Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey and comparison of peer-to-peer overlay network schemes., , , , and . IEEE Commun. Surv. Tutorials, 7 (1-4): 72-93 (2005)Relay Probability Characteristics in a Social Ad-Hoc Network with Different Intimacy Calculation Models and Social Network Structure Models., , and . BlackSeaCom, page 1-5. IEEE, (2018)Phagocytes: A Holistic Defense and Protection Against Active P2P Worms, , , , and . CoRR, (2011)A Method of Constructing QoS Overlay Network and Its Evaluation., , , , , , and . GLOBECOM, page 1-6. IEEE, (2009)Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System., , , , , , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 313-325. Springer, (2009)Trinity: Internet Routing Policies, Internet Latencies and Triangle Inequality Violations.. International Conference on Internet Computing, page 191-199. CSREA Press, (2007)Efficient Timeout Checking Mechanism for Traffic Control., , , and . ICCCN, page 327-333. IEEE, (2007)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)On the impact of wireless multimedia network for multi-modal activity recognition., , and . ISCC, page 1-6. IEEE Computer Society, (2014)Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?., , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)