ahmed2008learning
@article{ahmed2008learning,
  title = {Learning To Predict Bad Behavior}, 
  author = {Ahmed Syed, N and Feamster, Nick and Gray, Alex}, 
  journal = {NIPS 2007 Workshop on Machine Learning in Adversarial Environments for
        Computer Security}, 
  year = {2008}, 
  www_section = {Security}, 
}
andersen2002topology
@inproceedings{andersen2002topology,
  title = {Topology inference from BGP routing dynamics}, 
  author = {Andersen, David G and Feamster, Nick and Bauer, Steve and Balakrishnan, Hari}, 
  booktitle = {Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment}, 
  organization = {ACM}, 
  year = {2002}, 
  pages = {243--248}, 
  www_section = {Measurement}, 
}
andersen2007holding
@article{andersen2007holding,
  title = {Holding the Internet accountable}, 
  author = {Andersen, David G and Balakrishnan, Hari and Feamster, Nick and Koponen, Teemu
        and Moon, Daekyong and Shenker, Scott}, 
  journal = {ACM SIGCOMM HotNets}, 
  year = {2007}, 
  www_section = {Architecture}, 
}
andersen2008accountable
@inproceedings{andersen2008accountable,
  title = {Accountable internet protocol (AIP)}, 
  author = {Andersen, David G and Balakrishnan, Hari and Feamster, Nick and Koponen, Teemu
        and Moon, Daekyeong and Shenker, Scott}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {38}, 
  number = {4}, 
  year = {2008}, 
  pages = {339--350}, 
  www_tags = {selected}, 
  www_section = {Architecture}, 
}
anderson2008accountable
@article{anderson2008accountable,
  title = {Accountable Internet Protocol}, 
  author = {Anderson, D and Balakrishnan, H and Feamster, N and Koponen, T and Moon, D and
        Shenker, S}, 
%%%%% ERROR: Non-ASCII characters: ''\xe2\x80\x98''
  journal = {SIGCOMM ‘08, August}, 
  year = {2008}, 
  www_section = {Architecture}, 
}
antonakakis2010building
@inproceedings{antonakakis2010building,
  title = {Building a Dynamic Reputation System for DNS.}, 
  author = {Antonakakis, Manos and Perdisci, Roberto and Dagon, David and Lee, Wenke and
        Feamster, Nick}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2010}, 
  pages = {273--290}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
anwer2009fast
@article{anwer2009fast,
  title = {A Fast, Virtualized Data Plane for the NetFPGA}, 
  author = {Anwer, Muhammad Bilal and Feamster, Nick}, 
  journal = {NetFPGA Developers Workshop, Stanford, California}, 
  year = {2009}, 
  pages = {90--94}, 
  www_section = {Software Defined Networking}, 
}
anwer2010building
@article{anwer2010building,
  title = {Building a fast, virtualized data plane with programmable hardware}, 
  author = {Anwer, Muhammad Bilal and Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {40}, 
  number = {1}, 
  year = {2010}, 
  pages = {75--82}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
anwer2010network
@inproceedings{anwer2010network,
  title = {Network I/O fairness in virtual machines}, 
  author = {Anwer, Muhammad Bilal and Nayak, Ankur and Feamster, Nick and Liu, Ling}, 
  booktitle = {Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure
        systems and architectures}, 
  organization = {ACM}, 
  year = {2010}, 
  pages = {73--80}, 
  www_section = {Software Defined Networking}, 
}
anwer2010switchblade
@article{anwer2010switchblade,
  title = {Switchblade: a platform for rapid deployment of network protocols on
        programmable hardware}, 
  author = {Anwer, Muhammad Bilal and Motiwala, Murtaza and Tariq, Mukarram bin and
        Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {40}, 
  number = {4}, 
  year = {2010}, 
  pages = {183--194}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
bavier2006vini
@inproceedings{bavier2006vini,
  title = {In VINI veritas: realistic and controlled network experimentation}, 
  author = {Bavier, Andy and Feamster, Nick and Huang, Mark and Peterson, Larry and
        Rexford, Jennifer}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {36}, 
  number = {4}, 
  year = {2006}, 
  pages = {3--14}, 
  www_section = {Software Defined Networking}, 
}
bhatia2008hosting
@article{bhatia2008hosting,
  title = {Hosting virtual networks on commodity hardware}, 
  author = {Bhatia, Sapan and Motiwala, Murtaza and Muhlbauer, Wolfgang and Valancius,
        Vytautas and Bavier, Andy and Feamster, Nick and Peterson, Larry and Rexford,
        Jennifer}, 
  journal = {Georgia Tech. University., Tech. Rep. GT-CS-07-10}, 
  year = {2008}, 
  publisher = {Citeseer}, 
  www_section = {Architecture}, 
}
bhatia2008trellis
@inproceedings{bhatia2008trellis,
  title = {Trellis: A platform for building flexible, fast virtual networks on commodity
        hardware}, 
  author = {Bhatia, Sapan and Motiwala, Murtaza and Muhlbauer, Wolfgang and Mundada, Yogesh
        and Valancius, Vytautas and Bavier, Andy and Feamster, Nick and Peterson, Larry
        and Rexford, Jennifer}, 
  booktitle = {Proceedings of the 2008 ACM CoNEXT Conference}, 
  organization = {ACM}, 
  year = {2008}, 
  pages = {72}, 
  www_section = {Architecture}, 
}
bin2009characterizing
@inproceedings{bin2009characterizing,
  title = {Characterizing VLAN-induced sharing in a campus network}, 
  author = {Bin Tariq, Mukarram and Mansy, Ahmed and Feamster, Nick and Ammar, Mostafa}, 
  booktitle = {Proceedings of the 9th ACM SIGCOMM conference on Internet measurement
        conference}, 
  organization = {ACM}, 
  year = {2009}, 
  pages = {116--121}, 
  www_section = {Measurement}, 
}
burnett2010chipping
@inproceedings{burnett2010chipping,
  title = {Chipping Away at Censorship Firewalls with User-Generated Content.}, 
  author = {Burnett, Sam and Feamster, Nick and Vempala, Santosh}, 
  booktitle = {USENIX Security Symposium}, 
  organization = {Washington, DC}, 
  year = {2010}, 
  pages = {463--468}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
burnett2010circumventing
@article{burnett2010circumventing,
  title = {Circumventing censorship with collage}, 
  author = {Burnett, Sam and Feamster, Nick and Vempala, Santosh}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {40}, 
  number = {4}, 
  year = {2010}, 
  pages = {471--472}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
burnett2013making
@article{burnett2013making,
  title = {Making sense of internet censorship: a new frontier for internet measurement}, 
  author = {Burnett, Sam and Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {43}, 
  number = {3}, 
  year = {2013}, 
  pages = {84--89}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
caesar2005design
@inproceedings{caesar2005design,
  title = {Design and implementation of a routing control platform}, 
  author = {Caesar, Matthew and Caldwell, Donald and Feamster, Nick and Rexford, Jennifer
        and Shaikh, Aman and van der Merwe, Jacobus}, 
  booktitle = {Proceedings of the 2nd conference on Symposium on Networked Systems Design
        \& Implementation-Volume 2}, 
  organization = {USENIX Association}, 
  year = {2005}, 
  pages = {15--28}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
calvert2011instrumenting
@article{calvert2011instrumenting,
  title = {Instrumenting home networks}, 
  author = {Calvert, Kenneth L and Edwards, W Keith and Feamster, Nick and Grinter, Rebecca
        E and Deng, Ye and Zhou, Xuzi}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {41}, 
  number = {1}, 
  year = {2011}, 
  pages = {84--89}, 
  publisher = {ACM}, 
  www_section = {Broadband Access Networks}, 
}
chetty2012refactoring
@article{chetty2012refactoring,
  title = {Refactoring network infrastructure to improve manageability: a case study of
        home networking}, 
  author = {Chetty, Marshini and Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {42}, 
  number = {3}, 
  year = {2012}, 
  pages = {54--61}, 
  publisher = {ACM}, 
  www_section = {Software Defined Networking}, 
}
cunha2008distinguishing
@inproceedings{cunha2008distinguishing,
  title = {Distinguishing persistent failures from transient losses}, 
  author = {Cunha, {\'I}talo and Teixeira, Renata and Feamster, Nick and Diot, Christophe}, 
  booktitle = {Proceedings of the 2008 ACM CoNEXT Conference}, 
  organization = {ACM}, 
  year = {2008}, 
  pages = {50}, 
  www_section = {Measurement}, 
}
cunha2009measurement
@inproceedings{cunha2009measurement,
  title = {Measurement methods for fast and accurate blackhole identification with binary
        tomography}, 
  author = {Cunha, {\'I}talo and Teixeira, Renata and Feamster, Nick and Diot, Christophe}, 
  booktitle = {Proceedings of the 9th ACM SIGCOMM conference on Internet measurement
        conference}, 
  organization = {ACM}, 
  year = {2009}, 
  pages = {254--266}, 
  www_section = {Measurement}, 
}
dagon2013method
@article{dagon2013method,
  title = {Method and system for detecting and responding to attacking networks}, 
  author = {Dagon, David and Feamster, Nick and Lee, Wenke and Edmonds, Robert and Lipton,
        Richard and Ramachandran, Anirudh}, 
  journal = {US Patent 8,566,928}, 
  year = {2013}, 
  month = {October}, 
  www_section = {Security}, 
}
feamster1999mpeg
@inproceedings{feamster1999mpeg,
  title = {MPEG-2 to H. 263 transcoder}, 
  author = {Feamster, Nick and Wee, Susie J}, 
  booktitle = {Photonics East'99}, 
  organization = {International Society for Optics and Photonics}, 
  year = {1999}, 
  pages = {164--175}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
feamster2001controlling
@article{feamster2001controlling,
  title = {Controlling the impact of BGP policy changes on IP traffic}, 
  author = {Feamster, Nick and Borkenhagen, Jay and Rexford, Jennifer}, 
  journal = {ATT Labs--Research, Technical Report HA173000-011106-02TM}, 
  year = {2001}, 
  www_section = {Operations}, 
}
feamster2001interactions
@article{feamster2001interactions,
  title = {On the interactions between layered quality adaptation and congestion control
        for streaming video}, 
  author = {Feamster, Nick and Bansal, Deepak and Balakrishnan, Hari}, 
  journal = {11th International Packet Video Workshop}, 
  year = {2001}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
feamster2002infranet
@inproceedings{feamster2002infranet,
  title = {Infranet: Circumventing Web Censorship and Surveillance.}, 
  author = {Feamster, Nick and Balazinska, Magdalena and Harfst, Greg and Balakrishnan,
        Hari and Karger, David R}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2002}, 
  pages = {247--262}, 
  www_tags = {selected}, 
  www_section = {Security}, 
  www_pdf_url = {http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}, 
}
feamster2002network
@inproceedings{feamster2002network,
  title = {Network-wide BGP route prediction for traffic engineering}, 
  author = {Feamster, Nick and Rexford, Jennifer}, 
  booktitle = {ITCom 2002: The Convergence of Information Technologies and Communications}, 
  organization = {International Society for Optics and Photonics}, 
  year = {2002}, 
  pages = {55--68}, 
  www_section = {Operations}, 
}
feamster2002packet
@article{feamster2002packet,
  title = {Packet loss recovery for streaming video}, 
  author = {Feamster, Nick and Balakrishnan, Hari}, 
  journal = {12th International Packet Video Workshop}, 
  year = {2002}, 
  pages = {9--16}, 
  publisher = {PA: Pittsburgh}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
feamster2003defeating
@article{feamster2003defeating,
  title = {Defeating Web censorship with untrusted messenger discovery}, 
  author = {Feamster, Nick and Balazinska, Magdalena and Wang, Winston and Balakrishnan,
        Hari and Karger, David}, 
  journal = {Workshop on Privacy Enhancing Technologies}, 
  year = {2003}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
feamster2003guidelines
@article{feamster2003guidelines,
  title = {Guidelines for interdomain traffic engineering}, 
  author = {Feamster, Nick and Borkenhagen, Jay and Rexford, Jennifer}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {33}, 
  number = {5}, 
  year = {2003}, 
  pages = {19--30}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
feamster2003measuring
@inproceedings{feamster2003measuring,
  title = {Measuring the effects of internet path faults on reactive routing}, 
  author = {Feamster, Nick and Andersen, David G and Balakrishnan, Hari and Kaashoek, M
        Frans}, 
  booktitle = {ACM SIGMETRICS Performance Evaluation Review}, 
  organization = {ACM}, 
  volume = {31}, 
  number = {1}, 
  year = {2003}, 
  pages = {126--137}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
feamster2003thwarting
@incollection{feamster2003thwarting,
  title = {Thwarting web censorship with untrusted messenger discovery}, 
  author = {Feamster, Nick and Balazinska, Magdalena and Wang, Winston and Balakrishnan,
        Hari and Karger, David}, 
  booktitle = {Privacy Enhancing Technologies}, 
  year = {2003}, 
  pages = {125--140}, 
  publisher = {Springer Berlin Heidelberg}, 
  www_section = {Security}, 
}
feamster2003towards
@inproceedings{feamster2003towards,
  title = {Towards a logic for wide-area Internet routing}, 
  author = {Feamster, Nick and Balakrishnan, Hari}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {33}, 
  number = {4}, 
  year = {2003}, 
  pages = {289--300}, 
  www_section = {Internet Routing}, 
}
feamster2004borderguard
@inproceedings{feamster2004borderguard,
  title = {BorderGuard: Detecting cold potatoes from peers}, 
  author = {Feamster, Nick and Mao, Zhuoqing Morley and Rexford, Jennifer}, 
  booktitle = {Proceedings of the 4th ACM SIGCOMM conference on Internet measurement}, 
  organization = {ACM}, 
  year = {2004}, 
  pages = {213--218}, 
  www_section = {Internet Routing}, 
}
feamster2004case
@inproceedings{feamster2004case,
  title = {The case for separating routing from routers}, 
  author = {Feamster, Nick and Balakrishnan, Hari and Rexford, Jennifer and Shaikh, Aman
        and Van Der Merwe, Jacobus}, 
  booktitle = {Proceedings of the ACM SIGCOMM workshop on Future directions in network
        architecture}, 
  organization = {ACM}, 
  year = {2004}, 
  pages = {5--12}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
feamster2004location
@inproceedings{feamster2004location,
  title = {Location diversity in anonymity networks}, 
  author = {Feamster, Nick and Dingledine, Roger}, 
  booktitle = {Proceedings of the 2004 ACM workshop on Privacy in the electronic society}, 
  organization = {ACM}, 
  year = {2004}, 
  pages = {66--76}, 
  www_section = {Security}, 
}
feamster2004model
@inproceedings{feamster2004model,
  title = {A model of BGP routing for network engineering}, 
  author = {Feamster, Nick and Winick, Jared and Rexford, Jennifer}, 
  booktitle = {ACM SIGMETRICS Performance Evaluation Review}, 
  organization = {ACM}, 
  volume = {32}, 
  number = {1}, 
  year = {2004}, 
  pages = {331--342}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
feamster2004modeling
@article{feamster2004modeling,
  title = {Modeling BGP route selection within an AS}, 
  author = {Feamster, Nick and Rexford, Jennifer}, 
  journal = {IEEE/ACM Transactions on Networking. To appear. Earlier version appears in ACM
        SIGMETRICS}, 
  year = {2004}, 
  www_tags = {selected}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
feamster2004practical
@article{feamster2004practical,
  title = {Practical verification techniques for wide-area routing}, 
  author = {Feamster, Nick}, 
  journal = {ACM Sigcomm Computer Communication Review}, 
  volume = {34}, 
  number = {1}, 
  year = {2004}, 
  pages = {87--92}, 
  publisher = {ACM}, 
  www_section = {Internet Routing}, 
}
feamster2004some
@article{feamster2004some,
  title = {Some foundational problems in interdomain routing}, 
  author = {Feamster, Nick and Balakrishnan, Hari and Rexford, Jennifer}, 
  journal = {Proceedings of Third Workshop on Hot Topics in Networks (HotNets-III)}, 
  year = {2004}, 
  publisher = {Citeseer}, 
  www_section = {Internet Routing}, 
}
feamster2005correctness
@article{feamster2005correctness,
  title = {Correctness properties for Internet routing}, 
  author = {Feamster, Nick and Balakrishnan, Hari}, 
  journal = {Allerton Conference on Communication, Control, and Computing}, 
  year = {2005}, 
  www_section = {Internet Routing}, 
}
feamster2005detecting
@inproceedings{feamster2005detecting,
  title = {Detecting BGP configuration faults with static analysis}, 
  author = {Feamster, Nick and Balakrishnan, Hari}, 
  booktitle = {Proceedings of the 2nd conference on Symposium on Networked Systems Design
        \& Implementation-Volume 2}, 
  organization = {USENIX Association}, 
  year = {2005}, 
  pages = {43--56}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
feamster2005empirical
@article{feamster2005empirical,
  title = {An empirical study of bogon route advertisements}, 
  author = {Feamster, Nick and Jung, Jaeyeon and Balakrishnan, Hari}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {35}, 
  number = {1}, 
  year = {2005}, 
  pages = {63--70}, 
  publisher = {ACM}, 
  www_section = {Security}, 
}
feamster2005implications
@article{feamster2005implications,
  title = {Implications of autonomy for the expressiveness of policy routing}, 
  author = {Feamster, Nick and Johari, Ramesh and Balakrishnan, Hari}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {35}, 
  number = {4}, 
  year = {2005}, 
  pages = {25--36}, 
  publisher = {ACM SIGCOMM}, 
  www_tags = {selected}, 
  www_section = {Internet Routing}, 
}
feamster2007implications
@article{feamster2007implications,
  title = {Implications of autonomy for the expressiveness of policy routing}, 
  author = {Feamster, Nick and Johari, Ramesh and Balakrishnan, Hari}, 
  journal = {Networking, IEEE/ACM Transactions on}, 
  volume = {15}, 
  number = {6}, 
  year = {2007}, 
  pages = {1266--1279}, 
  publisher = {IEEE}, 
  www_section = {Internet Routing}, 
}
feamster2007lease
@article{feamster2007lease,
  title = {How to lease the Internet in your spare time}, 
  author = {Feamster, Nick and Gao, Lixin and Rexford, Jennifer}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {37}, 
  number = {1}, 
  year = {2007}, 
  pages = {61--64}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
feamster2007network
@article{feamster2007network,
  title = {Network-wide prediction of BGP routes}, 
  author = {Feamster, Nick and Rexford, Jennifer}, 
  journal = {Networking, IEEE/ACM Transactions on}, 
  volume = {15}, 
  number = {2}, 
  year = {2007}, 
  pages = {253--266}, 
  publisher = {IEEE}, 
  www_section = {Operations}, 
}
feamster2007path
@article{feamster2007path,
  title = {Path splicing with network slicing}, 
  author = {Feamster, Nick and Motiwala, Murtaza and Vempala, Santosh}, 
  journal = {Proc. ACM SIGCOMM HotNets}, 
  year = {2007}, 
  www_section = {Architecture}, 
}
feamster2008can
@inproceedings{feamster2008can,
  title = {Can great research be taught?: independent research with cross-disciplinary
        thinking and broader impact}, 
  author = {Feamster, Nick and Gray, Alexander}, 
  booktitle = {ACM SIGCSE Bulletin}, 
  organization = {ACM}, 
  volume = {40}, 
  number = {1}, 
  year = {2008}, 
  pages = {471--475}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
feamster2008fighting
@inproceedings{feamster2008fighting,
  title = {Fighting spam, phishing, and online scams at the network level}, 
  author = {Feamster, Nick}, 
  booktitle = {Proceedings of the 4th Asian Conference on Internet Engineering}, 
  organization = {ACM}, 
  year = {2008}, 
  pages = {39--40}, 
  www_section = {Security}, 
}
feamster2010decoupling
@inproceedings{feamster2010decoupling,
  title = {Decoupling policy from configuration in campus and enterprise networks}, 
  author = {Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and
        Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram}, 
  booktitle = {Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on}, 
  organization = {IEEE}, 
  year = {2010}, 
  pages = {1--6}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
feamster2010outsourcing
@inproceedings{feamster2010outsourcing,
  title = {Outsourcing home network security}, 
  author = {Feamster, Nick}, 
  booktitle = {Proceedings of the 2010 ACM SIGCOMM workshop on Home networks}, 
  organization = {ACM}, 
  year = {2010}, 
  pages = {37--42}, 
  www_section = {Software Defined Networking}, 
}
feamster2011getting
@article{feamster2011getting,
  title = {Getting Students' Hands Dirty with Clean-Slate Networking}, 
  author = {Feamster, Nick and Rexford, Jennifer}, 
  journal = {SIGCOMM-Computer Communication Review}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {531}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
freedman2005geographic
@inproceedings{freedman2005geographic,
  title = {Geographic locality of IP prefixes}, 
  author = {Freedman, Michael J and Vutukuru, Mythili and Feamster, Nick and Balakrishnan,
        Hari}, 
  booktitle = {Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement}, 
  organization = {USENIX Association}, 
  year = {2005}, 
  pages = {13--13}, 
  www_section = {Measurement}, 
}
fu2001and
@inproceedings{fu2001and,
  title = {The Dos and Don'ts of Client Authentication on the Web.}, 
  author = {Fu, Kevin and Sit, Emil and Smith, Kendra and Feamster, Nick}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2001}, 
  pages = {251--268}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
grover2013peeking
@article{grover2013peeking,
  title = {Peeking Behind the NAT: An Empirical Study of Home Networks}, 
  author = {Grover, Sarthak and Park, Mi Seon and Sundaresan, Srikanth and Burnett, Sam and
        Kim, Hyojoon and Feamster, Nick}, 
  journal = {Proc. ACM SIGCOMM IMC}, 
  year = {2013}, 
  www_tags = {selected}, 
  www_section = {Broadband Access Networks}, 
}
hao2009detecting
@inproceedings{hao2009detecting,
  title = {Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic
        Reputation Engine.}, 
  author = {Hao, Shuang and Syed, Nadeem Ahmed and Feamster, Nick and Gray, Alexander G and
        Krasser, Sven}, 
  booktitle = {USENIX Security Symposium}, 
  year = {2009}, 
  pages = {101--118}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
hao2010internet
@article{hao2010internet,
  title = {An Internet-Wide View into DNS Lookup Patterns}, 
  author = {Hao, Shuang and Feamster, Nick and Pandrangi, Ramakant}, 
  journal = {White Paper privately published by VeriSign Labs, School of Computer Science,
        Georgia Tech, Dulles, VA, Tech. Rep}, 
  year = {2010}, 
  www_section = {Security}, 
}
hao2011monitoring
@inproceedings{hao2011monitoring,
  title = {Monitoring the initial DNS behavior of malicious domains}, 
  author = {Hao, Shuang and Feamster, Nick and Pandrangi, Ramakant}, 
  booktitle = {Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement
        conference}, 
  organization = {ACM}, 
  year = {2011}, 
  pages = {269--278}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
hao2013understanding
@article{hao2013understanding,
  title = {Understanding the Domain Registration Behavior of Spammers}, 
  author = {Hao, Shuang and Thomas, Matthew and Paxson, Vern and Feamster, Nick and
        Kreibich, Christian and Grier, Chris and Hollenbeck, Scott}, 
  journal = {Proc. ACM SIGCOMM IMC}, 
  year = {2013}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
huang2007diagnosing
@inproceedings{huang2007diagnosing,
  title = {Diagnosing network disruptions with network-wide analysis}, 
  author = {Huang, Yiyi and Feamster, Nick and Lakhina, Anukool and Xu, Jim Jun}, 
  booktitle = {ACM SIGMETRICS Performance Evaluation Review}, 
  organization = {ACM}, 
  volume = {35}, 
  number = {1}, 
  year = {2007}, 
  pages = {61--72}, 
  www_section = {Operations}, 
}
huang2008practical
@article{huang2008practical,
  title = {Practical issues with using network tomography for fault diagnosis}, 
  author = {Huang, Yiyi and Feamster, Nick and Teixeira, Renata}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {38}, 
  number = {5}, 
  year = {2008}, 
  pages = {53--58}, 
  publisher = {ACM}, 
  www_section = {Measurement}, 
}
katz2012lifeguard
@article{katz2012lifeguard,
  title = {LIFEGUARD: practical repair of persistent route failures}, 
  author = {Katz-Bassett, Ethan and Scott, Colin and Choffnes, David R and Cunha, {\'I}talo
        and Valancius, Vytautas and Feamster, Nick and Madhyastha, Harsha V and Anderson,
        Thomas and Krishnamurthy, Arvind}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {42}, 
  number = {4}, 
  year = {2012}, 
  pages = {395--406}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
khadilkar2007usage
@inproceedings{khadilkar2007usage,
  title = {Usage-based DHCP lease time optimization}, 
  author = {Khadilkar, Manas and Feamster, Nick and Sanders, Matt and Clark, Russ}, 
  booktitle = {Proceedings of the 7th ACM SIGCOMM conference on Internet measurement}, 
  organization = {ACM}, 
  year = {2007}, 
  pages = {71--76}, 
  www_section = {Operations}, 
}
kim2011communicating
@inproceedings{kim2011communicating,
  title = {Communicating with caps: Managing usage caps in home networks}, 
  author = {Kim, Hyojoon and Sundaresan, Srikanth and Chetty, Marshini and Feamster, Nick
        and Edwards, W Keith}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {470--471}, 
  www_section = {Software Defined Networking}, 
}
kim2011evolution
@inproceedings{kim2011evolution,
  title = {The evolution of network configuration: a tale of two campuses}, 
  author = {Kim, Hyojoon and Benson, Theophilus and Akella, Aditya and Feamster, Nick}, 
  booktitle = {Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement
        conference}, 
  organization = {ACM}, 
  year = {2011}, 
  pages = {499--514}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
kim2012coronet
@inproceedings{kim2012coronet,
  title = {CORONET: Fault tolerance for Software Defined Networks}, 
  author = {Kim, Hyojoon and Schlansker, Mike and Santos, Jose Renato and Tourrilhes, Jean
        and Turner, Yoshio and Feamster, Nick}, 
  booktitle = {Network Protocols (ICNP), 2012 20th IEEE International Conference on}, 
  organization = {IEEE}, 
  year = {2012}, 
  pages = {1--2}, 
  www_section = {Software Defined Networking}, 
}
kim2013improving
@article{kim2013improving,
  title = {Improving network management with software defined networking. Communications
        Magazine}, 
  author = {Kim, Hyojoon and Feamster, N}, 
  journal = {IEEE}, 
  volume = {51}, 
  number = {2}, 
  year = {2013}, 
  pages = {114--119}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
konte2008fast
@article{konte2008fast,
  title = {Fast flux service networks: Dynamics and roles in hosting online scams}, 
  author = {Konte, Maria and Feamster, Nick and Jung, Jaeyeon}, 
  journal = {Retrieved August}, 
  volume = {13}, 
  year = {2008}, 
  pages = {2011}, 
  www_section = {Security}, 
}
konte2009dynamics
@article{konte2009dynamics,
  title = {Dynamics of online scam hosting infrastructure}, 
  author = {Konte, Maria and Feamster, Nick and Jung, Jaeyeon}, 
  journal = {Passive and Active Network Measurement}, 
  year = {2009}, 
  pages = {219--228}, 
  publisher = {Springer Berlin/Heidelberg}, 
  www_section = {Security}, 
}
konte2011wide
@inproceedings{konte2011wide,
  title = {Wide-area routing dynamics of malicious networks}, 
  author = {Konte, Maria and Feamster, Nick}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {432--433}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
konte2012re
@inproceedings{konte2012re,
  title = {Re-wiring activity of malicious networks}, 
  author = {Konte, Maria and Feamster, Nick}, 
  booktitle = {Passive and Active Measurement}, 
  year = {2012}, 
  pages = {116--125}, 
  publisher = {Springer Berlin Heidelberg}, 
  www_section = {Security}, 
}
koponen2011architecting
@article{koponen2011architecting,
  title = {Architecting for innovation}, 
  author = {Koponen, Teemu and Shenker, Scott and Balakrishnan, Hari and Feamster, Nick and
        Ganichev, Igor and Ghodsi, Ali and Godfrey, P and McKeown, Nick and Parulkar,
        Guru and Raghavan, Barath and others}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {41}, 
  number = {3}, 
  year = {2011}, 
  pages = {24--36}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Architecture}, 
}
lee2007mobcast
@inproceedings{lee2007mobcast,
  title = {MobCast: overlay architecture for seamless ip mobility using scalable anycast
        proxies}, 
  author = {Lee, Christopher P and Attrey, Keshav and Caballero, Carlos and Feamster, Nick
        and Mihail, Milena and Copeland, John A}, 
  booktitle = {Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE}, 
  organization = {IEEE}, 
  year = {2007}, 
  pages = {3872--3876}, 
  www_section = {Architecture}, 
}
lee2011countering
@techreport{lee2011countering,
  title = {Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and
        Efficient Mitigation}, 
  author = {Lee, Wenke and Dagon, David and Giffin, Jon and Feamster, Nick and Ollman,
        Gunter and Westby, Jody and Wesson, Rick and Vixie, Paul}, 
  institution = {GEORGIA TECH RESEARCH CORP ATLANTA}, 
  year = {2011}, 
  www_section = {Security}, 
}
lumezanu2012bias
@inproceedings{lumezanu2012bias,
  title = {\# bias: Measuring the Tweeting Behavior of Propagandists}, 
  author = {Lumezanu, Cristian and Feamster, Nick and Klein, Hans}, 
  booktitle = {Sixth International AAAI Conference on Weblogs and Social Media}, 
  year = {2012}, 
  www_section = {Security}, 
}
mansy2009measuring
@article{mansy2009measuring,
  title = {Measuring vlan-induced dependencies on a campus network}, 
  author = {Mansy, Ahmed and Tariq, Mukarram Bin and Feamster, Nick and Ammar, Mostafa}, 
  journal = {Proc. ACM SIGCOMM IMC}, 
  year = {2009}, 
  www_section = {Measurement}, 
}
martin2012user
@inproceedings{martin2012user,
  title = {User-driven dynamic traffic prioritization for home networks}, 
  author = {Martin, Jake and Feamster, Nick}, 
  booktitle = {Proceedings of the 2012 ACM SIGCOMM workshop on Measurements up the stack}, 
  organization = {ACM}, 
  year = {2012}, 
  pages = {19--24}, 
  www_section = {Broadband Access Networks}, 
}
medem2009determining
@article{medem2009determining,
  title = {Determining the causes of intradomain routing changes}, 
  author = {Medem, Amelie and Teixeira, Renata and Feamster, Nick and Meulle, Mickael}, 
%%%%% ERROR: Non-ASCII characters: ''\xe2\x80\x9d''
  journal = {University Pierre and Marie Curie,” Technical Report}, 
  year = {2009}, 
  www_section = {Measurement}, 
}
medem2010joint
@inproceedings{medem2010joint,
  title = {Joint analysis of network incidents and intradomain routing changes}, 
  author = {Medem, Amelie and Teixeira, Renata and Feamster, Nick and Meulle, Mickael}, 
  booktitle = {Network and Service Management (CNSM), 2010 International Conference on}, 
  organization = {IEEE}, 
  year = {2010}, 
  pages = {198--205}, 
  www_section = {Measurement}, 
}
motiwala2007path
@article{motiwala2007path,
  title = {Path splicing: Reliable connectivity with rapid recovery}, 
  author = {Motiwala, Murtaza and Feamster, Nick and Vempala, Santosh}, 
  journal = {ACM SIGCOMM HotNets VI}, 
  year = {2007}, 
  publisher = {Citeseer}, 
  www_section = {Architecture}, 
}
motiwala2008path
@article{motiwala2008path,
  title = {Path splicing}, 
  author = {Motiwala, Murtaza and Elmore, Megan and Feamster, Nick and Vempala, Santosh}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {38}, 
  number = {4}, 
  year = {2008}, 
  pages = {27--38}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Architecture}, 
}
motiwala2012towards
@article{motiwala2012towards,
  title = {Towards a cost model for network traffic}, 
  author = {Motiwala, Murtaza and Dhamdhere, Amogh and Feamster, Nick and Lakhina,
        Anukool}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {42}, 
  number = {1}, 
  year = {2012}, 
  pages = {54--60}, 
  publisher = {ACM}, 
  www_section = {Economics and Policy}, 
}
mundada2009openflow
@inproceedings{mundada2009openflow,
  title = {An OpenFlow switch element for Click}, 
  author = {Mundada, Yogesh and Sherwood, Rob and Feamster, Nick}, 
  booktitle = {in Symposium on Click Modular Router}, 
  year = {2009}, 
  www_section = {Software Defined Networking}, 
}
mundada2011silverline
@article{mundada2011silverline,
  title = {SilverLine: Data and network isolation for cloud services}, 
  author = {Mundada, Yogesh and Ramachandran, Anirudh and Feamster, Nick}, 
  journal = {Proc. of 3rd HotCloud}, 
  year = {2011}, 
  www_section = {Security}, 
}
nayak2009resonance
@inproceedings{nayak2009resonance,
  title = {Resonance: dynamic access control for enterprise networks}, 
  author = {Nayak, Ankur Kumar and Reimers, Alex and Feamster, Nick and Clark, Russ}, 
  booktitle = {Proceedings of the 1st ACM workshop on Research on enterprise networking}, 
  organization = {ACM}, 
  year = {2009}, 
  pages = {11--18}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
perdisci2010behavioral
@inproceedings{perdisci2010behavioral,
  title = {Behavioral Clustering of HTTP-Based Malware and Signature Generation Using
        Malicious Network Traces.}, 
  author = {Perdisci, Roberto and Lee, Wenke and Feamster, Nick}, 
  booktitle = {NSDI}, 
  year = {2010}, 
  pages = {391--404}, 
  www_section = {Security}, 
}
ramachandran2006can
@article{ramachandran2006can,
  title = {Can DNS-based blacklists keep up with bots?}, 
  author = {Ramachandran, Anirudh and Dagon, David and Feamster, Nick}, 
  journal = {Conference on email and anti-spam}, 
  year = {2006}, 
  www_section = {Security}, 
}
ramachandran2006revealing
@article{ramachandran2006revealing,
  title = {Revealing botnet membership using DNSBL counter-intelligence}, 
  author = {Ramachandran, Anirudh and Feamster, Nick and Dagon, David}, 
  journal = {Proc. 2nd USENIX Steps to Reducing Unwanted Traffic on the Internet}, 
  year = {2006}, 
  pages = {49--54}, 
  www_section = {Security}, 
  www_tags = {selected}, 
}
ramachandran2006understanding
@inproceedings{ramachandran2006understanding,
  title = {Understanding the network-level behavior of spammers}, 
  author = {Ramachandran, Anirudh and Feamster, Nick}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {36}, 
  number = {4}, 
  year = {2006}, 
  pages = {291--302}, 
  www_section = {Security}, 
}
ramachandran2007bitstore
@article{ramachandran2007bitstore,
  title = {Bitstore: An incentive-compatible solution for blocked downloads in bittorrent}, 
  author = {Ramachandran, Anirudh and das Sarma, A and Feamster, Nick}, 
  journal = {Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based
        Computing (NetEcon)}, 
  year = {2007}, 
  www_section = {Economics and Policy}, 
}
ramachandran2007filtering
@inproceedings{ramachandran2007filtering,
  title = {Filtering spam with behavioral blacklisting}, 
  author = {Ramachandran, Anirudh and Feamster, Nick and Vempala, Santosh}, 
  booktitle = {Proceedings of the 14th ACM conference on Computer and communications
        security}, 
  organization = {ACM}, 
  year = {2007}, 
  pages = {342--351}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
ramachandran2008authenticated
@inproceedings{ramachandran2008authenticated,
  title = {Authenticated out-of-band communication over social links}, 
  author = {Ramachandran, Anirudh V and Feamster, Nick}, 
  booktitle = {Proceedings of the first workshop on Online social networks}, 
  organization = {ACM}, 
  year = {2008}, 
  pages = {61--66}, 
  www_section = {Security}, 
}
ramachandran2008detecting
@incollection{ramachandran2008detecting,
  title = {Detecting botnet membership with dnsbl counterintelligence}, 
  author = {Ramachandran, Anirudh and Feamster, Nick and Dagon, David}, 
  booktitle = {Botnet Detection}, 
  year = {2008}, 
  pages = {131--142}, 
  publisher = {Springer US}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
ramachandran2008fast
@inproceedings{ramachandran2008fast,
  title = {Fast monitoring of traffic subpopulations}, 
  author = {Ramachandran, Anirudh and Seetharaman, Srinivasan and Feamster, Nick and
        Vazirani, Vijay}, 
  booktitle = {Proceedings of the 8th ACM SIGCOMM conference on Internet measurement}, 
  organization = {ACM}, 
  year = {2008}, 
  pages = {257--270}, 
  www_section = {Measurement}, 
}
ramachandran2009securing
@techreport{ramachandran2009securing,
  title = {Securing enterprise networks using traffic tainting}, 
  author = {Ramachandran, Anirudh and Mundada, Yogesh and Tariq, Mukarram Bin and Feamster,
        Nick}, 
  institution = {Technical Report GT-CS-09-15, GaTech}, 
  year = {2009}, 
  www_section = {Security}, 
}
ramachandran2011spam
@inproceedings{ramachandran2011spam,
  title = {Spam or ham?: characterizing and detecting fraudulent not spam reports in web
        mail systems}, 
  author = {Ramachandran, Anirudh and Dasgupta, Anirban and Feamster, Nick and Weinberger,
        Kilian}, 
  booktitle = {Proceedings of the 8th Annual Collaboration, Electronic messaging,
        Anti-Abuse and Spam Conference}, 
  organization = {ACM}, 
  year = {2011}, 
  pages = {210--219}, 
  www_section = {Security}, 
}
roy2013characterizing
@inproceedings{roy2013characterizing,
  title = {Characterizing correlated latency anomalies in broadband access networks}, 
  author = {Roy, Swati and Feamster, Nick}, 
  booktitle = {Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM}, 
  organization = {ACM}, 
  year = {2013}, 
  pages = {525--526}, 
  www_section = {Broadband Access Networks}, 
}
schlinker2013towards
@inproceedings{schlinker2013towards,
  title = {Towards impactful routing research: running your own (Emulated) as on the (Real)
        internet}, 
  author = {Schlinker, Brandon and Zarifis, Kyriakos and Cunha, {\'I}talo and Feamster,
        Nick and Katz-Bassett, Ethan and Yu, Minlan}, 
  booktitle = {Proceedings of the 2013 workshop on Student workhop}, 
  organization = {ACM}, 
  year = {2013}, 
  pages = {31--34}, 
  www_section = {Software Defined Networking}, 
}
shahbaz2013architecture
@inproceedings{shahbaz2013architecture,
  title = {Architecture for an open source network tester}, 
  author = {Shahbaz, Muhammad and Antichi, Gianni and Geng, Yilong and Zilberman, Noa and
        Covington, Adam and Bruyere, Marc and Feamster, Nick and McKeown, Nick and
        Felderman, Bob and Blott, Michaela and others}, 
  booktitle = {Proceedings of the ninth ACM/IEEE symposium on Architectures for networking
        and communications systems}, 
  organization = {IEEE Press}, 
  year = {2013}, 
  pages = {123--124}, 
  www_section = {Software Defined Networking}, 
}
sundaresan2010autonomous
@inproceedings{sundaresan2010autonomous,
  title = {Autonomous traffic engineering with self-configuring topologies}, 
  author = {Sundaresan, Srikanth and Lumezanu, Cristian and Feamster, Nick and
        Fran{\c{c}}ois, Pierre}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {40}, 
  number = {4}, 
  year = {2010}, 
  pages = {417--418}, 
  www_section = {Operations}, 
}
sundaresan2011broadband
@inproceedings{sundaresan2011broadband,
  title = {Broadband internet performance: a view from the gateway}, 
  author = {Sundaresan, Srikanth and De Donato, Walter and Feamster, Nick and Teixeira,
        Renata and Crawford, Sam and Pescap{\`e}, Antonio}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {134--145}, 
  www_tags = {selected}, 
  www_section = {Broadband Access Networks}, 
}
sundaresan2011helping
@article{sundaresan2011helping,
  title = {Helping Users Shop for ISPs with Internet Nutrition Labels}, 
  author = {Sundaresan, Srikanth and Feamster, Nick and Teixeira, Renata and Tang, Anthony
        and Edwards, K and Grinter, R and Chetty, Marshini and de Donato, Walter}, 
  journal = {ACM SIGCOMM Workshop on Home Networks}, 
  year = {2011}, 
  www_section = {Broadband Access Networks}, 
}
sundaresan2012accelerating
@article{sundaresan2012accelerating,
  title = {Accelerating last-mile web performance with popularity-based prefetching}, 
  author = {Sundaresan, Srikanth and Magharei, Nazanin and Feamster, Nick and Teixeira,
        Renata}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {42}, 
  number = {4}, 
  year = {2012}, 
  pages = {303--304}, 
  publisher = {ACM}, 
  www_section = {Broadband Access Networks}, 
}
sundaresan2012measuring
@article{sundaresan2012measuring,
  title = {Measuring home broadband performance}, 
  author = {Sundaresan, Srikanth and De Donato, Walter and Feamster, Nick and Teixeira,
        Renata and Crawford, Sam and Pescap{\`e}, Antonio}, 
  journal = {Communications of the ACM}, 
  volume = {55}, 
  number = {11}, 
  year = {2012}, 
  pages = {100--109}, 
  publisher = {ACM}, 
  www_tags = {selected}, 
  www_section = {Broadband Access Networks}, 
}
sundaresan2013characterizing
@article{sundaresan2013characterizing,
  title = {Characterizing and Mitigating Web Performance Bottlenecks in Broadband Access
        Networks}, 
  author = {Sundaresan, Srikanth and Magharei, Nazanin and Feamster, Nick and Teixeira,
        Renata}, 
  journal = {Proceedings of the ACM SIGMETRICS/international conference on Measurement and
        modeling of computer systems}, 
  year = {2013}, 
  www_section = {Broadband Access Networks}, 
}
sundaresan2013measuring
@article{sundaresan2013measuring,
  title = {Measuring and Mitigating Web Performance Bottlenecks in Broadband Access
        Networks}, 
  author = {Sundaresan, Srikanth and Feamster, Nick and Teixeira, Renata and Magharei,
        Nazanin}, 
  journal = {Proc. ACM SIGCOMM IMC}, 
  year = {2013}, 
  www_tags = {selected}, 
  www_section = {Broadband Access Networks}, 
}
sundaresan2013web
@inproceedings{sundaresan2013web,
  title = {Web performance bottlenecks in broadband access networks}, 
  author = {Sundaresan, Srikanth and Magharei, Nazanin and Feamster, Nick and Teixeira,
        Renata and Crawford, Sam}, 
  booktitle = {Proceedings of the ACM SIGMETRICS/international conference on Measurement
        and modeling of computer systems}, 
  organization = {ACM}, 
  year = {2013}, 
  pages = {383--384}, 
  www_section = {Broadband Access Networks}, 
}
tariq2008answering
@inproceedings{tariq2008answering,
  title = {Answering what-if deployment and configuration questions with wise}, 
  author = {Tariq, Mukarram and Zeitoun, Amgad and Valancius, Vytautas and Feamster, Nick
        and Ammar, Mostafa}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {38}, 
  number = {4}, 
  year = {2008}, 
  pages = {99--110}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
tariq2009detecting
@inproceedings{tariq2009detecting,
  title = {Detecting network neutrality violations with causal inference}, 
  author = {Tariq, Mukarram Bin and Motiwala, Murtaza and Feamster, Nick and Ammar,
        Mostafa}, 
  booktitle = {Proceedings of the 5th international conference on Emerging networking
        experiments and technologies}, 
  organization = {ACM}, 
  year = {2009}, 
  pages = {289--300}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
tariq2013answering
@article{tariq2013answering,
%%%%% ERROR: Non-ASCII characters: ''\xe2\x80\x9c\xe2\x80\x9d''
  title = {Answering “What-If” Deployment and Configuration Questions With WISE:
        Techniques and Deployment Experience}, 
  author = {Tariq, Mukarram Bin and Bhandankar, Kaushik and Valancius, Vytautas and
        Zeitoun, Amgad and Feamster, Nick and Ammar, Mostafa}, 
  journal = {Networking, IEEE/ACM Transactions on}, 
  volume = {21}, 
  number = {1}, 
  year = {2013}, 
  pages = {1--13}, 
  publisher = {IEEE}, 
  www_tags = {selected}, 
  www_section = {Operations}, 
}
valancius2007multiplexing
@inproceedings{valancius2007multiplexing,
  title = {Multiplexing BGP sessions with BGP-Mux}, 
  author = {Valancius, Vytautas and Feamster, Nick}, 
  booktitle = {Proceedings of the 2007 ACM CoNEXT conference}, 
  organization = {ACM}, 
  year = {2007}, 
  pages = {44}, 
  www_section = {Software Defined Networking}, 
}
valancius2008mint
@inproceedings{valancius2008mint,
  title = {MINT: A market for Internet transit}, 
  author = {Valancius, Vytautas and Feamster, Nick and Johari, Ramesh and Vazirani, Vijay}, 
  booktitle = {Proceedings of the 2008 ACM CoNEXT Conference}, 
  organization = {ACM}, 
  year = {2008}, 
  pages = {70}, 
  www_section = {Economics and Policy}, 
}
valancius2010transit
@article{valancius2010transit,
  title = {Transit portal: BGP connectivity as a service}, 
  author = {Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {40}, 
  number = {4}, 
  year = {2010}, 
  pages = {463--464}, 
  publisher = {ACM}, 
  www_section = {Software Defined Networking}, 
}
valancius2010wide
@article{valancius2010wide,
  title = {Wide-area route control for distributed services}, 
  author = {Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao,
        Akihiro}, 
  journal = {USENIX Annual}, 
  year = {2010}, 
  www_section = {Software Defined Networking}, 
}
valancius2011many
@inproceedings{valancius2011many,
  title = {How many tiers?: pricing in the internet transit market}, 
  author = {Valancius, Vytautas and Lumezanu, Cristian and Feamster, Nick and Johari,
        Ramesh and Vazirani, Vijay V}, 
  booktitle = {ACM SIGCOMM Computer Communication Review}, 
  organization = {ACM}, 
  volume = {41}, 
  number = {4}, 
  year = {2011}, 
  pages = {194--205}, 
  www_tags = {selected}, 
  www_section = {Economics and Policy}, 
}
valancius2013quantifying
@inproceedings{valancius2013quantifying,
  title = {Quantifying the benefits of joint content and network routing}, 
  author = {Valancius, Vytautas and Ravi, Bharath and Feamster, Nick and Snoeren, Alex C}, 
  booktitle = {Proceedings of the ACM SIGMETRICS/international conference on Measurement
        and modeling of computer systems}, 
  organization = {ACM}, 
  year = {2013}, 
  pages = {243--254}, 
  www_tags = {selected}, 
  www_section = {Measurement}, 
}
voellmy2010don
@techreport{voellmy2010don,
  title = {Don't configure the network, program it! domain-specific programming languages
        for network systems}, 
  author = {Voellmy, Andreas and Agarwal, Ashish and Hudak, Paul and Feamster, Nick and
        Burnett, Sam and Launchbury, John}, 
  institution = {YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE}, 
  year = {2010}, 
  www_section = {Software Defined Networking}, 
}
voellmy2012procera
@inproceedings{voellmy2012procera,
  title = {Procera: a language for high-level reactive network control}, 
  author = {Voellmy, Andreas and Kim, Hyojoon and Feamster, Nick}, 
  booktitle = {Proceedings of the first workshop on Hot topics in software defined
        networks}, 
  organization = {ACM}, 
  year = {2012}, 
  pages = {43--48}, 
  www_tags = {selected}, 
  www_section = {Software Defined Networking}, 
}
vutukuru2005geographic
@inproceedings{vutukuru2005geographic,
  title = {Geographic locality of IP prefixes}, 
  author = {Vutukuru, Mythili and Freedman, Michael J and Feamster, Nick and Balakrishnan,
        Hari}, 
  booktitle = {In IMC}, 
  year = {2005}, 
  www_section = {Measurement}, 
}
wang2006quantifying
@techreport{wang2006quantifying,
  title = {Quantifying the effects of routing dynamics on end-to-end Internet path
        failures}, 
  author = {Wang, Feng and Feamster, Nick and Gao, Lixin}, 
  institution = {Technical Report TR-05-CSE-03, University of Massachusetts}, 
  year = {2006}, 
  www_section = {Measurement}, 
}
wang2007measuring
@inproceedings{wang2007measuring,
  title = {Measuring the contributions of routing dynamics to prolonged end-to-end Internet
        path failures}, 
  author = {Wang, Feng and Feamster, Nick and Gao, Lixin}, 
  booktitle = {Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE}, 
  organization = {IEEE}, 
  year = {2007}, 
  pages = {1855--1859}, 
  www_section = {Measurement}, 
}
wee1999field
@inproceedings{wee1999field,
  title = {Field-to-frame transcoding with spatial and temporal downsampling}, 
  author = {Wee, Susie J and Apostolopoulos, John G and Feamster, Nick}, 
  booktitle = {Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference
        on}, 
  organization = {IEEE}, 
  volume = {4}, 
  year = {1999}, 
  pages = {271--275}, 
%%%%% ERROR: Missing field
% www_section = {?????},
}
xing2013take
@inproceedings{xing2013take,
  title = {Take this personally: pollution attacks on personalized services}, 
  author = {Xing, Xinyu and Meng, Wei and Doozan, Dan and Snoeren, Alex C and Feamster,
        Nick and Lee, Wenke}, 
  booktitle = {Proceedings of the 22nd USENIX conference on Security}, 
  organization = {USENIX Association}, 
  year = {2013}, 
  pages = {671--686}, 
  www_tags = {selected}, 
  www_section = {Security}, 
}
yardi2008photo
@inproceedings{yardi2008photo,
  title = {Photo-based authentication using social networks}, 
  author = {Yardi, Sarita and Feamster, Nick and Bruckman, Amy}, 
  booktitle = {Proceedings of the first workshop on Online social networks}, 
  organization = {ACM}, 
  year = {2008}, 
  pages = {55--60}, 
  www_section = {Security}, 
}
yu2011survey
@article{yu2011survey,
  title = {A survey of virtual lan usage in campus networks}, 
  author = {Yu, Minlan and Rexford, Jennifer and Sun, Xin and Rao, Sanjay and Feamster,
        Nick}, 
  journal = {Communications Magazine, IEEE}, 
  volume = {49}, 
  number = {7}, 
  year = {2011}, 
  pages = {98--103}, 
  publisher = {IEEE}, 
  www_section = {Operations}, 
}
zhang2011boosting
@inproceedings{zhang2011boosting,
  title = {Boosting the scalability of botnet detection using adaptive traffic sampling}, 
  author = {Zhang, Junjie and Luo, Xiapu and Perdisci, Roberto and Gu, Guofei and Lee,
        Wenke and Feamster, Nick}, 
  booktitle = {Proceedings of the 6th ACM Symposium on Information, Computer and
        Communications Security}, 
  organization = {ACM}, 
  year = {2011}, 
  pages = {124--134}, 
  www_section = {Security}, 
}
zhu2008ufo
@article{zhu2008ufo,
  title = {UFO: A resilient layered routing architecture}, 
  author = {Zhu, Yaping and Bavier, Andy and Feamster, Nick and Rangarajan, Sampath and
        Rexford, Jennifer}, 
  journal = {ACM SIGCOMM Computer Communication Review}, 
  volume = {38}, 
  number = {5}, 
  year = {2008}, 
  pages = {59--62}, 
  publisher = {ACM}, 
  www_section = {Architecture}, 
}