Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling opportunistic search and placement in cache networks., , , , and . Comput. Networks, (2017)Blockchain Competition Between Miners: A Game Theoretic Perspective., , , , , , and . Frontiers Blockchain, (2019)Optimal PHY Configuration in Wireless Networks., , , , and . IEEE/ACM Trans. Netw., 28 (6): 2601-2614 (2020)Blockchain Privacy Through Merge Avoidance and Mixing Services: a Hardness and an Impossibility Result., , , and . CoRR, (2021)Recomendação de Conteúdo e QoE: Um Experimento Quantificando o Impacto da QoS nas Preferências por Conteúdos., , and . SBRC Companion, (2018)An Extremely Lightweight Approach for DDoS Detection at Home Gateways., , , , , and . IEEE BigData, page 5012-5021. IEEE, (2019)Sharing renewable energy in smart microgrids., , , , , , , and . ICCPS, page 219-228. ACM, (2013)Software Longevity in the Wild: Folklore and Law., , , , and . ISSRE Workshops, page 232-238. IEEE, (2019)Caching Policies over Unreliable Channels., , , , , and . WiOpt, page 246-253. IEEE, (2020)To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints?, , and . CISS, page 1-6. IEEE, (2021)