Publications
2003. Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
2005. Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.
2004. BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
2005. Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.
2004. The case for separating routing from routers. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. :5-12.
2004. Some foundational problems in interdomain routing. Proceedings of Third Workshop on Hot Topics in Networks (HotNets-III).
2004. A model of BGP routing for network engineering. SIGMETRICS Perform. Eval. Rev.. 32(1):331-342.
2003. Measuring the effects of internet path faults on reactive routing. SIGMETRICS Perform. Eval. Rev.. 31(1):126-137.
2003. Defeating Web censorship with untrusted messenger discovery. Workshop on Privacy Enhancing Technologies.
2008. Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.
2008. Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
2004. Les leçons tirées des deux compétitions de visualisation d'information. Proceedings of the 16th conference on Association Francophone d'Interaction Homme-Machine. :7-12.
1997. A Network-Flow Technique for Finding Low-Weight Bounded-Degree Spanning Trees. Journal of Algorithms. 24(2):310-324.
2003. Overlaying graph links on treemaps. IEEE Symposium on Information Visualization Conference Compendium (demonstration).