Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FRIENDBOX: A cloudified F2F storage application., , , and . P2P, page 75-76. IEEE, (2012)Evaluation of P2P Systems under Different Churn Models: Why We Should Bother., and . Euro-Par (1), volume 6852 of Lecture Notes in Computer Science, page 541-553. Springer, (2011)Pace: Privacy-Protection for Access Control Enforcement in P2P Networks., and . Globe, volume 5697 of Lecture Notes in Computer Science, page 99-111. Springer, (2009)On the FaaS Track: Building Stateful Distributed Applications with Serverless Architectures., , , , and . Middleware, page 41-54. ACM, (2019)Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks., , and . Comput. Commun., 31 (12): 2850-2861 (2008)DECA: A Hierarchical Framework for DECentralized Aggregation in DHTs., , and . DSOM, volume 4269 of Lecture Notes in Computer Science, page 246-257. Springer, (2006)Improving the QoE in Personal Clouds with Cross-Swarm Bundling., , , and . LCN, page 424-432. IEEE Computer Society, (2016)Supporting geographical queries onto DHTs., , , and . LCN, page 435-442. IEEE Computer Society, (2008)SQS: Similarity Query Scheme for Peer-to-Peer Databases., , , and . ISCC, page 1107-1112. IEEE Computer Society, (2007)The p2pWeb Model: A Glue for the Web., , and . WETICE, page 153-158. IEEE Computer Society, (2007)