Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delay Performance of a Two-User Broadcast Channel with Security Constraints., , , and . GIIS, page 1-5. IEEE, (2018)Delta Encoding Overhead Analysis of Cloud Storage Systems Using Client-Side Encryption., and . CloudCom, page 183-190. IEEE, (2019)Collaborative framework for protection against attacks targeting BGP and edge networks., , and . Comput. Networks, (2017)Characterizing the file hosting ecosystem: A view from the edge., , , , and . Perform. Evaluation, 68 (11): 1085-1102 (2011)Server selection in large-scale video-on-demand systems., and . ACM Trans. Multim. Comput. Commun. Appl., 6 (1): 1:1-1:26 (2010)Ambient Interference Effects in Wi-Fi Networks., , , and . Networking, volume 6091 of Lecture Notes in Computer Science, page 160-173. Springer, (2010)Peer-Assisted On-Demand Streaming of Stored Media Using BitTorrent-Like Protocols., and . Networking, volume 4479 of Lecture Notes in Computer Science, page 570-581. Springer, (2007)Had You Looked Where I'm Looking: Cross-user Similarities in Viewing Behavior for 360° Video and Caching Implications., and . CoRR, (2019)Optimized Periodic Broadcast of Nonlinear Media., , , and . IEEE Trans. Multim., 10 (5): 871-884 (2008)Postcertificates for Revocation Transparency., , and . CoRR, (2022)