Author of the publication

A Novel Content Distribution Mechanism in DHT Networks.

, , , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 742-755. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions., , , , and . ICASSP, page 3477-3480. IEEE, (2009)DSwitch: a dual mode direct and network attached disk., , and . SoCC, page 71-83. ACM, (2015)VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils., , , , and . IEEE Trans. Dependable Secur. Comput., 13 (4): 488-501 (2016)Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage., , , , and . IEEE Trans. Parallel Distributed Syst., 22 (9): 1514-1527 (2011)A Topology-Aware Performance Prediction Model for Distributed Deep Learning on GPU Clusters., , , , , and . IEEE BigData, page 2795-2801. IEEE, (2020)Understanding and Surpassing Dropbox: Efficient Incremental Synchronization in Cloud Storage Services., , , and . GLOBECOM, page 1-7. IEEE, (2015)Understanding the Gift-Sending Interaction on Live-Streaming Video Websites., , and . HCI (12), volume 10282 of Lecture Notes in Computer Science, page 274-285. Springer, (2017)Detecting and Validating Sybil Groups in the Wild., , , , and . ICDCS Workshops, page 127-132. IEEE Computer Society, (2012)An Interest-based P2P RDF Query Architecture., , , , and . SKG, page 11. IEEE Computer Society, (2005)VoteTrust: Leveraging friend invitation graph to defend against social network Sybils., , , , , and . INFOCOM, page 2400-2408. IEEE, (2013)