-
1
-
-
34548273006
-
Gossip-based Peer Sampling
-
Jelasity, M., Voulgaris, S., Guerraoui, R., Kermarrec, A.M., van Steen, M.: Gossip-based Peer Sampling. ACM Transaction on Computer System 25(3) (2007)
-
(2007)
ACM Transaction on Computer System
, vol.25
, pp. 3
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.M.4
Van Steen, M.5
-
2
-
-
77949427879
-
On Gossip and Populations
-
Kutten, S., Žerovnik, J. (eds.) SIROCCO 2009. Springer, Heidelberg
-
Bertier, M., Busnel, Y., Kermarrec, A.M.: On Gossip and Populations. In: Kutten, S., Žerovnik, J. (eds.) SIROCCO 2009. LNCS, vol. 5869, pp. 72-86. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5869
, pp. 72-86
-
-
Bertier, M.1
Busnel, Y.2
Kermarrec, A.M.3
-
3
-
-
23944490662
-
Simple Efficient Load Balancing Algorithms for Peer-to-Peer
-
Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. Springer, Heidelberg
-
Karger, D.R., Ruhl, M.: Simple Efficient Load Balancing Algorithms for Peer-to-Peer. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 131-140. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3279
, pp. 131-140
-
-
Karger, D.R.1
Ruhl, M.2
-
4
-
-
0036374187
-
Search and Replication in Unstructured Peer-to-Peer Networks
-
Lv, Q., Cao, P., Cohen, E., Li, K., Shenker, S.: Search and Replication in Unstructured Peer-to-Peer Networks. In: Proceedings of the International Conference on Supercomputing (ICS), pp. 84-95 (2002)
-
(2002)
Proceedings of the International Conference on Supercomputing (ICS)
, pp. 84-95
-
-
Lv, Q.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
5
-
-
33748700606
-
Peer Counting and Sampling in Overlay Networks: Random Walk Methods
-
ACM Press, New York
-
Massoulié, L., Merrer, E.L., Kermarrec, A.M., Ganesh, A.: Peer Counting and Sampling in Overlay Networks: Random Walk Methods. In: Proceedings of the 25th Annual Symposium on Principles of Distributed Computing (PODC), pp. 123-132. ACM Press, New York (2006)
-
(2006)
Proceedings of the 25th Annual Symposium on Principles of Distributed Computing (PODC)
, pp. 123-132
-
-
Massoulié, L.1
Merrer, E.L.2
Kermarrec, A.M.3
Ganesh, A.4
-
6
-
-
77950963562
-
A Formal Characterization of Uniform Peer Sampling Based on View Shuffling
-
IEEE Computer Society, Los Alamitos
-
Busnel, Y., Beraldi, R., Baldoni, R.: A Formal Characterization of Uniform Peer Sampling Based on View Shuffling. In: Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 360-365. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
, pp. 360-365
-
-
Busnel, Y.1
Beraldi, R.2
Baldoni, R.3
-
7
-
-
70350633793
-
Correcness of Gossip-Based Membership under Message Loss
-
ACM Press, New York
-
Gurevich, M., Keidar, I.: Correcness of Gossip-Based Membership under Message Loss. In: Proceedings of the 28th Annual Symposium on Principles of Distributed Computing (PODC), Calgary, AL, Canada. ACM Press, New York (2009)
-
(2009)
Proceedings of the 28th Annual Symposium on Principles of Distributed Computing (PODC), Calgary, AL, Canada
-
-
Gurevich, M.1
Keidar, I.2
-
8
-
-
67650427144
-
An Analytical Model of Information Dissemination for a Gossip-based Protocol
-
Bakhshi, R., Gavidia, D., Fokkink, W., van Steen, M.: An Analytical Model of Information Dissemination for a Gossip-based Protocol. Computer Networks 53(13), 2288-2303 (2009)
-
(2009)
Computer Networks
, vol.53
, Issue.13
, pp. 2288-2303
-
-
Bakhshi, R.1
Gavidia, D.2
Fokkink, W.3
Van Steen, M.4
-
9
-
-
0034516311
-
Randomized Rumor Spreading
-
IEEE Computer Society, Los Alamitos
-
Karp, R., Schindelhauer, C., Shenker, S., Vocking, B.: Randomized Rumor Spreading. In: the 41st Annual Symposium on Foundations of Computer Science (FOCS), p. 565. IEEE Computer Society, Los Alamitos (2000)
-
(2000)
The 41st Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 565
-
-
Karp, R.1
Schindelhauer, C.2
Shenker, S.3
Vocking, B.4
-
10
-
-
22044433190
-
CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays
-
Voulgaris, S., Gavidia, D., van Steen, M.: CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays. Journal of Network System Management 13(2), 197-217 (2005)
-
(2005)
Journal of Network System Management
, vol.13
, Issue.2
, pp. 197-217
-
-
Voulgaris, S.1
Gavidia, D.2
Van Steen, M.3
-
11
-
-
67349214053
-
On Unbiased Sampling for Unstructured Peer-to-Peer Networks
-
Stutzbach, D., Rejaie, R., Duffield, N., Sen, S., Willinger, W.: On Unbiased Sampling for Unstructured Peer-to-Peer Networks. IEEE/ACM Transactions on Networking 17(02), 377-390 (2009)
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.2
, pp. 377-390
-
-
Stutzbach, D.1
Rejaie, R.2
Duffield, N.3
Sen, S.4
Willinger, W.5
-
12
-
-
11944253901
-
-
2nd edn. Cambridge University Press, Cambridge
-
Bollobás, B.: Random Graphs, 2nd edn. Cambridge University Press, Cambridge (2001)
-
(2001)
Random Graphs
-
-
Bollobás, B.1
-
13
-
-
25844500356
-
Non-uniform Random Membership Management in Peer-to-Peer Networks
-
IEEE Press, Los Alamitos
-
Zhong, M., Shen, K., Seiferas, J.: Non-uniform Random Membership Management in Peer-to-Peer Networks. In: Proceedings of the 24th Annual Joint Conference of the Computer and Communications Societies (INFOCOM). IEEE Press, Los Alamitos (2005)
-
(2005)
Proceedings of the 24th Annual Joint Conference of the Computer and Communications Societies (INFOCOM)
-
-
Zhong, M.1
Shen, K.2
Seiferas, J.3
-
14
-
-
33749593067
-
Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks
-
Awan, A., Ferreira, R.A., Jagannathan, S., Grama, A.: Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS (2006)
-
Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS (2006)
-
-
Awan, A.1
Ferreira, R.A.2
Jagannathan, S.3
Grama, A.4
-
15
-
-
84947265806
-
Security Considerations for Peer-to-Peer Distributed Hash Tables
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
-
Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261-269. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
16
-
-
67650523874
-
Brahms: Byzantine Resilient Random Membership Sampling
-
Bortnikov, E., Gurevich, M., Keidar, I., Kliot, G., Shraer, A.: Brahms: Byzantine Resilient Random Membership Sampling. Computer Networks 53, 2340-2359 (2009);
-
(2009)
Computer Networks
, vol.53
, pp. 2340-2359
-
-
Bortnikov, E.1
Gurevich, M.2
Keidar, I.3
Kliot, G.4
Shraer, A.5
-
18
-
-
35048895724
-
Group Spreading: A Protocol for Provably Secure Distributed Name Service
-
Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. Springer, Heidelberg
-
Awerbuch, B., Scheideler, C.: Group Spreading: A Protocol for Provably Secure Distributed Name Service. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 183-195. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3142
, pp. 183-195
-
-
Awerbuch, B.1
Scheideler, C.2
-
20
-
-
34547492967
-
Eclipse Attacks on Overlay Networks: Threats and Defenses
-
Singh, A., Ngan, T.W., Druschel, P., Wallach, D.S.: Eclipse Attacks on Overlay Networks: Threats and Defenses. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM (2006)
-
Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM (2006)
-
-
Singh, A.1
Ngan, T.W.2
Druschel, P.3
Wallach, D.S.4
-
21
-
-
27944459744
-
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
-
Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS (2005)
-
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS (2005)
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
22
-
-
84947273682
-
The Sybil Attack
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
-
Douceur, J., Donath, J.S.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.1
Donath, J.S.2
-
24
-
-
77950987644
-
Analytical Study of Adversarial Strategies in Cluster-based Overlays
-
Anceaume, E., Brasileiro, F.V., Ludinard, R., Sericola, B., Tronel, F.: Analytical Study of Adversarial Strategies in Cluster-based Overlays. In: Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 293-298 (2009)
-
(2009)
Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
, pp. 293-298
-
-
Anceaume, E.1
Brasileiro, F.V.2
Ludinard, R.3
Sericola, B.4
Tronel, F.5
-
25
-
-
84978382732
-
Secure Routing for Structured Peer-to-peer Overlay Networks
-
ACM, New York
-
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure Routing for Structured Peer-to-peer Overlay Networks. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), pp. 299-314. ACM, New York (2002)
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
26
-
-
35248832638
-
Asymptotically Efficient Approaches to Fault-tolerance in Peer-to-Peer Networks
-
Fich, F.E. (ed.) DISC 2003. Springer, Heidelberg
-
Hildrum, K., Kubiatowicz, J.: Asymptotically Efficient Approaches to Fault-tolerance in Peer-to-Peer Networks. In: Fich, F.E. (ed.) DISC 2003. LNCS, vol. 2848, pp. 321-336. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2848
, pp. 321-336
-
-
Hildrum, K.1
Kubiatowicz, J.2
-
27
-
-
27144478012
-
Making Chord Robust to Byzantine Attacks
-
Brodal, G.S., Leonardi, S. (eds.) ESA 2005. Springer, Heidelberg
-
Fiat, A., Saia, J., Young, M.: Making Chord Robust to Byzantine Attacks. In: Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS, vol. 3669, pp. 803-814. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3669
, pp. 803-814
-
-
Fiat, A.1
Saia, J.2
Young, M.3
-
28
-
-
57949089624
-
PeerCube: An Hypercube-based P2P Overlay Robust against Collusion and Churn
-
Anceaume, E., Brasileiro, F., Ludinard, R., Ravoaja, A.: PeerCube: an Hypercube-based P2P Overlay Robust against Collusion and Churn. In: Proceedings of the IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp. 15-24 (2008)
-
(2008)
Proceedings of the IEEE International Conference on Self-Adaptive and Self-Organizing Systems
, pp. 15-24
-
-
Anceaume, E.1
Brasileiro, F.2
Ludinard, R.3
Ravoaja, A.4
-
29
-
-
70949087670
-
Induced Churn as Shelter from Routing-Table Poisoning
-
Condie, T., Kacholia, V., Sank, S., Hellerstein, J.M., Maniatis, P.: Induced Churn as Shelter from Routing-Table Poisoning. In: Proceedings of the International Network and Distributed System Security Symposium, NDSS (2006)
-
Proceedings of the International Network and Distributed System Security Symposium, NDSS (2006)
-
-
Condie, T.1
Kacholia, V.2
Sank, S.3
Hellerstein, J.M.4
Maniatis, P.5
-
30
-
-
33750285481
-
SybilGuard: Defending against Sybil Attacks via Social Networks
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: Defending against Sybil Attacks via Social Networks. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp. 267-278 (2006)
-
(2006)
Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
31
-
-
45749116664
-
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
-
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), pp. 3-17 (2008)
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (SP)
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
|