Setting the Record Straighter on Shadow Banning | 0 | 0.34 | 2021 |
SurFree: a fast surrogate-free black-box attack | 0 | 0.34 | 2021 |
Remote Explainability Faces The Bouncer Problem | 0 | 0.34 | 2020 |
The Imitation Game - Algorithm Selection by Exploiting Black-Box Recommenders. | 0 | 0.34 | 2020 |
FeGAN: Scaling Distributed GANs | 0 | 0.34 | 2020 |
Unified and Scalable Incremental Recommenders with Consumed Item Packs. | 0 | 0.34 | 2019 |
TamperNN: Efficient Tampering Detection of Deployed Neural Nets | 0 | 0.34 | 2019 |
Gossiping GANs - Position paper. | 2 | 0.37 | 2018 |
MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets | 6 | 0.43 | 2018 |
zoNNscan : a boundary-entropy index for zone inspection of neural models. | 0 | 0.34 | 2018 |
The Topological Face of Recommendation. | 0 | 0.34 | 2017 |
Uncovering Influence Cookbooks : Reverse Engineering the Topological Impact in Peer Ranking Services. | 0 | 0.34 | 2017 |
The topological face of recommendation: models and application to bias detection. | 0 | 0.34 | 2017 |
Adversarial Frontier Stitching for Remote Neural Network Watermarking. | 14 | 0.68 | 2017 |
Efficient User Opt-Out from Block Stores | 0 | 0.34 | 2016 |
Frugal Topology Construction For Stream Aggregation In The Cloud | 0 | 0.34 | 2016 |
Hoop: Offloading HTTP(S) POSTs from User Devices onto Residential Gateways | 1 | 0.36 | 2014 |
Archiving cold data in warehouses with clustered network coding | 11 | 0.55 | 2014 |
Performance evaluation of a peer-to-peer backup system using buffering at the edge. | 0 | 0.34 | 2014 |
Heuristical top-k: fast estimation of centralities in complex networks. | 3 | 0.42 | 2014 |
(Re)partitioning for stream-enabled computation. | 1 | 0.35 | 2013 |
Bitbox: Eventually Consistent File Sharing. | 1 | 0.35 | 2013 |
Offline social networks: stepping away from the internet | 5 | 0.45 | 2012 |
Availability-Based Methods for Distributed Storage Systems | 9 | 0.55 | 2012 |
On the impact of users availability in OSNs | 7 | 0.46 | 2012 |
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV | 4 | 0.42 | 2012 |
FixMe: A Self-organizing Isolated Anomaly Detection Architecture for Large Scale Distributed Systems. | 2 | 0.41 | 2012 |
Choosing partners based on availability in P2P networks | 3 | 0.37 | 2012 |
Clustered Network Coding for Maintenance in Practical Storage Systems | 0 | 0.34 | 2012 |
Efficient Peer-To-Peer Backup Services Through Buffering At The Edge | 3 | 0.39 | 2011 |
Second order centrality: Distributed assessment of nodes criticity in complex networks | 23 | 1.16 | 2011 |
Distributed overlay maintenance with application to data consistency | 0 | 0.34 | 2011 |
Pretty Private Group Management | 0 | 0.34 | 2011 |
Centralities: capturing the fuzzy notion of importance in social graphs | 15 | 0.86 | 2009 |
Finding Good Partners in Availability-Aware P2P Networks | 14 | 0.75 | 2009 |
Energy aware self-organizing density management in wireless sensor networks | 5 | 0.46 | 2008 |
Evaluating the Quality of a Network Topology through Random Walks | 0 | 0.34 | 2008 |
SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems | 3 | 0.44 | 2008 |
Distributed churn measurement in arbitrary networks | 3 | 0.39 | 2008 |
Exploring the interdisciplinary connections of gossip-based systems | 14 | 0.75 | 2007 |
Peer counting and sampling in overlay networks based on random walks | 23 | 0.89 | 2007 |
Peer to peer size estimation in large and dynamic networks: A comparative study | 33 | 1.50 | 2006 |
Peer counting and sampling in overlay networks: random walk methods | 117 | 3.72 | 2006 |