Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distribuição de Conteúdo Sob Demanda Através da Alocação de Microserviços Dinâmicos na Borda e Núcleo da Rede., , , , and . SBRC, page 575-588. (2020)Utilizando relações entre objetos para melhorar o desempenho de redes orientadas a conteúdo.. Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil, (2016)ndltd.org (oai:agregador.ibict.br.BDTD_UFRGS:oai:www.lume.ufrgs.br:10183/142180).A conservative strategy to protect P2P file sharing systems from pollution attacks., , , and . Concurr. Comput. Pract. Exp., 23 (1): 117-141 (2011)Continuum: A Service-Based Software Infrastructure for Ubiquitous Computing., , , , , and . PerCom, page 1-4. IEEE Computer Society, (2009)Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs., , and . P2P, page 1-10. IEEE, (2013)Challenging the feasibility of authentication mechanisms for P2P live streaming., , , , , and . LANC, page 55-63. ACM, (2011)Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks., , , and . NOMS, page 327-334. IEEE, (2012)Transformers aftermath: current research and rising trends., , , , , , , , and . Commun. ACM, 64 (4): 154-163 (2021)On Social Consensus Mechanisms for Federated Learning Aggregation., , and . BRACIS (2), volume 13654 of Lecture Notes in Computer Science, page 236-250. Springer, (2022)Fraud detection and prevention in e-commerce: A systematic literature review., , , , , , , , and . Electron. Commer. Res. Appl., (2022)