From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Regenerating Codes over Binary Cyclic Codes., , , и . ISIT, стр. 216-220. IEEE, (2019)Identity attack and anonymity protection for P2P-VoD systems., , и . IWQoS, стр. 1-9. IEEE, (2011)VegaNet: a virtualized experimentation platform for production networks with connectivity consistency., , , , и . IEEE Netw., 26 (5): 15-21 (2012)Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service., , , , , и . ACSAC, стр. 119-128. ACM, (2012)Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud., , , , и . Middleware, том 7049 из Lecture Notes in Computer Science, стр. 81-100. Springer, (2011)Single Disk Failure Recovery forX-Code-Based Parallel Storage Systems., , , , , , и . IEEE Trans. Computers, 63 (4): 995-1007 (2014)Dynamic Packet Forwarding Verification in SDN., , , , и . IEEE Trans. Dependable Secur. Comput., 16 (6): 915-929 (2019)Coupling Decentralized Key-Value Stores with Erasure Coding., , и . SoCC, стр. 377-389. ACM, (2019)Enhancing the trust of internet routing with lightweight route attestation., , , , , и . AsiaCCS, стр. 92-101. ACM, (2011)OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems., , , и . FAST, стр. 331-344. USENIX Association, (2019)