Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of P2P live streaming systems using symmetry-based semiautomatic abstractions., , and . HPCS, page 343-349. IEEE, (2012)Impact of Provider Failures on the Traffic at a University Campus., , , and . SBRC, page 275-283. IEEE, (2014)SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming., , , and . Computer Networks, 57 (4): 1019-1036 (2013)Modeling the Dropbox client behavior., , , , and . ICC, page 1332-1337. IEEE, (2014)Learning Blockchain Delays: A Queueing Theory Approach., , , , , and . SIGMETRICS Performance Evaluation Review, 46 (3): 122-125 (2018)Using Centrality Metrics to Predict Peer Cooperation in Live Streaming Applications., , , , and . Networking (2), volume 7290 of Lecture Notes in Computer Science, page 84-96. Springer, (2012)Mapping critical illness early signs to priority alert transmission on wireless networks., , , , and . LATINCOM, page 1-6. IEEE, (2017)An enhanced cooperative MAC protocol for hybrid PLC/wireless systems., , , and . Computer Networks, (2019)Cryptographic Algorithms in Wearable Communications: An Empirical Analysis., , , , , and . IEEE Communications Letters, 23 (11): 1931-1934 (2019)The Impact of Content Sharing on Cloud Storage Bandwidth Consumption., , , , and . IEEE Internet Comput., 20 (4): 26-35 (2016)