Covid and Teaching
Why I Believe
GRoot: Proactive Verification of DNS Configurations, Best Student Paper, SIGCOMM 2020, First paper to verify DNS
Finding Network Misconfigurations by Automatic Template Inference, NSDI 2020, introduces network specific data mining to find bugs without specs
Scaling network verification using symmetry and surgery. POPL 2016, shows how to factor network symmetries into header & topology symmetries
Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN. SIGCOMM 2013, basis for startup Barefoot
Header Space Analysis: Static Checking for Networks, NSDI 2013, Early paper in network verification using dynamic equivalence classes
Automated Worm Fingerprinting, OSDI 2004, Basis of company NetSift we founded
New Directions in Traffic Measurement, ACM Trans. Comp Sys 2003, began a subfield of traffic measurement using network specific sketches
Scalable IP Lookup, ACM Trans Comp Sys. 2001, First O(log log N) algorithm for IP lookups, useful for IP v6
The Fault Span of Crash Failures, Journal of the ACM, 2000, shows that crashes can drive protocols to arbitrary states requiring self-stabilization
Deficit Round Robin, IEEE Trans Networking, 1996, O(1) Scheduling Algorithm for routers, widely deployed
Self stabilization by counter flushing, SIAM Journal of Computing 2000, general technique for self-stab.
Randomized Coordinated Attack, Principles of Distributed Computing 92, analysis of randomized two generals problem, Chapter 5 in Lynch's textbook Distributed Algorithms devoted to this paper.