Antonio Rocha
Antonio Rocha
Professor of Computer Science, Fluminense Federal University
Verified email at
Cited by
Cited by
A survey of how to use blockchain to secure internet of things and the stalker attack
EF Jesus, VRL Chicarino, CVN De Albuquerque, AAA Rocha
Security and communication networks 2018 (1), 9675050, 2018
Content availability and bundling in swarming systems
DS Menasche, AAA Rocha, B Li, D Towsley, A Venkataramani
Proceedings of the 5th international conference on Emerging networking …, 2009
On the detection of selfish mining and stalker attacks in blockchain networks
V Chicarino, C Albuquerque, E Jesus, A Rocha
Annals of Telecommunications 75, 143-152, 2020
SGLT1 activity in lung alveolar cells of diabetic rats modulates airway surface liquid glucose concentration and bacterial proliferation
TL Oliveira, N Candeia-Medeiros, PM Cavalcante-Araújo, IS Melo, ...
Scientific reports 6 (1), 21752, 2016
Estimating self-sustainability in peer-to-peer swarming systems
DS Menasché, AAA Rocha, EAS e Silva, RM Leao, D Towsley, ...
Performance Evaluation 67 (11), 1243-1258, 2010
Uso de blockchain para privacidade e segurança em internet das coisas
VRL Chicarino, EF Jesus, CVN de Albuquerque, AAA Rocha
Sociedade Brasileira de Computação, 2017
On the possibility of mitigating content pollution in content-centric networking
I Ribeiro, A Rocha, C Albuquerque, F Guimaraes
39th Annual IEEE Conference on Local Computer Networks, 498-501, 2014
Expression of non-acetylatable lysines 10 and 14 of histone H4 impairs transcription and replication in Trypanosoma cruzi
TCP Ramos, VS Nunes, SC Nardelli, B dos Santos Pascoalino, ...
Molecular and biochemical parasitology 204 (1), 1-10, 2015
Efficient network seeding under variable node cost and limited budget for social networks
RC De Souza, DR Figueiredo, AAA Rocha, A Ziviani
Information Sciences 514, 369-384, 2020
Modeling, analysis, measurement and experimentation with the Tangram-II integrated environment
ES e Silva, APC da Silva, AA de A. Rocha, RMM Leao, FP Duarte, ...
Proceedings of the 1st international conference on Performance evaluation …, 2006
Segurança em redes centradas em conteúdo: Vulnerabilidades, ataques e contramedidas
ICG Ribeiro, FQ Guimarães, JF Kazienko, AAA Rocha, PB Velloso, ...
Sociedade Brasileira de Computação, 2012
Implications of peer selection strategies by publishers on the performance of P2P swarming systems
DS Menasché, AA de A. Rocha, EA de Souza e Silva, D Towsley, ...
ACM SIGMETRICS Performance Evaluation Review 39 (3), 55-57, 2011
Calculating the trust of providers through the construction weighted Sec-SLA
A Silva, K Silva, A Rocha, F Queiroz
Future Generation Computer Systems 97, 873-886, 2019
Indícios sobre a correlação entre diferentes métodos diagnósticos em casos de tumor de mama em cadelas
FR Reis, APB Barreira, V Castro, JLC Castro, SMC Suzano, AA Rocha
Revista Eletrônica Novo Enfoque 9 (9), 14-31, 2010
Content pollution mitigation for content-centric networking
I Ribeiro, A Rocha, C Albuquerque, F Guimarães
2016 7th International Conference on the Network of the Future (NOF), 1-5, 2016
Pros & cons of model-based bandwidth control for client-assisted content delivery
A Sharma, A Venkataramani, AA Rocha
2014 sixth international conference on communication systems and networks …, 2014
On the interplay between content popularity and performance in P2P systems
E de Souza e Silva, RMM Leao, D Sadoc Menasché, AA de A. Rocha
International Conference on Quantitative Evaluation of Systems, 3-21, 2013
Dsca: A data stream caching algorithm
AA Rocha, M Dehghan, T Salonidis, T He, D Towsley
Proceedings of the 1st Workshop on Content Caching and Delivery in Wireless …, 2016
Heterogeneous download times in a homogeneous BitTorrent swarm
F Murai, AAA Rocha, DR Figueiredo, EAS e Silva
Computer Networks 56 (7), 1983-2000, 2012
Modeling chunk availability in p2p swarming systems
DS Menasche, AA Aragão Rocha, E de Souza e Silva, RM Meri Leão, ...
ACM SIGMETRICS Performance Evaluation Review 37 (2), 30-32, 2009
The system can't perform the operation now. Try again later.
Articles 1–20