Publications
(2006).
binpac: A yacc for Writing Application Protocol Parsers.
Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
(2006). The challenges of IT research in developing regions.
IEEE Pervasive Computing. 5(2), 15-23.
(2006). A Comparison of Phasing Algorithms for Trios and Unrelated Individuals.
American Journal of Human Genetics. 78(3), 437-450.
(2006).
(2006). Cross-Domain and Cross-Language Portability of Acoustic Features Estimated by Multilayer Perceptrons.
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 321-324.
(2006). DDoS Defense by Offense.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
(2006).
(2006). Designing DCCP: Congestion Control Without Reliability.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 27-38.
(2006).
(2006). The Devil and Packet Trace Anonymization.
Computer Communication Review. 36(1), 29-38.
(2006). Distributed Quota Enforcement for Spam Control.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
(2006). Distributed Segment Tree: Support Range Query and Cover Query over DHT.
Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
(2006). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006).
(2006). Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks.
Journal of Computational Biology. 13, 133-144.
(2006). End-Host Controlled Multicast Routing.
Elsevier Computer Networks. 5(6), 807-825.
(2006). Energy-Efficient Routing on the Virtual Spanner.
Lecture Notes in Computer Science. 4104,
(2006). Enhancing Network Intrusion Detection With Integrated Sampling and Filtering.
Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
(2006). Enriching Speech Recognition with Automatic Detection of Sentence Boundaries and Disfluencies.
IEEE Transactions on Audio. 14(5), 1526-1540.
(2006).
(2006). Fighting Coordinated Attackers with Cross-Organizational Information on Sharing.
Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
(2006). Fixed Parameter Tractability of Binary Near-Perfect Phylogenetic Tree Reconstruction.
Proceedings of the 33rd International Colloquium on Automata, Languages, and Programming (ICALP 2006). 667-678.
(2006).
(2006). Frame Semantics and Japanese FrameNet.
Nihongogaku (Japanese Linguistics). 25(6), 40-52.
(2006).