Author of the publication

How to Survive and Thrive in a Private BitTorrent Community.

, , , , and . ICDCN, volume 7730 of Lecture Notes in Computer Science, page 270-284. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Erasure-Coded Storage System for Edge Computing., , , , , and . IEEE Access, (2020)Dissecting Mining Pools of Bitcoin Network: Measurement, Analysis and Modeling., , and . IEEE Trans. Netw. Sci. Eng., 10 (1): 398-412 (2023)A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks., , , , and . Comput. Commun., 30 (11-12): 2428-2441 (2007)Enhancing the efficiency and scalability of blockchain through probabilistic verification and clustering., , , and . Inf. Process. Manag., 58 (5): 102650 (2021)GPGPU Performance Estimation With Core and Memory Frequency Scaling., and . IEEE Trans. Parallel Distributed Syst., 31 (12): 2865-2881 (2020)MG-WFBP: Merging Gradients Wisely for Efficient Communication in Distributed Deep Learning., , and . IEEE Trans. Parallel Distributed Syst., 32 (8): 1903-1917 (2021)Frontier technologies of trust computing and network security., , , and . Concurr. Comput. Pract. Exp., 27 (12): 2907-2909 (2015)G-BLASTN: accelerating nucleotide alignment by graphics processors., and . Bioinform., 30 (10): 1384-1391 (2014)MG-WFBP: Efficient Data Communication for Distributed Synchronous SGD Algorithms., and . CoRR, (2018)AdaProp: Learning Adaptive Propagation for Graph Neural Network based Knowledge Graph Reasoning., , , , and . KDD, page 3446-3457. ACM, (2023)