Author of the publication

The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems.

, , and . Peer-to-Peer Computing, page 57-64. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A leftover service curve approach to analyze demultiplexing in queueing networks., , and . VALUETOOLS, page 168-177. ICST/IEEE, (2012)Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System., , , , and . AsiaCCS, page 914-916. ACM, (2017)Unleashing the Power of Paying Multiplexing Only Once in Stochastic Network Calculus., , and . SIGMETRICS (Abstracts), page 117-118. ACM, (2022)The DISCO network calculator: a toolbox for worst case analysis., and . VALUETOOLS, volume 180 of ACM International Conference Proceeding Series, page 8. ACM, (2006)On the Catalyzing Effect of Randomness on the Per-Flow Throughput in Wireless Networks., and . CoRR, (2013)On the Stochastic End-to-End Delay Analysis in Sink Trees Under Independent and Dependent Arrivals., and . MMB, volume 12040 of Lecture Notes in Computer Science, page 136-154. Springer, (2020)Secure Location Verification: Why You Want Your Verifiers to Be Mobile., , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 419-437. Springer, (2019)Searching for Tight Performance Bounds in Feed-Forward Networks., , and . MMB/DFT, volume 5987 of Lecture Notes in Computer Science, page 227-241. Springer, (2010)RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users., , , and . USENIX Security Symposium, USENIX Association, (2024)Enhancing mobile QoS based on movement contracts., and . IWQoS, page 3-9. IEEE, (2004)