Author of the publication

Content Delivery Network Interconnection (CDNI) Request Routing: Footprint and Capabilities Semantics.

, , , , and . RFC, (December 2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms., , , and . International Teletraffic Congress, page 1-8. IEEE, (2012)Session PEERing for Multimedia INTerconnect (SPEERMINT) Security Threats and Suggested Countermeasures., , , and . RFC, (November 2011)A policy framework for personalized and role-based SPIT prevention., , and . IPTComm, page 12. ACM, (2009)Risiken der Nichterkennung von Malware in komprimierter Form., , , and . DIMVA, volume P-46 of LNI, page 201-211. GI, (2004)A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms., and . ICC, page 1-6. IEEE, (2009)Security Issues for P2P-Based Voice- and Video-Streaming Applications.. iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 95-110. Springer, (2009)Detecting Trustworthy Real-Time Communications Using a Web-of-Trust., , , and . GLOBECOM, page 1-8. IEEE, (2009)Design and evaluation of an optimized overlay topology for a single operator video streaming service., , , , and . AVSTP2P@MM, page 49-54. ACM, (2010)Assisting Server for Secure Multi-Party Computation., , and . WISTP, volume 7322 of Lecture Notes in Computer Science, page 144-159. Springer, (2012)Network Friendly P2P-TV: The Napa-Wine Approach., , , , , , , , , and 2 other author(s). Peer-to-Peer Computing, page 1-2. IEEE, (2010)