Publications
Export 7148 results:
[ Author] Title Type Year Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
2003. Overlaying graph links on treemaps. IEEE Symposium on Information Visualization Conference Compendium (demonstration).
2008. Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
2008. Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
2001. On the interactions between layered quality adaptation and congestion control for streaming video. 11th International Packet Video Workshop.
2004. Practical verification techniques for wide-area routing. SIGCOMM Comput. Commun. Rev.. 34(1):87-92.
2007. Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
2006. Can Information from End Systems Improve Routing. Proceedings of the Workshop on Internet Routing Evolution and Design.
2005. Correctness properties for Internet routing. Allerton Conference on Communication, Control, and Computing.
2010. Don't Configure the Network, Program It! Domain-Specific Programming Languages for Network Systems. YALEU/DCS/RR-1432
2004. Location diversity in anonymity networks. Proceedings of the 2004 ACM workshop on Privacy in the electronic society. :66-76.
2003. Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
2005. Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.
2004. BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
2005. Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.