Author of the publication

Selfish Mining in Public Blockchains: A Quantitative Analysis.

, , and . VALUETOOLS, volume 539 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating resistance to jamming and casual interception in mobile wireless networks., , , and . MSWiM, page 151-158. ACM, (2012)Performance evaluation of AQM techniques with heterogeneous traffic., , , and . CCNC, page 194-199. IEEE, (2016)A unifying approach to product-forms in networks with finite capacity constraints., , and . SIGMETRICS, page 25-36. ACM, (2010)On product-form approximations of cooperating stochastic models., and . ISCIS, volume 62 of Lecture Notes in Electrical Engineering, page 65-70. Springer, (2010)Explicit solutions for queues with hypo-exponential service time and applications to product-form analysis., and . VALUETOOLS, page 166-175. ICST/ACM, (2011)Queueing Networks., and . SFM, volume 4486 of Lecture Notes in Computer Science, page 34-82. Springer, (2007)Optimisation of Virtual Machine Garbage Collection Policies., , and . ASMTA, volume 6751 of Lecture Notes in Computer Science, page 70-84. Springer, (2011)Assessment of Aging and Rejuvenation for Resiliency in Heterogeneous Network Clusters., , , , , , and . ISSREW, page 198-205. IEEE, (2023)Performance engineering with product-form models: efficient solutions and applications., and . ICPE, page 437-448. ACM, (2011)Representing LCFSPR BCMP service center with Coxian service time by GSPN., and . VALUETOOLS, page 33. ICST/ACM, (2007)