Pietro Michiardi
Cited by
Cited by
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
P Michiardi, R Molva
Advanced communications and multimedia security, 107-121, 2002
Rarest first and choke algorithms are enough
A Legout, G Urvoy-Keller, P Michiardi
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 203-216, 2006
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks
S Zhong, LE Li, YG Liu, YR Yang
Wireless networks 13 (6), 799-816, 2007
Password strength: An empirical analysis
M Dell'Amico, P Michiardi, Y Roudier
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Simulation-based analysis of security exposures in mobile ad hoc networks
P Michiardi, R Molva
European Wireless Conference, 15-17, 2002
A comparative evaluation of outlier detection algorithms: Experiments and analyses
R Domingues, M Filippone, P Michiardi, J Zouaoui
Pattern Recognition 74, 406-421, 2018
A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks
P Michiardi, R Molva
WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks …, 2003
Understanding bittorrent: An experimental perspective
A Legout, G Urvoy-Keller, P Michiardi
Non-cooperative forwarding in ad-hoc networks
E Altman, AA Kherani, P Michiardi, R Molva
International Conference on Research in Networking, 486-498, 2005
Ad hoc networks security
P Michiardi, R Molva
ST Journal of System Research 4 (1), 756-775, 2003
Game theoretic analysis of security in mobile ad hoc networks
P Michiardi, R Molva
Random feature expansions for deep Gaussian processes
K Cutajar, EV Bonilla, P Michiardi, M Filippone
International Conference on Machine Learning, 884-893, 2017
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
P Michiardi, R Molva
Ad hoc networks 3 (2), 193-219, 2005
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
P Michiardi, R Molva
in Mobile Ad Hoc Networks, Institut Eurecom Research Report RR-02-063, 2002
Characterizing user mobility in Second Life
CA La, P Michiardi
Proceedings of the first workshop on Online social networks, 79-84, 2008
Uplink allocation beyond choke/unchoke: or how to divide and conquer best
N Laoutaris, D Carra, P Michiardi
Proceedings of the 2008 ACM CoNEXT Conference, 1-12, 2008
Security in ad hoc networks
R Molva, P Michiardi
IFIP International Conference on Personal Wireless Communications, 756-775, 2003
HFSP: size-based scheduling for Hadoop
M Pastorelli, A Barbuzzi, D Carra, M Dell'Amico, P Michiardi
Big Data, 2013 IEEE International Conference on, 2013, 2013
NG-DBSCAN: scalable density-based clustering for arbitrary data
A Lulli, M Dell'Amico, P Michiardi, L Ricci
Proceedings of the VLDB Endowment 10 (3), 157-168, 2016
Online data backup: A peer-assisted approach
L Toka, M Dell'Amico, P Michiardi
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-10, 2010
The system can't perform the operation now. Try again later.
Articles 1–20