Author of the publication

Trusted Dynamic Storage for Dunbar-Based P2P Online Social Networks.

, , , , and . OTM Conferences, volume 8841 of Lecture Notes in Computer Science, page 400-417. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the Quality of Service in a MAN Environment.. Decentralized and Distributed Systems, volume A-39 of IFIP Transactions, page 137-148. North-Holland, (1993)Peer-to-Peer Computing in Mobile Ad Hoc Networks., , and . The Handbook of Mobile Middleware, Auerbach Publications/CRC, (2006)Design and performance evaluation of ContentPlace, a social-aware data dissemination system for opportunistic networks, , and . Computer Networks, 54 (4): 589-604 (March 2010)Exploiting users’ social relations to forward data in opportunistic networks: the HiBOp solution, , and . Pervasive and Mobile Computing (PMC), 4 (5): 633--657 (2008)User-centric Mobility Models for Opportunistic Networking, , and . page 255--267. Springer, (2008)A localized slot allocation algorithm for wireless sensor networks., , and . Med-Hoc-Net, page 89-96. IEEE, (2013)Performance Analysis of a Device-to-Device Offloading Scheme in a Vehicular Network Environment., , and . CoRR, (2018)A Model to Evaluate the Effects of the BWB Mechanism in a DQDB Network in Underload Conditions., , and . ACM Conference on Computer Science, page 395-405. ACM, (1992)A Vacation Model for Interconnected FDDI Networks., , and . ACM Conference on Computer Science, page 9-16. ACM, (1992)Measuring UHF RFID tag reading for document localization., , , and . RFID-TA, page 115-122. IEEE, (2011)