Author of the publication

Friends and Foes: Preventing Sel.shness in Open Mobile Ad Hoc Networks.

, and . ICDCS Workshops, page 440-445. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards affordable externally consistent guarantees for geo-replicated systems., and . PaPoC@EuroSys, page 3:1-3:4. ACM, (2018)N-party BAR Transfer: motivation, definition, and challenges., , and . TADDS, page 18-22. ACM, (2011)Asynchrony and Collusion in the N-party BAR Transfer Problem., , and . SIROCCO, volume 7355 of Lecture Notes in Computer Science, page 183-194. Springer, (2012)Lynceus: Tuning and Provisioning Data Analytic Jobs on a Budget., , , , and . CoRR, (2019)Supporting views in network management systems., and . DSOM, page 315-326. INRIA, Rocquencourt, France, (2001)FastRank: Practical lightweight tolerance to rational behavior in edge assisted streaming., , , , , and . Pervasive Mob. Comput., (2018)Effective Detection of Multimedia Protocol Tunneling using Machine Learning., , and . USENIX Security Symposium, page 169-185. USENIX Association, (2018)Property-Driven Cooperative Logging for Concurrency Bugs Replication., , and . HotPar, USENIX Association, (2013)Versioned transactional shared memory for the FénixEDU web application., , , and . WDDDM@EuroSys, page 15-18. ACM, (2008)Rollerchain: A DHT for Efficient Replication., , and . NCA, page 17-24. IEEE Computer Society, (2013)