Author of the publication

Enabling routing control in a DHT.

, , , and . IEEE Journal on Selected Areas in Communications, 28 (1): 28-38 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree Graphs., , , and . ICDCS, page 152-159. IEEE Computer Society, (2008)HonIDS: Enhancing Honeypot System with Intrusion Detection Models., , , and . IWIA, page 135-143. IEEE Computer Society, (2006)Characterizing Enough Vantage Points for Pinpointing Routing Instability., , , and . IPDPS Workshops, page 1270-1275. IEEE Computer Society, (2012)AHBP: An Efficient Broadcast Protocol for Mobile Ad Hoc Networks., and . J. Comput. Sci. Technol., 16 (2): 114-125 (2001)Efficient range query processing over DHTs based on the balanced Kautz tree., , , and . Concurrency and Computation: Practice and Experience, 23 (8): 796-814 (2011)Survey of DHT topology construction techniques in virtual computing environments., , and . SCIENCE CHINA Information Sciences, 54 (11): 2221-2235 (2011)Energy-efficient lifetime maximization and sleeping scheduling supporting data fusion and QoS in Multi-SensorNet., and . Signal Processing, 87 (12): 2949-2964 (2007)A Push-Based Prefetching for Remote Caching RAM Grid., , and . IJGHPC, 1 (4): 1-15 (2009)Dynamic Self-Adaptive Replica Location Method in Data Grids., , , , and . CLUSTER, page 442-445. IEEE Computer Society, (2003)Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms., , and . Computers & Security, 28 (8): 827-842 (2009)