Author of the publication

Exploring the Acceptability of Delayed Reciprocity in Peer-to-Peer Networks.

, , , and . PERSUASIVE, volume 5033 of Lecture Notes in Computer Science, page 237-240. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating user interaction strength in distributed online networks., , , and . Concurr. Comput. Pract. Exp., 27 (17): 5311-5331 (2015)Personalization on a peer-to-peer television system., , , , and . Multim. Tools Appl., 36 (1-2): 89-113 (2008)The fifteen year struggle of decentralizing privacy-enhancing technology., , , , and . CoRR, (2014)Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems., , , , , , , and . CoRR, (2017)Crowdsourced user interface testing for multimedia applications., , and . CrowdMM@ACM Multimedia, page 21-22. ACM, (2012)UDP NAT and Firewall Puncturing in the Wild., and . Networking (2), volume 6641 of Lecture Notes in Computer Science, page 1-12. Springer, (2011)Tribler: Search and stream., , , and . Peer-to-Peer Computing, page 164-165. IEEE, (2011)Open2Edit: A peer-to-peer platform for collaboration., , and . Networking, page 1-9. IEEE Computer Society, (2013)Tribler: P2P media search and sharing., , , and . ACM Multimedia, page 739-742. ACM, (2011)A Gossip-Based Distributed Social Networking System., , , and . WETICE, page 93-98. IEEE Computer Society, (2009)