Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the steady-state of cache networks., , and . INFOCOM, page 863-871. IEEE, (2013)Evaluating weightless neural networks for bias identification on news., , , and . ICNSC, page 257-262. IEEE, (2017)Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores., , , , , , and . IEEE Secur. Priv., 19 (4): 44-53 (2021)Modeling content availability in peer-to-peer swarming systems., , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 87-88 (2009)Data Plane Cooperative Caching With Dependencies., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2092-2106 (2022)On the Flow of Software Security Advisories., , , , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1305-1320 (2021)Scalability Issues in P2P Systems., , , and . CoRR, (2014)Análise não supervisionada para inferência de qualidade de experiência de usuários residenciais., , , , and . SBRC, page 958-971. (2019)Uma abordagem para detecção de DDoS a partir de roteadores domésticos., , , , and . SBRC, page 834-847. (2019)Identificação de Anomalias em Redes de Dados baseada em Decomposição Tensorial., , , , and . SBRC, page 952-965. (2020)