Name
Papers
Collaborators
YVONNE ANNE PIGNOLET
53
88
Citations 
PageRank 
Referers 
118
21.26
263
Referees 
References 
1345
593
Search Limit
1001000
Title
Citations
PageRank
Year
On the Feasibility of Perfect Resilience with Local Fast Failover20.362021
Probabilistic and temporal failure detectors for solving distributed problems00.342021
Brief Announcement - What Can(Not) Be Perfectly Rerouted Locally.00.342020
Latency-Aware Industrial Fog Application Orchestration with Kubernetes00.342020
SOK - cryptocurrency networking context, state-of-the-art, challenges.00.342020
Improved Fast Rerouting Using Postprocessing10.352019
Bonsai: Efficient Fast Failover Routing Using Small Arborescences20.372019
Breeding Unicorns: Developing Trustworthy and Scalable Randomness Beacons00.342019
Load-Optimal Local Fast Rerouting for Dense Networks.00.342018
Transparent Fault Tolerance for Real-Time Automation Systems.00.342018
When Can a Distributed Ledger Replace a Trusted Third Party?20.362018
Competition: Energy-Efficient Many-to-Many Communication with Channel-Hopping.00.342018
You Only Live Multiple Times: A Blackbox Solution for Reusing Crash-Stop Algorithms In Realistic Crash-Recovery Settings.00.342018
Local Fast Failover Routing With Low Stretch.50.422018
Tomographic Node Placement Strategies and the Impact of the Routing Model.10.352018
Load-Optimal Local Fast Rerouting for Resilient Networks10.362017
Competition: Energy-Efficient Network Flooding with Channel-Hopping.00.342017
Processing Encrypted and Compressed Time Series Data.00.342017
Privacy-preserving Regression on Partially Encrypted Data.00.342017
Faster Exact Reliability Computation00.342017
The Many Faces of Graph Dynamics.00.342016
Competition: Dependable Network Flooding using Glossy with Channel-Hopping.00.342016
Simultaneous Acoustic Localization of Multiple Smartphones with Euclidean Distance Matrices.00.342016
Upper and lower bounds for deterministic broadcast in powerline communication networks.00.342016
Never Say Never -- Probabilistic and Temporal Failure Detectors30.412016
Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance.00.342016
Homophily and the Glass Ceiling Effect in Social Networks40.472015
Migrating legacy control software to multi-core hardware20.452015
Exploring the Graph of Graphs: Network Evolution and Centrality Distances00.342015
Adversarial topology discovery in network virtualization environments: a threat for ISPs?20.412015
To Transmit Now or Not to Transmit Now30.392015
Lightweight Indoor Localization System10.372015
Source Routing in Time-Varing Lossy Networks.10.352015
ColorCast: Deterministic broadcast in powerline networks with uncertainties00.342014
Core-Periphery in Networks: An Axiomatic Approach.40.632014
Distributed minimum dominating set approximations in restricted families of graphs.170.882013
Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks10.352013
Dynamic selection of wireless/powerline links using Markov Decision Processes20.382013
Adversarial VNet embeddings: A threat for ISPs?40.412013
Multi-Interface PLC / Wireless Network Simulation10.362012
Monitoring churn in wireless networks30.412012
Future Internet for smart distribution systems10.462012
Heterogeneous Multi-Interface Routing: Networking Stack And Simulator Extensions10.412012
On The Elite of Social Networks30.432011
Information dissemination on multiple channels00.342011
Energy-efficiency through micro-managing communication and optimizing sleep.40.412011
Misleading stars: what cannot be measured in the Internet?30.392011
Distributed power control in the SINR model.90.532011
On the Windfall and price of friendship: Inoculation strategies on social networks10.352011
Cost And Complexity Of Harnessing Games With Payments10.392011
  • 1
  • 2