From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Impeding attrition attacks in P2P systems., , , , и . ACM SIGOPS European Workshop, стр. 12. ACM, (2004)The future is cloudy: Reflecting prediction error in mobile applications., , , , , и . MobiCASE, стр. 20-29. IEEE, (2014)2 P2P or Not 2 P2P?, , , , , и . IPTPS, том 3279 из Lecture Notes in Computer Science, стр. 33-43. Springer, (2004)Mitigating routing misbehavior in mobile ad hoc networks., , , и . MobiCom, стр. 255-265. ACM, (2000)The LOCKSS peer-to-peer digital preservation system., , , , и . ACM Trans. Comput. Syst., 23 (1): 2-50 (2005)Preventing attacks in peer-to-peer document preservation systems.. Stanford University, USA, (2005)Preserving peer replicas by rate-limited sampled voting., , , , , и . SOSP, стр. 44-59. ACM, (2003)A fresh look at the reliability of long-term digital storage., , , , , , и . EuroSys, стр. 221-234. ACM, (2006)AMC: verifying user interface properties for vehicular applications., , , , и . MobiSys, стр. 1-12. ACM, (2013)Evaluating vehicular ad hoc networks for group applications., и . PerCom Workshops, стр. 594-599. IEEE Computer Society, (2011)