbad, CA, USA, October 2018. (Award paper).
An Empirical Analysis of the Commercial VPN Ecosystem, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 443-456.
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 43-55.
Cloud Datacenter SDN Monitoring: Experiences and Challenges, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018.
Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 2018.
Sprocket: A Serverless Video Processing Framework, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Carlsbad, CA, October 2018, pages 263-274.
Inferring Persistent Interdomain Congestion, , Proceedings of the ACM SIGCOMM Conference, Budapest, Hungary, August 2018. (Best Paper).
Evaluating the Performance of Software NICs for 100-Gb/s Datacenter Traffic Control, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Ithaca, New York, July 2018.
Dark Packets and the end of Network Scaling, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Ithaca, New York, July 2018, pages 1-14.
CacheCloud: Towards Speed-of-Light Datacenter Communication, , Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud-X), Boston, MA, July 2018.
Toward Optical Switching in the Data Center, , IEEE International Conference on High Performance Switching and Routing, Bucharest, Romania, June 2018.
Tracking Ransomware End-to-end, , Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, May 2018.
Distributed Shared Persistent Memory, , Proceedings of the 9th Annual Non-Volatile Memories Workshop (NVMW), San Diego, CA, March 2018.
Estimating Profitability of Alternative Cryptocurrencies, , Proceedings of the International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curacao, February 2018.
Passive Realtime Datacenter Fault Detection and Localization, , USENIX ;login: 42(3), 2017.
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, November 2017.
Tripwire: Inferring Internet Site Compromise, , Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 341-354.
Exploring the Dynamics of Search Advertiser Fraud, , Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 157-170.
PacketLab: A Universal Measurement Endpoint Interface, , Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017.
Log20: Fully Automated Optimal Placement of Log Printing Statements under Specified Overhead Threshold, , Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, October 2017.
LITE Kernel RDMA Support for Datacenter Applications, , Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, October 2017.
Distributed Shared Persistent Memory, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Santa Clara, CA, September 2017.
Disaggregated Operating System, , Proceedings of the 17th International Workshop on High Performance Transaction Systems (HPTS), October 2017.
RotorNet: A Scalable, Low-complexity, Optical Datacenter Network, , Proceedings of the ACM SIGCOMM Conference, Los Angeles, CA, August 2017.
Backpage and Bitcoin: Uncovering Human Traffickers, , Proceedings of the ACM SIGKDD Conference, Halifax, Nova Scotia, August 2017.
Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX, , Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.
On the Effectiveness of Mitigations against Floating-point Timing channels, , Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.
Dead Store Elimination (Still) Considered Harmful, , Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017.
Using Indirect Routing to Recover from Network Traffic Scheduling Estimation Error, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Beijing, China, May 2017.
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles, , Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild, , Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.
Finding and Preventing Bugs in JavaScript Bindings, , Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.
How Do System Administrators Resolve Access-Denied Issues in the Real World?, , Proceedings of the 35th Annual CHI Conference on Human Factors in Computing Systems (CHI'17), Denver, CO, USA, May 2017.
Pinning Down Abuse on Google Maps, , Proceedings of the International World Wide Web Conference (WWW), Perth, Australia, April 2017.
Tools for Automated Analysis of Cybercriminal Markets, , Proceedings of the International World Wide Web Conference (WWW), Perth, Australia, April 2017.
Passive Realtime Datacenter Fault Detection and Localization, , Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.
Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads, , Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.
Enabling Wide-spread Communications on Optical Fabric with MegaSwitch, , Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.
FarmBeats: An IoT Platform for Data-Driven Agriculture, , Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2017.
Datalography: Scaling Datalog Graph Analytics on Graph Processing Systems, , Proceedings of the IEEE International Conference on Big Data, December 2016.
P-FatTree: A Multi-channel Datacenter Network Topology, , Proceedings of the 15th ACM Workshop on Hot Topics in Networks (HotNets-XV), Atlanta, GA, November 2016.
Early Detection of Configuration Errors to Reduce Failure Damage, , Proceedings of the 12th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Savannah, GA, USA, November 2016. (Award paper).
Nanophotonic Devices and Circuits for Communications, , Proceedings of the Third Annual International Conference on Nanoscale Computing and Communication (ACM Nanocom'16), New York, NY, September 2016.
You've Got Vulnerability: Exploring Effective Vulnerability Notifications, , Proceedings of the 25th USENIX Security Symposium, Austin, TX, August 2016.
On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction, , Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016.
Automobile Driver Fingerprinting, , Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016.
Learning from Big Malwares, , Proceedings of the 7th ACM Asia-Pacific Workshop on Systems (APSys), Hong Kong, China, August 2016.
DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior, , Proceedings of the 14th International Conference on Mobile Systems, Applications, and Services (MobiSys'16), Singapore, June 2016.
Lost in Space: Improving Inference of IPv4 Address Space Utilization, , IEEE Journal on Selected Areas in Communication 34(6), June 2016.
NChecker: Saving Mobile App Developers from Network Disruptions, , Proceedings of the ACM European Conference on Computer Systems (EuroSys), London, UK, April 2016.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, , Communications of the Association for Computing Machinery 59(4):86-93, April 2016.
Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard, , Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI'16), Santa Clara, CA, USA, March 2016.
61 Port 1x6 Selector Switch for Data Center Networks, , Optical Fiber Communication Conference, March 2016, pages M3I.3.
Is memory disaggregation feasible? A case study with Spark SQL, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Santa Clara, CA, March 2016.
Stressing Out: Bitcoin "Stress Testing", , BITCOIN '14: The Third Workshop on Bitcoin and Blockchain Research, Christ Church, Barbados, February 2016.
Exploring Controller Area Networks, , USENIX ;login: 40(6), December 2015.
Integrated Space-division Multiplexer for Data Center Networks, , IEEE Journal of Selected Topics in Quantum Electronics PP(99):1-1, October 2015.
Sorting 100TB on Google Compute Engine, , UC San Diego technical report CS2015-2013, September 2015.
Scheduling Techniques for Hybrid Circuit/Packet Networks, , Proceedings of ACM CoNEXT, Heidelberg, Germany, December 2015.
Security by Any Other Name: On the Effectiveness of Provider Based Email Security, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 2015.
Empirical Analysis of Search Advertising Strategies, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Leveraging Internet Background Radiation for Opportunistic Network Analysis, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
From .academy to .zone: An Analysis of the New TLD Land Rush, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Who is .com? Learning to Parse WHOIS Records, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Affiliate Crookies: Characterizing Affiliate Marketing Abuse, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Offline Downloading in China: A Comparative Study, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
An End-to-End Measurement of Certificate Revocation in the Web's PKI, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Timeouts: Beware Surprisingly High Delay, , Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.
Achieving Cost-efficient, Data-intensive Computing in the Cloud, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Kohala Coast, Hawaii, August 2015.
Hey, You Have Given Me Too Many Knobs! -- Understanding and Dealing with Over-Designed Configuration in System Software, , Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15), Bergamo, Italy, August 2015.
Inside the Social Network's (Datacenter) Network, , Proceedings of the ACM SIGCOMM Conference, London, England, August 2015.
PowerSpy: Location Tracking using Mobile Device Power Analysis, , Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 2015.
Fast and Vulnerable: A Story of Telematic Failures, , Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), Washington D.C., August 2015.
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems, , Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), Washington D.C., August 2015.
Interpreting Advertiser Intent in Sponsored Search, , Proceedings of the ACM SIGKDD Conference, Sydney, Australia, August 2015.
Nanophotonics: Technology and Application, , Proceedings of the IEEE Optical MEMS and Nanophotonics Conference, Jerusalem, Israel, August 2015.
Systems Approaches to Tackling Configuration Errors: A Survey, , ACM Computing Surveys (CSUR) 47(4), July 2015.
Framing Dependencies Introduced by Underground Commoditization, , Proceedings of the Workshop on the Economics of Information Security (WEIS), Delft, The Netherlands, June 2015.
A Study of Application Performance with Non-Volatile Main Memory, , Proceedings of the 31st IEEE Conference on Massive Data Storage (MSST), Santa Clara, CA, May 2015.
Removing the Costs and Retaining the Benefits of Flash-Based SSD Virtualization with FSDV, , Proceedings of the 31st IEEE Conference on Massive Data Storage (MSST), Santa Clara, CA, May 2015.
ConfValley: A Systematic Configuration Validation Framework for Cloud Services, , Proceedings of the ACM European Conference in Computer Systems (EuroSys), Bordeuax, France, April 2015.
Scheduling for Data Center Networks with Reconfiguration Delay, , Proceedings of the IEEE Infocom Conference, Hong Kong, China, April 2015, pages 1-9.
Enfold: Downclocking OFDM in WiFi, , GetMobile: Mobile Computing and Communications 19(2):10-13, April 2015.
Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure, , Proceedings of the 12th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Oakland, CA, April 2015.
Managing Contention with Medley, , IEEE Transcations on Mobile Computing 14(3), March 2015.
Achieving Congestion Diversity in Multi-hop Wireless Mesh Networks, , IEEE Transcations on Mobile Computing 15(3), March 2015.
Mojim: A Reliable and Highly-Available Non-Volatile Memory System, , Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Istanbul, Turkey, March 2015.
FTXen: Making Hypervisor Resilient to Hardware Faults on Relaxed Cores, , Proceedings of the 21st IEEE International Symposium on High Performance Computer Architecture (HPCA'15), Bay Area, CA, February 2015.
CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks, , Proceedings of the 16th ACM International Workshop on Mobile Computing Systems and Applications (HotMobile), Sante Fe, NM, February 2015.
Too LeJIT to Quit: Extending JIT Spraying to ARM, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015.
On The Security of Mobile Cockpit Information Systems, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.
Deniable Liaisons, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.
Characterizing Large-Scale Click Fraud in ZeroAccess, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.
Algebraic MACs and Keyed-Verification Anonymous Credentials, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.
RevCast: Fast, Private Certificate Revocation over FM Radio, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns, , Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014, pages 359-372.
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild, , Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.
Towards Network-level Efficiency for Cloud Storage Services, , Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.
Challenges in Inferring Internet Interdomain Congestion, , Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.
Inferring Complex AS Relationships, , Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed, , Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.
Willow: A Programmable SSD, , Proceedings of the 11th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, CO, USA, October 2014.
Blender: Upgrading Tenant-based Data Center Networking, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Marina del Rey, CA, October 2014.
Enfold: Downclocking OFDM in WiFi, , Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.
Cutting the Cord: a Robust Wireless Facilities Network for Data Centers, , Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.
DREAM: Dynamic Resource Allocation for Software-defined Measurement, , Proceedings of the ACM SIGCOMM Conference, Chicago, IL, August 2014.
Hulk: Eliciting Malicious Behavior in Browser Extensions, , Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, August 2014.
Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise, , Proceedings of the ACM SIGKDD Conference, New York, NY, August 2014.
A Spectral Algorithm for Learning Class-Based n-gram Models of Natural Language, , Proceedings of the 30th Conference on Uncertainty in Artificial Intelligence (UAI 2014), Quebec City, Canada, July 2014.
Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, , Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014, pages 4:1:1-4:1:13.
Performance Regression Testing Target Prioritization via Performance Risk Analysis, , Proceedings of the International Conference on Software Engineering (ICSE), Hyderabad, India, May 2014.
WCMP: Weighted Cost Multipathing for Improved Fairness in Data Centers, , Proceedings of the ACM European Conference in Computer Systems (EuroSys), Amsterdam, The Netherlands, April 2014.
A Gaussian Latent Variable Model for Large Margin Classification of Labeled and Unlabeled Data, , Proceedings of the 17th International Conference on Artificial Intelligence and Statistics (AISTATS), Reykjavik, Iceland, April 2014.
XXXtortion? Inferring Registration Intent in the .XXX TLD, , Proceedings of the International World Wide Web Conference (WWW)`, Seoul, Korea, April 2014, pages 901-912.
SENIC: A Scalable NIC for End-Host Rate Limiting, , Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014.
Circuit Switching Under the Radar with REACToR, , Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014, pages 1-15.
Libra: Divide and Conquer to Verify Formading Tables in Huge Networks, , Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014.
Wideband silicon-photonic thermo-optic switch in a wavelength-division multiplexed ring network, , Opt. Express 22(7):8205-8218, April 2014.
Exposing Inconsistent Web Search Results with Bobble, , Proceedings of the Passive and Active Measurement Conference (PAM), Los Angeles, CA, March 2014.
EnCore: Exploiting System Environment and Correlation Information for Misconfiguration Detection, , Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Salt Lake City, UT, March 2014.
Botcoin: Monetizing Stolen Cycles, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.
DSpin: Detecting Automatically Spun Content on the Web, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014, pages 4:1:1-4:1:16.
SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, , USENIX ;login: 38(6):10-14, December 2013.
Views and Transactional Storage for Large Graphs, , Proceedings of the ACM/IFIP/USENIX Middleware Conference, Bejing, China, December 2013. (Best paper).
Directing Data Center Traffic, , Science 342(6155):202-203, 2013.
Aspen Trees: Balancing Data Center Fault Tolerance, Scalability and Cost, , Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013.
Bullet Trains: A Study of NIC Burst Behavior at Microsecond Timescales, , Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013, pages 133-138.
FasTrak: Enabling Express Lanes in Multi-Tenant Data Centers, , Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013.
Do Not Blame Users for Misconfigurations, , Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), Nemacolin Woodlands Resort, Pennsylvania, November 2013.
From ARIES to MARS:Transaction Support for Next-Generation Solid-State Drives, , Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), Nemacolin Woodlands Resort, Pennsylvania, November 2013.
Scalable Coordination of a Tightly-Coupled Service in the Wide Area, , Proceedings of the ACM Conference on Timely Results in Operating Systems, Farmington, PA, November 2013.
ViceROI: Catching Click-Spam in Search Ad Networks, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013.
Dahu: Commodity Switches for Direct Connect Data Center Networks, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), San Jose, CA, October 2013.
A Multiport Microsecond Optical Circuit Switch for Data Center Networking, , IEEE Photonics Technology Letters 25(16):1589-1592, 2013.
A Comparison of Syslog and IS-IS for Monitoring Link State, , Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, , Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013, pages 127-140.
Internet Nameserver IPv4 and IPv6 Address Relationships, , Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.
Speedtrap: Internet-Scale IPv6 Alias Resolution, , Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.
AS Relationships, Customer Cones, and Validation, , Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.
Scalable Lineage Capture for Debugging DISC Analytics, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2013.
High-Fidelity Switch Models for Software-Defined Network Emulation, , Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Hong Kong, China, August 2013.
B4: Experience with a Globally Deployed Software Defined WAN, , Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.
Integrating Microsecond Circuit Switching into the Data Center, , Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.
Fast Programmable Match-Action Processing in Hardware for SDN, , Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.
Take This Personally: Pollution Attacks on Personalized Services, , Proceedings of the 22nd USENIX Security Symposium, Washington D.C., August 2013.
Measuring the Practical Impact of DNSSEC Deployment, , Proceedings of the 22nd USENIX Security Symposium, Washington D.C., August 2013.
Practical Comprehensive Bounds on Surreptitious Communication over DNS, , Proceedings of the 22nd USENIX Security Symposium, Washington D.C., August 2013.
Challenges in the Emulation of Large Scale Software Defined Networks, , Proceedings of the 4th ACM Asia-Pacific Workshop on Systems (APSys), Singapore, July 2013.
Optical/Electrical Hybrid Switching for Datacenter Communications, , Proceedings of the 18th OptoElectronics and Communications Conference (OECC2013) / Photonics in Switching 2013 (PS2013), Kyoto, Japan, July 2013.
NicPic: Scalable and Accurate End-Host Rate Limiting, , Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud-V), San Jose, CA, June 2013.
Bug Characteristics in Open Source Software, , Springer Journal of Empirical Software Engineering, June 2013.
Quantifying the Benefits of Joint Content and Network Routing, , Proceedings of the ACM SIGMETRICS Conference, Pittsburgh, PA, June 2013.
ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowsourcing, , Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Taipei, Taiwan, June 2013.
A Variational Approximation for Topic Modeling of Hierarchical Corpora, , Proceedings of the International Conference on Machine Learning, Atlanta, GA, June 2013, pages 2:55-2:63.
Warped Mirrors for Flash, , Proceedings of the 29th IEEE Conference on Massive Data Storage (MSST), Long Beach, CA, May 2013.
SloMo: Downclocking WiFi Communication, , Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 245-258.
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones, , Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 57-70.
Real Time Network Policy Checking Using Header Space Analysis, , Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013.
See Straight Through Data Center Bandwidth Limitations with X-Rays, , Proceedings of TinyTOCS, Reconfigurable wireless X-Ray links in data centers could deliver 40 Pb/sec, but would have to be turned off while operators are present, April 2013.
The Day After Patch Tuesday: Effects Observable in IP Darkspace Traffic, , Proceedings of the Passive and Active Measurement Conference, Hong Kong, China, March 2013.
A Coordinated View of the Temporal Evolution of Large-scale Internet Events, , Proceedings of the Passive and Active Measurement Conference, Hong Kong, China, March 2013.
A 10 us Hybrid Optical-Circuit/Electrical-Packet Network for Data Centers, , Proceedings of OFC/NFOEC, Anaheim, CA, March 2013.
Scalability vs. Fault Tolerance in Aspen Trees, , Microsoft Research technical report MSR-TR-2013-21, February 2013.
TritonSort: A balanced and energy-efficient large-scale sorting system, , ACM Transactions on Computer Systems 31(1), February 2013.
Getting Real: Lessons in Transitioning Research Simulations into Hardware Systems, , Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2013.
Warming up Storage-Level Caches with Bonfire, , Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2013.
Juice: A Longitudinal Study of an SEO Campaign, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2013, pages 7:4:1-7:4:17.
Taster's Choice: A Comparative Analysis of Spam Feeds, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012, pages 427-440.
Analyis of a '/0' Stealth Scan from a Botnet, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012.
Fathom: A Browser-based Network Measurement Platform, , Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012.
Hunting Mice with Microsecond Circuit Switches, , Proceedings of the 11th ACM Workshop on Hot Topics in Networks (HotNets-XI), Redmond, WA, October 2012.
Chronos: Predictable Low Latency for Data Center Applications, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012, pages 9:1-9:14.
Themis: An I/O-Efficient MapReduce, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012.
xOMB: Extensible Open Middleboxes with Commodity Servers, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Austin, Texas, October 2012.
NetBump: User-extensible Active Queue Management with Bumps on the Wire, , Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Austin, Texas, October 2012.
Torchestra: Reducing Interactive Traffic Delays over Tor, , Proceedings of the Workshop on Privacy in the Electronic Society (WPES), Raleigh, NC, October 2012.
Priceless: The Role of Payments in Abuse-advertised Goods, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 845-856.
Manufacturing Compromise: The Emergence of Exploit-as-a-Service, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 821-832.
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging, , Proceedings of the 10th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Hollywood, CA, USA, October 2012.
Accurate Characterization of Variability in Power Consumption in Modern Computing Platforms, , Workshop on Power-Aware Computing and Systems (HotPower), Hollywood, CA, October 2012.
TinyTOCS as an Experimental Laboratory, , Proceedings of TinyTOCS, When rethinking academic publishing, don't retrofit a cathedral onto what should be a bazaar, September 2012.
RadioJockey: Mining Program Execution to Optimize Cellular Radio Usage, , Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Istanbul, Turkey, August 2012.
A Demonstration of Ultra-low Latency Data Center Optical Circuit Switching (Demo session), , Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.
NetPilot: Automating Datacenter Network Failure Mitigation, , Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.
Mirror Mirror on the Ceiling: Flexible Wireless Links for Data Centers, , Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.
Establishing Browser Security Guarantees through Formal Shim Verification, , Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, August 2012.
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs, , Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, August 2012.
When Good Services Go Wild: Reassembling Web Services for Unintended Purposes, , Proceedings of the USENIX Workshop on Hot Topics in Security, Bellevue, WA, August 2012.
NetShare and Stochastic NetShare: Predictable Bandwidth Allocation for Data Centers, , ACM SIGCOMM Computer Communication Review 42(3), July 2012.
scc: Cluster Storage Provisioning Informed by Application Characteristics and SLAs, , USENIX ;login: 37(3), June 2012.
Economic Analysis of Cybercrime in Crowdsourced Labor Markets, , Proceedings of the Workshop on the Economics of Information Security (WEIS), Berlin, Germany, June 2012.
Measuring the Cost of Cybercrime, , Proceedings of the Workshop on the Economics of Information Security (WEIS), Berlin, Germany, June 2012.
Router Support for Fine-Grained Latency Measurements, , IEEE/ACM Transactions on Networking 20(3):811-824, June 2012.
When You Don't Trust Clients: Byzantine Proposer Fast Paxos, , Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Macau, China, June 2012.
Software Abstractions for Trusted Sensors, , Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Low Wood Bay, Lake District, UK, June 2012.
Characterizing Logging Practices in Open-Source Software, , Proceedings of the International Conference on Software Engineering (ICSE), Zurich, Switzerland, June 2012.
Internet-Scale IPv4 Alias Resolution with MIDAR, , IEEE/ACM Transactions on Networking 21(2), April 2012.
FlashTier: a Lightweight, Consistent and Durable Storage Cache, , Proceedings of the ACM European Conference in Computer Systems (EuroSys), Bern, Switzerland, April 2012.
Practical TDMA for Datacenter Ethernet, , Proceedings of the ACM European Conference in Computer Systems (EuroSys), Bern, Switzerland, April 2012.
Less is More: Trading a little Bandwidth for Ultra-Low Latency in the Data Center, , Proceedings of the 9th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2012.
Header Space Analysis: Static Checking for Networks, , Proceedings of the 9th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2012.
Weighted Fair Queuing with Differential Dropping, , Proceedings of the IEEE Infocom Conference, Orlando, FL, April 2012. (Mini-conference).
Return-Oriented Programming: Systems, Languages and Applications, , ACM Transactions on Information and System Security 15(1), March 2012.
The BIZ Top-Level Domain: Ten Years Later, , Proceedings of the Passive and Active Measurement Conference, Vienna, Austria, March 2012.
Improving Software Diagnosability via Log Enhancement, , ACM Transactions on Computer Systems 30(1), February 2012.
De-indirection for Flash-based SSDs with Nameless Writes, , Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012.
BlueSky: A Cloud-Backed File System for the Enterprise, , Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012, pages 19:1-19:14.
scc: Cluster Storage Provisioning Informed by Application Characteristics and SLAs, , Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012.
Limitations of scanned human copresence encounters for modelling proximity-borne malware, , Proceedings of the International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, January 2012, pages F1.1.4:1--F1.1.5:10.
Extracting benefit from harm: using malware pollution to analyze the impac of political and geophysical events on the Internet, , ACM SIGCOMM Computer Communication Review 42(1), January 2012.
In Planning Digital Defenses, the Biggest Obstacle is Human Ingenuity, , New York Times, Dec 6 2011.
TCP Fast Open, , Proceedings of ACM CoNEXT, Tokyo, Japan, December 2011.
Distributed Application Configuration, Management, and Visualization with Plush, , ACM Transactions on Internet Technology (TOIT) 11(2), Dec 2011.
GQ: Practical Containment for Measuring Modern Malware Systems, , Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.
An Analysis of Underground Forums, , Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011, pages 71-80.
Analysis of Country-wide Internet Outages Caused by Censorship, , Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.
Pingin' in the Rain, , Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.
ALIAS: Scalable, Decentralized Label Assignment for Data Centers, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Cascais, Portugal, October 2011.
Switching the Optical Divide: Fundamental Challenges for Hybrid Electrical/Optical Datacenter Networks, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Cascais, Portugal, October 2011.
An Empirical Study on Configuration Errors in Commercial and Open Source Systems, , Proceedings of the 23th ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, October 2011.
A Characterization of Node Update Distributions in the PlanetLab Test Bed, , Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, October 2011.
Judging a site by its content: learning the textual, structural, and visual features of malicious Web pages, , Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011.
Topic Modeling of Freelance Job Postings to Monitor Web Service Abuse, , Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011, pages 11-20.
Cloak and Dagger: Dynamics of Web Search Cloaking, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011, pages 477-490.
On the Empirical Performance of Self-calibrating WiFi Location Systems, , Proceedings of IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, October 2011.
How Do Fixes Become Bugs? -- A Comprehensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating Systems, , Proceedings of the European Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE), Szeged, Hungary, September 2011.
What's the Difference? Efficient Set Reconciliation without Prior Context, , Proceedings of the ACM SIGCOMM Conference, Toronto, Canada, August 2011.
Interview with Stefan Savage: On the Spam Payment Trail, , USENIX ;login: 36(4):7-20, August 2011.
Putting Out a HIT: Crowdsourcing Malware Installs, , Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), San Francisco, CA, August 2011.
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks, , Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), San Francisco, CA, August 2011.
No Plan Survives Contact: Experience with Cybercrime Measurement, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011, pages 2:1-2:8.
ExperimenTor: A Testbed for Safe Realistic Tor Experimentation, , Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011.
Show Me the Money: Characterizing Spam-advertised Revenue, , Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 219-234.
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse, , Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 203-218.
Comprehensive Experimental Analyses of Automotive Attack Surfaces, , Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011.
The Phantom Tollbooth: Privacy-preserving Electronic Toll Collection in the Presence of Driver Collusion, , Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011.
DefenestraTor: Throwing out Windows in Tor, , Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011, pages 134-154.
DieCast: Testing Distributed Systems with an Accurate Scale Model, , ACM Transactions on Computer Systems 29(2):4:1-4:48, May 2011.
Evaluating the Effectiveness of Model-Based Power Characterization, , Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.
Context-based Online Configuration-Error Detection, , Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.
In-situ MapReduce for Log Processing, , Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.
Fine-Grained Latency and Loss Measurements in the Presence of Reordering, , Proceedings of the ACM SIGMETRICS Conference, San Jose, CA, June 2011.
Privacy-preserving Network Forensics, , Communications of the Association for Computing Machinery 54(5):78-87, May 2011.
Click Trajectories: End-to-End Analysis of the Spam Value Chain, , Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2011, pages 431-446. (Award paper).
aComment: Mining Annotations from Comments and Code to Detect Interrupt-Related Concurrency Bugs, , Proceedings of the International Conference on Software Engineering (ICSE), Honolulu, HI, May 2011.
Learning to Detect Malicious URLs, , ACM Transactions on Intelligent Systems and Technology (TIST) 2(3):30:1-30:24, April 2011.
Dissemination in Opportunistic Mobile Ad-hoc Networks: the Power of the Crowd, , Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011, pages 1179-1187.
Achieving Congestion Diversity in Wireless Ad-hoc Networks, , Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011. (Mini-conference).
The Emerging Optical Data Center, , Proceedings of OFC/NFOEC, Los Angeles, CA, March 2011.
Hardware Requirements for Optical Circuit Switched Data Center Networks, , Proceedings of OFC/NFOEC, Los Angeles, CA, March 2011.
TritonSort: A Balanced Large-Scale Sorting System, , Proceedings of the 8th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2011.
Efficiently Measuring Bandwidth at All Time Scales, , Proceedings of the 8th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2011.
On the Effects of Registrar-level Intervention, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011, pages 1-8.
Topology Switching for Data Center Networks, , USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, Boston, MA, March 2011.
Got Traffic? An Evaluation of Click Traffic Providers, , Proceedings of the WICOM/AIRWeb Workshop on Web Quality (WebQuality), Hyderabad, India, March 2011, pages 19-26.
Improving Software Diagnosability via Log Enhancement, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Newport Beach, CA, March 2011.
Proximax: Fighting Censorship with an Adaptive System for Distribution of Open Proxies, , Proceedings of the International Conference on Financial Cryptography and Data Security (FC), St Lucia, February 2011.
Sora: High-performance Software Radio using General-purpose Multi-core Processors, , Communications of the Association for Computing Machinery 54(1):99-107, January 2011.
Measured Impact of Crooked Traceroute, , ACM SIGCOMM Computer Communication Review 41(1), January 2011.
Knowledge File System -- A principled approach to personal information management, , IEEE ICDM Workshop on Data Mining for Services, Sydney, Australia, December 2010, pages 1037-1044.
Scale-Out Networking in the Data Center, , IEEE MICRO 30(4):29-41, August 2010.
Practical Defenses for Evil Twin Attacks in 802.11, , Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.
Toward Improving Path Selection in Tor, , Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.
VNC in High-Latency Environments and Techniques for Improvement, , Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.
Resolving IP Aliases with Prespecified Timestamps, , Proceedings of the ACM Internet Measurement Conference (IMC), Melbourne, Australia, November 2010.
How to Tell an Airport from a Home: Techniques and Applications, , Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, CA, October 2010, pages 13:1-13:6.
Fault Localization via Risk Modeling, , IEEE Transactions on Dependable and Secure Computing 7(4):396-409, October 2010.
Difference Engine: Harnessing Memory Redundancy in Virtual Machines, , Communications of the Association for Computing Machinery 53(10):85-93, October 2010.
Usage Patterns in an Urban WiFi Network, , IEEE/ACM Transactions on Networking 18(5):1359-1372, October 2010.
Ad Hoc Synchronization Considered Harmful, , Proceedings of the 9th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, Canada, USA, October 2010.
Do I Use the Wrong Definition? DefUse: Definition-Use Invariants for Detecting Concurrency and Sequential Bugs, , Proceedings of the Conference on Object-Oriented Programming: Systems, Languages, and Applications (OOPSLA), October 2010.
Hyperbolic Geometry of Complex Networks, , Physical Review E 82(3), September 2010.
Helios: A Hybrid Electrical/Optical Switch Architecture for Modular Data Centers, , Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.
California Fault Lines: Understanding the Causes and Impact of Network Failures, , Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.
Re: CAPTCHAs -- Understanding CAPTCHA-Solving from an Economic Context, , Proceedings of the 19th USENIX Security Symposium, Washington, D.C., August 2010, pages 435-452.
Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits, , Proceedings of the ACM SIGKDD Conference, Washington D.C., July 2010, pages 105-114.
Towards Understanding Bugs in Open Source Router Software, , ACM SIGCOMM Computer Communication Review 40(3), July 2010.
Improving HTTP-based Video Performance using Network Flow Buffering, , Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC), Riccione, Italy, June 2010.
SecondLife: a Social Network of Humans and Bots, , Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Amsterdam, The Netherlands, June 2010, pages 9-14.
Measuring Online Service Availability Using Twitter, , Proceedings of ACM Workshop on Online Social Networks (WOSN), Boston, MA, June 2010, pages 13:1-13:9.
Stout: An Adaptive Interface to Scalable Cloud Storage, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2010.
SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2010.
Stateful Bulk Processing for Incremental Algorithms, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Indianapolis, IN, June 2010.
Fluxo: A System for Internet Service Programming by Non-expert Developers, , Proceedings of the ACM Symposium on Cloud Computing (SOCC), Indianapolis, IN, June 2010.
Improving Video Performance in VNC Under Latency Conditions, , Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS), Chicago, May 2010.
Experimental Security Analysis of a Modern Automobile, , Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2010.
Exploiting Feature Covariance in High-Dimensional Online Learning, , Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS), Sardinia, Italy, May 2010.
Analysis of Durability of Replicated Distributed Storage Systems, , Proceedings of the International Parallel and Distributed Processing Symposium, Atlanta, GA, April 2010.
SlimGene: Compressing Genomic Sequences using SLIMGENE, , Proceedings of the International Conference on Research in Computational Molecular Biology, Lisbon, Portugal, April 2010.
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2010.
Experiences with Tracing Causality in Networked Services, , Proceedings of the Internet Network Management Workshop / Workshop on Research on Enterprise Networking (INM/WREN), San Jose, CA, April 2010.
Hedera: Dynamic Flow Scheduling for Data Center Networks, , Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010. (Test of Time Award).
Carousel: Scalable Logging for Intrusion Prevention Systems, , Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.
SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies, , Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.
Reverse Traceroute, , Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010. (Award paper).
EndRE: An End-System Redundancy Elimination Service for Enterprises, , Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.
Operator and Radio Resource Sharing in Multi-Carrier Environments, , Proceedings of the 12th IEEE/IFIP Network Operations and Management Symposium (NOMS'10), April 2010.
Towards a Proximal Resource-based Architecture to Support Augmented Reality Applications, , Proceedings of the Workshop on Cloud-Mobile Convergence for Virtual Reality (CMCVR), Waltham, MA, March 2010.
Neon: System Support for Derived Data Management, , Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Pittsburgh, PA, March 2010, pages 63-74.
Leaping Multiple Headers in a Single Bound: Wire Speed Parsing using the Kangaroo System, , Proceedings of the IEEE Infocom Conference, San Diego, CA, March 2010.
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces, , Proceedings of the IEEE Infocom Conference, San Diego, CA, March 2010.
SherLog: Error Diagnosis by Connecting Clues from Run-time Logs, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Pittsburgh, PA, March 2010.
Botnet Judo: Fighting Spam with Itself, , Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.
Covenant: An Architecture for Cooperative Scheduling in 802.11 Wireless Networks, , IEEE Transactions on Wireless Communications 9(1), January 2010.
Towards Decoupling Storage and Computation in Hadoop with SuperDataNodes, , ACM SIGOPS Operating Systems Review 44(2):41-46, April 2010.
Cumulus: Filesystem Backup to the Cloud, , ACM Transaction on Storage 5(4):1-28, December 2009.
mPlane: An Architecture For Scalable Fault Localization, , Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet, Rome, Italy, December 2009.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, November 2009. (Test of Time Award).
When Private Keys are Public: Results from the 2008 Debian OpenSSL Debacle, , Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009.
The Importance of Being Overheard: Throughput Gains in Wireless Mesh Neworks, , Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009.
Moving Beyond End-to-End Path Information to Optimize CDN Performance, , Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009. (Best paper).
Understanding the Efficacy of Deployed Internet Source Address Validation Filtering, , Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009.
I Seek Uou: Searching and Matching Individuals in Social Networks, , Proceedings of the ACM Workshop on Web Information and Data Management (WIDM), November 2009.
Evaluating the Impact of Inaccurate Information in Utility-Based Scheduling, , Proceedings of the ACM Conference on High Performance Computing and Networking, Portland, OR, November 2009.
Two Auction-Based Resource Allocation Environments: Design and Experience, , In Market Oriented Grid and Utility Computing. Rajkumar Buyya and Kris Bubendorfer, editor. Wiley, 2009.
Pitfalls for ISP-friendly P2P Design, , Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, NY, October 2009.
GT: picking up the truth from the ground for Internet traffic, , ACM SIGCOMM Computer Communication Review 39(5), October 2009.
PRES: Probabilistic Replay with Execution Sketching on Multiprocessors, , Proceedings of the 22th ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, October 2009.
Curvature and Temperature of Complex Networks, , Physical Review E 80(3):035101, September 2009.
SAM: Enabling Practical Spatial Multiple Access in Wireless LAN, , Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Beijing, China, September 2009.
Spamalytics: An Empirical Analysis of Spam Marketing Conversion, , Communications of the Association for Computing Machinery 52(9):99-107, September 2009.
Graph Annotations in Modeling Complex Network Topologies, , Transactions on Modeling and Computer Simulation 19(4), September 2009.
Every Microsecond Counts: Tracking Fine-Grain Latencies with a Lossy Difference Aggregator, , Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.
PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric, , Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.
Detailed Diagnosis in Enterprise Networks, , Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.
Cumulus: Filesystem Backup to the Cloud, , USENIX ;login: 34(4):7-13, August 2009.
Data Center Switch Architecture in the Age of Merchant Silicon, , Proceedings of the IEEE Symposium on Hot Interconnects, August 2009.
GrassRoots: Socially-Driven Web Sites for the Masses, , Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.
MobiClique Middleware for Mobile Social Networking, , Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.
CrossTalk: Scalably Interconnecting Instant Messenger Networks, , Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default, , Privacy Enhancing Technologies Symposium, Seattle, Washington, August 2009.
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage, , Proceedings of EVT 2009, Montreal, Canada, July 2009.
Storage System Problem Troubleshooting and System Logs, , USENIX ;login: 34(3), June 2009.
Realistic and Responsive Network Traffic Generation, , IEEE/ACM Transactions on Networking 17(3):712-725, June 2009.
Secure and Policy-Compliant Source Routing, , IEEE/ACM Transactions on Networking 17(3):764-777, June 2009.
Towards Low Latency State Machine Replication for Uncivil Wide-area Networks, , Fifth Workshop on Hot Topics in System Dependability (HotDep), Estoril, Lisbon, Portugal, June 2009.
Identifying Suspicious URLs: An Application of Large-Scale Online Learning, , Proceedings of the International Conference on Machine Learning, Montreal, Canada, June 2009, pages 681-688.
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs, , Proceedings of the ACM SIGKDD Conference, Paris, France, June 2009, pages 1245-1254.
Defending Mobile Phones from Proximity Malware, , Proceedings of the IEEE Infocom Conference, Rio de Janeiro, Brazil, April 2009, pages 1503-1511.
Greedy Forwarding in Scale-Free Networks Embedded in Hyperbolic Metric Spaces, , 11th ACM SIGMETRICS Workshop on Mathematical Performance Modeling and Analysis, June 2009.
Spamcraft: An Inside Look at Spam Campaign Orchestration, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, April 2009, pages 4:1-4:9.
Difference Engine, , USENIX ;login: 34(2):24-31, April 2009.
Softspeak: Making VoIP Play Well in Existing 802.11 Deployments, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.
iPlane Nano: Path Prediction for Peer-to-Peer Applications, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.
Somniloquy: Augmenting Network Interfaces to Reduce PC Energy Usage, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.
Cimbiosys: A platform for content-based partial replication, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.
NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 349-364.
Sora: High Performance Software Radio Using General Purpose Multi-core Processors, , Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 75-90. (Award paper and Test of Time award).
Short Paper: Improving the Responsiveness of Internet Services with Automatic Cache Placement, , Proceedings of the ACM European Conference in Computer Systems (EuroSys), Nuremberg, Bermany, March 2009.
Memory Resource Allocation for File System Prefetching -- From a Supply Chain Management Perspective, , Proceedings of the ACM European Conference in Computer Systems (EuroSys), Nuremberg, Bermany, March 2009.
CTrigger: Exposing Atomicity Violation Bugs from Their Hiding Places, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Washington, DC, March 2009.
Efficient On-line Validation with Delta Execution, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Washington, DC, March 2009.
Live Debugging of Distributed Systems, , Proceedings of the International Conference on Compiler Construction, March 2009.
Detecting Malicious Packet Losses, , IEEE Transactions on Parallel and Distributed Systems 20(2), February 2009.
Understanding Customer Problem Troubleshooting from Storage System Logs, , Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 43-56.
Cumulus: Filesystem Backup to the Cloud, , Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 225-238.
MPIWiz: Subgroup Reproducible Replay of MPI Applications, , Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), Raleigh, North Carolina, USA, February 2009, pages 251-260.
Towards Decoupling Storage and Computation in Hadoop with SuperDataNodes, , Proceedings of the International Workshop on Large-Scale Distributed Systems and Middleware (LADIS), Big Sky, MT, October 2009.
Difference Engine: Harnessing Memory Redundancy in Virtual Machines, , Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, December 2008, pages 309-322. (Award paper).
Mencius: Building Efficient Replicated State Machines for WANs, , Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, December 2008.
Towards Automatic Inference of Task Hierarchies in Complex Systems, , Fourth Workshop on Hot Topics in System Dependability (HotDep), San Diego, CA, USA, December 2008, pages 7:1-7:6.
Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices, , Proceedings of ACM CoNEXT, Madrid, Spain, December 2008.
Are Disks the Dominant Contributor for Storage Failures - A Comprehensive Study of Storage Subsystem Failure Characteristics, , ACM Transaction on Storage 4(3), November 2008.
Spamalytics: an Empirical Analysis of Spam Marketing Conversion, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008, pages 3-14.
Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008.
When Good Instructions Go Bad: Generalizing Return-oriented Programming to the SPARC, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008.
Analysis of a Mixed-Use Urban WiFi Network: When Metropolitan becomes Neapolitan, , Proceedings of the ACM Internet Measurement Conference (IMC), Vouliagmeni, Greece, October 2008, pages 85-98.
Design and Implementation Tradeoffs for Wide-Area Resource Discovery, , ACM Transactions on Internet Technology (TOIT) 8(4), Sep 2008.
XL: An Efficient Network Routing Algorithm, , Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.
A Scalable, Commodity, Data Center Network Architecture, , Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008. (Test of Time Award).
Storm: When Researchers Collide, , USENIX ;login: 33(4):6-13, August 2008.
Flexible Resource Allocation and Composition Across GSM/3G Networks and WLANs, , Proceedings of the International Workshop on Mobility in the Evolving Internet Architecture (MobiArch), August 2008.
Google's Deep-Web Crawl, , Proceedings of the 34th Internation Conference on Very Large Data Bases (VLDB), Auckland, New Zealand, August 2008.
Ad-Hoc Data Processing in the Cloud (demo), , Proceedings of the 34th Internation Conference on Very Large Data Bases (VLDB), Auckland, New Zealand, August 2008.
AutoISES: Automatically Inferring Security Specifications and Detecting Violations, , Proceedings of the 17th USENIX Security Symposium, San Jose, CA, August 2008.
Trace-based Microarchitecture-level Diagnosis of Permanent Hardware Faults, , Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008, pages 22-31.
Using Likely Program Invariants to Detect Hardware Errors, , Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008, pages 70-79.
Evaluating Distributed Systems: Does Background Traffic Matter?, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2008.
Wide-Scale Data Stream Management, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2008.
Improving Scalability and Fault Tolerance in an Application Management Infrastructure, , Proceedings of the USENIX Workshop on Large-Scale Computing (LASCO), Boston, MA, June 2008.
Automatic Request Categorization in Internet Services, , Proceedings of the First Workshop on Hot Topics in Measurement and Modeling of Computer Systems (HotMetrics), Annapolis, MD, June 2008.
CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining, , Proceedings of the 2008 SIAM International Conference on Data Mining, April 2008.
DieCast: Testing Distributed Systems with an Accurate Scale Model, , Proceedings of the 5th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, April 2008.
Efficiency through Eavesdropping: Link-layer Packet Caching, , Proceedings of the 5th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, April 2008.
On the Spam Campaign Trail, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff, , Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
Banal: Because Format Checking Is So Trite, , Proceedings of USENIX Workshop on Organizing Workshops, Conferences and Symposia for Computer Systems (WOWCS), San Francisco, CA, April 2008.
Web Service Access Management for Integration with Agent Systems, , Proceedings of ACM Symposium on Applied Computing (SAC), Forteleza, Ceara, Brazil, March 2008.
Detecting Compromised Routers via Packet Forwarding Behavior, , IEEE Network 22(2), March 2008.
Learning from Mistakes --- A Comprehensive Study on Real World Concurrency Bug Characteristics, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Seattle, WA, March 2008.
Understanding the propagation of hard faults to software and its implications on Resilient Systems Design, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Seattle, WA, March 2008.
Dual Frame Motion Compensation with Uneven Quality Assignment, , IEEE Transactions on Circuits and Systems for Video Technology 18(2):249-256, February 2008.
Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics, , Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2008, pages 111-125.
High Bandwidth Data Dissemination for Large-scale Distrbuted Systems, , ACM Transactions on Computer Systems 26(1), February 2008.
Remote Control: Distributed Application Configuration, Management, and Visualization with Plush, , USENIX ;login: 33(1), February 2008.
Specificity rule discovery in HIV-1 protease cleavage site analysis, , Computational Biology and Chemistry 32(1):72-79, February 2008.
Curing Regular Expressions Matching Algorithms from Insomnia, Amnesia, and Acalculia, , Proceedings of the ACM/IEEE Symposium on Architecture for Networking and Communications Systems (ANCS), Orlando, FL, December 2007.
Can You Infect Me Now? Malware Propagation in Mobile Phone Networks, , Proceedings of the ACM Workshop on Recurring Malcode (WORM), Washington D.C., November 2007.
Usher: An Extensible Framework for Managing Clusters of Virtual Machines, , Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.
/* iComment: Bugs or Bad Comments? */, , Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.
MUVI: Automatically Inferring Multi-Variable Access Correlations and Detecting Related Semantic and Concurrency Bugs, , Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.
Triage: Diagnosing Production Run Failures at the User's Site, , Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.
10 network papers that changed the world, , ACM SIGCOMM Computer Communication Review 37(5), October 2007.
Remote Control: Distributed Application Configuration, Management, and Visualization with Plush, , Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2007.
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86), , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2007.
Network Monitoring using Traffic Dispersion Graphs (TDGs), , Proceedings of the ACM Internet Measurement Conference (IMC), San Diego, CA, October 2007.
A study of interleaving coverage criteria, , Proceedings of the European Software Engineering Conference (ESEC) and ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), Dubrovnik, Croatia, September 2007, pages 533-536.
Comparison of the Three CPU Schedulers in Xen, , ACM SIGMETRICS Performance Evaluation Review (PER) 35(2):42-51, September 2007.
Cross-component Energy Management: Joint Adaptation of Processor and Memory, , ACM Transactions on Architecture and Code Optimization 4(3), September 2007.
Slicing Spam with Occam's Razor, , Proceedings of Conference on Email and Anti-Spam (CEAS), Mountain View, CA, August 2007.
Orbis: Rescaling Degree Correlations to Generate Annotated Internet Topologies, , Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.
Cloud Control with Distributed Rate Limiting, , Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007. (Best student paper).
Automating Cross-Layer Diagnosis of Enterprise Wireless Networks, , Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure, , Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.
Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks, , Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.
Wresting Control from BGP: Scalable Fine-grained Route Control, , Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, June 2007, pages 295-308.
Detection and Localization of Network Black Holes, , Proceedings of the IEEE Infocom Conference, Anchorage, AK, May 2007, pages 2180-2188.
A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock, , IEEE Transactions on Dependable and Secure Computing 4(3), July 2007.
Managing Energy-Performance Tradeoffs for Multithreaded Applications on Multiprocessor Architectures, , Proceedings of the ACM SIGMETRICS Conference, San Diego, CA, USA, June 2007.
Enhancing Game-Server AI with Distributed Client Computation, , Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), San Francisco, CA, June 2007.
Delta Execution for Software Reliability, , Third Workshop on Hot Topics in System Dependability (HotDep), Edinburgh, UK, June 2007.
Classic Paxos vs. Fast Paxos: Caveat Emptor, , Third Workshop on Hot Topics in System Dependability (HotDep), Edinburgh, UK, June 2007.
Mace: Language Support for Building Distributed Systems, , Proceedings of Programming Languages Design and Implementation (PLDI), June 2007.
How to Design Computer Security Experiments, , World Conference on Information Security Education (WISE), June 2007.
Improving Wireless Access of Video Over the Internet, , Proceedings of the Third International Conference on Networking and Services, Athens, Greece, June 2007.
Hotcomments: How to Make Program Comments More Useful?, , Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HotOS-XI), San Diego, CA, May 2007.
X-Trace: A Pervasive Network Tracing Facility, , Proceedings of the 4th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, April 2007. (Test of Time Award).
Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code, , Proceedings of the 4th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, April 2007. (Award paper).
Toward Models for Forensic Analysis, , Proceedings of the International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), Seattle, WA, April 2007.
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons, , ACM SIGCOMM Computer Communication Review 37(2), April 2007.
Analysis of Computer Intrusions using Sequences of Function Calls, , IEEE Transactions on Dependable and Secure Computing 4(2):137-150, April 2007.
Achieving Efficiency and Accuracy in the ALPS Application-level Proportional-share Scheduler, , Journal of Grid Computing 5(2):251-270, March 2007.
A Performance Analysis of Indirect Routing, , Proceedings of the IEEE International Parallel and Distributed Processing Symposium, Long Beach, CA, March 2007.
A Resource Allocation Problem in Replicated P2P Storage Systems, , Fourth International Workshop on Hot Topics in Peer-to-Peer Systems (Hot-P2P), Long Beach, CA, March 2007.
Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms, , Proceedings of the ACM European Conference in Computer Systems (EuroSys), Lisbon, Portugal, March 2007.
On Scalable Attack Detection in the Network, , IEEE/ACM Transactions on Networking 15(1), February 2007.
HARD: Hardware-Assisted Lockset-based Race Detection, , Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Phoenix, AZ, February 2007, pages 121-132.
Scaling Peer-to-Peer Games in Low-Bandwidth Environments, , Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Bellvue, WA, February 2007.
Modeling and Generating Realistic Streaming Media Server Workloads , , Computer Networks 51(1):336-356, January 2007.
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants, , IEEE MICRO 27(1):26-35, January 2007.
Declarative Resource Naming for Macroprogramming Wireless Networks of Embedded Systems, , Lecture Notes in Computer Science 4240/2006:192-199, January 2007.
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection, , Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Orlando, FL, December 2006.
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks, , Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Orlando, FL, December 2006, pages 135-148.
A Study of End-to-End Web Access Failures, , Proceedings of CoNEXT, Lisboa, Portugal, December 2006.
Characterization of a Large Web Site Population with Implications for Content Delivery, , World Wide Web Journal 9(4):505-536, December 2006.
Maximizing Data Locality in Distributed Systems, , Journal of Computer and System Sciences 72(8), December 2006.
The Stratified Round Robin Scheduler: Design, Analysis and Implementation, , IEEE/ACM Transactions on Networking, December 2006.
Optimizing Grid Site Manager Performance with Virtual Machines, , Proceedings of the 3rd USENIX Workshop on Real, Large Distributed Systems (WORLDS), Seattle, WA, December 2006.
Decongestion Control, , Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006, pages 61-66.
Service Portability: Why HTTP Redirect is the Model for the Future, , Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006.
Glavlit: Preventing Exfiltration at Wire Speed, , Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006.
Fast packet classification for two-dimensional conflict-free filters, , Computer Networks 50(11):1831-1842, November 2006.
Parallelism versus Memory Allocation in Pipelined Router Forwarding Engines, , Theory of Computing Systems 39(6), November 2006.
Enforcing Performance Isolation Across Virtual Machines in Xen, , Proceedings of the ACM/IFIP/USENIX Middleware Conference, Melbourne, Australia, November 2006.
Asgard: Software Guards for System Address Spaces, , Proceedings of the 7th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Seattle, WA, USA, November 2006.
Automatic Online Failure Diagnosis at the End-User Site, , Second Workshop on Hot Topics in System Dependability (HotDep), Seattle, WA, USA, November 2006.
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, CA, October 2006.
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2006.
Bitmap algorithms for counting active flows on high-speed links, , IEEE/ACM Transactions on Networking 14(5):925-937, October 2006.
Unexpected Means of Identifying Protocols, , Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.
Finding Diversity in Remote Code Injection Exploits, , Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.
Source and channel coding trade-offs for a pulsed quality video encoder, , Proceedings of the 40th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, October 2006.
An Improved Construction for Counting Bloom filters, , Proceedings of the European Symposium on Algorithms (ESA), Zurich, SWitzerland, September 2006.
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis, , Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006, pages 39-50.
Systematic Topology Analysis and Generation Using Degree Correlations, , Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.
Detecting Evasion Attacks at High Speeds without Reassembly, , Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.
Realistic and Responsive Network Traffic Generation, , Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.
Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines, , Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.
PRIMED: Community-of-Interest-Based DDoS Mitigation, , Proceedings of the ACM SIGCOMM Workshop on Large Scale Attack Defense, Pisa, Italy, September 2006, pages 147-154.
Fatih: Detecting and Isolating Malicious Routers via Traffic Validation, , IEEE Transactions on Dependable and Secure Computing 3(3), July 2006.
Replicating Nondeterministic Services on Grid Environments, , Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.
ALPS: An Application-Level Proportional-Share Scheduler, , Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.
Service Contracts and Aggregate Utility Functions, , Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.
Loose Synchronization for Large-Scale Networked Systems, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2006, pages 301-314.
Service Placement in Shared Wide-Area Platforms, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2006, pages 273-288.
Distributed Network Querying with Bounded Approximate Caching, , 11th International Conference on Database Systems for Advanced Applications (DASFAA), June 2006.
Predictability of Rules in HIV-1 Protease Cleavage Site Analysis, , Proceedings of the 2006 International Conference on Computational Science (ICCS), University of Reading, UK, May 2006.
Inferring Internet Denial-of-Service Activity, , ACM Transactions on Computer Systems 24(2):115-139, May 2006.
WAP5: Black-box Performance Debugging for Wide-Area Systems, , Proceedings of the 15th International World Wide Web Conference, May 2006.
To Infinity and Beyond: Time-Warped Network Emulation, , Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006, pages 87-100.
Pip: Detecting the Unexpected in Distributed Systems, , Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006. (Test of Time Award).
ReAgents: Behavior-based Remote Agents and Their Performance, , Fifth International Joint Conference on Autonomous Agents amp; MultiAgent Systems, Hakodate, Japan, May 2006.
MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks, , Mobile Computing and Communications Review (MC2R), April 2006.
Analysis of Long-Running Replicated Systems, , Proceedings of the IEEE Infocom Conference, Barcelona, Spain, April 2006.
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code, , IEEE Transactions on Software Engineering 32(3):176-192, March 2006.
On Object Maintenance in Peer-to-Peer Systems, , Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Santa Barbara, CA, February 2006.
DMA-aware memory energy management, , Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Austin, TX, February 2006, pages 133-144.
Wireless Security and Internetworking, , Proceedings of the IEEE 94(2), February 2006.
Multiple Job Scheduling in a Connection-Limited Data Parallel System, , IEEE Transactions on Parallel and Distributed Systems 17(2):125-134, February 2006.
The Costs and Limits of Availability for Replicated Services, , ACM Transactions on Computer Systems 24(2):70-113, February 2006.
PlanetLab Application Management Using Plush, , ACM SIGOPS Operating Systems Review 40(1):33-40, January 2006.
Experiences With Resource Allocators for Large-Scale Multiuser Testbeds, , ACM SIGOPS Operating Systems Review 40(1):41-48, January 2006.
The Internet AS-Level Topology: Three Data Sources and One Definiteve Metric, , ACM SIGCOMM Computer Communication Review, January 2006.
Self Managed Systems and Services: Effective Web Service Load Balancing Through Statistical Monitoring, , Communications of the Association for Computing Machinery 49(3):48-54, March 2006.
Opportunistic Measurement: Extracting Insight from Spurious Traffic, , Proceedings of the 4th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.
Cross-layer Visibility as a Service, , Proceedings of the 4th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.
ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing, , Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Barcelona, Spain, November 2005.
Self-stopping Worms, , Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington D.C., November 2005, pages 12-21.
Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2005.
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, , Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005, pages 148-162.
Rx: Treating Bugs as Allergies---a Safe Method to Survive Software Failure, , Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005. (Award paper).
Hibernator: Helping Disk Arrays Sleep through the Winter, , Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.
TIE Breaking: Tunable Interdomain Egress Selection, , Proceedings of CoNEXT, Toulouse, France, October 2005.
The Power of Slicing in Internet Flow Measurement, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), New Orleans, LA, October 2005.
Java Active Extensions: Scalable Middleware for Performance-Isolated Remote Execution, , Elsevier Computer Communications Journal 28(14):1680-1691, September 2005.
Principles-Driven Forensic Analysis, , Proceedings of the New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, September 2005.
Coterie Availability in Sites, , Proceedings of the International Symposium on Distributed Computing (DISC), Cracow, Poland, September 2005.
PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code, , ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), September 2005.
Replication predicates for dependent-failure algorithms, , Proceedings of the 11th International Conference on Parallel and Distributed Computing (Euro-Par), August 2005. (Award paper).
Performance Directed Energy Management for Main Memory and Disks, , ACM Transaction on Storage 1(3):346-380, 2005.
A Case Study in Building Layered DHT Applications, , Proceedings of the ACM SIGCOMM Conference, Philadelphia, PA, August 2005.
Addressing Strategic Behavior in a Deployed Microeconomic Resource Allocator, , Proceedings of the Third Workshop on Economics of Peer-to-Peer Systems, Philadelphia, PA, August 2005, pages 99-104.
Cooperative Packet Scheduling via Pipelining in 802.11 Wireless Networks, , Proceedings of the Workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND), Philadelphia, PA, August 2005, pages 35-40.
Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network, , Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.
Brief Announcement: The Overlay Network Content Distribution Problem, , Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Las Vegas, NV, July 2005, page 98.
Append-Only Signatures, , Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP), Lisboa, Portugal, July 2005.
Design and Implementation Tradeoffs for Wide-Area Resource Discovery, , Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Research Triangle Park, NC, July 2005.
Why Markets Could (But Don't Currently) Solve Resource Allocation Problems in Systems, , Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005, pages 37-42.
Treating Bugs as Allergies: A Safe Method for Surviving Software Failures, , Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005.
The Virtue of Dependent Failures in Multi-site Systems, , Proceedings of the IEEE Workshop on Hot Topics in System Dependability (HotDep), Yokohama, Japan, June 2005.
Managing Self-inflicted Nondeterminism, , Proceedings of the IEEE Workshop on Hot Topics in System Dependability (HotDep), Yokohama, Japan, June 2005.
The Entropia Virtual Machine for Destop Grids, , Proceedings of the ACM/USENIX Conference on Virtual Execution Environments (VEE), Chicago, IL, June 2005.
Fatih: Detecting and Isolating Malicious Routers, , Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, June 2005, pages 538-547. (Award paper).
A Tree-based Router Search Engine Architecture with Single Port Memories, , Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), Madison, WI, June 2005.
MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks, , International Workshop on Wireless Traffic Measurements and Modeling, June 2005.
Accuracy Characterization for Metropolitan-scale Wi-Fi Localization, , Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Seattle, WA, June 2005.
Empirical Evaluation of Multi-level Buffer Cache Collaboration for Storage Systems, , Proceedings of the ACM SIGMETRICS Conference, Banff, Alberta, Canada, June 2005.
A Robust System for Accurate Real-time Summaries of Internet Traffic, , Proceedings of the ACM SIGMETRICS Conference, Banff, Alberta, Canada, June 2005.
Mining Block Correlations to Improve Storage Performance, , ACM Transaction on Storage 1(2):213-245, 2005.
Mirage: A Microeconomic Resource Allocation System for Sensornet Testbeds, , Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors (EmNetS-II), Sydney, Australia, May 2005, pages 19-28.
Power Aware Storage Cache Management, , IEEE Transactions on Computers 54(5):587-602, May 2005.
IP Fault Localization Via Risk Modeling, , Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005, pages 57-70.
Remote Physical Device Fingerprinting, , Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2005. (Award paper).
Remote Physical Device Fingerprinting, , IEEE Transactions on Dependable and Secure Computing 2(2):93-108, April 2005.
Access and Mobility of Wireless PDA Users, , Mobile Computing and Communications Review (MC2R) 9(2):40-55, April 2005.
Maintaining High Bandwidth under Dynamic Network Conditions, , Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005, pages 193-208.
Surviving Internet Catastrophes, , Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005.
Traffic Matrix Reloaded: Impact of Routing Changes, , Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.
Comparison of Public End-to-end Bandwidth Estimation Tools on High-Speed Links, , Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.
A Study of Burstiness in TCP Flows, , Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.
Spectroscopy of traceroute Delays, , Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.
Efficient and Flexible Architectural Support for Dynamic Monitoring, , ACM Transaction on Architecture and Code Generation 2(1):3-33, March 2005.
SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks, , Proceedings of the IEEE Infocom Conference, Miami, FL, March 2005.
Designing Incentives for Peer-to-Peer Routing, , Proceedings of the IEEE Infocom Conference, Miami, FL, March 2005.
Error Concealment for Dual Frame Video Coding with Uneven Quality, , Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2005.
NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation, , Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Ithaca, NY, February 2005.
Consistent and Automatic Replica Regeneration, , ACM Transactions on Storage 1(1):3-37, February 2005.
Scalable Packet Classification, , IEEE/ACM Transactions on Networking 13(1), February 2005.
A Lower Bound for Multicast Key Distribution, , Computer Networks 47(3):429-441, February 2005.
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs, , Proceedings of IEEE International Symposium on High-Performance Computer Architecture, San Francisco, CA, February 2005.
MediaGuard: a Model-based Framework for Building Streaming Media Services, , Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2005.
VI-Attached Database Storage, , IEEE Transactions on Parallel and Distributed Systems 16(1):35-50, 2005.
Wireless Hotspots: Current Challenges and Future Directions, , Mobile Networks and Applications 10(3):265-274, January 2005.
Effective Small-site Web Load Balancing Through Statistical Monitoring, , Proceedings of the IEEE/IFIP International Workshop on Self-Managed Systems and Services (SelfMan), Nice, France, May 2005.
COPS: Quality of Service vs. Any Service at All, , Proceedings of the International Workshop on Quality of Service (IWQoS), June 2005.
Automated Worm Fingerprinting, , Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, USA, December 2004, pages 45-60.
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code, , Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, USA, December 2004, pages 289-302.
FUSE: Lightweight Guaranteed Distributed Failure Notification, , Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, USA, December 2004.
Distributed Resource Discovery on PlanetLab with SWORD, , Proceedings of the ACM/USENIX Workshop on Real, Large Distributed Systems (WORLDS), San Francisco, CA, December 2004.
AccMon: Automatically Detecting Memory-related Bugs via Program Counter-based Invariants, , Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Portland, OR, December 2004.
iWatcher: Simple, General Architectural Support for Software Debugging, , IEEE MICRO 24(6), December 2004.
Performance-Directed Energy Management for Storage Systems, , IEEE MICRO 24(6), December 2004.
Packet-Dispersion Techniques and a Capacity-Estimation Methodology, , IEEE/ACM Transactions on Networking 12(6), December 2004.
Is P2P Dying or Just Hiding?, , Proceedings of the 9th IEEE Global Internet Symposium and Next Generation Networks(GlobeCom), Dallas, TX, November 2004.
On the Difficulty of Scalably Detecting Network Attacks, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Washington, D.C., October 2004.
On the Effectiveness of Address-Space Randomization, , Proceedings of the ACM Conference on Computer and Communications Security (CCS), Washington, D.C., October 2004, pages 298-307.
The Top Speed of Flash Worms, , Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington, D.C., October 2004.
On Scalable Attack Detection in the Network, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Taormina, Sicily, Italy, October 2004.
Transport Layer Identification of P2P Traffic, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Taormina, Sicily, Italy, October 2004.
Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation and Application, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Taormina, Sicily, Italy, October 2004.
Performance Directed Energy Management for Main Memory and Disks, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Boston, MA, October 2004.
Realistic Large Scale Online Network Simulation, , Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.
Realistic Modeling and Synthesis of Resources for Computational Grids, , Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.
Resource Management for Rapid Application Turnaround on Enterprise Desktop Grids, , Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.
ShortCuts: Using Soft State To Improve DHT Routing, , Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004.
Towards Informed Web Content Delivery, , Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004. (Best student paper).
Resource Allocation in Federated Distributed Computing Infrastructures, , Proceedings of the 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure, Boston, MA, October 2004.
Routing in an Internet-Scale Network Emulator, , Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Volendam, The Netherlands, October 2004, pages 275-283.
The Lonely NATed Node, , Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, September 2004.
A System for Authenticated Policy-Compliant Routing, , Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004, pages 167-178.
Building a Better NetFlow, , Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.
Network Sensitivity to Hot-Potato Disruptions, , Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.
A Measurement Framework for Pinpointing Routing Changes, , Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, Portland, OR, September 2004.
A User-Level Framework for Scheduling within Service Execution Environments, , Proceedings of the IEEE International Conference on Services Computing, Shanghai, China, September 2004.
Using Behavior Templates to Design Remotely-executing Agents for Wireless Clients, , Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.
Resource-controlled Remote Execution to Enhance Wireless Network Applications, , Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.
Flexible Architecture for Customizing Streams for Wireless Clients, , Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.
The Spread of the Witty Worm, , IEEE Security and Privacy 2(4), July 2004.
UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection, , International Conference on Telecommunication Systems - Modeling and Analysis (ICTSM), July 2004.
Light-weight Multicast Services (LMS): a Router-assisted Scheme for Reliable Multicast, , IEEE/ACM Transactions on Networking 12(3), June 2004.
PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy, , Proceedings of the 18th Annual International Conference on Supercomputing(ICS), St Malo, France, June 2004, pages 79-88.
iWatcher: Efficient Architectural Support for Software Debugging, , Proceedings of the 31st International Symposium on Computer Architecture (ISCA), Munnchen, Germany, June 2004, pages 224-235.
Parallelism versus Memory Allocation in Pipelined Router Forwarding Engines, , Proceedings of the ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Barcelona, Spain, June 2004.
Fault-Tolerant Forwarding in the Face of Malicious Routers, , Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2004.
Reduced State Fair Queuing for Edge and Core Routers, , Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Kinsale, County Cork, Ireland, June 2004.
Evaluation of Rate-based Transport Protocols for Lambda-Grids, , Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Honolulu, HI, June 2004.
Dynamics of Hot-Potato Routing in IP Networks, , Proceedings of the ACM SIGMETRICS Conference, New York, NY, June 2004.
Second-Level Buffer Cache Management, , IEEE Transactions on Parallel and Distributed Systems 15(6):505-519, June 2004.
Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004.
Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004, pages 87-98.
Web Customization Using Behavior-Based Remote Executing Agents, , Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.
Characterization of a Large Web Site Population with Implications for Content Delivery, , Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.
A Uniform Projection Method for Motif Discovery in DNA Sequences, , IEEE Transactions on Bioinformatics and Computational Biology 1(2), April 2004.
Tree bitmap: Hardware/Software IP Lookups with Incremental Updates, , ACM SIGCOMM Computer Communication Review 34(2):97-122, April 2004.
Measurements and Laboratory Simulations of the Upper DNS Hierarchy, , Proceedings of the Passive and Active Measurement Workshop, Antibes Juan-les-Pins, France, April 2004.
Their share: diversity and disparity in IP traffic, , Proceedings of the Passive and Active Measurement Workshop, Antibes Juan-les-Pins, France, April 2004.
TotalRecall: System Support for Automated Availability Management, , Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004, pages 337-350.
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks, , Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004.
Consistent and Automatic Service Regeneration, , Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004.
C-Miner: Mining Block Correlations in Storage Systems, , Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, March 2004, pages 173-186.
The Spread of the Witty Worm, , CAIDA Report, March 2004.
Dual Frame Motion Compensation with Uneven Quality Assignment, , Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2004.
Scalability in Adaptive Multi-Metric Overlays, , Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Tokyo, Japan, March 2004.
Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection, , Proceedings of the IEEE Infocom Conference, Hong Kong, China, March 2004.
Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management, , Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Madrid, Spain, February 2004, pages 118-129.
Longitudinal study of Internet traffic from 1998-2003, , Proceedings of the Winter Interational Symposium on Information and Communication Technologies, Cancun, Mexico, January 2004.
Delta Routing: Improving the Price-Performance of Hybrid Private Networks, , Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS), Seoul, Korea, April 2004.
Double Hashing with Multiple Passbits, , International Journal of Foundations of Computer Science 14(6):1165-1182, December 2003.
Workload and Failure Characterization on a Large-Scale Federated Testbed, , Intel Research Berkeley technical report IRB-TR-03-040, November 2003.
Dual frame motion compensation for a rate switching network, , Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, November 2003.
Bandwidth estimation: metrics, measurement techniques, and tools, , IEEE Network 17(6):27-35, November 2003.
Decoupling Policy from Mechanism in Internet Routing, , Proceedings of the 2nd ACM Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, November 2003, pages 81-86.
The Measurement Manifesto, , Proceedings of the 2nd ACM Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, November 2003.
Practical Lazy Scheduling in Sensor Networks, , Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, November 2003, pages 280-291.
Traffic-based Load Balance for Scalable Network Emulation, , Proceedings of Supercomputing Conference, Phoenix, AZ, November 2003.
The OptiPuter, , Communications of the Association for Computing Machinery 47(11), November 2003.
Transport Protocols for High Performance: Whither TCP?, , Communications of the Association for Computing Machinery 47(11), November 2003.
Measuring and Characterizing End-to-End Internet Service Performance, , ACM Transactions on Internet Technology (TOIT) 3(4), November 2003.
Bitmap Algorithms for Counting Active Flows on High Speed Links, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003.
Best-Path vs. Multi-Path Overlay Routing, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003, pages 91-100.
In Search of Path Diversity in ISP Networks, , Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003, pages 313-318.
End-to-End differentiation of congestion and wireless losses, , IEEE/ACM Transactions on Networking 11(5):703-717, October 2003.
Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh, , Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003.
SHARP: An Architecture for Secure Resource Peering, , Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003.
Toward Scaling Network Emulation using Topology Partitioning, , Proceedings of the Eleventh IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Orlando, FL, October 2003.
Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Overlay Network Topology, , Proceeding of ACM Workshop on Survivable and Self-Regenerative Systems, October 2003.
Wireless Hotspots: Current Challenges and Future Directions, , Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), San Diego, CA, September 2003.
Automatically Inferring Patterns of Resource Consumption in Network Traffic, , Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003, pages 137-148.
Stratified Round Robin: A Low Complexity Packet Scheduler with Bandwidth Fairness and Bounded Delay, , Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.
Packet Classification Using Multidimensional Cutting, , Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.
The Impact of Address Allocation and Routing on the Structure and Implementation of Routing Tables, , Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, , Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003, pages 15-28.
Dynamic Detection and Prevention of Race Conditions in File Accesses, , Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003.
Fast and Scalable Conflict Detection for Packet Classifiers, , Computer Networks 42(6):717-735, August 2003.
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice, , ACM Transactions on Computer Systems 21(3), August 2003.
Inside the Slammer Worm, , IEEE Security and Privacy 1(4):33-39, July 2003.
Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup, , Proceedings of the 4th IEEE Workshop on Internet Applications, San Jose, CA, June 2003, pages 104-111.
A Pipelined Memory Architecture for High Throughput Network Processors, , Proceedings of the 30th International Symposium on Computer Architecture (ISCA), San Diego, CA, June 2003.
Efficient Implementation of a Statistics Counter Architecture, , Proceedings of the ACM SIGMETRICS Conference, San Diego, CA, June 2003.
Engineering fault-tolerant TCP/IP services using FT-TCP, , Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), San Francisco, CA, June 2003.
Priority Forwarding in Ad Hoc Networks with Self-Interested Parties, , Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.
The Case for Service Provider Deployment of Super-Peers in Peer-to-Peer Networks, , Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.
Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering, , Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.
MediSyn: A Synthetic Streaming Media Service Workload Generator, , Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Monterey, CA, June 2003.
Efficient Peer-to-Peer Keyword Searching, , Proceeding of the ACM/IFIP/USENIX Middleware Conference, Rio de Janeiro, Brazil, June 2003.
Currentcy: A Unifying Abstraction for Expressing Energy Management Policies, , Proceedings of the USENIX Annual Technical Conference, San Antonio, TX, June 2003.
Eviction-Based Cache Placement for Storage Caches, , Proceedings of the USENIX Annual Technical Conference, San Antonio, TX, June 2003.
Scalable Data Management Alternatives to Support Data Mining Heterogeneous Logs for Computer Network Security, , 2003 SIAM Workshop on Data Mining for Counter Terrorism and Security, June 2003.
The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe, , Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS-IX), Lihue, HI, May 2003, pages 73-78.
Synchronous Consensus for Dependent Process Failures, , Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Providence, RI, May 2003.
Group Membership and Wide-Area Master Worker Computations, , Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Providence, RI, May 2003.
Entropia: Architecture and Performance of an Enterprise Desktop Grid System, , Journal of Parallel and Distributed Computing 63(5):597-610, May 2003.
Internet Quarantine: Requirements for Containing Self-Propagating Code, , Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003, pages 1901-1910.
Packet Classification for Core Routers: Is There an Alternative to CAMs?, , Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003.
Anypoint: Extensible Transport Switching on the Edge, , Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.
TESLA: A Transparent, Extensible Session-Layer Architecture for End-to-end Network Services, , Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003, pages 221-232.
Model-Based Resource Provisioning in a Web Service Utility, , Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.
Using Random Subsets to Build Scalable Network Services, , Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.
Traceback of Single IP Packets using SPIE, , Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Washington, DC, April 2003, pages 266-270.
Understanding Availability, , Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Berkeley, CA, February 2003, pages 256-267.
Catching Accurate Profiles in Hardware, , Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Anaheim, CA, February 2003.
The Spread of the Sapphire/Slammer Worm, , CAIDA Report, January 2003.
The Bancomat Problem: An Example of Resource Allocation in a Partitionable Asynchronous Systems, , Journal of Theoretical Computer Science 291(1), January 2003.
Single-Packet IP Traceback, , IEEE/ACM Transactions on Networking 10(6):721-734, December 2002.
Beyond Folklore: Observations on Fragmented Traffic, , IEEE/ACM Transactions on Networking 10(6), December 2002.
Scalability and Accuracy in a Large-Scale Network Emulator, , Proceedings of the 5th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, USA, December 2002.
Fast and Scalable Conflict Detection for Packet Classifiers, , Proceedings of the 10th International Conference on Network Protocols (ICNP), Paris, France, November 2002.
Measuring Packet Reordering, , Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002, pages 97-105.
Code-Red: a Case Study on the Spread and Victims of an Internet Worm, , Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002.
Agile and Scalable Analysis of Network Events, , Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002.
Automated Measurement of High-Volume Traffic Clusters, , Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002, pages 77-78.
ECOSystem: Managing Energy as a First Class Operating System Resource, , Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, CA, October 2002.
Breaking the Barriers: High Performance Security for High Performance Computing, , Proceedings of the New Security Paradigms Workshop, Virginia Beach, VA, September 2002.
Back to the Future: Dependable Computing through Dynamic Provisioning of Service Utilities, , Proceedings of the 10th ACM SIGOPS European Workshop, Saint Emilion, France, September 2002.
New Directions in Traffic Measurement and Accounting, , Proceedings of the ACM SIGCOMM Conference, Pittsburgh, PA, August 2002.
Route Flap Damping Exacerbates Internet Routing Convergence, , Proceedings of the ACM SIGCOMM Conference, Pittsburgh, PA, August 2002.
Design and Evaluation of a Conit-based Continuous Consistency Model for Replicated Services, , ACM Transactions on Computer Systems 20(3):239-282, August 2002.
Moshe: A group membership service for WANs, , ACM Transactions on Computer Systems 20(3):191-238, August 2002.
Whole Page Performance, , Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.
Service Level Agreement Based Distributed Resource Allocation for Streaming Hosting System, , Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.
High-Performance Cluster Storage Server, , Proceedings of the IEEE Interational Conference on Multimedia Communications and Systems (ICMCS), Edinburgh, United Kingdom, July 2002.
Minimal Cost Replication for Availability, , Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Monterey, CA, July 2002.
A Framework for Application-specific Customization of Network Services, , Proceedings of the International Workshop on Active Middleware Services, Edinburgh, United Kingdom, July 2002.
Characterizing User Behavior and Network Performance in a Public Wireless LAN, , Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.
Symbiotic Jobscheduling with Priorities for a Simultaneous Multithreading Processor, , Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.
Experiences with VI communication for database storage, , Proceedings of the 29th International Symposium on Computer Architecture (ISCA), Anchorage, AK, May 2002, pages 257-268.
Hot-Spot Congestion Relief in Public-Area Wireless Networks, , Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Callicoon, NY, June 2002.
Replication Strategies for Highly Available Peer-to-Peer Storage, , Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.
Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality, , Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.
Opus: An Overlay Peer Utility Service, , Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH), New York, NY, June 2002.
Application-specific Network Management for Energy-aware Streaming of Popular Multimedia Formats, , Proceedings of the USENIX Annual Technical Conference, Monterey, CA, June 2002.
EtE: Passive End-to-End Internet Service Performance, , Proceedings of the USENIX Annual Technical Conference, Monterey, CA, June 2002. (Best student paper).
A Web Middleware Architecture for Dynamic Customization of Content for Wireless Clients, , Proceedings of the International World Wide Web Conference (WWW), Honolulu, HI, May 2002.
Tracking Mobile Units for Dependable Message Delivery, , IEEE Transactions on Software Engineering 28(5):433-448, May 2002.
Architecture of the Entropia Distributed Computing System, , Proceedings of the International Parallel and Distributed Processing Symposium, Ft. Lauderdale, FL, April 2002.
Self-organizing Subsets: From Each According to His Abilities, To Each According to His Needs, , Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Cambridge, MA, March 2002.
Causality tracking in causal message-logging protocols, , Distributed Computing 15(1), February 2002.
Interposed Request Routing for Scalable Network Storage, , ACM Transactions on Computer Systems 20(1):25-48, February 2002.
PAWNs: Satisfying the Need for Ubiquitous Secure Connectivity and Location Services, , IEEE Wireless Communications 9(1):40-48, February 2002.
Improving Wireless Access to the Internet by Extending the Client/Server Model, , Proceedings of the European Wireless Conference, Florance, Italy, February 2002.
End-to-end Differentiation of Congestion and Wireless Losses, , Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2002.
Coarse-Grained Network Simulation for Wide-Area Distributed Systems, , Proceedings of Communication Networks and Distributed Systems Modeling and Simulation, Phoenix, AZ, January 2002.
The Apprentice Challenge, , ACM Transactions on Programming Languages and Systems (TOPLAS) 24(3):193-216, May 2002.
The SAHARA Model for Service Composition Across Multiple Providers, , Proceedings of the International Conference on Pervasive Computing (Pervasive), August 2002.
Providing Quality of Service for Wireless Links in Wireless/Wired Networks, , IEEE Personal Communications 6(5), October 2002.
Robust Congestion Signaling, , Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, CA, November 2001, pages 332-341.
Fast Firewall Implementations for Software and Hardware Based Routers, , Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, CA, November 2001.
Multiway Range Trees: Scalable IP lookups with Fast Updates, , Proceedings of the 6th IEEE Global Internet Symposium (GlobeCom), San Antonio, TX, November 2001.
Scalable High-speed Prefix Matching, , ACM Transactions on Computer Systems 19(4):440-482, November 2001.
The GrADS Project: Software Support for High-Level Grid Application Development, , International Journal of High Performance Computing Applications 15(4):327-344, November 2001.
Mesh Based Content Routing using XML, , Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001, pages 160-173.
Managing Energy and Server Resources in Hosting Centers, , Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001.
The Costs and Limits of Availability for Replicated Services, , Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001.
Inferring Internet Denial of Service Activity, , Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001, pages 9-22. (Best paper and Test of Time Awards).
Hash-Based IP Traceback, , Proceedings of the ACM SIGCOMM Conference, San Diego, CA, August 2001, pages 3-14. (Best student paper).
Scalable Packet Classification, , Proceedings of the ACM SIGCOMM Conference, San Diego, CA, August 2001.
Scalable Causal Message Logging for Wide-Area Environments, , European conference on Parallel Computing (Euro-Par), Manchester, United Kingdom, August 2001.
Segmented Information Dispersal (SID) Data Layouts for Digital Video Servers, , IEEE Transactions on Knowledge and Data Engineering 13(4):593-606, July 2001.
Exploring the Benefits of a Continuous Consistency Model for Wireless Web Portals, , Proceedings of the 2nd IEEE Workshop on Internet Applications, San Jose, CA, July 2001.
Scalable and Self-Organizing (Meta) Data Dissemination for Ubiquitous Computing, , Proceedings of the 2nd IEEE Workshop on Internet Applications, San Jose, CA, July 2001.
Network Support for IP Traceback, , IEEE/ACM Transactions on Networking 9(3):226-237, June 2001.
Hardware Support for a Hash-Based IP Traceback, , Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Anaheim, CA, June 2001.
The Multi-Queue Replacement Algorithm for Second Level Buffer Caches, , Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2001.
The Trickle-Down Effect: Web Caching and Server Request Distribution, , Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.
The Medusa Proxy: A Tool for Exploring User-Perceived Web Performance, , Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.
Reconsidering Internet Mobility, , Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May 2001, pages 41-46.
Position Summary: Anypoint Communication Protocol, , Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May 2001.
On the Placement of Web Server Replicas, , Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.
Wrapping Server-Side TCP to Mask Connection Failures, , Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.
Fast Packet Classification for Two-Dimensional Conflict-Free Filters, , Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.
Reducing Web Latency Using Reference Point Caching, , Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.
A Lower Bound for Multicast Key Distribution, , Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.
Alpine: A User-Level Infrastructure for Network Protocol Development, , Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001, pages 171-183.
Measurement and Analysis of a Streaming Media Workload, , Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001. (Best paper).
Fine-Grained Failover Using Connection Migration, , Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001, pages 221-232.
FIRE: Flexible Intra-AS Routing Environment, , IEEE Journal on Selected Areas in Communication 19(3):410-425, March 2001.
TOS: Kernel Support for Distributed Systems Management, , Proceedings of the ACM Symposium on Applied Computing (SAC), Las Vegas, NV, March 2001.
A Chat Room Assignment for Teaching Network Security, , Proceedings of the 32nd Technical Symposium on Computer Science Education, Charlotte, NC, February 2001.
Transcoding Characteristics of Web Images, , Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2001.
Formal Models of Java at the JVM Level--a Survey from the ACL2 Perspective, , Proceedings of Workshop on Formal Techniques for Java Programs / ECOOP, Budapest, Hungary, June 2001.
An Executable Formal Java Virtual Machine Thread Model, , Proceedings of the USENIX Java Virtual Machine Symposium (JVM), Monterey, CA, April 2001.
Combining Generality and Practicality in a Conit-Based Continuous Consistency Model for Wide-Area Replication, , Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Phoenix, AZ, April 2001.
Application-Level Differentiated Multimedia Web Services Using Quality Aware Transcoding, , IEEE Journal on Selected Areas in Communication 18(12):2544-2564, December 2000.
Optimistic Virtual Synchrony, , Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS), Nurnberg, Germany, October 2000.
Gossip versus Deterministically Constrained Flooding on Small Networks, , Proceedings of the International Symposium on Distributed Computing (DISC), Toledo, Spain, October 2000.
Design and Evaluation of a Continuous Consistency Model for Replicated Services, , Proceedings of the 4th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, October 2000.
Interposed Request Routing for Scalable Network Storage, , Proceedings of the 4th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, October 2000. (Award paper).
Every Joule is Precious: The Case for Revisiting Operating System Design for Energy Efficiency, , Proceedings of the 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 2000.
Efficient Numerical Bounding for Replicated Network Services, , Proceedings of the 26th International Conference on Very Large Databases (VLDB), Cairo, Egypt, September 2000.
Practical Network Support for IP Traceback, , Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000, pages 295-306.
Memory Efficient State Lookups with Fast Updates, , Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000.
FIRE: Flexible Intra-AS Routing Environment, , Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000, pages 191-203.
An End-to-End Approach to Host Mobility, , Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Boston, MA, August 2000, pages 155-166.
Managing the Storage and Battery Resources in an Image Capture Device (Digital Camera) using Dynamic Transcoding, , Proceedings of the 3rd ACM/IEEE International Workshop on Wireless and Mobile Multimedia (WoWMoM), Boston, MA, August 2000.
Epidemic Routing for Partially Connected Ad Hoc Networks, , Duke University technical report , July 2000.
A Predictive Block Sampling Algorithm for Desktop Multimedia Video Applications, , Proceedings of IEEE International Conference on Multimedia and Expo, New York, NY, July 2000.
An Automatic Object Inlining Optimization and its Evaluation, , Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI), Vancouver, Canada, June 2000.
Building Replicated Internet Services Using TACT: Tunable Availability/Consistency Tradeoffs, , Proceedings of the 2nd International Workshop on Advanced issues of E-Commerce and Web-Based Information Systems (WECWIS), Milpitas, CA, June 2000.
A Client-Server Oriented Algorithm for Virtually Synchronous Group Membership in WANs, , Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Taipei, Taiwan, April 2000.
Self-Stabilization by Counter Flushing, , SIAM Journal of Computing 30(2):486-510, April 2000.
The Fault Span of Crash Failures, , Journal of the ACM 47(2):244-293, March 2000.
Modeling TCP Latency, , Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000, pages 1742-1751.
Fast and Scalable Priority Queue Architecture for High-Speed Network Switches, , Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000.
Understanding the Performance of TCP Pacing, , Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000, pages 1157-1165.
Differentiated Multimedia Web Services Using Quality Aware Transcoding, , Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000.
On the Scale and Performance of Cooperative Web Proxy Caching, , Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, December 1999.
Adaptive Inverse Multiplexing for Wide-Area Wireless Networks, , Proceedings of the 4th IEEE Global Internet Symposium (GlobeCom), Rio de Janiero, Brazil, December 1999, pages 1665-1672.
An Architecture for Packet-Striping Protocols, , ACM Transactions on Computer Systems 17(4), November 1999.
TCP Congestion Control with a Misbehaving Receiver, , ACM SIGCOMM Computer Communication Review 29(5):71-78, October 1999.
Toward Automatic State Management for Dynamic Web Services, , Proceedings of the 1999 Network Storage Symposium (Netstore), Seattle, WA, October 1999.
Sting: a TCP-based Network Measurement Tool, , Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999, pages 71-79. (Best student paper).
Active Names: Flexible Location and Transport of Wide-Area Resources, , Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.
Organization-Based Analysis of Web-Object Sharing and Caching, , Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.
The End-to-end Effects of Internet Path Selection, , Proceedings of the ACM SIGCOMM Conference, Cambridge, MA, September 1999, pages 289-299.
Packet Classification Using Tuple Space Search, , Proceedings of the ACM SIGCOMM Conference, Cambridge, MA, September 1999.
Multimedia Web Services for Mobile Clients Using Quality Aware Transcoding, , Proceedings of the 2nd ACM/IEEE International Workshop on Wireless and Mobile Multimedia (WoWMoM), Seattle, WA, August 1999.
IP Lookups Using Multiway and Multicolumn Search, , IEEE/ACM Transactions on Networking 7(3), June 1999.
VirtualQueue: A Technique for Packet Voice Stream Reconstruction, , Proceedings of the IEEE Interational Conference on Multimedia Communications and Systems (ICMCS), Florence, Italy, June 1999.
NAP: Practical Fault-Tolerance for Itinerant Computations, , Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Austin, TX, June 1999.
Fast cluster failover using virtual memory-mapped communication, , Proceedings of the 13th International Conference on Supercomputing (ICS), June 1999, pages 373-382.
Toward Wide-Area Resource Allocation, , Proceedings of Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, June 1999.
Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages, , Proceedings of the ACM SIGMETRICS Conference, Atlanta, GA, May 1999, pages 206-207.
The Case for Informed Transport Protocols, , Proceedings of the 7th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VII), Rio Rico, AZ, March 1999, pages 58-63.
Fast Address Lookups Using Controlled Prefix Expansion, , ACM Transactions on Computer Systems 17(1), February 1999.
Detour: a Case for Informed Internet Routing and Transport, , IEEE Micro 19(1):50-59, January 1999.
Packet Filtering in High Speed Networks, , Proceedings of the ACM/SIAM Symposium on Discrete Algorithms (SODA), Baltimore, MD, January 1999.
Permutation Development Data Layout (PDDL), , Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Orlando, FL, January 1999.