Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the steady-state of cache networks., , and . INFOCOM, page 863-871. IEEE, (2013)Evaluating weightless neural networks for bias identification on news., , , and . ICNSC, page 257-262. IEEE, (2017)Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores., , , , , , and . IEEE Secur. Priv., 19 (4): 44-53 (2021)Modeling content availability in peer-to-peer swarming systems., , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 87-88 (2009)On the Flow of Software Security Advisories., , , , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1305-1320 (2021)Data Plane Cooperative Caching With Dependencies., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2092-2106 (2022)Scalability Issues in P2P Systems., , , and . CoRR, (2014)Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach., , , , , and . CSR, page 41-46. IEEE, (2021)Identificação de Anomalias em Redes de Dados baseada em Decomposição Tensorial., , , , and . SBRC, page 952-965. (2020)Análise não supervisionada para inferência de qualidade de experiência de usuários residenciais., , , , and . SBRC, page 958-971. (2019)