-
1981
-
1982
-
1983
-
1984
Routing reserved bandwith multi-point connections.
Published in Computer communication review.Article -
1985
Control handling in real-time communication protocols.
Published in Computer communication review.Article -
1986
-
1987
-
1988
-
1989
Identifying spam without peeking at the contents.
Published in Crossroads : the ACM student magazine.Article -
1990
Peer to peer collaborative spam detection.
Published in Crossroads : the ACM student magazine.Article