Author of the publication

Estimating user interaction strength in distributed online networks.

, , , and . Concurr. Comput. Pract. Exp., 27 (17): 5311-5331 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Peer-to-Peer Bandwidth Marketplace., , and . ICDCN, volume 8314 of Lecture Notes in Computer Science, page 302-316. Springer, (2014)Crowdsourced user interface testing for multimedia applications., , and . CrowdMM@ACM Multimedia, page 21-22. ACM, (2012)Estimating user interaction strength in distributed online networks., , , and . Concurr. Comput. Pract. Exp., 27 (17): 5311-5331 (2015)Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems., , , , , , , and . CoRR, (2017)Personalization on a peer-to-peer television system., , , , and . Multim. Tools Appl., 36 (1-2): 89-113 (2008)The fifteen year struggle of decentralizing privacy-enhancing technology., , , , and . CoRR, (2014)UDP NAT and Firewall Puncturing in the Wild., and . Networking (2), volume 6641 of Lecture Notes in Computer Science, page 1-12. Springer, (2011)A Gossip-Based Distributed Social Networking System., , , and . WETICE, page 93-98. IEEE Computer Society, (2009)BarterCast: A practical approach to prevent lazy freeriding in P2P networks., , , and . IPDPS, page 1-8. IEEE, (2009)Tribler: Search and stream., , , and . Peer-to-Peer Computing, page 164-165. IEEE, (2011)