| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2016 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2012 | — | conf |
Allerton Conference
|
| 2012 | J | jnl |
Comput. Networks
|
| 2012 | J | jnl |
Signal Process. Image Commun.
|
| 2011 | C | conf |
VCIP
|
| 2010 | J | jnl |
IEEE/ACM Trans. Netw.
|
| 2010 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2009 | J | jnl |
CoRR
|
| 2009 | B | conf |
ICCCN
|
| 2008 | J | jnl |
Comput. Commun.
|
| 2008 | J | jnl |
Proc. Natl. Acad. Sci. USA
|
| 2008 | J | jnl |
IEEE/ACM Trans. Netw.
|
| 2008 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2008 | J | jnl |
Peer-to-Peer Netw. Appl.
|
| 2007 | — | conf |
Peer-to-Peer Computing
|
| 2007 | J | jnl |
IEEE Trans. Image Process.
|
| 2007 | A* | conf |
INFOCOM
|
| 2006 | B | conf |
DCC
|
| 2006 | J | jnl |
Computer
|
| 2006 | J | jnl |
CoRR
|
| 2006 | — | conf |
Peer-to-Peer Computing
|
| 2006 | J | jnl |
CoRR
|
| 2006 | J | jnl |
Theor. Comput. Sci.
|
| 2005 | J | jnl |
CoRR
|
| 2005 | J | jnl |
Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks
CoRR
|
| 2005 | J | jnl |
CoRR
|
| 2005 | J | jnl |
CoRR
|
| 2005 | — | conf |
WMuNeP
|
| 2005 | B | conf |
ISIT
|
| 2005 | — | conf |
CEAS
|
| 2004 | B | conf |
ITW
|
| 2004 | A | conf |
ICME
|
| 2004 | B | conf |
Data Compression Conference
|
| 2004 | B | conf |
Data Compression Conference
|
| 2004 | B | conf |
WCNC
|
| 2004 | — | conf |
Peer-to-Peer Computing
|
| 2004 | J | jnl |
CoRR
|
| 2002 | J | jnl |
CoRR
|