Conference paperSynthesizing near-optimal malware specifications from suspicious behaviorsMatt Fredrikson, Somesh Jha, et al.S&P 2010
Conference paperFailure diagnosis with incomplete information in cable networksYun Mao, Hani Jamjoom, et al.CoNEXT 2006
PaperCODS: Evolving data efficiently and scalably in column oriented databasesZiyang Liu, Sivaramakrishnan Natarajan, et al.VLDB
Conference paperDA VINCI: A tool to improve VoIP call routing configurationsKunwadee Sripanidkulchai, Shu Tao, et al.NOMS 2010