Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling content availability in peer-to-peer swarming systems., , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 87-88 (2009)On the Flow of Software Security Advisories., , , , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1305-1320 (2021)Data Plane Cooperative Caching With Dependencies., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2092-2106 (2022)Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores., , , , , , and . IEEE Secur. Priv., 19 (4): 44-53 (2021)Scalability Issues in P2P Systems., , , and . CoRR, (2014)On the steady-state of cache networks., , and . INFOCOM, page 863-871. IEEE, (2013)Evaluating weightless neural networks for bias identification on news., , , and . ICNSC, page 257-262. IEEE, (2017)Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach., , , , , and . CSR, page 41-46. IEEE, (2021)Análise não supervisionada para inferência de qualidade de experiência de usuários residenciais., , , , and . SBRC, page 958-971. (2019)Uma abordagem para detecção de DDoS a partir de roteadores domésticos., , , , and . SBRC, page 834-847. (2019)