Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-exchange schemes to handle mismatch in peer-to-peer systems., , , , and . The Journal of Supercomputing, 48 (1): 15-42 (2009)Special Issue: Recent Advances in Peer-to-Peer Systems and Security.. Concurrency and Computation: Practice and Experience, 20 (2): 125-126 (2008)Cashmere: Resilient Anonymous Routing., , , and . NSDI, USENIX, (2005)Towards Location-aware Topology in both Unstructured and Structured P2P Systems., , , , and . ICPP, page 30. IEEE Computer Society, (2007)On Infostation Density of Vehicular Networks., , , and . WICON, page 1-9. ICST / IEEE, (2010)Supporting Demanding Wireless Applications with Frequency-agile Radios., , , , and . NSDI, page 65-80. USENIX Association, (2010)An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System., , , , , and . ICDCS, page 56. IEEE Computer Society, (2007)Link and Triadic Closure Delay: Temporal Metrics for Social Network Dynamics., , , , , and . ICWSM, The AAAI Press, (2014)An Architecture for a Secure Service Discovery Service., , , , and . MobiCom, page 24-35. ACM, (1999)I am the antenna: accurate outdoor AP location using smartphones., , , , , , and . MobiCom, page 109-120. ACM, (2011)