Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.. 2009.
Learning Phonetic Rules in a Speech Recognition System.. ILP. 1297:37-44.. 1997.
Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.. 2011.
A Segment-Based Statistical Speech Recognition System for Isolated/continuous Number Recognition. Proceedings of the Fifteenth Annual Symposium on Computational Geometry. :201-211.. 1999.
Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.. 2009.
A Comparative Study of Several Feature Transformation and Learning Methods for Phoneme Classification. International Journal of Speech Technology. 3:263-276.. 2000.
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.. 2011.