{"id":20,"date":"2017-08-28T16:28:17","date_gmt":"2017-08-28T20:28:17","guid":{"rendered":"https:\/\/sites.bu.edu\/nislab\/?page_id=20"},"modified":"2025-11-07T22:58:56","modified_gmt":"2025-11-08T03:58:56","slug":"publications","status":"publish","type":"page","link":"https:\/\/sites.bu.edu\/nislab\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h2>2025<\/h2>\n<p>Journals<\/p>\n<ul>\n<li>Pranet Sharma, Zhenpeng Shi, Sevval Simsek, David Starobinski, and David Sastre Medina. &#8220;Understanding Similarities and Differences Between Software Composition Analysis Tools.&#8221; <em>IEEE<\/em> <em>Security and Privacy<\/em>, vol. 23, no. 1, pp. 53-63, Jan.-Feb. 2025. <a href=\"http:\/\/10.1109\/MSEC.2024.3410957\">[DOI]<\/a><\/li>\n<li><span>Zeying Zhu, Jonathan Chamberlain, Kenny Wu, David Starobinski, and Zaoxing Liu. 2025. Approximation-First Timeseries Query At Scale. Proc. VLDB Endow. 18, 8 (April 2025), 2348\u20132361. [<a href=\"https:\/\/doi.org\/10.14778\/3742728.3742732\">DOI<\/a>]<\/span><\/li>\n<\/ul>\n<p>Refereed Conferences<\/p>\n<ul>\n<li><span>\u015eevval \u015eim\u015fek, Howell Xia, Jonah Gluck, David Sastre Medina and David Starobinski, &#8220;Fixing Invalid CVE-CWE Mappings in Threat Databases,&#8221; <\/span><em>2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC)<\/em><span>, Toronto, ON, Canada, 2025, pp. 950-960, doi: 10.1109\/COMPSAC65507.2025.00124. [<a href=\"https:\/\/doi.org\/10.1109\/COMPSAC65507.2025.00124\">DOI<\/a>]<\/span><\/li>\n<li><span>Jonathan Chamberlain, Jilin Zheng, Zeying Zhu, Zaoxing Liu, and David Starobinski. 2025. Exploiting Kubernetes Autoscaling for Economic Denial of Sustainability. Proc. ACM Meas. Anal. Comput. Syst. 9, 2, Article 22 (June 2025), 29 pages. [<a href=\"https:\/\/doi.org\/10.1145\/3727114\">DOI<\/a>]<\/span><\/li>\n<li><span>Nicholas Brendle, Jonathan Chamberlain, Joel T Johnson, David Starobinski, &#8220;Advancing Spectrum Sharing through Statistical Analysis of EESS-Passive Satellite Overpasses&#8221;, 2025 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). London, United Kingdom: IEEE [<a href=\"https:\/\/people.bu.edu\/staro\/DySPAN_2025_Final.pdf\">PDF<\/a>]<\/span><\/li>\n<\/ul>\n<h2>2024<\/h2>\n<p>Journals<\/p>\n<ul>\n<li>Jonathan Chamberlain, David Starobinski, and Joel T Johnson. &#8220;Facilitating Spectrum Sharing with Passive Satellite Incumbents.&#8221; <em>IEEE Journal on Selected Areas in Communication<\/em>, vol. 42, no. 12, pp. 3719-3733, Dec. 2024. <a href=\"https:\/\/doi.org\/10.1109\/JSAC.2024.3459034\">[DOI]<\/a><\/li>\n<li><span>Stefan Gvozdenovic, Johannes K. Becker, John Mikulskis, and David Starobinski, &#8220;IoT-Scan: Network Reconnaissance for the Internet of Things,&#8221; <\/span><i>IEEE Internet of Things Journal (IoT-J),<\/i><span> Vol: 11, Issue: 8, pp. 13091-13107, April 2024. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/2023_IoT_Scan_Final.pdf\">[PDF]<\/a> <a href=\"http:\/\/10.1109\/JIOT.2023.3327293\">[DOI]<\/a><\/li>\n<li><span>Jungyeol Kim, Rohan Saraogi, Saswati Sarkar, David Starobinski, and Santosh Venkatesh, &#8220;Capturing the Spread of Information in Heterogeneous V2X through Scalable Computation,&#8221; <\/span><i>IEEE\/ACM Transactions on Networking (TON),<\/i><span>\u00a0 Vol. 32, Issue 2, pp. 1540-1555, April 2024. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/2023-ToN-Jungyeol.pdf\">[PDF]<\/a><\/li>\n<li>Novak Boskov, Xingyu Chen, Sevval Simsek, Ari Trachtenberg, David Starobinski. &#8220;Out-of-band transaction pool sync for large dynamic blockchain networks,&#8221; <i>International Journal of Network Management<\/i>. 2024; 34(5):e2265. <a heref=\"https:\/\/doi.org\/10.1002\/nem.2265\" href=\"https:\/\/doi.org\/10.1002\/nem.2265\">[DOI]<\/a><\/li>\n<li><span>Zhenpeng Shi, Nikolay Matyunin, Kalman Graffi, and David Starobinski. &#8220;Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs,&#8221; <em>ACM Transactions on Privacy and Security (TOPS, previously known as TISSEC)<\/em>, Vol. 27, Issue 1, Article No. 13, pp. 1-26, February 2024. <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3641819\">[DOI]<\/a><\/span><\/li>\n<\/ul>\n<p>Refereed Conferences<\/p>\n<ul>\n<li>Nicholas Brendle, Joel T Johnson, David Starobinski, and Jonathan Chamberlain. &#8220;Estimating the Retreival Performance of Passive Remote Sensing Under Alternate Spectrum Sharing Scenarios.&#8221; <em>IEEE IGARSS 2024, <\/em>July 2024. <a append-to-href=\"?src=document\" target=\"_blank\" href=\"https:\/\/doi.org\/10.1109\/IGARSS53475.2024.10640738\" rel=\"noopener noreferrer\">[DOI]<\/a><\/li>\n<li>Jonathan Chamberlain, Joel T Johnson, and David Starobinski. &#8220;Spectrum Sharing between Earth Exploration Satellite and Commerical Services: An Economic Feasibility Analysis,&#8221; <em>IEEE<\/em> <em>DySpan 2024<\/em>, May 2024 <strong>(Runner Up Best Paper Award, Policy Track)<\/strong>. <a href=\"http:\/\/10.1109\/DySPAN60163.2024.10632841\">[DOI]<\/a><a append-to-href=\"?src=document\" target=\"_blank\" href=\"https:\/\/doi.org\/10.1109\/IGARSS53475.2024.10640738\" rel=\"noopener noreferrer\"><\/a><\/li>\n<li><span>\u015eevval \u015eim\u015fek, Zhenpeng Shi, Howell Xia, David Sastre Medina, and David Starobinski. 2024. &#8220;Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database&#8221;. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS &#8217;24). Association for Computing Machinery, New York, NY, USA, 5042\u20135044. [<a href=\"https:\/\/doi.org\/10.1145\/3658644.3691375\">DOI<\/a>]<\/span><\/li>\n<\/ul>\n<h2>2023<\/h2>\n<p>Journals<\/p>\n<ul>\n<li><span>Zhenpeng Shi, David Starobinski, and Ariel Orda, &#8220;Social Cost Analysis of Shared\/Buy-in Computing Systems,&#8221; <\/span><i>ACM Transactions on Economics and Computation (TEAC),<\/i><span> Vol. 11, Issue 3-4, Article No. 9, pp. 1\u201336, December 2023. <a href=\"https:\/\/dl.acm.org\/doi\/full\/10.1145\/3624355\">[DOI]<\/a> <\/span><a href=\"https:\/\/people.bu.edu\/staro\/TEAC_Zhenpeng.pdf\">[PDF]<\/a><\/li>\n<li><span>Novak Boskov, Ari Trachtenberg and David Starobinski, &#8220;Enabling Cost-Benefit Analysis of Data Sync Protocols,&#8221; <\/span><i>IEEE Computer,<\/i><span> Vol. 56, No. 10, pp. 62-71, October 2023. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/GenSync_Magazine_Paper.pdf\">[PDF]<\/a><\/li>\n<li><span>Johannes K. Becker and David Starobinski, &#8220;Snout: A Middleware Platform for Software-Defined Radios,&#8221; <\/span><i>IEEE Transactions on Network and Service Management (TNSM),<span>\u00a0<\/span><\/i><span>Vol. 20, No. 1, pp. 644-657, March 2023.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/IEEE_TNSM_Snout.pdf\">[PDF]<\/a><\/li>\n<\/ul>\n<p>Refereed Conferences<\/p>\n<ul>\n<li><span>Novak Boskov, Sevval Simsek, Ari Trachtenberg and David Starobinski, &#8220;SREP: Out-Of-Band Sync of Transaction Pools for Large-Scale Blockchains,&#8221; <\/span><i>IEEE ICBC 2023,<\/i><span>\u00a0May 2023\u00a0<\/span><strong>(Best paper award)<\/strong><span>.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/2023-ICBC-Novak.pdf\">[PDF]<\/a><\/li>\n<li><span>Furkan Ercan, Kevin Galligan, D. Starobinski, Muriel Medard, Ken R. Duffy, and Rabia T. Yazicigil, &#8220;GRAND-EDGE: A Universal, Jamming-resilient Algorithm with Error-and-Erasure Decoding,&#8221; <\/span><i>IEEE International Conference on Communications (ICC) 2023,<\/i><span>\u00a0Rome, Italy, May 2023.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/2023-ICC-Furkan.pdf\">[PDF]<\/a><\/li>\n<\/ul>\n<h2>2022<\/h2>\n<p>Journals<\/p>\n<ul>\n<li><span>Muhammad Anas Imtiaz, David Starobinski, and Ari Trachtenberg, &#8220;Empirical Comparison of Block Relay Protocols,&#8221; <\/span><i>IEEE Transactions on Network and Service Management (TNSM),<\/i><span>\u00a0Vol. 19, No. 4, pp. 3960-3974, December 2022.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/TNSM22_Block_Relay_Comparison.pdf\">[PDF]<\/a><\/li>\n<li><span>Novak Bo\u0161kov, David Starobinski, and Ari Trachtenberg, &#8220;GenSync: A New Framework for Benchmarking and Optimizing Reconciliation of Data,&#8221; <\/span><i>IEEE Transactions on Network and Service Management (TNSM),<\/i><span>\u00a0Vol. 19, No. 4, pp. 4408-4423, December 2022.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/GenSync__Set_Reconciliation_Framework_For_Peer_To_Peer_Systems.pdf\">[PDF]<\/a><\/li>\n<li><span>L. Samuels, N. Boskov, A.F. Oliveira, E. Sun, D. Starobinski, A. Trachtenberg, M. Varia, M. Monga M, R. Canetti R, A. Devaiah, G.V.Denis, &#8220;Automated Exposure Notification for COVID-19,&#8221; <\/span><i>Journal of Young Investigators<\/i><span>, Vol. 25, No. 12, December 2022.\u00a0<\/span><a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC10321550\/\">[PDF]<\/a><\/li>\n<li><span>Zhenpeng Shi, Kalman Graffi, David Starobinski, and Nikolay Matyunin, &#8220;Threat Modeling Tools: A Taxonomy,&#8221; <\/span><i>IEEE Security &amp; Privacy,<\/i><span> Vol. 20, no. 4, pp. 29-39, July-August 2022. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/Threat_Modeling_Tools_Survey.pdf\">[PDF]<\/a><\/li>\n<\/ul>\n<p>Refereed Conferences<\/p>\n<ul>\n<li><span>Furkan Ercan, Kevin Galligan, Ken R. Duffy, Muriel Medard, David Starobinski and Rabia T. Yazicigil, &#8220;A General Security Approach for Soft-information Decoding against Smart Bursty Jammers,&#8221; <\/span><i>IEEE Globecom Workshops 2022,<\/i><span>\u00a0Rio de Janeiro, Brazil, 2022.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/Furkan_Globecom_2022.pdf\">[PDF]<\/a><\/li>\n<li><span>Johannes K. Becker and David Starobinski, &#8220;Optimizing Freshness in IoT Scans,&#8221; <\/span><i>IEEE WF-IoT 2022,<\/i><span>\u00a0Yokohama, Japan, November 2022\u00a0<\/span><strong>(3rd place Best paper award)<\/strong><span>.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/IEEE_WFIoT_2022_Freshness.pdf\">[PDF]<\/a><\/li>\n<li><span>Zhenpeng Shi, Nikolay Matyunin, Kalman Graffi, and David Starobinski, &#8220;Uncovering Product Vulnerabilities with Threat Knowledge Graphs,&#8221; <\/span><i>IEEE SecDev 2022,<\/i><span>\u00a0Atlanta, GA, October 2022.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/secdev22-final.pdf\">[PDF]<\/a><\/li>\n<li><span>Stefan Gvozdenovic, Johannes K. Becker, John, Mikulskis, and David Starobinski, &#8220;Multi-Protocol IoT Network Reconnaissance,&#8221; <\/span><i>IEEE CNS 2022,<\/i><span>\u00a0Austin, TX, October 2022.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/IoT_Scan_CNS22.pdf\">[PDF]<\/a><\/li>\n<li><span>Jonathan Chamberlain and David Starobinski, &#8220;Game Theoretic Analysis of Citizens Broadband Radio Service,&#8221; <\/span><i>RAWNET 2022,<\/i><span>\u00a0Turin, Italy, September 2022.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/CBRS_RAWNET22.pdf\">[PDF]<\/a><\/li>\n<\/ul>\n<h2>2021<\/h2>\n<p>Journals<\/p>\n<ul>\n<li><span>Jonathan Chamberlain, Eran Simhon, and David Starobinski, &#8220;Preemptible Queues with Advance Reservations: Strategic Behavior and Revenue Management,&#8221; <\/span><i>European Journal of Operational Research (EJOR),<\/i><span>\u00a0Vol. 30, No. 2, pp. 561-578, September 2021.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/EJOR_AR_Preemption_Final.pdf\">[PDF]<\/a><span>.<\/span><\/li>\n<li><span>Liangxiao Xin and David Starobinski, &#8220;Countering Cascading Denial of Service Attacks on Wi-Fi Networks,&#8221; <\/span><i>IEEE\/ACM Transactions on Networking (TON),<\/i><span>\u00a0Vol. 29, No. 3, pp. 1335-1348, June 2021.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/IEEE_ToN_Liangxiao_2021.pdf\">[PDF]<\/a><\/li>\n<li><span>Muhammad Anas Imtiaz, David Starobinski, and Ari Trachtenberg, &#8220;Investigating Orphan Transactions in the Bitcoin Network,&#8221; <\/span><i>IEEE Transactions on Network and Service Management (TNSM),<\/i><span>\u00a0Vol. 18, No. 2, pp. 1718-1731, June 2021. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/Orphan_TNSM_Anas_2021.pdf\">[PDF]<\/a><\/li>\n<li><span>Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis, &#8220;Churn in the Bitcoin Network,&#8221; <\/span><i>IEEE Transactions on Network and Service Management (TNSM),<\/i><span>\u00a0Vol. 18, No. 2, pp. 1598-1615, June 2021. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/Churn_extended_final.pdf\">[PDF]<\/a><\/li>\n<li><span>Jonathan Chamberlain and David Starobinski, &#8220;Strategic Revenue Management of Preemptive versus Non-preemptive Queues,&#8221; <\/span><i>Operations Research Letters (ORL),<\/i><span>\u00a0Vol. 49, pp. 184-187, March 2021. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/ORL21_Two_Class_Revenue_and_Welfare.pdf\">[PDF]<\/a><span>.<\/span><\/li>\n<\/ul>\n<p>Refereed Conferences<\/p>\n<ul>\n<li><span>Nata\u0161a Trkulja, David Starobinski, and Randall Berry, &#8220;Denial-of-Service Attacks on C-V2X Networks.&#8221; <\/span><i>AutoSec 2021,<\/i><span> February 2021. <\/span><a href=\"https:\/\/people.bu.edu\/staro\/CV2Xpaper_AutoSec.pdf\">[PDF]<\/a><\/li>\n<\/ul>\n<h2>2020<\/h2>\n<p>Journals<\/p>\n<ul>\n<li><span>Liangxiao Xin, David Starobinski, and Guevara Noubir, &#8220;Cascading Attacks on Wi-Fi Networks: Theory and Experiments,&#8221; <i>IEEE Transactions on Control of Network Systems,<\/i>\u00a0Vol. 7, pp. 1757-1768, Dec. 2020<\/span><span>. <a href=\"http:\/\/people.bu.edu\/staro\/Cascading_DoS.pdf\">[PDF]<\/a><\/span><\/li>\n<li><span>Johannes K. Becker, Stefan Gvozdenovic, Liangxiao Xin, and David Starobinski, &#8220;Testing and Fingerprinting the Physical Layer of Wireless Cards with Software-Defined Radios,&#8221; <i>Computer Communications,<\/i>\u00a0Vol. 160, pp. 186-196, July 2020<\/span><i>.<\/i><a href=\"https:\/\/people.bu.edu\/staro\/COMCOM___Testing___Fingerprinting_the_Physical_Layer.pdf\"><span> [PDF]<\/span><\/a><\/li>\n<li><span>Jonathan Chamberlain and David Starobinski, &#8220;Social Welfare and Price of Anarchy in Preemptive Priority Queues,&#8221; <\/span><i>Operations Research Letters,<\/i><span>\u00a0Vol. 48, pp. 530-533, July 2020.\u00a0<\/span><a href=\"https:\/\/people.bu.edu\/staro\/OR_Letters_Two_Class_Social_Welfare.pdf\">[PDF]<\/a><br \/>\n<span><\/span><\/li>\n<li><span>Zhenpeng Shi, Azer Bestavros, Ariel Orda, and David Starobinski, &#8220;A Game-Theoretic Analysis of Shared\/Buy-in Computing Systems,&#8221;\u00a0<\/span><i>IEEE Open Journal of the Communications Society,<\/i><span>\u00a0Vol. 1, pp. 190-204, 2020. <a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=8970328\">[PDF]<\/a><\/span><\/li>\n<li><span>Jungyeol Kim, Saswati Sarkar, Santosh S. Venkatesh, Megan Smirti Ryerson, David Starobinski, &#8220;An Epidemiological Diffusion Framework for Vehicular Messaging in General Transportation Networks,&#8221;\u00a0<\/span><i>Transportation Research Part B: Methodological,<\/i><span>\u00a0Vol. 131, pp. 160-190, 2020. <a href=\"http:\/\/people.bu.edu\/staro\/TRB_2020.pdf\">[PDF]<\/a><\/span><\/li>\n<\/ul>\n<p>Refereed Conferences<\/p>\n<ul>\n<li>Novak Bo\u0161kov, Ari Trachtenberg, and David Starobinski, &#8220;Birdwatching: False Negatives in Cuckoo Filters,&#8221; in <i>ACM CoNEXT &#8217;20 &#8211; Proceedings of the Student Workshop,<\/i><span>\u00a0<\/span>December 2020. <a href=\"https:\/\/people.bu.edu\/staro\/cuckoo_filter_workshop_paper.pdf\">[PDF]<\/a><\/li>\n<li>Stefan Gvozdenovic, Johannes K. Becker, and David Starobinski, &#8220;SDR-based PHY Characterization of Zigbee Devices,&#8221; in <em>2020 IEEE 63rd International Midwest Symposium on Circuits and Systems<\/em> (<em>MWSCAS &#8217;20<\/em>), Springfield, MA, USA,<span>\u00a0<\/span>August 2020. <a href=\"https:\/\/people.bu.edu\/staro\/MWSCAS_2020.pdf\">[PDF]<\/a><\/li>\n<li><span>Stefan Gvozdenovic, Johannes K. Becker, John Mikulskis, and David Starobinski, &#8220;Truncate after Preamble: PHY-based Starvation Attacks on IoT Networks,&#8221; in\u00a0<em>13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec &#8217;20),<\/em> Linz (Virtual Event), Austria,<\/span><span> 2020. <a href=\"http:\/\/people.bu.edu\/staro\/WiSec_2020_author.pdf\">[PDF]<\/a><\/span><\/li>\n<li><span>Muhammad Anas Imtiaz, David Starobinski, and Ari Trachtenberg, &#8220;Characterizing Orphan Transactions in the Bitcoin Network,&#8221; <\/span>in <em>2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC &#8217;20<\/em>), Toronto (Virtual Conference), Canada, 2020. <strong>(Best paper award)<\/strong> <a href=\"https:\/\/doi.org\/10.1109\/ICBC48266.2020.9169449\">[DOI]<\/a> <a href=\"http:\/\/people.bu.edu\/staro\/ICBC2020.pdf\">[PDF]<\/a><\/li>\n<\/ul>\n<h2>2019<\/h2>\n<ul>\n<li><span>Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis, &#8220;Churn in the Bitcoin Network: Characterization and Impact&#8221;, in\u00a0<\/span><i>5th New England Network and Systems (NENS) Day (NENS \u201919)<\/i><span>, Cambridge, MA, USA, 2019.<\/span><\/li>\n<li>Rabia Yazicigil, Deepak Gopalan, and David Starobinski, &#8220;Security Assessment of Wideband Spectrum Sensors,&#8221; in <i>2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN \u201919)<\/i>, Newark, NJ, USA, 2019. <a href=\"http:\/\/people.bu.edu\/staro\/DySPAN19.pdf\">[PDF]<\/a><\/li>\n<li><span id=\"song2019shingling\">Bowen Song and Ari Trachtenberg, \u201cScalable String Reconciliation by Recursive Content-Dependent Shingling,\u201d in <i>2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)<\/i>, Allerton Park and Retreat Center, Monticello, IL, USA, 2019. Accepted. <\/span><\/li>\n<li><span id=\"tiwari2019alt\">Trishita Tiwari and Ari Trachtenberg, \u201cAlternative (ab)uses for HTTP Alternative Services,\u201d in <i>13th USENIX Workshop on Offensive Technologies (WOOT 19)<\/i>, Santa Clara, CA, 2019. <a href=\"https:\/\/www.usenix.org\/conference\/woot19\/presentation\/tiwari\">[PDF]<\/a><\/span><\/li>\n<li><span id=\"milligan2019fingerprinting\">Julissa Milligan, Sarah Scheffler, Andrew Sellars, Trishita Tiwari, Ari Trachtenberg, and Mayank Varia, \u201cCase Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies,\u201d in <i>9th Workshop in Socio-Technical Aspects in Security (STAST\u201919)<\/i>, 2019. In press. <a href=\"https:\/\/arxiv.org\/abs\/1908.07965v1\">[arXiv]<\/a><\/span><\/li>\n<li>Liangxiao Xin, Johannes K Becker, Stefan Gvozdenovic, and David Starobinski, \u201cBenchmarking the Physical Layer of Wireless Cards using Software-Defined Radios,\u201d in <em>22nd Int\u2019l ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM \u201919)<\/em>, Miami Beach, FL, USA, 2019. <a href=\"http:\/\/people.bu.edu\/staro\/SDR-Benchmark.pdf\">[PDF]<\/a><\/li>\n<li>John Mikulskis, Johannes K Becker, Stefan Gvozdenovic, and David Starobinski, \u201cPoster: Snout \u2013 An Extensible IoT Pen-Testing Tool,\u201d in <em>2019 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201919)<\/em>, London, United Kingdom, 2019. <a href=\"http:\/\/people.bu.edu\/staro\/CCS2019.pdf\">[PDF]<\/a><\/li>\n<li>Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg, and Nabeel Younis, \u201cChurn in the Bitcoin Network: Characterization and Impact,\u201d in <em>2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)<\/em>, 2019, pp. 431\u2013439. <a href=\"https:\/\/dx.doi.org\/10.1109\/BLOC.2019.8751297\">[DOI]<\/a><\/li>\n<li>Trishita Tiwari, Avraham Klausner, Mikhail Andreev, Ari Trachtenberg, and Arkady Yerukhimovich, \u201cLocation Leakage from Network Access Patterns,\u201d in <em>2019 IEEE Conference on Communications and Network Security (CNS)<\/em>, 2019. <a href=\"https:\/\/dx.doi.org\/10.1109\/CNS.2019.8802847\">[DOI]<\/a> <a href=\"https:\/\/arxiv.org\/abs\/1807.02719\">[arXiv]<\/a><\/li>\n<li>Johannes K Becker, David Li, and David Starobinski, \u201cTracking Anonymized Bluetooth Devices,\u201d <em>Proceedings on Privacy Enhancing Technologies (PoPETs)<\/em>, vol. 2019, no. 3, 2019. (to be presented at PETS 2019 Symposium). <a href=\"https:\/\/dx.doi.org\/10.2478\/popets-2019-0036\">[DOI]<\/a> <a href=\"http:\/\/people.bu.edu\/staro\/Tracking_Anonymized_Bluetooth_Devices__PoPETS_Camera_Ready_.pdf\">[PDF]<\/a><\/li>\n<li>Yihao Hu, Ari Trachtenberg, and Prakash Ishwar, \u201cCollaborative Privacy for Web Applications,\u201d\u00a0<span id=\"hu2019collaborative\">in <i>2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)<\/i>, Allerton Park and Retreat Center, Monticello, IL, USA, 2019. Accepted. <\/span> <a href=\"http:\/\/arxiv.org\/abs\/1901.03383\">[arXiv]<\/a><\/li>\n<li>Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, and Anders Fogh, \u201cPage Cache Attacks,\u201d in <em>2019 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919)<\/em>, 2019, vol. abs\/1901.01161. In press. <a href=\"https:\/\/arxiv.org\/abs\/1901.01161\">[arXiv]<\/a>\n<ul>\n<li><em>Related Vulnerability: <a href=\"&quot;https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5489\">CVE-2019-5489<\/a><\/em><\/li>\n<\/ul>\n<\/li>\n<li>Wei Si, David Starobinski, and Moshe Laifenfeld, \u201cA Robust Load Balancing and Routing Protocol for Intra-Car Hybrid Wired\/Wireless Networks,\u201d <em>IEEE Transactions on Mobile Computing<\/em>, vol. 18, no. 2, pp. 250\u2013263, 2019. <a href=\"https:\/\/dx.doi.org\/10.1109\/TMC.2018.2832208\">[DOI]<\/a><\/li>\n<\/ul>\n<h2>2018<\/h2>\n<ul>\n<li><span>Muhammad Anas Imtiaz, Nabeel Younis, David Starobinski, and Ari Trachtenberg, &#8220;Measuring Bitcoin&#8217;s Resilience to Churn&#8221;, in\u00a0<\/span><i>2018\u00a0ACM Internet Measurement Conference (IMC \u201918)<\/i><span>, Boston, MA, USA, 2018.<\/span><\/li>\n<li>Trishita Tiwari, David Starobinski, and Ari Trachtenberg, &#8220;Distributed Web Mining of Ethereum&#8221;. In I. Dinur, S. Dolev, &amp; S. Lodha (Eds.), <em>Cyber Security Cryptography and Machine Learning. CSCML 2018. Lecture Notes in Computer Science<\/em> (pp. 38\u201354). Springer, Cham. <a href=\"https:\/\/doi.org\/10.1007\/978-3-319-94147-9_4\">doi<\/a><\/li>\n<li>Eran Simhon and David Starobinski, &#8220;Equilibrium and Learning in Queues with Advance Reservations&#8221;. <a href=\"http:\/\/arxiv.org\/abs\/1806.08016\">arxiv<\/a><\/li>\n<li>Nabeel Younis, Muhammad Anas Imtiaz, David Starobinski, and Ari Trachtenberg, &#8220;Improving Bitcoin\u2019s Resilience to Churn&#8221;. <a href=\"http:\/\/arxiv.org\/abs\/1803.06559\">arxiv<\/a><\/li>\n<li><span>Christopher Liao, Yonatan Klausner, David Starobinski, Eran Simhon, and Azer Bestavros, &#8220;A Case Study of a Shared\/Buy-In Computing Ecosystem,&#8221; <i>Cluster Computing (Springer),<\/i> Vol. 21, No. 3, pp. 1595-1606, September 2018. <a href=\"http:\/\/people.bu.edu\/staro\/CC-Liao-2018.pdf\">pdf<\/a><\/span><\/li>\n<li>Eran Simhon and David Starobinski, &#8220;On the Impact of Information Disclosures on Advance Reservations: A Game-Theoretic View,&#8221; <i>European Journal of Operations Research (EJOR),<\/i> Vol. 267, No. 3, pp. 1075-1088, June 2018. <a href=\"http:\/\/people.bu.edu\/staro\/Fully_obs_Simhon_18.pdf\">pdf<\/a><\/li>\n<li>Liangxiao Xin and David Starobinski, &#8220;Mitigation of Cascading Denial of Service Attacks on Wi-Fi Networks,&#8221; <em>IEEE CNS 2018<\/em>, Beijing, China, June 2018<\/li>\n<\/ul>\n<h2>2017<\/h2>\n<ul>\n<li>Eran Simhon and David Starobinski, &#8220;Advance Reservation Games,&#8221;<span>\u00a0<\/span><i>ACM Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS),<\/i><span>\u00a0<\/span>Vol. 2, No. 2, May 2017.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/ACM_ToMPECS_AR.pdf\">pdf<\/a><\/li>\n<li>Niloofar Fazlollahi and David Starobinski, &#8220;Distance Vector-based Advance Reservation with Delay Performance Guarantees,&#8221;<span>\u00a0<\/span><i>Theory of Computing Systems (Springer),<\/i><span>\u00a0<\/span>Vol. 60, No. 2, pp. 194-221, February 2017.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/DAR-TOCS-final.pdf\">pdf<\/a><\/li>\n<li><span>Eran Simhon, Christopher Liao, and David Starobinski, &#8220;Smart Parking Pricing: A Machine Learning Approach,&#8221;\u00a0<\/span><i>IEEE Smart Data Pricing Workshop (SDP 2017),<\/i><span>\u00a0Atlanta, GA, May 2017.\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/SDP2017.pdf\">pdf<\/a><\/li>\n<li>Khai Phan, Ryan Ewing, David Starobinski, and Liangxiao Xin, &#8220;Brief Announcement: Passive and Active Attacks on Audience Response Systems using Software Defined Radios,&#8221; 19th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2017), Boston, MA, November 2017. <a href=\"http:\/\/people.bu.edu\/staro\/SSS2017_Brief_v0.pdf\">pdf<\/a><\/li>\n<\/ul>\n<h2>2016<\/h2>\n<ul>\n<li>Aylin Turhan, Murat Alanyali, Emir Kavurmacioglu, and David Starobinski, &#8220;Dynamic Pricing of Preemptive Service for Secondary Demand,&#8221;<span>\u00a0<\/span><i>IEEE Transactions on Cognitive Communications and Networking,<\/i><span>\u00a0<\/span>Vol. 2, No. 2, pp. 208-222, June 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/TCCN-final.pdf\">pdf<\/a><\/li>\n<li>Wei Si, David Starobinski, Morteza Hashemi, Moshe Laifenfeld, and Ari Trachtenberg, &#8220;Channel Sensitivity of LIFO-Backpressure: Quirks and Improvements,&#8221;<span>\u00a0<\/span><i>IEEE Transactions on Control of Network Systems,<\/i><span>\u00a0<\/span>Vol. 3, No. 2, pp. 192-205, June 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/TCNS_Wei_2015.pdf\">pdf<\/a><\/li>\n<li>Eran Simhon and David Starobinski, &#8220;A Game-Theoretic Perspective on Advance Reservations,&#8221;<span>\u00a0<\/span><i>IEEE Network,<\/i><span>\u00a0<\/span>Vol. 30, No. 2, pp. 6-11, March-April 2016 (Special issue on Smart Data Pricing).<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/NetworkMag16-Eran.pdf\">pdf<\/a><\/li>\n<li>Emir Kavurmacioglu, Murat Alanyali, and David Starobinski, &#8220;Competition in Private Commons: Price War or Market Sharing?,&#8221;<span>\u00a0<\/span><i>IEEE\/ACM Transactions on Networking,<\/i><span>\u00a0<\/span>Vol. 24, No. 1, pp. 29-42, February 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/ToN-Emir.pdf\">pdf<\/a><\/li>\n<li><span>Hashemi, Morteza, Yuval Cassuto, and Ari Trachtenberg. &#8220;Fountain codes with nonuniform selection distributions through feedback.&#8221;\u00a0<\/span><i>IEEE Transactions on Information Theory<\/i><span>\u00a062, no. 7 (2016): 4054-4070.<\/span><\/li>\n<li>Eran Simhon, Yezekael Hayel, David Starobinski, and Quanyan Zhu, &#8220;Optimal Information Disclosure Policies in Strategic Queueing Games,&#8221;<span>\u00a0<\/span><i>Operations Research Letters,<\/i><span>\u00a0<\/span>Vol. 44, No. 1, pp. 109-113, January 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/ORL_Simhon.pdf\">pdf<\/a><\/li>\n<li>Khai Phan, David Starobinski, and Liangxiao Xin, &#8220;Security Assessment of Audience Response Systems using Software Defined Radios,&#8221;<span>\u00a0<\/span><i>IEEE MIT Undergraduate Research Technology Conference 2016,<\/i><span>\u00a0<\/span>Cambridge, MA, November 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/MIT_Conference_Khai.pdf\">pdf<\/a><\/li>\n<li>Yonatan Klausner, Christopher Liao, David Starobinski, Eran Simhon, and Azer Bestavros, &#8220;Workload Characterization of the Shared\/Buy-in Computing Cluster at Boston University,&#8221;<span>\u00a0<\/span><i>IEEE MIT Undergraduate Research Technology Conference 2016,<\/i><span>\u00a0<\/span>Cambridge, MA, November 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/MIT_Conference_Yoni.pdf\">pdf<\/a><\/li>\n<li>Liangxiao Xin, David Starobinski, and Guevara Noubir, &#8220;Cascading DoS Attacks on Wi-Fi Networks,&#8221;<span>\u00a0<\/span><i>IEEE CNS 2016,<\/i><span>\u00a0<\/span>Philadelphia, PA, October 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/CNS_2016.pdf\">pdf<\/a><span>\u00a0<\/span>(Best paper award)<\/li>\n<li>Wei Si, David Starobinski, and Moshe Laifenfeld, &#8220;Protocol-Compliant DoS Attacks on CAN: Demonstration and Mitigation,&#8221;<span>\u00a0<\/span><i>IEEE VTC 2016-Fall,<\/i><span>\u00a0<\/span>Montreal, Canada, September 2016.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/VTC_2016.pdf\">pdf<\/a><\/li>\n<li><span>Yerukhimovich, Arkady, Rebecca Balebako, Anne Boustead, Robert K. Cunningham, William Welser IV, Richard Housley, Richard Shay et al. &#8220;Can Smartphones and Privacy Coexist?.&#8221; (2016). <a href=\"https:\/\/pdfs.semanticscholar.org\/a4d7\/7a5f84eb7d77344d43554902f4fb4d2637f3.pdf\">pdf<\/a><\/span><\/li>\n<li><span class=\"author\">A. Trachtenberg.\u00a0<\/span><span class=\"title\">Extra Time on an Exam: Suitable Accommodation or Legal Cheating?<\/span><span>\u00a0<\/span><span class=\"journal\">Chronicle of Higher Education<\/span><span>\u00a0<\/span><span class=\"date\">2016.<\/span><span>\u00a0<a href=\"http:\/\/www.chronicle.com\/article\/Extra-Time-on-an-Exam-\/237787\">pdf<\/a><\/span><\/li>\n<li><span>Spensky, Chad, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley, and Robert K. Cunningham. &#8220;SoK: Privacy on Mobile Devices\u2013It\u2019s Complicated.&#8221;\u00a0<\/span><i>Proceedings on Privacy Enhancing Technologies<\/i><span>\u00a02016, no. 3 (2016): 96-116. <a href=\"https:\/\/www.degruyter.com\/view\/j\/popets.2016.2016.issue-3\/popets-2016-0018\/popets-2016-0018.xml\">pdf<\/a><\/span><\/li>\n<\/ul>\n<h2>2015<\/h2>\n<ul>\n<li>E. Kavurmacioglu and D. Starobinski, \u201cNetwork Dimensioning with Carrier Aggregation\u201d,\u00a0<i>IEEE DySPAN 2015,<\/i><span>\u00a0<\/span>Stockholm, Sweden, September 2015.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/DySPAN15.pdf\">pdf<\/a><\/li>\n<li>E. Simhon and D. Starobinski, \u201cOn the Impact of Sharing Information in Advance Reservation Systems\u201d,\u00a0<i>ACM SIGMETRICS NetEcon 2015 Workshop,<\/i><span>\u00a0<\/span>Portland, OR, June 2015.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/Netecon15.pdf\">pdf<\/a><\/li>\n<li>M Timchenko, A Trachtenberg,\u201dDistributed anonymous data collection and feedback\u201d,\u00a0Proceedings of the 8th ACM International Systems and Storage\u00a0Conference.\u00a0pdf<\/li>\n<li>E. Simhon, C. Cramer, Z. Lister, and D. Starobinski, \u201cPricing in Dynamic Advance Reservation Games\u201d,\u00a0<i>IEEE Smart Data Pricing Workshop (SDP 2015),<\/i><span>\u00a0<\/span>Hong Kong, China, April 2015.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/SDP2015.pdf\">pdf<\/a><\/li>\n<li>M. Timchenko and D. Starobinski, \u201cA Simple Laboratory Environment for Real-World Offensive Security Education\u201d,\u00a0<i>ACM SIGCSE 2015,<\/i><span>\u00a0<\/span>Kansas City, MO, March 2015.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/SIGCSE15.pdf\">pdf<\/a><\/li>\n<li>Y. Hayel, E. Simhon, D. Starobinski, and Q. Zhu, \u201cDistributed Strategic Mode Selection for Large-Scale D2D Communications Based on Queue State Information\u201d,\u00a0<i>CISS 2015,<\/i><span>\u00a0<\/span>Baltimore, MD, March 2015.<span>\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/CISS2015.pdf\">pdf<\/a><\/li>\n<li>W. Si, D. Starobinski, M. Hashemi, M. Laifenfeld, and A. Trachtenberg, \u201cChannel Sensitivity of LIFO-Backpressure: Quirks and Improvements\u201d,\u00a0<i>IEEE Transactions on Control of Network Systems,<\/i><span>\u00a0<\/span>to appear.<a href=\"http:\/\/people.bu.edu\/staro\/TCNS_Wei_2015.pdf\"><span>\u00a0<\/span>pdf<\/a><\/li>\n<li>W. Si, M. Hashemi, L. Xin, D. Starobinski, and A. Trachtenberg, \u201cTeaCP: A Toolkit for Evaluation and Analysis of Collection Protocols in Wireless Sensor Networks\u201d,\u00a0<i>IEEE Transactions on Network and Service Management,<\/i><span>\u00a0<\/span>Vol. 12, No. 2, pp. 293-307, June 2015.<a href=\"http:\/\/people.bu.edu\/staro\/TNSM_20150224.pdf\"><span>\u00a0<\/span>pdf<\/a><\/li>\n<li>E. Kavurmacioglu, M. Alanyali, and D. Starobinski, \u201cCompetition in Private Commons: Price War or Market Sharing?\u201d,\u00a0<i>IEEE\/ACM Transactions on Networking,<\/i>\u00a0to appear.<\/li>\n<\/ul>\n<h2>2014<\/h2>\n<ul>\n<li>M. Hashemi, W. Si, M. Laifenfeld, D. Starobinski, and A. Trachtenberg, \u201cIntra-Car Multi-hop Wireless Sensor Networking: A Case Study\u201d,\u00a0<i>IEEE Communications Magazine (Automotive Networking Series),<\/i><span>\u00a0<\/span>Vol. 52, No. 12, pp. 183-191, December 2014.<a href=\"http:\/\/people.bu.edu\/staro\/COMSOC-2014.pdf\"><span>\u00a0<\/span>pdf<\/a><\/li>\n<li><span>E. Simhon, and D. Starobinski. \u201cAdvance Reservation Games and the Price of Conservatism.\u201d\u00a0<\/span><i>ACM SIGMETRICS Performance Evaluation Review\u00a0<\/i><span>42.3 (2014): 33-33.<\/span><\/li>\n<li>E. Simhon and D. Starobinski, Game-theoretic\u00a0analysis of advance reservation services, in\u00a0Information Sciences and Systems (CISS), 2014 48th\u00a0Annual Conference on. IEEE, 2014.<span>\u00a0<\/span>pdf<\/li>\n<li>C. Orakcal and D. Starobinski, \u201cJamming-Resistant Rate Adaptation in Wi-Fi Networks,\u201d\u00a0<i>Performance Evaluation,<\/i>\u00a0Vols. 75-76, pp. 50-68, 2014.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/PEVA-Cankut.pdf\">pdf<\/a><\/li>\n<li>Y. Gilad, A. Herzberg, and A. Trachtenberg, Securing Smartphones: A Micro-TCB Approach\u00a0IEEE Pervasive Computing Magazine\u00a02014\u00a0\u00a0to appear.<span>\u00a0<\/span><a href=\"http:\/\/ipsit.bu.edu\/documents\/Allerton2013web.pdf\">pdf<\/a><\/li>\n<li><span class=\"author\">A. Trachtenberg,\u00a0<\/span><span class=\"title\">S\u201day it ain\u2019t so \u2013 An implementation of deniable encryption\u201d,<\/span><span>\u00a0<\/span><span class=\"journal\">Blackhat Asia<\/span><span>\u00a0<\/span><span class=\"date\">2014<\/span>\u00a0<a href=\"https:\/\/www.blackhat.com\/docs\/asia-14\/materials\/Trachtenberg\/WP-Asia-14-Trachtenberg-Say-It-Ain%27t-So-An-Implementation-Of-Deniable-Encryption.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li><span class=\"author\">M. Hashemi and A. Trachtenberg, \u201c<\/span><span class=\"title\">Near Real-time Rateless Coding with a Constrained Feedback Budget\u201d,\u00a0<\/span><span>\u00a0<\/span><span class=\"journal\">Allerton,<\/span><span>\u00a0<\/span><span class=\"date\">2014<\/span>\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/RLT_web.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>2013<\/h2>\n<ul>\n<li>\u00a0A. Klausner, A. Trachtenberg, D. Starobinski, and M. Horenstein,An Overview of the Capabilities and Limitations of Smartphone Sensors, \u00a0<i>International Journal of Handheld Computing Research<\/i>, Vol. 4, No. 2, pp. 69-80, June 2013. (pdf version available upon request).<\/li>\n<li>M. Hashemi, A. Trachtenberg, Y. Cassuto, Delete-And-Conquer: Rateless Coding with Constrained Feedback\u00a0Allerton\u00a0October 2013<span>\u00a0<\/span><a href=\"http:\/\/ipsit.bu.edu\/documents\/Allerton2013web.pdf\">pdf<\/a><\/li>\n<li>W. Si, M. Hashemi, I. Warsawski, M. Laifenfeld, D. Starobinski, and A. Trachtenberg, \u201cTeaCP: a Toolkit for Evaluation and Analysis of Collection Protocols in Wireless Sensor Networks\u201d IEEE COMCAS\u00a0October 2013\u00a0to appear<\/li>\n<li>A. Kontorovich,.A. Trachtenberg, Deciding unique decodability of bigram counts via finite automata\u00a0Journal of Computer and System Sciences\u00a0September\u00a02013<span>\u00a0<\/span><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0022000013001670\">pdf<\/a><\/li>\n<li>E. Kavurmacioglu, M. Alanyali, and D. Starobinski, \u201cDemand-Insensitive Price Relationships in Private Commons,\u201d ACM SIGMETRICS W-PIN+NetEcon 2013 Workshop, Pittsburgh, PA, 2013\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/Netecon13.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>M. Hashemi, W. Si, M. Laifenfeld, D. Starobinski, and A. Trachtenberg, \u201cIntra-car Wireless Sensors Data Collection: A Multi-hop approach,\u201d IEEE VTC 2013-Spring, Dresden, Germany, 2013\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/VTC13.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<\/ul>\n<h2><\/h2>\n<h2>2012<\/h2>\n<ul>\n<li>A. Kontorovich and A. Trachtenberg \u201cEfficiently decoding strings from their shingles\u201d Arxiv preprint arXiv:1204.3293 2012:\u00a0pdf<\/li>\n<li>A. Kontorovich and A. Trachtenberg \u201cString reconciliation with unknown edit distance\u201d IEEE ISIT, 2012:\u00a0pdf<\/li>\n<li>K. Lin, D. Starobinski, A. Trachtenberg and S. Agarwal \u201cScheduling Algorithms and Bounds for Rateless Data Dissemination in Dense Wireless Networks\u201d CISS, 2012:\u00a0pdf<\/li>\n<li>A. Kontorovich and A. Trachtenberg \u201cUnique decodability for string reconciliation\u201d ITA, 2012.<\/li>\n<li>Murat Alanyali, Ashraf Al Daoud, and David Starobinski, \u201cEconomic Viability of Private Commons: Framework and Guidelines for Profitability,\u201d\u00a0Telecommunications Policy (Elsevier), to appear:\u00a0pdf<\/li>\n<li>Avi Klausner, Ari Trachtenberg, David Starobinski, and Mark Horenstein \u201cAn Overview of the Capabilities and Limitations of Smartphone Sensors,\u201d\u00a0International Journal of Handheld Computing Research, to appear. (pdf version available upon request)<\/li>\n<li><span>Emir Kavurmacioglu, Murat Alanyali, and David Starobinski, \u201cCompetition in Secondary Spectrum Markets: Price War or Market Sharing?\u201d,\u00a0<\/span><i>IEEE DySPAN 2012,<\/i><span>\u00a0Bellevue, WA, October 2012.\u00a0<\/span><a href=\"http:\/\/people.bu.edu\/staro\/DySPAN12.pdf\">pdf<\/a><\/li>\n<li>Huseyin Mutlu, Murat Alanyali, David Starobinski, and Aylin Turhan, \u201cOnline Pricing of Secondary Spectrum Access with Unknown Demand Function,\u201d\u00a0IEEE JSAC, Vol. 30, No. 11, pp. 2285-2294, 2012 (Special issue on Economics of Communication Networks and Systems):\u00a0pdf<\/li>\n<li>Weiyao Xiao, Sachin Agarwal, David Starobinski, and Ari Trachtenberg, \u201cReliable Rateless Wireless Broadcasting with Near-Zero Feedback,\u201d\u00a0IEEE\/ACM Transactions on Networking, Vol. 20, No. 6, pp. 1924-1937, 2012:\u00a0pdf<\/li>\n<li>Aylin Turhan, Murat Alanyali, and David Starobinski, \u201cOptimal Admission Control in Two-class Preemptive Loss Systems,\u201d\u00a0Operations Research Letters, Vol. 40, No. 6, pp. 510-515,r 2012:\u00a0pdf<\/li>\n<li>Niloofar Fazlollahi, David Starobinski, and Ari Trachtenberg, \u201cConnected Identifying Codes,\u201d\u00a0IEEE Transactions on Information Theory, Vol. 58, No.7, pp. 4814-4824, 2012:\u00a0pdf<\/li>\n<li>Ashish Agarwal, David Starobinski, and Thomas Little, \u201cPhase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks,\u201d \u00a0IEEE Transactions on Intelligent Transportation Systems, Vol. 13, No. 1, pp. 249-263, 2012:\u00a0pdf<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><a name=\"2011\"><\/a>2011<\/h2>\n<ul>\n<li>A. Klausner, A. Trachtenberg and D. Starobinski Phones and robots: brains and brawn ACM SenSys pp. 361-362 Seattle, WA November 1-4 2011:\u00a0pdf<\/li>\n<li>M. Alanyali, A. Al Daoud, and David Starobinski, \u201cEconomic Viability of Private Commons: Framework and Guidelines for Profitability,\u201d\u00a0<i>Telecommunications Policy (Elsevier)<\/i>, Vol. 37, No. 2-3, pp. 231-240, March\/April 2013 (Special issue on selected papers from IEEE DySPAN 2011).\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/TP-2012.pdf\">pdf<\/a><\/li>\n<li>A. Kontorovich and A. Trachtenberg Unique decodability of bigram counts by finite automata Arxiv preprint arXiv:1111.6431 2011:\u00a0pdf<\/li>\n<li>A. Al Daoud, M. Alanyali, and D. Starobinski, \u201cOn Equilibrium Analysis of Acyclic Multiclass Loss Networks under Admission Control,\u201d\u00a0Operations Research Letters, Vol. 39, No. 6, pp. 406-410, 2011:\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/OR_final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>R. Cohen, N. Fazlollahi, and D. Starobinski, \u201cThroughput-Competitive Advance Reservation with Bounded Path Dispersion,\u201d\u00a0IEEE\/ACM Transactions on Networking, Vol. 19, No. 5, pp. 1265-1275, 2011:\u00a0pdf<\/li>\n<li>A. Aziz, D Starobinski, and P. Thiran, \u201cUnderstanding and Tackling the Root Causes of Instability in Wireless Mesh Networks,\u201d\u00a0IEEE\/ACM Transactions on Networking, Vol. 19, No. 4, pp. 1178-1193, 2011:\u00a0pdf<\/li>\n<li>A. Daoud, M. Alanyali, and D. Starobinski, \u201cReservation Policies for Revenue Maximization from Secondary Spectrum Access in Wireless Cellular Networks,\u201d\u00a0Elsevier Journal of Computer Networks, Vol. 55, No. 1, pp. 214-224, 2011 (fast-tracked from WiOpt 2010).:\u00a0pdf<\/li>\n<li>M. Boyle, A. Klausner, D. Starobinski, A. Trachtenberg and H. Wu, \u201cGait-based User Classification Using Phone Sensors\u201d\u00a0MOBISYS 2011: extended report in\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/mobisys11.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>N. Fazlollahi, D. Starobinski, and A. Trachtenberg, \u201cConnected Identifying Codes and Fundamental Bounds\u201d\u00a0ITA 2011:\u00a0<a href=\"http:\/\/ita.ucsd.edu\/workshop\/11\/files\/paper\/paper_257.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>N. Fazlollahi, D. Starobinski, and A. Trachtenberg, \u201cConnected Identifying Codes for Sensor Network Monitoring\u201d\u00a0IEEE WCNC 2011:\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/wcnc11.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Ashraf Al Daoud, Murat Alanyali, and David Starobinski, \u201cOn Equilibrium Analysis of Acyclic Multiclass Loss Networks under Admission Control,\u201d\u00a0Operations Research Letters, to appear.<\/li>\n<li>Reuven Cohen, Niloofar Fazlollahi, and David Starobinski, \u201cThroughput-Competitive Advance Reservation with Bounded Path Dispersion,\u201d\u00a0IEEE\/ACM Transactions on Networking, to appear.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/compet_final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Adel Aziz, David Starobinski, and Patrick Thiran, \u201cUnderstanding and Tackling the Root Causes of Instability in Wireless Mesh Networks,\u201d\u00a0IEEE\/ACM Transactions on Networking, to appear.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/aaziz-ToN_final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li><\/li>\n<\/ul>\n<h2><a name=\"2010\"><\/a>2010<\/h2>\n<ul>\n<li>Ashraf Al Daoud, Murat Alanyali, and David Starobinski, \u201cReservation Policies for Revenue Maximization from Secondary Spectrum Access in Wireless Cellular Networks,\u201d\u00a0<em>WiOpt 2010<\/em>, Avignon, France, June 2010.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/WiOpt_final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Niloofar Fazlollahi and David Starobinski, \u201cDistributed Advance Network Reservation with Delay Guarantees\u201d\u00a0<em>IEEE IPDPS 2010<\/em>, Atlanta, GA, April 2010.<a href=\"http:\/\/people.bu.edu\/staro\/IPDPS-2010.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Weiyao Xiao, Sachin Agarwal, David Starobinski, and Ari Trachtenberg, \u201cReliable Wireless Broadcasting with Near-Zero Feedback,\u201d\u00a0<em>IEEE INFOCOM 2010<\/em>, San Diego, CA, March 2010.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/Infocom_QE_Final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Huseyin Mutlu, Murat Alanyali, and David Starobinski, \u201cOn-line Pricing of Secondary Spectrum Access with Unknown Demand Function and Call Length Distribution,\u201d\u00a0<em>IEEE INFOCOM 2010<\/em>, San Diego, CA, March 2010.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/Infocom10_CameraReady_HM.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Weiyao Xiao and David Starobinski, \u201cExtreme Value FEC for Reliable Broadcasting in Wireless Networks\u201d\u00a0<em>IEEE JSAC<\/em>\u00a0(Special Issue on Simple Wireless Sensor networking Solutions), in press.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/JSAC_EVT_Final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>David Starobinski and Weiyao Xiao, \u201cAsymptotically Optimal Data Dissemination in Multi-Channel Wireless Sensor Networks: Single Radios Suffice\u201d\u00a0<em>IEEE\/ACM Transactions on Networking<\/em>, in press.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/ToN-Weiyao-Final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Ashraf Al Daoud, Murat Alanyali, and David Starobinski, \u201cPricing Strategies for Spectrum Lease in Secondary Markets\u201d\u00a0<em>IEEE\/ACM Transactions on Networking<\/em>, in press.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/Pricing_Final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><a name=\"2009\"><\/a>2009<\/h2>\n<ul>\n<li>Adel Aziz, David Starobinski, Patrick Thiran, and Alaeddine El Fawal \u201cEZ-Flow: Removing Turbulence in IEEE 802.11 Wireless Mesh Networks without Message Passing\u201d\u00a0<em>ACM CoNEXT 2009<\/em>, Rome, Italy, December 2009.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/conext20-aziz_final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Adel Aziz, David Starobinski, and Patrick Thiran, \u201cElucidating the Instability of Random Access Wireless Mesh Networks\u201d\u00a0<em>IEEE SECON 2009<\/em>, Rome, Italy, June 2009.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/SECON09_AST.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Huseyin Mutlu, Murat Alanyali, and David Starobinski, \u201cSpot Pricing of Secondary Spectrum Access in Wireless Cellular Networks\u201d\u00a0<em>IEEE\/ACM Transactions on Networking<\/em>, Vol. 17, No. 6, pp. 1794-1804, December 2009.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/mutlu_journal_camera.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Reuven Cohen, Niloofar Fazlollahi, and David Starobinski, \u201cPath Switching and Grading Algorithms for Advanced Channel Reservation Architectures\u201d\u00a0<em>IEEE\/ACM Transactions on Networking<\/em>, Vol. 17, No. 5, pp. 1684-1695, October 2009.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/TON_GCR_Final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Ivana Stojanovic, Zeyu Wu, Masoud Sharif, and David Starobinski, \u201cData Dissemination in Wireless Broadcast Channels: Network Coding versus Cooperation\u201d\u00a0<em>IEEE Transactions on Wireless Communications, to appear<\/em>.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/IEEE_WTran08_Stojanovic_Wu_Sharif_Starobinski_rev4.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Andrew Hagedorn, Sachin Agarwal, David Starobinski, and Ari Trachtenberg, \u201cRateless Coding with Feedback\u201d\u00a0<em>IEEE INFOCOM 2009<\/em>, Rio de Janeiro, Brazil, April 2009.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/infocom2009-feedback.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Weiyao Xiao and David Starobinski, \u201cExtreme Value FEC for Wireless Data Broadcasting\u201d\u00a0<em>IEEE INFOCOM 2009<\/em>, Rio de Janeiro, Brazil, April 2009. [http:\/\/people.bu.edu\/staro\/Infocom-FEC-2009.pdf][pdf]]<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><a name=\"2008\"><\/a>2008<\/h2>\n<ul>\n<li>Moshe Laifenfeld, Ari Trachtenberg, Reuven Cohen and David Starobinski, \u201cJoint Monitoring and Routing in Wireless Sensor Networks Using Robust Identifying Codes\u201d\u00a0<em>Mobile Networks and Applications<\/em>, October 2008.\u00a0<a href=\"http:\/\/www.springerlink.com\/content\/8386234004837647\" target=\"_top\" rel=\"noopener noreferrer\">Springer\u2019s web<\/a><\/li>\n<li>Moshe Laifenfeld, Ari Trachtenberg, Reuven Cohen and David Starobinski, \u201cIdentifying Codes and Covering Problems\u201d\u00a0<em>IEEE Trans. Inf. Theory<\/em>, September 2008.\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/IT08.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Andrew Hagedorn, David Starobinski, and Ari Trachtenberg, \u201cRateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes\u201d\u00a0<em>ACM\/IEEE<\/em><\/li>\n<li><em>IPSN 2008<\/em>, Saint Louis, MO, April 2008.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/rateless_deluge.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>\u00a0Downloadable code<\/li>\n<li>Huseyin Mutlu, Murat Alanyali, and David Starobinski, \u201cSpot Pricing of Secondary Spectrum Usage in Wireless Cellular Networks\u201d\u00a0<em>IEEE INFOCOM 2008<\/em>, Phoenix, AZ, April 2008.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/hsn-camera.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Reuven Cohen, Niloofar Fazlollahi, and David Starobinski, \u201cCompetitive Advance Reservation with Bounded Path Dispersion\u201d\u00a0<em>IEEE INFOCOM High-Speed Networking Workshop 2008 (HSN 2008)<\/em>, Phoenix, AZ, April 2008.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/info08.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Ari Trachtenberg, \u201cClosed-form expression for the parameters of binary lexicodes\u201d, ITA 2008:\u00a0<a href=\"http:\/\/ita.ucsd.edu\/workshop\/08\/files\/open_problems\/Trachtenberg.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Sachin Agarwal, Andrew Hagedorn, and Ari Trachtenberg, \u201cAdaptive rateless coding under partial information\u201d, ITA 2008:\u00a0<a href=\"http:\/\/ita.ucsd.edu\/workshop\/08\/files\/paper\/paper_257.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li><\/li>\n<\/ul>\n<h2><a name=\"2007\"><\/a>2007<\/h2>\n<ul>\n<li>Tao Wu and David Starobinski, \u201cA Comparative Analysis of Server Selection in Content Replication Networks,\u201d\u00a0<em>IEEE\/ACM Transactions on Networking<\/em>, to appear.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/TNET-00381-2006R1.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Sachin Agarwal, Andrew Hagedorn, and Ari Trachtenberg, \u201cNear optimal update-broadcast of data sets,\u201d DISN 2007:\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/disn_web.ps\" target=\"_top\" rel=\"noopener noreferrer\">ps<\/a>\u00a0or\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/disn_web.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>.<\/li>\n<li>Moshe Laifenfeld, Ari Trachtenberg, Reuven Cohen, and David Starobinski, \u201cJoint Monitoring and Routing in Wireless Sensor Networks using Robust Identifying Codes,\u201d\u00a0<em>IEEE BROADNETS 2007<\/em>, Raleigh, NC, September 2007.<\/li>\n<li>Ashraf Al Daoud, Murat Alanyali, and David Starobinski, \u201cPricing Spectrum Access in Cellular CDMA Networks with Heterogeneous Demand,\u201d\u00a0<em>IEEE BROADNETS 2007<\/em>, Raleigh, NC, September 2007 (invited paper).<\/li>\n<li>Angad Singh and David Starobinski, \u201cA Semi Markov-based Analysis of Rate Adaptation Algorithms in Wireless LANs,\u201d\u00a0<em>IEEE SECON 2007<\/em>, San Diego, CA, June 2007.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/SeconPaper.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>David Starobinski, Weiyao Xiao, Xiangping Qin, and Ari Trachtenberg \u201cNear-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks,\u201d\u00a0<em>IEEE INFOCOM 2007<\/em>, Anchorage, May 2007.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/camera-info07.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Ashraf Al Daoud, Murat Alanyali, and David Starobinski, \u201cSecondary Pricing of Spectrum in Cellular CDMA Networks,\u201d\u00a0<em>IEEE DySPAN 2007<\/em>, Dublin, Ireland, April 2007.<\/li>\n<li>Ivana Stojanovic, Masoud Sharif, and David Starobinski, \u201cData Dissemination in Wireless Broadcast Channels: Network Coding or Cooperation?,\u201d\u00a0<em>CISS 2007<\/em>, Johns Hopkins University, March 2007.<\/li>\n<li>Saikat Ray and David Starobinski, \u201cOn False Blocking in RTS\/CTS-based Multi-hop Wireless Networks,\u201d\u00a0<em>IEEE Transactions on Vehicular Technology<\/em>, Vol. 56, No. 2, pp. 849-862, March 2007.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/Blocking_TVT.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Ioannis Paschalidis, Wei Lai, and David Starobinski, \u201cAsymptotically Optimal Transmission Policies for Large-Scale Low-Power Wireless Sensor Networks,\u201d\u00a0<em>IEEE\/ACM Transactions on Networking<\/em>, Vol. 15, No. 1, pp. 105-118, February 2007.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/snets-opt-journal-rev.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<\/ul>\n<h2><a name=\"2006\"><\/a>2006<\/h2>\n<ul>\n<li>S. Agarwal, V. Chauhan, and A. Trachtenberg, \u201cBandwidth Efficient String Reconciliation using Puzzles,\u201d\u00a0<em>IEEE Transactions on Parallel and Distributed Systems<\/em>, November 2006:\u00a0ps\u00a0(2.7M) or\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/puzzles_journal.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>\u00a0(279K).<\/li>\n<li>Andrew Hagedorn, David Starobinski, and Ari Trachtenberg \u201cPoster Abstract: Rateless Codes for Data Dissemination in Sensor Networks,\u201d\u00a0<em>Proc. ACM SenSys 2006 (Poster Session)<\/em>, Boulder, Colorado, November 2006.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/pp02-hagedorn.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Tao Wu and David Starobinski, \u201cOn the Price of Anarchy in Unbounded Delay Networks,\u201d\u00a0<em>First Workshop on Game Theory for Networks (GameNets 2006)<\/em>, Pisa, Italy, October 2006.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/GN06_FINAL.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>M. Laifenfeld, A. Trachtenberg, and T.Y. Berger-Wolf, \u201cIdentifying codes and the set cover problem\u201d,\u00a0<em>44th Annual Allerton Conf. on Comm., Ctrl., and Comput.<\/em>, October 2006, in\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/Allerton_web.ps\" target=\"_top\" rel=\"noopener noreferrer\">ps<\/a>\u00a0or\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/Allerton_web.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>.<\/li>\n<li>Reuven Cohen, Niloofar Fazlollahi, and David Starobinski, \u201cGraded Channel Reservation with Path Switching in Ultra High Capacity Networks,\u201d\u00a0<em>Third International Workshop on Networks for Grid Applications (GridNets 2006)<\/em>, San Jose, CA, October 2006.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/gridnets2.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>S. Agarwal, M. Laifenfeld, A. Trachtenberg, and M. Alanyali, \u201cFast data access over asymmetric channels using fair and secure bandwidth sharing,\u201d\u00a0<em>ICDCS 2006<\/em>:\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/persist-web.ps\" target=\"_top\" rel=\"noopener noreferrer\">ps<\/a>\u00a0(3M) or\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/persist-web.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>.<\/li>\n<li>Venkatesh Saligrama and David Starobinski, \u201cOn the Macroscopic Effects of Local Interactions in Multi-Hop Wireless Networks,\u201d\u00a0<em>WiOpt 2006<\/em>, Boston, MA, April 2006.<a href=\"http:\/\/people.bu.edu\/staro\/wi-opt-final.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>S. Agarwal and A. Trachtenberg, \u201cApproximating the number of differences between remote sets,\u201d\u00a0<em>IEEE Information Theory Workshop<\/em>, Punta del Este, Uruguay, March 2006. : in\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/wrap-web.ps\" target=\"_top\" rel=\"noopener noreferrer\">ps<\/a>\u00a0(190K) or\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/wrap-web.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>\u00a0(147K).<\/li>\n<li>Francesco De Pellegrini, David Starobinski, Mark Karpovsky, and Lev Levitin, \u201cScalable, Distributed Cycle-Breaking Algorithms for Gigabit Ethernet Backbones,\u201d\u00a0<em>OSA Journal of Optical Networking (Special Feature on Optical Ethernet)<\/em>, Vol. 5, No. 2, pp. 122-144, February 2006.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/cycle-breaking-rev.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Rajesh Krishnan and David Starobinski, \u201cEfficient Clustering Algorithms for Self-Organizing Wireless Sensor Networks,\u201d\u00a0<em>Journal of Ad-Hoc Networks<\/em>, Vol. 4, No. 1, pp. 36-59, January 2006.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/self-org-krishnan.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<\/ul>\n<h2><a name=\"2005\"><\/a>2005<\/h2>\n<ul>\n<li>Saikat Ray, Jeffrey Carruthers, and David Starobinski, \u201cEvaluation of the Masked Node Problem in Ad-Hoc Wireless LANs\u201d,\u00a0<em>IEEE Transactions on Mobile Computing<\/em>, Vol. 4, No. 5, pp. 430-442, September\/October 2005.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/masked.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>M. Laifenfeld and A. Trachtenberg, \u201cDisjoint idenitying codes for arbitrary graphs\u201d,\u00a0<em>2005 IEEE International Symposium on Information Theory<\/em>, Adelaide, Australia, Sep 2005.\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/disjoint_web.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Saikat Ray, David Starobinski and Jeffrey Carruthers, \u201cPerformance of Wireless Networks with Hidden Nodes: A Queueing-Theoretic Analysis\u201d,\u00a0<em>Journal of Computer Communications (Special Issue on the Performance of Wireless LANs, PANs, and Ad-Hoc Networks)<\/em>, Vol. 28, pp. 1179-1192, June 2005.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/ray_hidden.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>David Starobinski and Tao Wu, \u201cPerformance of Server Selection Algorithms for Content Replication Networks,\u201d\u00a0<em>IFIP Networking 2005<\/em>, Waterloo, Canada, May 2005.\u00a0pdf<\/li>\n<li>Ioannis Paschalidis, Wei Lai, and David Starobinski, \u201cAsymptotically Optimal Transmission Policies for Low-Power Wireless Sensor Networks,\u201d\u00a0<em>IEEE INFOCOM 2005<\/em>, Miami, March 2005.<\/li>\n<\/ul>\n<h2><a name=\"2004\"><\/a>2004<\/h2>\n<ul>\n<li>K. Saliba, \u201cRobust Location Detection: Evaluation of Varying Network Topologies\u201d, CISE Technical Report 2004-IR-0030\u00a0pdf<\/li>\n<li>S. Agarwal and A. Trachtenberg, \u201cEstimating the number of differences between remote sets\u201d, CISE Technical Report 2004-IR-0010, submitted to IEEE Transactions on Networking\u00a0pdf<\/li>\n<li>V. Chauhan and A. Trachtenberg, \u201cReconciliation puzzles,\u201d\u00a0<em>IEEE Globecom 2004<\/em>\u00a0,in\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/recon_web.ps\" target=\"_top\" rel=\"noopener noreferrer\">ps<\/a>(138K) or\u00a0<a href=\"http:\/\/ipsit.bu.edu\/documents\/recon_web.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>(102K)<\/li>\n<li>Saikat Ray, David Starobinski, Ari Trachtenberg and Rachanee Ungrangsi, \u201cRobust location detection with sensor networks\u201d,\u00a0<em>IEEE Journal on Selected Areas in Communications (Special Issue on Fundamental Performance Limits of Wireless Sensor Networks)<\/em>, August 2004.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/jsac_loc.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Francesco de Pellegrini, David Starobinski, Mark Karpovsky and Lev Levitin, \u201cScalable Cycle-Breaking Algorithms for Gigabit Ethernet Backbones,\u201d\u00a0<em>IEEE INFOCOM 2004<\/em>, Hong Kong, March 2004.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/INFO2004camera.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<\/ul>\n<h2><a name=\"2003\"><\/a>2003<\/h2>\n<ul>\n<li>Rajesh Krishnan and David Starobinski, \u201cMessage-Efficient Self-Organization of Wireless Sensor Networks,\u201d to appear in\u00a0<em>IEEE WCNC 2003<\/em>.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/wcnc-rajesh.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>David Starobinski, Mark Karpovsky, and Lev Zakrevski, \u201cApplication of Network Calculus to General Topologies using Turn-Prohibition,\u201d to appear in\u00a0<em>IEEE\/ACM Transactions on Networking<\/em>.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/TP-ToN.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Saikat Ray, Jeffrey Carruthers, and David Starobinski, \u201cRTS\/CTS-induced Congestion in Ad-Hoc Wireless LANs,\u201d\u00a0<em>IEEE WCNC 2003<\/em>.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/wcnc-ray.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>Ray S., Ugrangsi R., De Pellegrini F., Trachtenberg A., Starobinski D., \u201cRobust Location Detection for Emergency Sensor Networks\u201d, to appear in the proceedings of\u00a0<em>IEEE INFOCOM 2003<\/em>, San Francisco, CA.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/wcnc-rajesh.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>(241k)<\/li>\n<\/ul>\n<h2><a name=\"2002\"><\/a>2002<\/h2>\n<ul>\n<li>Y. Minsky and A. Trachtenberg, Practical set reconciliation, Technical Report 2002-01, Boston University. Also appeared as Scalable set reconciliation at\u00a0<em>the 40th Annual Allerton Conference on Communication, Control, and Computing<\/em>, October 2002.<\/li>\n<li>A. Trachtenberg, D. Starobinski, and S. Agarwal, \u201cFast PDA Synchronization using Characteristic Polynomial Interpolation,\u201d Proceedings of\u00a0<em>IEEE INFOCOM 2002<\/em>, pp.1510-1519, June 2002. Available in\u00a0postscript(5.7M) or\u00a0pdf(372k)<\/li>\n<li>S. Agarwal, David Starobinski and Ari Trachtenberg, \u201cOn the Scalability of Data Synchronization Protocols for PDAs and Mobile Devices,\u201d,\u00a0<em>IEEE Network (Special Issue on Scalability in Communication Networks)<\/em>, Vol. 16, No. 4, pp. 22-28, July-August 2002.\u00a0pdf\u00a0(973k)<\/li>\n<li>David Starobinski, Mark Karpovsky, and Lev Zakrevski, \u201cApplication of Network Calculus to General Topologies using Turn-Prohibition,\u201d Proceedings of\u00a0<em>IEEE INFOCOM 2002<\/em>, pp.1151-1159, June 2002.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/TPinfo2002.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>(113k)<\/li>\n<li>A. Trachtenberg,\u00a0<em>Designing Lexicographic Codes with a Given Trellis Complexity<\/em>,\u00a0IEEE Transactions on Information Theory\u00a0(January 2002)<\/li>\n<li>S. Agarwal,\u00a0<em>Data Synchronization in Mobile and Distributed Networks<\/em>, Master\u2019s Thesis, Boston University, July 2002.\u00a0pdf<\/li>\n<li>S. Agarwal and A. Yaar and D. Starobinski and A. Trachtenberg,\u00a0<em>Fast Network Synchronization<\/em>, ACM SIGCOMM Comp. Comm. Review 32:3, July 2002, p. 14 (poster):<a href=\"http:\/\/ipsit.bu.edu\/documents\/sigcomm.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a>\u00a0(97K)<\/li>\n<\/ul>\n<h2><a name=\"2001\"><\/a>2001<\/h2>\n<ul>\n<li>David Starobinski and David Tse, \u201cProbabilistic Methods for Web Caching\u201d,\u00a0Performance Evaluation\u00a0, Vol 46, Nos. 2-3, pp. 125-137, October 2001.\u00a0<a href=\"http:\/\/people.bu.edu\/staro\/webcaching.pdf\" target=\"_top\" rel=\"noopener noreferrer\">pdf<\/a><\/li>\n<li>M. Karpovsky, L. Levitin, and A. Trachtenberg,_Data verification and reconciliation with generalized error-control codes_,39th Annual Allerton Conference on Communication, Control, and Computing, Monticello IL, Oct 3-5, 2001. Available in\u00a0postscript\u00a0(103K) or\u00a0pdf\u00a0(109K)<\/li>\n<li>Y. Minsky, A. Trachtenberg, and R. Zippel,\u00a0<em>Set Reconciliation with Nearly Optimal Communication Complexity<\/em>,\u00a0International Symposium on Information Theory, Washington D.C., June 2001. Available in\u00a0postscript(86k) or\u00a0pdf(117k).<\/li>\n<li>M. Karpovsky, L. Levitin, and A. Trachtenberg,\u00a0<em>Connections between data reconciliation and error-correcting codes<\/em>,\u00a0International Symposium on Information Theory, Washington D.C., June 2001, recent result. Abstract available inpostscript\u00a0(46k) or\u00a0pdf. (55k).<\/li>\n<li>David Starobinski and Mark Karpovsky, \u201cTurn Prohibition-based Packet Forwarding in Gigabit Ethernets,\u201d\u00a0<em>Gigabit Networking Workshop (GBN 2001)<\/em>, Anchorage, Alaska, April 2001.<\/li>\n<li>A. Trachtenberg and D. Starobinski,\u00a0<em>Towards Global Synchronization<\/em>,\u00a0Workshop on New Visions for Large-Scale Networks: Research and Applications, Vienna, VA, March 2001. Available in\u00a0pdf.<\/li>\n<\/ul>\n<h2><a name=\"2000\"><\/a>2000<\/h2>\n<ul>\n<li>David Starobinski and Moshe Sidi, \u201cModeling and Analysis of Power-Tail Distributions via Classical Teletraffic Methods,\u201d\u00a0<em>Queueing Systems (QUESTA)<\/em>, Vol. 36, Nos. 1-3, pp. 243-267, November 2000.\u00a0<a href=\"http:\/\/www-comnet.technion.ac.il\/pub\/412staro.ps.gz\" target=\"_top\" rel=\"noopener noreferrer\">Gzipped PostScript<\/a><\/li>\n<li>T. Etzion, A. Trachtenberg, and A. Vardy, \u201cWhich Codes have Cycle-Free Tanner Graphs?\u201d ,IEEE Trans. Inf. Theory, 45:6. Available in\u00a0postscript\u00a0(496K) or\u00a0pdf\u00a0(378k)<\/li>\n<li>David Starobinski and David Tse, \u201cProbabilistic Models for Web Caching,\u201d\u00a0<em>Conference and Workshop on Stochastic Networks<\/em>, Madison, Wisconsin, June 2000.<\/li>\n<li>David Starobinski and Moshe Sidi, \u201cStochastically Bounded Burstiness for Communication Networks,\u201d\u00a0<em>IEEE Transactions on Information Theory<\/em>, Vol. 46, No. 1, pp.206-212, January 2000.\u00a0<a href=\"http:\/\/www-comnet.technion.ac.il\/pub\/starobinski.ps.gz\" target=\"_top\" rel=\"noopener noreferrer\">Gzipped PostScript<\/a><\/li>\n<li>Y. Minsky, A. Trachtenberg, and R. Zippel, \u201cEfficient reconciliation of unordered databases\u201d,\u00a0<em>Technical Report 2000-1796<\/em>, Cornell University. Available in\u00a0postscript\u00a0(296k) or\u00a0pdf(260k).<\/li>\n<li>Ari Trachtenberg, \u201cError-Correcting Codes on Graphs: Lexicodes, Trellises, and Factor Graphs\u201d,\u00a0<em>Ph.D. thesis from the University of Illinois at Urbana-Champaign<\/em>,\u00a0Department of Computer Science. Available in\u00a0html,\u00a0postscript\u00a0(1.2M) or\u00a0pdf\u00a0(1M).<\/li>\n<\/ul>\n<h2><a name=\"1999\"><\/a>1999<\/h2>\n<ul>\n<li>David Starobinski and Moshe Sidi, \u201cModeling and Analysis of Heavy-Tailed Distributions via Classical Teletraffic Methods,\u201d Proceedings of\u00a0ITC-16, pp. 45-54, June 1999. A PostScript version is available upon request.<\/li>\n<li>David Starobinski, Ph.D.\u00a0<em>Thesis Quality of Service in High Speed Networks with Multiple Time-Scale Traffic<\/em>, Technion \u2013 Israel Institute of Technology, May 1999.<a href=\"http:\/\/www-comnet.technion.ac.il\/pub\/doctor.ps.gz\" target=\"_top\" rel=\"noopener noreferrer\">Gzipped PostScript<\/a><\/li>\n<li>David Starobinski and Moshe Sidi, \u201cStochastically Bounded Burstiness for Communication Networks,\u201d Proceedings of\u00a0<em>INFOCOM \u201999<\/em>, pp.36-42, March 1999.<a href=\"http:\/\/www-comnet.technion.ac.il\/pub\/infocom99.ps.gz\" target=\"_top\" rel=\"noopener noreferrer\">Gzipped PostScript<\/a><\/li>\n<li>A. Trachtenberg and Y. Minsky, Efficient reconciliation of unordered databases, Technical Report 99-1778, Cornell University. Available in\u00a0postscript\u00a0(431k) or\u00a0pdf(272k).<\/li>\n<li><\/li>\n<\/ul>\n<h2><a name=\"Earlier\"><\/a>Earlier<\/h2>\n<ul>\n<li>Moshe Sidi and David Starobinski, \u201cNew Call Blocking versus Handoff Blocking in Cellular Networks,\u201d\u00a0<em>ACM Journal of Wireless Networks<\/em>\u00a0, Vol. 3, No. 1, pp. 15-27, March 1997\u00a0(forwarded for fast-track publication by the Program Chair of Infocom \u201996).\u00a0<a href=\"http:\/\/www-comnet.technion.ac.il\/pub\/journal.ps.gz\" target=\"_top\" rel=\"noopener noreferrer\">Gzipped PostScript<\/a><\/li>\n<li>A. Trachtenberg and A. Vardy,\u00a0<em>\u201cLexicographic Codes; Constructions, Bounds, and Trellis Complexities\u201d,<\/em>\u00a0CISS \u201997. Available in\u00a0postscript(337K) or\u00a0pdf\u00a0(225k).<\/li>\n<li>Moshe Sidi and David Starobinski, \u201cNew Call Blocking versus Handoff Blocking in Cellular Networks \u201d, Proceedings of\u00a0<em>INFOCOM \u201996<\/em>, pp. 35-42, March 1996.<a href=\"http:\/\/www-comnet.technion.ac.il\/pub\/info96.ps.gz\" target=\"_top\" rel=\"noopener noreferrer\">Gzipped PostScript<\/a><\/li>\n<li>A. Trachtenberg,\u00a0<em>Computational Methods in Coding Theory<\/em>, M.Sc. thesis, available in\u00a0postscript\u00a0(1M) or\u00a0pdf\u00a0(1M).<\/li>\n<li>David Starobinski, M.Sc. Thesis,\u00a0<em>New Call Blocking versus Handoff Blocking in Cellular Networks<\/em>, Technion \u2013 Israel Institute of Technology, December 1995.<a href=\"http:\/\/www-comnet.technion.ac.il\/pub\/final.ps.gz\" target=\"_top\" rel=\"noopener noreferrer\">Gzipped PostScript<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>2025 Journals Pranet Sharma, Zhenpeng Shi, Sevval Simsek, David Starobinski, and David Sastre Medina. &#8220;Understanding Similarities and Differences Between Software Composition Analysis Tools.&#8221; IEEE Security and Privacy, vol. 23, no. 1, pp. 53-63, Jan.-Feb. 2025. [DOI] Zeying Zhu, Jonathan Chamberlain, Kenny Wu, David Starobinski, and Zaoxing Liu. 2025. Approximation-First Timeseries Query At Scale. Proc. VLDB [&hellip;]<\/p>\n","protected":false},"author":13841,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/pages\/20"}],"collection":[{"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/users\/13841"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":50,"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":825,"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/pages\/20\/revisions\/825"}],"wp:attachment":[{"href":"https:\/\/sites.bu.edu\/nislab\/wp-json\/wp\/v2\/media?parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}