Author of the publication

Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies.

, , and . Peer-to-Peer Computing, page 11-18. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN., , and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 231-244. Kluwer, (2003)Analysis of user keyword similarity in online social networks, and . (2010)Localizing Temporal Anomalies in Large Evolving Graphs., , , and . SDM, page 927-935. SIAM, (2015)Mining User Deliberation and Bias in Online Newsgroups: A Dynamic View., , and . COSN, page 209-219. ACM, (2015)Sleepy Network-Layer Authentication Service for IPSEC.. ESORICS, volume 1146 of Lecture Notes in Computer Science, page 146-159. Springer, (1996)TCPtransform: Property-Oriented TCP Traffic Transformation., , , , , , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 222-240. Springer, (2005)SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11., , , , , and . GLOBECOM, page 768-772. IEEE, (2002)Social Coordinates: A Scalable Embedding Framework for Online Social Networks., , and . ICMLSC, page 191-196. ACM, (2017)Intrusion Detection for an On-Going Attack., , , and . Recent Advances in Intrusion Detection, (1999)The influence of feedback with different opinions on continued user participation in online newsgroups., , , , and . ASONAM, page 388-395. ACM, (2013)