Insight into redundancy schemes in DHTs.Published in:Journal of Supercomputing, 2008, v. 43, n. 2, p. 183, doi. 10.1007/s11227-007-0126-4By:Chen, Guihai;Qiu, Tongqing;Wu, FanPublication type:Article
REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery.Published in:AI Communications, 2016, v. 29, n. 1, p. 107, doi. 10.3233/AIC-150659By:Charles, Perez;Babiga, Birregah;Robert, Layton;Marc, Lemercier;Paul, WattersPublication type:Article