Luis López

Affiliations:
  • King Juan Carlos University, LADyR, GSyC, ESCET, Spain


According to our database1, Luis López authored at least 16 papers between 2005 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Resource location based on precomputed partial random walks in dynamic networks.
Comput. Networks, 2016

2015
Improving resource location with locally precomputed partial random walks.
Computing, 2015

2012
Reliable Internet-Based Master-Worker Computing in the Presence of Malicious Workers.
Parallel Process. Lett., 2012

A model of self-avoiding random walks for searching complex networks.
Networks, 2012

Resource location based on partial random walks in networks with resource dynamics.
Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems, 2012

2010
Performance of random walks in one-hop replication networks.
Comput. Networks, 2010

2009
Adversarial Queueing Model for Continuous Network Dynamics.
Theory Comput. Syst., 2009

Self-managed topologies in P2P networks.
Comput. Networks, 2009

2007
A game theoretic comparison of TCP and digital fountain based protocols.
Comput. Networks, 2007

2006
Reliably Executing Tasks in the Presence of Untrusted Entities.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

A Topology Self-adaptation Mechanism for Efficient Resource Location.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

DANTE: A Self-adapting Peer-to-Peer System.
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006

2005
A mathematical model for the TCP Tragedy of the Commons.
Theor. Comput. Sci., 2005

Reliably Executing Tasks in the Presence of Malicious Processors.
Proceedings of the Distributed Computing, 19th International Conference, 2005

Adversarial Queueing Model for Continuous Network Dynamics.
Proceedings of the Mathematical Foundations of Computer Science 2005, 2005

A Game Theoretic Analysis of Protocols Based on Fountain Codes.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005


  Loading...