Publications
Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
.
2011. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2011. Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.
.
2009. Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
.
2009. A Comparative Study of Several Feature Transformation and Learning Methods for Phoneme Classification. International Journal of Speech Technology. 3:263-276.
.
2000. A Segment-Based Statistical Speech Recognition System for Isolated/continuous Number Recognition. Proceedings of the Fifteenth Annual Symposium on Computational Geometry. :201-211.
.
1999. Learning Phonetic Rules in a Speech Recognition System.. ILP. 1297:37-44.
.
1997.