Publications
2003. Pathogenic Potential of Environmental Vibrio Cholerae Strains Carrying Genetic Variants of the Toxin-Coregulated Pilus Pathogenicity Island. Infection and ImmunityInfect. Immun.. 71(2):1020-1025.
2004. Interlingual annotation of multilingual text corpora. Proceedings of the North American Chapter of the Association for Computational Linguistics Workshop on Frontiers in Corpus Annotation. :55-62.
2004. Measuring HPC productivity. International Journal of High Performance Computing Applications. 18(4):459-473.
2003. The CPR model for summarizing video. Proceedings of the 1st ACM international workshop on Multimedia databases. :2-9.
2004. The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
2007. Story creation from heterogeneous data sources. Multimedia Tools and Applications. 33(3):351-377.
2004. BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
2005. Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.
2004. Some foundational problems in interdomain routing. Proceedings of Third Workshop on Hot Topics in Networks (HotNets-III).
2004. The case for separating routing from routers. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. :5-12.
2004. A model of BGP routing for network engineering. SIGMETRICS Perform. Eval. Rev.. 32(1):331-342.
2003. Measuring the effects of internet path faults on reactive routing. SIGMETRICS Perform. Eval. Rev.. 31(1):126-137.
2008. Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.
2003. Defeating Web censorship with untrusted messenger discovery. Workshop on Privacy Enhancing Technologies.
2002. Infranet: Circumventing web censorship and surveillance. Proceedings of the 11th USENIX Security Symposium. :247-262.