-
1
-
-
47949121211
-
-
http://www.symantec.com/avcenter/security/Content/7680.html.
-
-
-
-
4
-
-
47949088102
-
-
B. Anthony and G. Blelloch. http://www.cs.cmu.edu/afs/cs/project/ pscicoguyb/realworld.
-
B. Anthony and G. Blelloch. http://www.cs.cmu.edu/afs/cs/project/ pscicoguyb/realworld.
-
-
-
-
6
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and S. Wallach. Secure routing for structured peer-to-peer overlay networks. In OSDI'02, 2002.
-
(2002)
OSDI'02
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, S.5
-
7
-
-
0141639922
-
Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. InACM
-
Y. Chen and A. Liestman. Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. InACM MOBIHOC'02, 2002.
-
(2002)
MOBIHOC'02
-
-
Chen, Y.1
Liestman, A.2
-
9
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In SOSP, 2005.
-
(2005)
SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
12
-
-
19644369843
-
Approximation algorithm for connected dominating sets
-
Apr
-
S. Guha and S. Khuller. Approximation algorithm for connected dominating sets. In Algorithmica, Apr. 1998.
-
(1998)
Algorithmica
-
-
Guha, S.1
Khuller, S.2
-
13
-
-
0032131147
-
A fast and high quality multilevel scheme for partitioning irregular graphs
-
G. Karypis and V. Kumar. A fast and high quality multilevel scheme for partitioning irregular graphs. In SIAM Journal on Scientific Computing, 1998.
-
(1998)
SIAM Journal on Scientific Computing
-
-
Karypis, G.1
Kumar, V.2
-
16
-
-
47949104148
-
A self-repairing p2p system resilient to dynamic adversarial churn
-
F. Kuhn, S. Schmid, and R. Wattenhofer. A self-repairing p2p system resilient to dynamic adversarial churn. In OSDI'02, 2002.
-
(2002)
OSDI'02
-
-
Kuhn, F.1
Schmid, S.2
Wattenhofer, R.3
-
17
-
-
0029205669
-
Fast distributed construction of k-dominating sets and applications
-
S. Kutten and D. Peleg. Fast distributed construction of k-dominating sets and applications. In PODC'95, 1995.
-
(1995)
PODC'95
-
-
Kutten, S.1
Peleg, D.2
-
18
-
-
31844441738
-
On the effectiveness of automatic patching
-
M.Vojnovic and A. Ganesh. On the effectiveness of automatic patching. In WORM'05, 2005.
-
(2005)
WORM'05
-
-
Vojnovic, M.1
Ganesh, A.2
-
19
-
-
0038742218
-
Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design
-
M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. In IEEE Internet Computing Journal, 2002.
-
(2002)
IEEE Internet Computing Journal
-
-
Ripeanu, M.1
Foster, I.2
Iamnitchi, A.3
-
20
-
-
84878711344
-
Characterizing unstructured overlay topologies in modern p2p file-sharing systems
-
D. Stutzbach, R. Rejaie, and S. Sen. Characterizing unstructured overlay topologies in modern p2p file-sharing systems. In Internet Measurement Conference, 2005.
-
(2005)
Internet Measurement Conference
-
-
Stutzbach, D.1
Rejaie, R.2
Sen, S.3
-
21
-
-
47949091831
-
-
H. Wang and et al. Shield: Vulnerability-driven network filters for preventing know vulnerability exploits. InACM SIGCOMM, 2004.
-
H. Wang and et al. Shield: Vulnerability-driven network filters for preventing know vulnerability exploits. InACM SIGCOMM, 2004.
-
-
-
-
24
-
-
33746562303
-
A first look at peer-to-peer worms: Threats and denfenses
-
L. Zhou and et al. A first look at peer-to-peer worms: threats and denfenses. In IPTPS'05, 2005.
-
(2005)
IPTPS'05
-
-
Zhou, L.1
and et, al.2
|