-
1
-
-
67649702011
-
-
Akamai Technologies
-
Akamai Technologies (2006). http://www.akamai.com.
-
(2006)
-
-
-
2
-
-
67649689100
-
-
Alexa Internet
-
Alexa Internet (2006). Alexa web search - top 500. http://www.alexa.com/ site/ds/top-sites?ts-mode=global.
-
(2006)
Alexa web search - top
, vol.500
-
-
-
3
-
-
0037995929
-
SETI@home: An experiment in public-resource computing
-
Anderson, D. P., Cobb, J., Korpela, E., Lebofsky, M., and Werthimer, D. (2002). SETI@home: an experiment in public-resource computing. Commun. ACM, 45(11):56-61.
-
(2002)
Commun. ACM
, vol.45
, Issue.11
, pp. 56-61
-
-
Anderson, D.P.1
Cobb, J.2
Korpela, E.3
Lebofsky, M.4
Werthimer, D.5
-
4
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
36(SI):299-314
-
Castro, M, Druschel, P., Ganesh, A., Rowstron, A., and Wallach, D. S. (2002). Secure routing for structured peer-to-peer overlay networks. SIGOPS Open Syst. Rev., 36(SI):299-314.
-
(2002)
SIGOPS Open Syst. Rev
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
5
-
-
8344273496
-
Efficient search in unstructured peer-to-peer networks
-
Cholvi, V., Felber, P., and Biersack, E. (2004). Efficient search in unstructured peer-to-peer networks. In Proc. SPAA Symposium, pages 271-272.
-
(2004)
Proc. SPAA Symposium
, pp. 271-272
-
-
Cholvi, V.1
Felber, P.2
Biersack, E.3
-
7
-
-
4544243718
-
Towards secure epidemics: Detection and removal of malicious peers in epidemic-style protocols
-
Technical Report UBLCS-2003-14, University of Bologna, Bologna, Italy
-
Jelasity, M., Montresor, A., and Babaoglu, O. (2003). Towards secure epidemics: Detection and removal of malicious peers in epidemic-style protocols. Technical Report UBLCS-2003-14, University of Bologna, Bologna, Italy.
-
(2003)
-
-
Jelasity, M.1
Montresor, A.2
Babaoglu, O.3
-
9
-
-
0036374187
-
Search and replication in unstructured peer-to-peer networks
-
Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S. (2002). Search and replication in unstructured peer-to-peer networks. In Proc. Intl. Conf. on Supercomputing, pages 84-95.
-
(2002)
Proc. Intl. Conf. on Supercomputing
, pp. 84-95
-
-
Lv, Q.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
10
-
-
67649734406
-
Hiding in plain sight, Google seeks more power
-
Markoff, J. and Hansell, S. (2006). Hiding in plain sight, Google seeks more power. New York Times. http://www.nytimes.com/2006/06/14/technology/ 14search.html?pagewanted=l&ei= 5088&en=c96a72bbc5f90a47&ex= 1307937600&partner=rssnyt&emc=rss.
-
(2006)
New York Times
-
-
Markoff, J.1
Hansell, S.2
-
11
-
-
34250826265
-
A conversation with Werner Vogels
-
O'Hanlon, C. (2006). A conversation with Werner Vogels. Queue, 4(4): 14-22.
-
(2006)
Queue
, vol.4
, Issue.4
, pp. 14-22
-
-
O'Hanlon, C.1
-
12
-
-
0002804019
-
Flexible update propagation for weakly consistent replication
-
Petersen, K., Spreitzer, M., Terry, D., Theimer, M., and Demers, A. (1997). Flexible update propagation for weakly consistent replication. In Proc. SOSP Conf.
-
(1997)
Proc. SOSP Conf
-
-
Petersen, K.1
Spreitzer, M.2
Terry, D.3
Theimer, M.4
Demers, A.5
-
13
-
-
33947179375
-
Globule: A collaborative content delivery network
-
Pierre, G. and van Steen, M. (2006). Globule: A collaborative content delivery network. IEEE Communications Magazine, 44(8): 127-133.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.8
, pp. 127-133
-
-
Pierre, G.1
van Steen, M.2
-
14
-
-
33746297451
-
Securely replicated Web documents
-
Popescu, B. C, van Steen, M., Crispo, B., Tanenbaum, A. S., Sacha, J., and Kuz, I. (2005). Securely replicated Web documents. In Proc. IPDPS Conf.
-
(2005)
Proc. IPDPS Conf
-
-
Popescu, B.C.1
van Steen, M.2
Crispo, B.3
Tanenbaum, A.S.4
Sacha, J.5
Kuz, I.6
-
15
-
-
0034775826
-
A scalable content-addressable network
-
Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Schenker, S. (2001). A scalable content-addressable network. In Proc. SIGCOMM Conf., pages 161-172.
-
(2001)
Proc. SIGCOMM Conf
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Schenker, S.5
-
16
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
Rowstron, A. I. T. and Druschel, P. (2001). Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proc. Middleware Conf., pages 329-350.
-
(2001)
Proc. Middleware Conf
, pp. 329-350
-
-
Rowstron, A.I.T.1
Druschel, P.2
-
17
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D. R., Kaashoek, M. F, Dabek, F, and Balakrishnan, H. (2003). Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw., 11(1):17-32
-
(2003)
IEEE/ACM Trans. Netw
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
18
-
-
22044433190
-
CY-CLON: Inexpensive membership management for unstructured P2P overlays
-
Voulgaris, S., Gavidia, D., and Steen, M. (2005). CY-CLON: Inexpensive membership management for unstructured P2P overlays. Journal of Network and Systems Management, 13(2): 197-217.
-
(2005)
Journal of Network and Systems Management
, vol.13
, Issue.2
, pp. 197-217
-
-
Voulgaris, S.1
Gavidia, D.2
Steen, M.3
-
19
-
-
85091097467
-
Reliability and security in the CoDeeN content distribution network
-
Wang, L., Park, K., Pang, R., Pai, V. S., and Peterson, L. L. (2004). Reliability and security in the CoDeeN content distribution network. In Proc. USENIX Technical Conf., pages 171-184.
-
(2004)
Proc. USENIX Technical Conf
, pp. 171-184
-
-
Wang, L.1
Park, K.2
Pang, R.3
Pai, V.S.4
Peterson, L.L.5
|