Export 223 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Feamster N, Dingledine R.  2004.  Location diversity in anonymity networks. Proceedings of the 2004 ACM workshop on Privacy in the electronic society. :66-76.
Feamster N, Balakrishnan H.  2004.  Verifying the Correctness of Wide-Area Internet Routing. MIT-CSAIL-TR-2004-031
Feamster N, Rexford J.  2002.  Network-wide BGP route prediction for traffic engineering. Proceedings of ITCOM.
Feamster N, Voellmy A, Agarwal A, Hudak P, Burnett S, Launchbury J.  2010.  Don't Configure the Network, Program It! Domain-Specific Programming Languages for Network Systems. YALEU/DCS/RR-1432
Feamster N, Balakrishnan H.  2002.  Packet loss recovery for streaming video. 12th International Packet Video Workshop.
Feamster N.  2004.  Practical verification techniques for wide-area routing. SIGCOMM Comput. Commun. Rev.. 34(1):87-92.
Feamster N, Rexford J.  2004.  Modeling BGP route selection within an AS. IEEE/ACM Transactions on Networking.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Feamster N, Balakrishnan H.  2003.  Towards a logic for wide-area Internet routing. SIGCOMM Comput. Commun. Rev.. 33(4):289-300.
Feamster N, Wee S.  1999.  An MPEG-2 to H. 263 transcoder. SPIE Voice, Video, and Data Communications Conference.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Defeating Web censorship with untrusted messenger discovery. Workshop on Privacy Enhancing Technologies.
Feamster N.  2008.  Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.
Feamster N.  2010.  Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
Feamster N, Motiwala M, Vempala S.  2007.  Path splicing with network slicing. Proc. ACM SIGCOMM Hot-Nets.
Feamster N, Mao Z M, Rexford J.  2004.  BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
Feamster N, Johari R, Balakrishnan H.  2005.  Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Feamster N, Balakrishnan H, Rexford J.  2004.  Some foundational problems in interdomain routing. Proceedings of Third Workshop on Hot Topics in Networks (HotNets-III).
Feamster N, Gray AG, Krasser S, Syed NA.  2008.  SNARE: Spatio-temporal Network-level Automatic Reputation Engine. GT-CSE-08-02
Feamster N, Rexford J.  2007.  Network-Wide Prediction of BGP Routes. Networking, IEEE/ACM Transactions on. 15(2):253-266.
Feamster N, Borkenhagen J, Rexford J.  2003.  Techniques for interdomain traffic engineering. Computer Communications Review. 33(5)
Fayzullin M, V.S. Subrahmanian, Picariello A, Sapino ML.  2005.  The CPR model for summarizing video. Multimedia Tools and Applications. 26(2):153-173.
Fayzullin M, V.S. Subrahmanian, Albanese M, Cesarano C, Picariello A.  2007.  Story creation from heterogeneous data sources. Multimedia Tools and Applications. 33(3):351-377.
Fayzullin M, V.S. Subrahmanian, Picariello A, Sapino ML.  2003.  The CPR model for summarizing video. Proceedings of the 1st ACM international workshop on Multimedia databases. :2-9.