Publications
2012. Networking lessons: From computers to water. 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS). :1-6.
2001. Optimized seamless integration of biomolecular data. Proceedings of the IEEE 2nd International Symposium on Bioinformatics and Bioengineering Conference, 2001. :23-32.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
1999. PLANet: an active internetwork. IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 3:1124-1133vol.3-1124-1133vol.3.
2001. Practical programmable packets. IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:41-50vol.1-41-50vol.1.
2011. Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
2000. Receiver based management of low bandwidth access links. IEEE INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:245-254vol.1-245-254vol.1.
2002. Remote access to large spatial databases. Proceedings of the 10th ACM international symposium on Advances in geographic information systems. :5-10.
2002. Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 20(8):1511-1527.
1997. A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
1999. Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
2003. On the use of flow migration for handling short-term overloads. Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE. 6:3108-3112vol.6-3108-3112vol.6.
2008. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
1996. User controlled overviews of an image library: a case study of the visible human. Proceedings of the first ACM international conference on Digital libraries. :74-82.
2010. Video Précis: Highlighting Diverse Aspects of Videos. IEEE Transactions on Multimedia. 12(8):853-868.
2009. Web Monitoring 2.0: Crossing Streams to Satisfy Complex Data Needs. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1215-1218.
1998. Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
2012. You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.