Author of the publication

Can Heterogeneity Make Gnutella Scalable?

, , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 94-103. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Topologies, Power Laws, and Hierarchy, , , , and . (2001)Epidemic Algorithms for Replicated Database Maintenance, , , , , , , , and . (1987)Adaptive Stream Processing using Dynamic Batch Sizing., , , and . SoCC, page 16:1-16:13. ACM, (2014)SANE: a protection architecture for enterprise networks, , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Architecting for innovation, , , , , , , , , and 3 other author(s). SIGCOMM Comput. Commun. Rev., 41 (3): 24--36 (July 2011)The Data-Centric Revolution in Networking.. VLDB, page 15. Morgan Kaufmann, (2003)Towards a Modern Communications API., , , and . HotNets, ACM SIGCOMM, (2007)A simple algorithm for finding frequent elements in streams and bags., , and . ACM Trans. Database Syst., (2003)Making greed work in networks a game-theoretic analysis of switch service disciplines.. IEEE/ACM Trans. Netw., 3 (6): 819-831 (1995)Sharing the Cost of Multicast Transmissions., , and . J. Comput. Syst. Sci., 63 (1): 21-41 (2001)