Author of the publication

Two Types of Trustworthiness of Acquaintances in Peer-to-Peer (P2P) Overlay Networks.

, , , , and . BWCCA, page 320-327. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Aikebaier, Ailixier
add a person with the name Aikebaier, Ailixier
 

Other publications of authors with the same name

A multimedia quorum-based (MQB) protocol in P2P overlay networks., , , and . MoMM, page 103-109. ACM, (2011)Improving of EPCLB Algorithm for Reducing the Overhead of a Load Balancer., , and . BWCCA, page 277-284. IEEE Computer Society, (2011)Trustworthiness-based Approach to Reliably Make Agreement among Peers in Scalable P2P Group., , and . CISIS, page 377-384. IEEE Computer Society, (2011)Trustworthiness of Acquaintances in Peer-to-Peer(P2P) Overlay Networks., , , , and . CISIS, page 267-274. IEEE Computer Society, (2010)A Scalable Communication Protocol for Multi-layered Groups., , , , and . CISIS, page 426-431. IEEE Computer Society, (2011)A Power Consumption Model for Storage-based Applications., , , , and . CISIS, page 612-617. IEEE Computer Society, (2011)Situation-Aware Group Communication Protocols., , , , and . CISIS, page 415-420. IEEE Computer Society, (2014)Experimentation of Group Communication Protocols., , , and . NBiS, page 476-481. IEEE Computer Society, (2013)Power Consumption Models for Migrating Processes in a Server Cluster., , , and . NBiS, page 15-22. IEEE Computer Society, (2014)Read-Write Abortion (RWA) Based Synchronization Protocols to Prevent Illegal Information Flow., , , , and . NBiS, page 120-127. IEEE Computer Society, (2014)