From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CoDE - An application-layer framework for confidentiality in distributed environments., и . CollaborateCom, стр. 458-465. ICST / IEEE, (2011)Tagging with DHARMA, a DHT-based approach for resource mapping through approximation., , , и . IPDPS Workshops, стр. 1-8. IEEE, (2010)Troubleshooting web sessions with CUSUM., , и . IWCMC, стр. 385-390. IEEE, (2015)Governed Content Distribution on DHT Based Networks., , , и . ICIW, стр. 391-396. IEEE Computer Society, (2008)Tempering Kademlia with a Robust Identity Based System., , , и . Peer-to-Peer Computing, стр. 30-39. IEEE Computer Society, (2008)Publishing, Retrieving and Streaming Lectures via Application Level Multicast., и . AICT/ICIW, стр. 106. IEEE Computer Society, (2006)An identity-based approach to secure P2P applications with Likir, , , и . Peer-to-Peer Networking and Applications, (2011)10.1007/s12083-010-0099-6.Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach., , , , , и . ICC, стр. 1-5. IEEE, (2009)Accessing and Distributing Streaming Events on DHT-Based Systems., , , и . AXMEDIS, стр. 306-314. IEEE Computer Society, (2006)Experimental Performance Evaluation of Cloud-Based Analytics-as-a-Service., , , , и . CLOUD, стр. 196-203. IEEE Computer Society, (2016)