Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Legout, Arnaud
add a person with the name Legout, Arnaud
 

Other publications of authors with the same name

A survey on YouTube streaming service., , , , , , , and . VALUETOOLS, page 300-305. ICST/ACM, (2011)Small Is Not Always Beautiful, , , and . CoRR, (2008)Studying social networks at scale: macroscopic anatomy of the twitter social graph., , and . SIGMETRICS, page 277-288. ACM, (2014)ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic., , , , and . MobiSys, page 361-374. ACM, (2016)Bandwidth-allocation policies for unicast and multicast flows., , and . IEEE/ACM Trans. Netw., 9 (4): 464-478 (2001)Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, , , , and . CoRR, (2010)I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, , , , and . CoRR, (2011)Compromising Tor Anonymity Exploiting P2P Information Leakage, , , , , , and . CoRR, (2010)PLM: fast convergence for cumulative layered multicast transmisson schemes., and . SIGMETRICS, page 13-22. ACM, (2000)Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic., , , , and . MobiSys (Companion Volume), page 117. ACM, (2016)