![]() |
| 2008 | ||
|---|---|---|
| 3 | EE | Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Philip A. Chou, Jin Li: Peer-to-Peer utility maximization. CISS 2008: 298-303 |
| 2 | EE | Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Jin Li, Philip A. Chou: Utility maximization in peer-to-peer systems. SIGMETRICS 2008: 169-180 |
| 2007 | ||
| 1 | EE | Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein: Highly efficient techniques for network forensics. ACM Conference on Computer and Communications Security 2007: 150-160 |
| 1 | Hervé Brönnimann | [1] |
| 2 | Minghua Chen | [2] [3] |
| 3 | Philip A. Chou | [2] [3] |
| 4 | Paul Giura | [1] |
| 5 | Jin Li | [2] [3] |
| 6 | Sudipta Sengupta | [2] [3] |
| 7 | Joel Wein | [1] |