From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rarest first and choke algorithms are enough., , и . Internet Measurement Conference, стр. 203-216. ACM, (2006)Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent., , , , и . LEET, USENIX Association, (2010)In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE Extension., , , , , и . WPES@CCS, стр. 151-166. ACM, (2021)Understanding the Properties of the BitTorrent Overlay, , и . (2007)Did I delete my cookies? Cookies respawning with browser fingerprinting., , , и . CoRR, (2021)I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy., , , , и . Internet Measurement Conference, стр. 45-60. ACM, (2011)Classification of content and users in BitTorrent by semi-supervised learning methods., , , и . IWCMC, стр. 625-630. IEEE, (2012)Network characteristics of video streaming traffic., , , , , и . CoNEXT, стр. 25. ACM, (2011)Hybrid Approach for Experimental Networking Research., , , , , и . ICDCN, том 7129 из Lecture Notes in Computer Science, стр. 168-178. Springer, (2012)Pushing BitTorrent Locality to the Limit, , и . CoRR, (2008)