Author of the publication

A Self-organized P2P Network for an Efficient and Secure Content Location and Download.

, , , , and . DBISP2P, volume 4125 of Lecture Notes in Computer Science, page 368-375. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Malgosa-Sanahuja, Josemaria
add a person with the name Malgosa-Sanahuja, Josemaria
 

Other publications of authors with the same name

An efficient distributed discovery service for EPCglobal network in nested package scenarios., , , and . J. Netw. Comput. Appl., 34 (3): 925-937 (2011)The III International Conference on digital citizenship, san sebastian, Spain, showed new ideas about how to take advantage of the new technologies for entrepreneurship Global Communications Newsletter., , and . IEEE Commun. Mag., 50 (8): 1-4 (2012)A virtualized infrastructure to offer network mapping functionality in SDN networks., , , and . Int. J. Commun. Syst., (2019)Accurate Packet Timestamping on Linux Platforms for Precise Capacity Estimation - An Implementation of a Highly Accurate Timestamping System Embedded in the Linux Kernel and its Application to Capacity Estimation., , , , and . ICSOFT (1), page 137-142. SciTePress, (2011)Evaluation of a Server-Free VoD Application in an In-building Scenario., , , and . AP2PS, page 192-197. IEEE Computer Society, (2009)Analysis and Performance Evaluation of a Multicast File Transfer Solution for Congested Asymmetric Networks., , , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 703-714. Springer, (2006)Analysis and performance evaluation of a multicast flow control mechanism for wired-wireless networks., , , and . Communications and Computer Networks, page 68-73. IASTED/ACTA Press, (2005)A hybrid topology architecture for p2p file sharing systems., , , , and . ICSOFT (1), page 319-324. INSTICC Press, (2006)An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks., , , , and . SECRYPT, page 205-208. INSTICC Press, (2008)Fountain Codes for Reliable Data Transmission in Low Voltage Power-line Networks., , , , and . ICSOFT (2), page 135-140. INSTICC Press, (2009)