The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Arnaud Legout: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi
    Rarest first and choke algorithms are enough. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:203-216 [Conf]
  2. Arnaud Legout, Jörg Nonnenmacher, Ernst Biersack
    Bandwidth Allocation Policies for Unicast and Multicast Flows. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:254-261 [Conf]
  3. Arnaud Legout, Ernst Biersack
    PLM: fast convergence for cumulative layered multicast transmisson schemes. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2000, pp:13-22 [Conf]
  4. Arnaud Legout, Jörg Nonnenmacher, Ernst Biersack
    Bandwidth-allocation policies for unicast and multicast flows. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2001, v:9, n:4, pp:464-478 [Journal]
  5. Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixia Zhang
    Clustering and sharing incentives in BitTorrent systems. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2007, pp:301-312 [Conf]
  6. Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixia Zhang
    Clustering and Sharing Incentives in BitTorrent Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  7. Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixia Zhang
    Clustering and Sharing Incentives in BitTorrent Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  8. Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi
    Rarest First and Choke Algorithms Are Enough [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  9. Anwar Al Hamra, Arnaud Legout, Chadi Barakat
    Understanding the Properties of the BitTorrent Overlay [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  10. Can Realistic BitTorrent Experiments Be Performed on Clusters? [Citation Graph (, )][DBLP]


  11. Small Is Not Always Beautiful [Citation Graph (, )][DBLP]


  12. Pushing BitTorrent Locality to the Limit [Citation Graph (, )][DBLP]


  13. Swarming Overlay Construction Strategies [Citation Graph (, )][DBLP]


  14. BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies [Citation Graph (, )][DBLP]


  15. Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent [Citation Graph (, )][DBLP]


  16. De-anonymizing BitTorrent Users on Tor [Citation Graph (, )][DBLP]


  17. Compromising Tor Anonymity Exploiting P2P Information Leakage [Citation Graph (, )][DBLP]


  18. Can Realistic BitTorrent Experiments Be Performed on Clusters? [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002