Publications
2002. Clustering and server selection using passive monitoring. IEEE INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 3:1717-1725vol.3-1717-1725vol.3.
1997. A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
2002. Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 20(8):1511-1527.
2006. In VINI veritas: realistic and controlled network experimentation. SIGCOMM Comput. Commun. Rev.. 36(4):3-14.
2008. Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
2009. First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
1999. Human-centered computing, online communities, and virtual environments. IEEE Computer Graphics and Applications. 19(6):70-74.
2011. Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
2012. You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
2008. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
2004. Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
2007. Configuration Reasoning and Ontology For Web. IEEE International Conference on Services Computing, 2007. SCC 2007. :387-394.
2002. Decoupled query optimization for federated database systems. 18th International Conference on Data Engineering, 2002. Proceedings. :716-727.
2002. Embedded grammar tags: advancing natural language interaction on the Web. Intelligent Systems, IEEE. 17(1):48-53.
2011. Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
2006. Eye of the Beholder: Phone-Based Text-Recognition for the Visually-Impaired. 2006 10th IEEE International Symposium on Wearable Computers. :145-146.
2001. Optimized seamless integration of biomolecular data. Proceedings of the IEEE 2nd International Symposium on Bioinformatics and Bioengineering Conference, 2001. :23-32.
2007. Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
2005. Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.
1999. Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
1998. Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.