Author of the publication

Malicious Behaviour in Content-Addressable Peer-to-Peer Networks.

, , , and . CNSR, page 319-326. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Individual privacy constraints on time-series data., , and . Inf. Syst., (2015)Free riding-aware forwarding in Content-Addressable Networks., and . VLDB J., 16 (4): 463-482 (2007)From source code to runtime behaviour: Software metrics help to select the computer architecture., , , and . Knowl.-Based Syst., 23 (4): 343-349 (2010)Building a Hybrid Database Application for Structured Documents., , and . Multimedia Tools Appl., 8 (1): 65-90 (1999)On Extending the XML Engine with Query-Processing Capabilities.. ADL, page 127-138. IEEE Computer Society, (2000)Parallel NN-search for large multimedia repositories., , and . State-of-the-Art in Content-Based Image and Video Retrieval, page 319-343. Kluwer, (1999)Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs., , and . SDM, page 723-734. SIAM / Omnipress, (2011)Self-Organization in Overlay Networks., and . CAiSE Workshops (2), page 139-153. FEUP Edições, Porto, (2005)Reviewing the reviewers: A study of author perception on peer reviews in computer science., , and . CollaborateCom, page 1-8. ICST / IEEE, (2010)Traffic Management Based on Negotiations between Vehicles - A Feasibility Demonstration Using Agents., , and . AMEC/TADA, volume 13 of Lecture Notes in Business Information Processing, page 90-104. Springer, (2007)