From post

Modeling of epidemic diffusion in peer-to-peer file-sharing networks

, , , и . Biologically Inspired Approaches to Advanced Information Technology: Second International Workshop, BioADIT 2006, Osaka, Japan, January 26-27, 2006 2, стр. 322--329. Springer Berlin Heidelberg, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance Comparison of Error Recovery Schemes for High Bandwidth-Delay Product Networks, , , and . page 841-852. (1994)Scalable Socket Buffer Tuning for High-Performance Web Servers., , , and . ICNP, page 281-289. IEEE Computer Society, (2001)Performance evaluation of intermittent receiver-driven data transmission on wireless sensor networks., , , , and . ISWCS, page 141-145. IEEE, (2009)Mitigate Catastrophic Forgetting by Varying Goals., and . ICAART (2), page 530-537. SCITEPRESS, (2020)Network-Adaptive Image and Video Transmission in Camera-Based Wireless Sensor Networks., , and . ICDSC, page 336-343. IEEE, (2007)Implementation and evaluation of a reaction-diffusion based coding rate control mechanism for camera sensor networks., , , and . ICDSC, page 1-8. IEEE, (2008)Proposal and Evaluation of Attractor Perturbation-Based Rate Control for Stable End-to-End Delay., , and . BIONETICS, volume 134 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2012)Analysis of Flow Enforcement Algorithm for Bursty Traffic in ATM Networks., , and . INFOCOM, page 2453-2462. IEEE Computer Society, (1992)Performance Analysis of Fast Reservation Protocol with Generalized Bandwidth Reservation Method., , , and . INFOCOM, page 758-767. IEEE Computer Society, (1996)Experimental evaluation of SCTP tunneling for energy-efficient TCP data transfer over a WLAN., , and . IWCMC, page 833-838. IEEE, (2014)