Author of the publication

Understanding overlay characteristics of a large-scale peer-to-peer IPTV system.

, , , and . ACM Trans. Multim. Comput. Commun. Appl., 6 (4): 31:1-31:24 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Firstfilter: A cost-sensitive approach to malicious URL detection in large-scale enterprise networks., , and . IBM J. Res. Dev., 60 (4): 4 (2016)Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks., , and . MobiQuitous, ICST / ACM, (2008)Sangam - efficient cellular-WiFi group framework for file sharing service., , and . MILCOM, page 1-6. IEEE, (2012)Measurement of a large-scale overlay for multimedia streaming., , , and . HPDC, page 241-242. ACM, (2007)Characterizing and leveraging people movement for content distribution in mobile Peer-to-Peer networks. University of Illinois Urbana-Champaign, USA, (2010)Detecting Malicious Behavior in Computer Networks via Cost-Sensitive and Connectivity Constrained Classification., , , and . SDM, page 117-125. SIAM, (2017)Joint bluetooth/wifi scanning framework for characterizing and leveraging people movement in university campus., , , and . MSWiM, page 257-265. ACM, (2010)A Large-Scale System for Real-Time Glucose Monitoring., , , , , , , , and . DSN Workshops, page 34-37. IEEE Computer Society, (2018)MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming., , , and . INFOCOM, page 296-300. IEEE, (2010)Believe It Today or Tomorrow? Detecting Untrustworthy Information from Dynamic Multi-Source Data., , , , , , , and . SDM, page 397-405. SIAM, (2015)