Author of the publication

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.

, , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Developer Ranking Algorithm for Automatic Bug Triage Using Topic Model and Developer Relations., , , and . APSEC (1), page 223-230. IEEE Computer Society, (2014)Highways: Proximity Clustering for Scalable Peer-to-Peer Network., , and . Peer-to-Peer Computing, page 266-267. IEEE Computer Society, (2004)The structure of Internet latency.. University of Cambridge, UK, (2007)British Library, EThOS.Embeddable Overlay Networks., and . ISCC, page 1099-1106. IEEE Computer Society, (2007)On the Quality of Triangle Inequality Violation Aware Routing Overlay Architecture., , , , and . INFOCOM, page 2761-2765. IEEE, (2009)Efficient Timeout Checking Mechanism for Traffic Control., , , and . ICCCN, page 327-333. IEEE, (2007)Trinity: Internet Routing Policies, Internet Latencies and Triangle Inequality Violations.. International Conference on Internet Computing, page 191-199. CSREA Press, (2007)A Method of Constructing QoS Overlay Network and Its Evaluation., , , , , , and . GLOBECOM, page 1-6. IEEE, (2009)Relay Probability Characteristics in a Social Ad-Hoc Network with Different Intimacy Calculation Models and Social Network Structure Models., , and . BlackSeaCom, page 1-5. IEEE, (2018)A survey and comparison of peer-to-peer overlay network schemes, , , , and . Communications Surveys Tutorials, IEEE, 7 (2): 72 - 93 (quarter 2005)