-
2
-
-
0038107564
-
A stochastic process on the hypercube with applications to peer-to-peer networks
-
M. Adler, E. Halperin, R. M. Karp, and V. V. Vazirani. A stochastic process on the hypercube with applications to peer-to-peer networks. In Proc. of STOC'03, pages 575-584.
-
Proc. of STOC'03
, pp. 575-584
-
-
Adler, M.1
Halperin, E.2
Karp, R.M.3
Vazirani, V.V.4
-
3
-
-
0038416064
-
Skip graphs
-
Baltimore, MD, USA, 12-14 Jan
-
J. Aspnes and G. Shah. Skip graphs. In Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 384-393, Baltimore, MD, USA, 12-14 Jan. 2003.
-
(2003)
Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 384-393
-
-
Aspnes, J.1
Shah, G.2
-
5
-
-
33746784297
-
A case study in building layered dht applications
-
Aug
-
Y. Chawathe, S. Ramabhadran, S. Ratnasamy, A. LaMarca, J. Heller-stein, and S. Shenker. A case study in building layered dht applications. In Proceedings of ACM Sigcomm, Aug. 2005.
-
(2005)
Proceedings of ACM Sigcomm
-
-
Chawathe, Y.1
Ramabhadran, S.2
Ratnasamy, S.3
LaMarca, A.4
Heller-stein, J.5
Shenker, S.6
-
7
-
-
39049111696
-
-
GEANT Backbone Network
-
GEANT Backbone Network, http://www.dante.net.
-
-
-
-
8
-
-
3042827192
-
IrisNet: An architecture for a world-wide sensor web
-
Oct
-
P. B. Gibbons, B. Karp, Y. Ke, S. Nath, and S. Seshan. IrisNet: An architecture for a world-wide sensor web. IEEE Pervasive Computing, 2(4), Oct. 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.4
-
-
Gibbons, P.B.1
Karp, B.2
Ke, Y.3
Nath, S.4
Seshan, S.5
-
9
-
-
2442425480
-
The impact of dht routing geometry on resilience and proximity
-
K. Gummadi, R. Gummadi, S. Ratnasamy, S. Shenker, and I. Sotica. The impact of dht routing geometry on resilience and proximity. ACM SIGCOMM, 2003.
-
ACM SIGCOMM, 2003
-
-
Gummadi, K.1
Gummadi, R.2
Ratnasamy, S.3
Shenker, S.4
Sotica, I.5
-
10
-
-
84888527471
-
Querying the Internet with PIER
-
R. Huebsch, J. M. Hellerstein, N. Lanham, B. T. Loo, S. Shenker, and I. Stoica. Querying the Internet with PIER. In Proceedings of VLDB, 2003.
-
Proceedings of VLDB, 2003
-
-
Huebsch, R.1
Hellerstein, J.M.2
Lanham, N.3
Loo, B.T.4
Shenker, S.5
Stoica, I.6
-
15
-
-
33847264582
-
Mining anomalies using traffic distributions
-
Technical Report BUCS-TR-2005-002, Department of Computer Science, Boston University, Feb
-
A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic distributions. Technical Report BUCS-TR-2005-002, Department of Computer Science, Boston University, Feb 2004.
-
(2004)
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
16
-
-
4544292493
-
Failure recovery for structured p2p networks: Protocol design and performance evaluation
-
S. Lam and H. Liu. Failure recovery for structured p2p networks: protocol design and performance evaluation. ACM SIGMETRICS, 2004.
-
(2004)
ACM SIGMETRICS
-
-
Lam, S.1
Liu, H.2
-
19
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Dec
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23), Dec. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23
-
-
Paxson, V.1
-
22
-
-
0034775826
-
A scalable content-addressable network
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In Proceedings of SIGCOMM 2001, pages 161-172.
-
(2001)
Proceedings of SIGCOMM
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Schenker, S.5
-
23
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of Usenix LISA, 1999.
-
(1999)
Proceedings of Usenix LISA
-
-
Roesch, M.1
-
26
-
-
39049167819
-
-
B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Report UCB/CSD-01-1141, U.C. Berkeley, April 2001.
-
B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Report UCB/CSD-01-1141, U.C. Berkeley, April 2001.
-
-
-
|