From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and analysis of P2P content distribution under coordinated attack strategies., и . CCNC, стр. 131-135. IEEE, (2011)Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems., , , , и . Secur. Commun. Networks, 7 (4): 700-713 (2014)Implementing the Availability Model of a Software-Defined Backbone Network in Möbius., , и . CoRR, (2017)Open, Autonomous Digital Ecosystems - How to Create and Evolve Trustworthy Systems of Systems?., , и . ERCIM News, (2015)Cross-Entropy Guided Ant-Like Agents Finding Cyclic Paths in Scarcely Meshed Networks., и . Ant Algorithms, том 2463 из Lecture Notes in Computer Science, стр. 123-134. Springer, (2002)Robust Implementation of policies using ant-like agents., и . Net-Con, том 235 из IFIP Conference Proceedings, стр. 153-164. Kluwer, (2002)A Compact Routing Scheme with Lower Stretch., , и . NTMS, стр. 1-5. IEEE, (2009)Evaluating Local Disaster Recovery Strategies., , , и . SIGMETRICS Perform. Evaluation Rev., 46 (2): 62-66 (2018)Distributed soft policy enforcement by swarm intelligence; application to loadsharing and protection., и . Ann. des Télécommunications, 59 (1-2): 10-24 (2004)Cross entropy guided ant-like agents finding dependable primary/backup path patterns in networks., и . IEEE Congress on Evolutionary Computation, стр. 1528-1533. IEEE, (2002)