-
1
-
-
32344451942
-
Correctness of a gossip based membership protocol
-
A. Allavena, A. Demers, J.E. Hopcroft, Correctness of a gossip based membership protocol, in: ACM PODC, 2005, pp. 292-301.
-
(2005)
ACM PODC
, pp. 292-301
-
-
Allavena, A.1
Demers, A.2
Hopcroft, J.E.3
-
2
-
-
0029719644
-
The space complexity of approximating the frequency moments
-
STOC
-
N. Alon, Y. Matias, M. Szegedy, The space complexity of approximating the frequency moments, in: Proc. of the 28th Annual ACM Symposium on Theory of Computing (STOC), 1996, pp. 20-29.
-
(1996)
Proc. of the 28th Annual ACM Symposium on Theory of Computing
, pp. 20-29
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
3
-
-
27744501621
-
-
John Wiley and Sons, Inc.
-
Attiya H., and Welch J. Distributed Computing Fundamentals, Simulations, and Advanced Topics (2004), John Wiley and Sons, Inc.
-
(2004)
Distributed Computing Fundamentals, Simulations, and Advanced Topics
-
-
Attiya, H.1
Welch, J.2
-
4
-
-
35048895724
-
-
B. Awerbuch, C. Scheideler, Group spreading: a protocol for provably secure distributed name service, in: ICALP, 2004, pp. 183-195.
-
B. Awerbuch, C. Scheideler, Group spreading: a protocol for provably secure distributed name service, in: ICALP, 2004, pp. 183-195.
-
-
-
-
5
-
-
84885718443
-
-
B. Awerbuch, C. Scheideler, Robust random number generation for peer-to-peer systems, in: OPODIS, 2006, pp. 275-289.
-
B. Awerbuch, C. Scheideler, Robust random number generation for peer-to-peer systems, in: OPODIS, 2006, pp. 275-289.
-
-
-
-
7
-
-
67650522021
-
-
B. Awerbuch, C. Scheideler, Towards scalable and robust overlay networks, in: IPTPS, 2006.
-
B. Awerbuch, C. Scheideler, Towards scalable and robust overlay networks, in: IPTPS, 2006.
-
-
-
-
8
-
-
10644244988
-
Sampling from a moving window over streaming data
-
SODA
-
B. Babcock, M. Datar, R. Motwani, Sampling from a moving window over streaming data, in: Proc. of the 13th annual ACM-SIAM symposium on Discrete algorithms (SODA), 2002, pp. 633-634.
-
(2002)
Proc. of the 13th annual ACM-SIAM symposium on Discrete algorithms
, pp. 633-634
-
-
Babcock, B.1
Datar, M.2
Motwani, R.3
-
9
-
-
67650525253
-
-
G. Badishi, I. Keidar, A. Sasson, Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast, in: DSN, June-July 2004, pp. 201-210.
-
G. Badishi, I. Keidar, A. Sasson, Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast, in: DSN, June-July 2004, pp. 201-210.
-
-
-
-
10
-
-
33748084385
-
RaWMS - random walk based lightweight membership service for wireless ad hoc networks
-
Z. Bar-Yossef, R. Friedman, G. Kliot, RaWMS - random walk based lightweight membership service for wireless ad hoc networks, in: ACM MobiHoc, 2006, pp. 238-249.
-
(2006)
ACM MobiHoc
, pp. 238-249
-
-
Bar-Yossef, Z.1
Friedman, R.2
Kliot, G.3
-
11
-
-
34250665891
-
-
Z. Bar-Yossef, M. Gurevich, Random sampling from a search engine's index, in: Proc. of 15th WWW, 2006, pp. 367-376, Full version available as CCIT Report #598, Department of Electrical Engineering, Technion.
-
Z. Bar-Yossef, M. Gurevich, Random sampling from a search engine's index, in: Proc. of 15th WWW, 2006, pp. 367-376, Full version available as CCIT Report #598, Department of Electrical Engineering, Technion.
-
-
-
-
12
-
-
84959038140
-
Counting distinct elements in a data stream
-
RANDOM
-
Z. Bar-Yossef, T.S. Jayram, R. Kumar, D. Sivakumar, L. Trevisan, Counting distinct elements in a data stream, in: Proc. of the Sixth International Workshop on Randomization and Approximation Techniques (RANDOM), 2002, pp. 1-10.
-
(2002)
Proc. of the Sixth International Workshop on Randomization and Approximation Techniques
, pp. 1-10
-
-
Bar-Yossef, Z.1
Jayram, T.S.2
Kumar, R.3
Sivakumar, D.4
Trevisan, L.5
-
13
-
-
0001818392
-
Bimodal multicast
-
Birman K.P., Hayden M., Ozkasap O., Xiao Z., Budiu M., and Minsky Y. Bimodal multicast. ACM Trans. Comput. Syst. 17 2 (1999) 41-88
-
(1999)
ACM Trans. Comput. Syst.
, vol.17
, Issue.2
, pp. 41-88
-
-
Birman, K.P.1
Hayden, M.2
Ozkasap, O.3
Xiao, Z.4
Budiu, M.5
Minsky, Y.6
-
14
-
-
0034207121
-
Min-wise independent permutations
-
Broder A.Z., Charikar M., Frieze A.M., and Mitzenmacher M. Min-wise independent permutations. J. Comput. Syst. Sci. 60 3 (2000) 630-659
-
(2000)
J. Comput. Syst. Sci.
, vol.60
, Issue.3
, pp. 630-659
-
-
Broder, A.Z.1
Charikar, M.2
Frieze, A.M.3
Mitzenmacher, M.4
-
15
-
-
2442603590
-
-
OSDI
-
M. Castro, P. Druschel, A.J. Ganesh, A.I.T. Rowstron, D.S. Wallach, Secure routing for structured peer-to-peer overlay networks, in: OSDI, 2002.
-
(2002)
Secure routing for structured peer-to-peer overlay networks
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.J.3
Rowstron, A.I.T.4
Wallach, D.S.5
-
16
-
-
70949087670
-
Induced churn as shelter from routing-table poisoning
-
T. Condie, V. Kacholia, S. Sankararaman, J. Hellerstein, P. Maniatis, Induced churn as shelter from routing-table poisoning, in: Proc. of the 13th Annual Network and Distributed System Security Symposium (NDSS), 2006.
-
(2006)
Proc. of the 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Condie, T.1
Kacholia, V.2
Sankararaman, S.3
Hellerstein, J.4
Maniatis, P.5
-
17
-
-
0036767270
-
Maintaining Stream Statistics over Sliding Windows
-
Datar M., Gionis A., Indyk P., and Motwani R. Maintaining Stream Statistics over Sliding Windows. SIAM J. Comput. 31 6 (2002) 1794-1813
-
(2002)
SIAM J. Comput.
, vol.31
, Issue.6
, pp. 1794-1813
-
-
Datar, M.1
Gionis, A.2
Indyk, P.3
Motwani, R.4
-
18
-
-
85030178366
-
-
A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, D. Terry. epidemic algorithms for replicated database management, in: ACM PODC, August 1987, pp. 1-12.
-
A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, D. Terry. epidemic algorithms for replicated database management, in: ACM PODC, August 1987, pp. 1-12.
-
-
-
-
19
-
-
0033335116
-
-
SRDS
-
D. Malkhi, Y. Mansour, M. K. Reiter, On diffusing updates in a Byzantine environment, in: SRDS, 1999, pp. 134-143.
-
(1999)
On diffusing updates in a Byzantine environment
, pp. 134-143
-
-
Malkhi, D.1
Mansour, Y.2
Reiter, M.K.3
-
21
-
-
2442558299
-
Lightweight probabilistic broadcast
-
Eugster P.Th., Guerraoui R., Handurukande S.B., Kouznetsov P., and Kermarrec A.-M. Lightweight probabilistic broadcast. ACM Trans. Comput. Syst. (TOCS) 21 4 (2003) 341-374
-
(2003)
ACM Trans. Comput. Syst. (TOCS)
, vol.21
, Issue.4
, pp. 341-374
-
-
Eugster, P.Th.1
Guerraoui, R.2
Handurukande, S.B.3
Kouznetsov, P.4
Kermarrec, A.-M.5
-
22
-
-
0037330403
-
Peer-to-Peer membership management for gossip-based protocols
-
Ganesh A.J., Kermarrec A.-M., and Massoulie L. Peer-to-Peer membership management for gossip-based protocols. IEEE Trans. Comput. 52 2 (2003) 139-149
-
(2003)
IEEE Trans. Comput.
, vol.52
, Issue.2
, pp. 139-149
-
-
Ganesh, A.J.1
Kermarrec, A.-M.2
Massoulie, L.3
-
23
-
-
8344250202
-
-
C. Gkantsidis, M. Mihail, A. Saberi, Random walks in peer-to-peer networks, in: IEEE INFOCOM, 2004, pp. 130-140.
-
C. Gkantsidis, M. Mihail, A. Saberi, Random walks in peer-to-peer networks, in: IEEE INFOCOM, 2004, pp. 130-140.
-
-
-
-
24
-
-
0022793132
-
How to construct random functions
-
Goldreich O., Goldwasser S., and Micali S. How to construct random functions. JACM 33 4 (1986) 792-807
-
(1986)
JACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
25
-
-
0041964688
-
A generalization of Krasnoselski's theorem on the real line
-
Hillam B.P. A generalization of Krasnoselski's theorem on the real line. Math. Mag. 48 (1975) 167-168
-
(1975)
Math. Mag.
, vol.48
, pp. 167-168
-
-
Hillam, B.P.1
-
26
-
-
34548273006
-
Gossip-based peer sampling
-
Jelasity M., Voulgaris S., Guerraoui R., Kermarrec A.-M., and van Steen M. Gossip-based peer sampling. ACM Trans. Comput. Syst. (TOCS) 25 3 (2007) 8
-
(2007)
ACM Trans. Comput. Syst. (TOCS)
, vol.25
, Issue.3
, pp. 8
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.-M.4
van Steen, M.5
-
28
-
-
34748899427
-
Fireflies: Scalable support for intrusion-tolerant network overlays
-
EuroSys
-
H. Johansen, A. Allavena, R. van Renesse, Fireflies: scalable support for intrusion-tolerant network overlays, in: Proc. of the 2006 EuroSys Conference (EuroSys), 2006, pp. 3-13.
-
(2006)
Proc. of the 2006 EuroSys Conference
, pp. 3-13
-
-
Johansen, H.1
Allavena, A.2
van Renesse, R.3
-
29
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web
-
D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahy, Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web, in: Proc. of the ACM STOC, 1997, pp. 654-663.
-
(1997)
Proc. of the ACM STOC
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, T.3
Levine, M.4
Lewin, D.5
Panigrahy, R.6
-
31
-
-
10444222507
-
Choosing a random peer
-
V. King, J. Saia, Choosing a random peer, in: ACM PODC, 2004, pp. 125-130.
-
(2004)
ACM PODC
, pp. 125-130
-
-
King, V.1
Saia, J.2
-
32
-
-
0041472348
-
-
C. Law, K. Siu, Distributed construction of random expander networks, in: IEEE INFOCOM, April 2003, pp. 2133-2143.
-
C. Law, K. Siu, Distributed construction of random expander networks, in: IEEE INFOCOM, April 2003, pp. 2133-2143.
-
-
-
-
33
-
-
85043380426
-
-
H.C. Li, A. Clement, E.L. Wong, J. Napper, I. Roy, L. Alvisi, M. Dahlin, BAR gossip, in: Proc. of the Seventh USENIX Symp. on Oper. Systems Design and Impl. (OSDI), November 2006, pp. 45-58.
-
H.C. Li, A. Clement, E.L. Wong, J. Napper, I. Roy, L. Alvisi, M. Dahlin, BAR gossip, in: Proc. of the Seventh USENIX Symp. on Oper. Systems Design and Impl. (OSDI), November 2006, pp. 45-58.
-
-
-
-
34
-
-
0036374187
-
Search and replication in unstructured peer-to-peer networks
-
C. Lv, P. Cao, E. Cohen, K. Li, S. Shenker, Search and replication in unstructured peer-to-peer networks, in: Proc. of the 16th Intr. Conference on Supercomputing (ICS), 2002, pp. 84-95.
-
(2002)
Proc. of the 16th Intr. Conference on Supercomputing (ICS)
, pp. 84-95
-
-
Lv, C.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
36
-
-
33748700606
-
Peer counting and sampling in overlay networks: Random walk methods
-
L. Massoulie, E. Le Merrer, A.-M. Kermarrec, A.J. Ganesh, Peer counting and sampling in overlay networks: random walk methods, in: ACM PODC, 2006, pp. 123-132.
-
(2006)
ACM PODC
, pp. 123-132
-
-
Massoulie, L.1
Le Merrer, E.2
Kermarrec, A.-M.3
Ganesh, A.J.4
-
37
-
-
18844460674
-
-
R. Melamed, I. Keidar, Araneola: a scalable reliable multicast system for dynamic environments, in: IEEE NCA, 2004, pp. 5-14.
-
R. Melamed, I. Keidar, Araneola: a scalable reliable multicast system for dynamic environments, in: IEEE NCA, 2004, pp. 5-14.
-
-
-
-
38
-
-
0017959977
-
Secure communications over insecure channels
-
Merkle R.C. Secure communications over insecure channels. CACM 21 (1978) 294-299
-
(1978)
CACM
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
39
-
-
0037303962
-
Tolerating malicious gossip
-
Minsky Y.M., and Schneider F.B. Tolerating malicious gossip. Dist. Comput. 16 1 (2003) 49-68
-
(2003)
Dist. Comput.
, vol.16
, Issue.1
, pp. 49-68
-
-
Minsky, Y.M.1
Schneider, F.B.2
-
40
-
-
77951438838
-
Defending against eclipse attacks on overlay networks
-
A. Singh, M. Castro, P. Druschel, A. Rowstron, Defending against eclipse attacks on overlay networks, in: ACM SIGOPS European Workshop, 2004.
-
(2004)
ACM SIGOPS European Workshop
-
-
Singh, A.1
Castro, M.2
Druschel, P.3
Rowstron, A.4
-
41
-
-
34547492967
-
-
A. Singh, T.-W. Ngan, P. Druschel, D.S. Wallach, Eclipse attacks on overlay networks: threats and defenses, in: IEEE INFOCOM, 2006.
-
A. Singh, T.-W. Ngan, P. Druschel, D.S. Wallach, Eclipse attacks on overlay networks: threats and defenses, in: IEEE INFOCOM, 2006.
-
-
-
-
42
-
-
0022026217
-
Random sampling with a reservoir
-
Vitter J.S. Random sampling with a reservoir. ACM Trans. Math. Softw. 11 1 (1985) 37-57
-
(1985)
ACM Trans. Math. Softw.
, vol.11
, Issue.1
, pp. 37-57
-
-
Vitter, J.S.1
-
43
-
-
22044433190
-
CYCLON: inexpensive membership management for unstructured P2P overlays
-
Voulgaris S., Gavidia D., and van Steen M. CYCLON: inexpensive membership management for unstructured P2P overlays. J. Netw. Syst. Manage. 13 2 (2005) 197-217
-
(2005)
J. Netw. Syst. Manage.
, vol.13
, Issue.2
, pp. 197-217
-
-
Voulgaris, S.1
Gavidia, D.2
van Steen, M.3
-
44
-
-
45749109010
-
SybilGuard: defending against Sybil attacks via social networks
-
Yu H., Kaminsky M., Gibbons P.B., and Flaxman A. SybilGuard: defending against Sybil attacks via social networks. IEEE/ACM Trans. Netw. (ToN) 16 3 (2008) 576-589
-
(2008)
IEEE/ACM Trans. Netw. (ToN)
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|