Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling content availability in peer-to-peer swarming systems., , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 87-88 (2009)Data Plane Cooperative Caching With Dependencies., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2092-2106 (2022)On the Flow of Software Security Advisories., , , , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1305-1320 (2021)Scalability Issues in P2P Systems., , , and . CoRR, (2014)Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores., , , , , , and . IEEE Secur. Priv., 19 (4): 44-53 (2021)Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach., , , , , and . CSR, page 41-46. IEEE, (2021)Evaluating weightless neural networks for bias identification on news., , , and . ICNSC, page 257-262. IEEE, (2017)On the steady-state of cache networks., , and . INFOCOM, page 863-871. IEEE, (2013)Identificação de Anomalias em Redes de Dados baseada em Decomposição Tensorial., , , , and . SBRC, page 952-965. (2020)Uma abordagem para detecção de DDoS a partir de roteadores domésticos., , , , and . SBRC, page 834-847. (2019)