-
1
-
-
33751077077
-
The computational and storage potential of volunteer computing
-
DOI 10.1109/CCGRID.2006.101, 1630798, Sixth IEEE International Symposium on Cluster Computing and the Grid: Spanning the World and Beyond, 2006. CCGRID 06
-
ANDERSON, D. P. AND FEDAK, G. 2006. The computational and storage potential of volunteer computing. In Proceedings ot the 6th International Symposium on Cluster Computing and the Grid. IEEE Computer Society Press, Los Alamitos, CA, 73-80. (Pubitemid 44761684)
-
(2006)
Sixth IEEE International Symposium on Cluster Computing and the Grid, 2006. CCGRID 06
, pp. 73-80
-
-
Anderson, D.P.1
Fedak, G.2
-
2
-
-
43349088970
-
P2P systems with transactional semantics
-
DOI 10.1145/1353343.1353349, Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings
-
ANTONY, S., AGRAWAL, D., AND ABBADI, A. E. 2008. P2P systems with transactional semantics. In Proceedings of the 11th International Conference on Extended Database Technology. ACM Press, New York, NY, 4-15. (Pubitemid 351661687)
-
(2008)
Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings
, pp. 4-15
-
-
Antony, S.1
Agrawal, D.2
El Abbadi, A.3
-
3
-
-
35048895724
-
Group spreading: A protocol for provably secure distributed name service
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germeny
-
AWERBUCH, B. AND SCHEIDELER, C. 2004. Group spreading: A protocol for provably secure distributed name service. In Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes on Computer Science, vol. 3142. Springer-Verlag, Berlin, Germeny, 183-195.
-
(2004)
Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP)
, vol.3142
, pp. 183-195
-
-
Awerbuch, B.1
Scheideler, C.2
-
6
-
-
48049100352
-
S/Kademlia: A practicable approach towards secure key-based routing
-
IEEE Computer Society Press, Los Alamitos, CA
-
BAUMGART, I. AND MIES, S. 2007. S/Kademlia: A practicable approach towards secure key-based routing. In Proceedings of the 13th International Conference on Parallel and Distributed Systems. IEEE Computer Society Press, Los Alamitos, CA, 2:1-8.
-
(2007)
Proceedings of the 13th International Conference on Parallel and Distributed Systems
, vol.2
, pp. 1-8
-
-
Baumgart, I.1
Mies, S.2
-
7
-
-
32344438389
-
On the establishment of distinct identifies in overlay networks
-
DOI 10.1145/1073814.1073873, Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing, PODC 2005
-
BAZZI, R. A. AND KONJEVOD, G. 2005. On the establishment of distinct identities in overlay networks. In Proceedings of the 24th Symposium on Principles of Distributed Computing. ACM Press, New York, NY, 312-320. (Pubitemid 43218411)
-
(2005)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
, vol.24
, pp. 312-320
-
-
Bazzi, R.A.1
Konjevod, G.2
-
8
-
-
84885784991
-
Hop chains: Secure routing and the establishment of distinct identities
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
BAZZI, R. A., RI CHOI, Y., AND GOUDA, M. G. 2006. Hop chains: Secure routing and the establishment of distinct identities. In Proceedings of the 10th International Conference on Principles of Distributed Systems. Lecture Notes on Computer Science, vol. 4305. Springer-Verlag, Berlin, Germany, 365-379.
-
(2006)
Proceedings of the 10th International Conference on Principles of Distributed Systems
, vol.4305
, pp. 365-379
-
-
Bazzi, R.A.1
Ri Choi, Y.2
Gouda, M.G.3
-
9
-
-
85092898866
-
High Availability, scalable storage, dynamic peer networks: Pick two
-
USENIX, Berkeley, CA
-
BLAKE, C. AND RODRIGUES, R. 2003. High Availability, scalable storage, dynamic peer networks: Pick two. In Proceedings of the 9th Conference on Hot Topics in Operating Systems. USENIX, Berkeley, CA, 1-6.
-
(2003)
Proceedings of the 9th Conference on Hot Topics in Operating Systems
, pp. 1-6
-
-
Blake, C.1
Rodrigues, R.2
-
11
-
-
84934290505
-
A peer-to-peer replica location service based on a distributed hash table
-
IEEE Computer Society Press, Los Alamitos, CA
-
CAI, M., CHERVENAK, A., AND FRANK, M. 2004. A peer-to-peer replica location service based on a distributed hash table. In Proceedings of the 18th International Conference on Supercomputing. IEEE Computer Society Press, Los Alamitos, CA, 56.
-
(2004)
Proceedings of the 18th International Conference on Supercomputing
, vol.56
-
-
Cai, M.1
Chervenak, A.2
Frank, M.3
-
12
-
-
4544303626
-
Performance and dependability of structured peer-to-peer overlays
-
IEEE Computer Society Press, Los Alamitos, CA
-
CASTRO, M., COSTA, M., AND ROWSTRON, A. 2004. Performance and dependability of structured peer-to-peer overlays. In Proceedings of the International Conference on Dependable Systems and Networks. IEEE Computer Society Press, Los Alamitos, CA, 9-18.
-
(2004)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 9-18
-
-
Castro, M.1
Costa, M.2
Rowstron, A.3
-
13
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
ACM Press, New York, NY
-
CASTRO, M., DRUSCHEL, P., GANESH, A., ROWSTRON, A., AND WALLACH, D. S. 2002a. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th Symposium on Operating System Design and Implementation. ACM Press, New York, NY, 299-314.
-
(2002)
Proceedings of the 5th Symposium on Operating System Design and Implementation
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
14
-
-
0036802048
-
Scribe: A large-scale and decentralized application-level multicast infrastructure
-
CASTRO, M., DRUSCHEL, P., KERMARREC, A.-M., AND ROWSTRON, A. 2002b. Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE J. Select. Areas Comm. 20, 8, 100-110.
-
(2002)
IEEE J. Select. Areas Comm.
, vol.20
, Issue.8
, pp. 100-110
-
-
Castro, M.1
Druschel, P.2
Kermarrec, A.-M.3
Rowstron, A.4
-
15
-
-
0345757358
-
Practical Byzantine Fault Tolerance and Proactive Recovery
-
DOI 10.1145/571637.571640
-
CASTRO, M. AND LISKOV, B. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 4, 398-461. (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
16
-
-
33846606374
-
ID mapping attacks in P2P networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
CERRI, D., GHIONI, A., PARABOSCHI, S., AND TIRABOSCHI, S. 2005. ID mapping attacks in P2P networks. In Proceedings of the Global Telecommunications Conference (GLOBECOM). IEEE Computer Society Press, Los Alamitos, CA.
-
(2005)
Proceedings of the Global Telecommunications Conference (GLOBECOM)
-
-
Cerri, D.1
Ghioni, A.2
Paraboschi, S.3
Tiraboschi, S.4
-
17
-
-
70949087670
-
Induced churn as shelter from routing table poisoning
-
The Internet Society, San Diego, CA
-
CONDIE, T., KACHOLIA, V., SANKARARAMAN, S., HELLERSTEIN, J., AND MANIATIS, P. 2006. Induced churn as shelter from routing table poisoning. In Proceedings of the 13th Symposium on Network and Distributed System Security. The Internet Society, San Diego, CA.
-
(2006)
Proceedings of the 13th Symposium on Network and Distributed System Security
-
-
Condie, T.1
Kacholia, V.2
Sankararaman, S.3
Hellerstein, J.4
Maniatis, P.5
-
19
-
-
0002277494
-
Wide-area cooperative storage with CFS
-
ACM Press, New York, NY
-
DABEK, F., KAASHOEK, M. F., KARGER, D., MORRIS, R., AND STOICA, I. 2001. Wide-area cooperative storage with CFS. In Proceedings of the 18th Symposium on Operating System Principles. ACM Press, New York, NY.
-
(2001)
Proceedings of the 18th Symposium on Operating System Principles
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
20
-
-
84875702502
-
Designing a DHT for low latency and high throughput
-
USENIX, Berkeley, CA
-
DABEK, F., LI, J., SIT, E., ROBERTSON, J., KAASHOEK, M. F., AND MORRIS, R. 2004. Designing a DHT for low latency and high throughput. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX, Berkeley, CA, 85-98.
-
(2004)
Proceedings of the 1st Symposium on Networked Systems Design and Implementation
, pp. 85-98
-
-
Dabek, F.1
Li, J.2
Sit, E.3
Robertson, J.4
Kaashoek, M.F.5
Morris, R.6
-
21
-
-
35948933907
-
Survey of six myths and oversights about distributed hash tables' security
-
IEEE Computer Society Press, Los Alamitos, CA
-
DAHAN, S. AND SATO, M. 2007. Survey of six myths and oversights about distributed hash tables' security. In Proceedings of the 27th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society Press, Los Alamitos, CA, 26.
-
(2007)
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops
, vol.26
-
-
Dahan, S.1
Sato, M.2
-
22
-
-
33646038920
-
Sybil-resistant DHT routing
-
Lecture Notes on Computer Science. Springer-Verlag, Berlin, Germany
-
DANEZIS, G., LESNIEWSKI-LAAS, C., KAASHOEK, M. F., AND ANDERSON, R. J. 2005. Sybil-resistant DHT Routing. In Proceedings of the 10th European Symposium on Research in Computer Security. Lecture Notes on Computer Science. Springer-Verlag, Berlin, Germany, 305-318.
-
(2005)
Proceedings of the 10th European Symposium on Research in Computer Security
, pp. 305-318
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.J.4
-
23
-
-
77956551622
-
-
Ph.D. dissertation, Dept. of Computer Science, Stanford University, Stanford, CA
-
DASWANI, N. 2004. Denial-of-service (DoS) attacks and commerce infrastructure in peer-to-peer networks. Ph.D. dissertation, Dept. of Computer Science, Stanford University, Stanford, CA.
-
(2004)
Denial-of-service (DoS) Attacks and Commerce Infrastructure in Peer-to-peer Networks
-
-
Daswani, N.1
-
24
-
-
85030178366
-
Epidemic algorithms for replicated database maintenance
-
ACM Press, New York, NY
-
DEMERS, A., GREENE, D., HAUSER, C., IRISH, W., LARSON, J., SHENKER, S., STURGIS, H., SWINEHART, D., AND TERRY, D. 1987. Epidemic algorithms for replicated database maintenance. In Proceedings of the 6th Symposium on Principles of Distributed Computing. ACM Press, New York, NY, 1-12.
-
(1987)
Proceedings of the 6th Symposium on Principles of Distributed Computing
, pp. 1-12
-
-
Demers, A.1
Greene, D.2
Hauser, C.3
Irish, W.4
Larson, J.5
Shenker, S.6
Sturgis, H.7
Swinehart, D.8
Terry, D.9
-
25
-
-
33750953996
-
Defending the sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration
-
DOI 10.1109/ARES.2006.45, 1625383, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
DINGER, J. AND HARTENSTEIN, H. 2006. Defending the Sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration. In Proceedings of the 1st International Conference on Availability, Reliability and Security. IEEE Computer Society Press, Los Alamitos, CA, 756-763. (Pubitemid 44732717)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 756-763
-
-
Dinger, J.1
Hartenstein, H.2
-
26
-
-
84947273682
-
The Sybil attack
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
DOUCEUR, J. R. 2002. The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 251-260.
-
(2002)
Proceedings of the 1st International Workshop on Peer-to-Peer Systems
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
27
-
-
84968779644
-
Censorship resistant peer-to-peer content addressable networks
-
Society for Industrial and Applied Mathematics, Philadelphia, PA
-
FIAT, A. AND SAIA, J. 2002. Censorship resistant peer-to-peer content addressable networks. In Proceedings of the 13th Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, Philadelphia, PA, 94-103.
-
(2002)
Proceedings of the 13th Symposium on Discrete Algorithms
, pp. 94-103
-
-
Fiat, A.1
Saia, J.2
-
28
-
-
79551693817
-
Censorship resistant peer-to-peer networks
-
FIAT, A. AND SAIA, J. 2007. Censorship resistant peer-to-peer networks. Theor. Comput. 3, 1, 1-23.
-
(2007)
Theor. Comput.
, vol.3
, Issue.1
, pp. 1-23
-
-
Fiat, A.1
Saia, J.2
-
29
-
-
27144478012
-
Making Chord robust to Byzantine attacks
-
Algorithms - ESA 2005: 13th Annual European Symposium. Proceedings
-
FIAT, A., SAIA, J., AND YOUNG, M. 2005. Making Chord robust to Byzantine attack. In Proceedings of the 13th Annual European Symposium on Algorithms. Lecture Notes on Computer Science, vol. 3669. Springer- Verlag, Berlin, Germany, 803-814. (Pubitemid 41491577)
-
(2005)
Lecture Notes in Computer Science
, vol.3669
, pp. 803-814
-
-
Fiat, A.1
Saia, J.2
Young, M.3
-
30
-
-
34548339774
-
Beacon vector routing: Scalable point-to-point routing in wireless sensornets
-
ACM Press, New York, NY
-
FONSECA, R., RATNASAMY, S., ZHAO, J., EE, C. T., CULLER, D. E., SHENKER, S., AND STOICA, I. 2005. Beacon vector routing: Scalable point-to-point routing in wireless sensornets. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation. ACM Press, New York, NY, 1-11.
-
(2005)
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation
, pp. 1-11
-
-
Fonseca, R.1
Ratnasamy, S.2
Zhao, J.3
Ee, C.T.4
Culler, D.E.5
Shenker, S.6
Stoica, I.7
-
31
-
-
33749055757
-
Identity theft protection in structured overlays
-
DOI 10.1109/NPSEC.2005.1532053, 1532053, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
-
GANESH, L. AND ZHAO, B. Y. 2005. Identity theft protection in structured overlays. In Proceedings of the 13th International Conference on Network Protocols. IEEE Computer Society Press, Los Alamitos, CA, 49-54. (Pubitemid 44461875)
-
(2005)
2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
, vol.2005
, pp. 49-54
-
-
Ganesh, L.1
Zhao, B.Y.2
-
32
-
-
8344287020
-
Load balancing in dynamic structured P2P systems
-
IEEE Computer Society Press, Los Alamitos, CA
-
GODFREY, B., LAKSHMINARAYANAN, K., SURANA, S., KARP, R. M., AND STOICA, I. 2004. Load balancing in dynamic structured P2P systems. In Proceedings of the 23rd Annual Joint Conference of the IEE Computer and Communications Socities (Infocom). Vol. 4. IEEE Computer Society Press, Los Alamitos, CA, 2253-2262.
-
(2004)
Proceedings of the 23rd Annual Joint Conference of the IEE Computer and Communications Socities (Infocom)
, vol.4
, pp. 2253-2262
-
-
Godfrey, B.1
Lakshminarayanan, K.2
Surana, S.3
Karp, R.M.4
Stoica, I.5
-
33
-
-
33750291183
-
Minimizing churn in distributed systems
-
DOI 10.1145/1151659.1159931
-
GODFREY, P. B., SHENKER, S., AND STOICA, I. 2006. Minimizing churn in distributed systems. In Proceedings of the ACM SIGCOMM Data Communication Festival. ACM Press, New York, NY, 147-158. (Pubitemid 44623723)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 147-158
-
-
Godfrey, P.B.1
Shenker, S.2
Stoica, I.3
-
34
-
-
1242310042
-
The impact of DHT routing geometry on resilience and proximity
-
ACM Press, New York, NY
-
GUMMADI, K.,GUMMADI, R.,GRIBBLE, S.,RATNASAMY, S.,SHENKER, S., AND STOICA, I. 2003. The impact of DHT routing geometry on resilience and proximity. In Proceedings of the ACM SIGCOMM Data Communication Festival. ACM Press, New York, NY, 381-394.
-
(2003)
Proceedings of the ACM SIGCOMM Data Communication Festival
, pp. 381-394
-
-
Gummadi, K.1
Gummadi, R.2
Gribble, S.3
Ratnasamy, S.4
Shenker, S.5
Stoica, I.6
-
35
-
-
84883649048
-
Efficient routing for peer-to-peer overlays
-
USENIX, Berkeley, CA
-
GUPTA, A., LISKOV, B., AND RODRIGUES, R. 2004. Efficient routing for peer-to-peer overlays. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX, Berkeley, CA, 113-126.
-
(2004)
Proceedings of the 1st Symposium on Networked Systems Design and Implementation
, pp. 113-126
-
-
Gupta, A.1
Liskov, B.2
Rodrigues, R.3
-
36
-
-
35248864956
-
Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
GUPTA, I., BIRMAN, K. P., LINGA, P., DEMERS, A. J., AND VAN RENESSE, R. 2003. Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead. In Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2735. Springer- Verlag, Berlin, Germany, 160-169.
-
(2003)
Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems
, vol.2735
, pp. 160-169
-
-
Gupta, I.1
Birman, K.P.2
Linga, P.3
Demers, A.J.4
Van Renesse, R.5
-
37
-
-
67549104856
-
The effect of replica placement on routing robustness in distributed hash tables
-
IEEE Computer Society Press, Los Alamitos, CA
-
HARVESF, C. AND BLOUGH, D.M. 2006. The effect of replica placement on routing robustness in distributed hash tables. In Proceedings of the 6th International Conference on Peer-to-Peer Computing. IEEE Computer Society Press, Los Alamitos, CA, 57-6.
-
(2006)
Proceedings of the 6th International Conference on Peer-to-Peer Computing
, pp. 57-56
-
-
Harvesf, C.1
Blough, D.M.2
-
38
-
-
35248832638
-
Asymptotically efficient approaches to fault-tolerance in peer-topeer networks
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, German
-
HILDRUM, K. AND KUBIATOWICZ, J. 2003. Asymptotically efficient approaches to fault-tolerance in peer-topeer networks. In Proceedings of the 17th International Symposium on Distributed Computing (DISC). Lecture Notes on Computer Science, vol. 2848. Springer-Verlag, Berlin, German, 321-336.
-
(2003)
Proceedings of the 17th International Symposium on Distributed Computing (DISC)
, vol.2848
, pp. 321-336
-
-
Hildrum, K.1
Kubiatowicz, J.2
-
39
-
-
85084097128
-
Measurements and mitigation of peerto- peer-based botnets: A case study on Storm Worm
-
USENIX, Berkeley, CA
-
HOLZ, T., STEINER, M., DAHL, F., BIERSACK, E., AND FREILING, F. 2008. Measurements and mitigation of peerto- peer-based botnets: A case study on Storm Worm. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). USENIX, Berkeley, CA, 1-9.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
40
-
-
33845347872
-
Simple efficient load-balancing algorithms for peer-to-peer systems
-
DOI 10.1007/s00224-006-1246-6
-
KARGER, D. R. AND RUHL, M. 2006. Simple efficient load-balancing algorithms for peer-to-peer systems. Theor. Comput. Syst. 39, 6, 787-804. (Pubitemid 44878426)
-
(2006)
Theory of Computing Systems
, vol.39
, Issue.6
, pp. 787-804
-
-
Karger, D.R.1
Ruhl, M.2
-
43
-
-
44649144215
-
-
Tech. rep. University of Massachusetts, Amherst, Amherst, MA
-
LEVINE, B. N., SHIELDS, C., AND MARGOLIN, B. N. 2006. A survey of solutions to the Sybil attack. Tech. rep. University of Massachusetts, Amherst, Amherst, MA.
-
(2006)
A Survey of Solutions to the Sybil Attack
-
-
Levine, B.N.1
Shields, C.2
Margolin, B.N.3
-
44
-
-
25844481024
-
A Performance vs. cost framework for evaluating DHT design tradeoffs under churn
-
Computer Society Press, Los Alamitos, CA
-
LI, J., STRIBLING, J., MORRIS, R., KAASHOEK, M. F., AND GIL, T. M. 2005. A Performance vs. cost framework for evaluating DHT design tradeoffs under churn. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Computer Society Press, Los Alamitos, CA. 225-236.
-
(2005)
Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 225-236
-
-
Li, J.1
Stribling, J.2
Morris, R.3
Kaashoek, M.F.4
Gil, T.M.5
-
45
-
-
85206023214
-
-
LOS ANGELES TIMES.
-
LOS ANGELES TIMES. 2006. EDonkey file-sharing network is shut down. http://articles.latimes.com/2006/sep/13/business/fi-donkey13.
-
(2006)
EDonkey File-sharing Network Is Shut Down
-
-
-
46
-
-
11244287362
-
Experiences applying game theory to system design
-
Proceedings of the ACM SIGCOMM 2004 Workshops
-
MAHAJAN, R., RODRIG, M., WETHERALL, D., AND ZAHORJAN, J. 2004. Experiences applying game theory to system design. In Proceedings of the Workshop on Practice and Theory of Incentives in Networked Systems (PINS). ACM Press, New York, NY, 183-190. (Pubitemid 40062768)
-
(2004)
Proceedings of the ACM SIGCOMM 2004 Workshops
, pp. 183-190
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
47
-
-
38549133359
-
Informant: Detecting sybils using incentives
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
MARGOLIN, N. B. AND LEVINE, B. N. 2007. Informant: Detecting Sybils using incentives. In Proceedings of the 11th International Conference on Financial Cryptography and Data Security. Lecture Notes on Computer Science, vol. 4886. Springer-Verlag, Berlin, Germany, 192-207. (Pubitemid 351153053)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886
, pp. 192-207
-
-
Boris Margolin, N.1
Levine, B.N.2
-
48
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
MAYMOUNKOV, P. AND MAZIÉRES, D. 2002. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 53-65.
-
(2002)
Proceedings of the 1st International Workshop on Peer-to-Peer Systems
, vol.2429
, pp. 53-65
-
-
Maymounkov, P.1
Maziéres, D.2
-
49
-
-
34648857771
-
-
Tech. rep. RR2005-01, Universit Catholique de Louvain. Louvain, Belgium
-
MESAROS, V., COLLET, R., GLYNN, K., AND VAN ROY, P. 2005. A transactional system for structured overlay networks. Tech. rep. RR2005-01, Universit Catholique de Louvain. Louvain, Belgium.
-
(2005)
A Transactional System for Structured Overlay Networks
-
-
Mesaros, V.1
Collet, R.2
Glynn, K.3
Van Roy, P.4
-
50
-
-
50149117080
-
SCAR-Scattering, Concealing and Recovering Data within a DHT
-
IEEE Computer Society Press, Los Alamitos, CA
-
MILLS, B. N. AND ZNATI, T. F. 2008. SCAR-Scattering, Concealing and Recovering Data within a DHT. In Proceedings of the 41st Annual Simulation Symposium. IEEE Computer Society Press, Los Alamitos, CA, 35-42.
-
(2008)
Proceedings of the 41st Annual Simulation Symposium
, pp. 35-42
-
-
Mills, B.N.1
Znati, T.F.2
-
51
-
-
34248566417
-
A simple fault tolerant distributed hash table
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
NAOR, M. AND WIEDER, U. 2003. A simple fault tolerant distributed hash table. In Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2735. Springer- Verlag, Berlin, Germany, 88-97.
-
(2003)
Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems
, vol.2735
, pp. 88-97
-
-
Naor, M.1
Wieder, U.2
-
52
-
-
85006277702
-
Experiences building PlanetLab
-
USENIX, Berkeley, CA
-
PETERSON, L., BAVIER, A., FIUCZYNSKI, M. E., AND MUIR, S. 2006. Experiences building PlanetLab. In Proceedings of the 7th Symposium on Operating System Design and Implementation. USENIX, Berkeley, CA.
-
(2006)
Proceedings of the 7th Symposium on Operating System Design and Implementation
-
-
Peterson, L.1
Bavier, A.2
Fiuczynski, M.E.3
Muir, S.4
-
53
-
-
33947179375
-
Globule: A collaborative content delivery network
-
DOI 10.1109/MCOM.2006.1678120
-
PIERRE, G. AND VAN STEEN, M. 2006. Globule: A collaborative content delivery network. IEEE Comm. Mag. 44, 8, 127-133. (Pubitemid 46405191)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.8
, pp. 127-133
-
-
Pierre, G.1
Van Steen, M.2
-
54
-
-
38149008060
-
Transactions for distributedWikis on structured overlays
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
PLANTIKOW, S., REINEFELD, A., AND SCHINTKE, F. 2007. Transactions for distributedWikis on structured overlays. In Proceedings of the 18thWorkshop onDistributed Systems: Operations and Management. Lecture Notes on Computer Science, vol. 4785. Springer-Verlag, Berlin, Germany, 256-267.
-
(2007)
Proceedings of the 18thWorkshop OnDistributed Systems: Operations and Management
, vol.4785
, pp. 256-267
-
-
Plantikow, S.1
Reinefeld, A.2
Schintke, F.3
-
55
-
-
57249110719
-
Tribler: A social-based peer-to-peer system
-
POUWELSE, J., GARBACKI, P., WANG, J., BAKKER, A., YANG, J., IOSUP, A., EPEMA, D., REINDERS, M., VAN STEEN, M., AND SIPS, H. 2007. Tribler: A social-based peer-to-peer system. Concurr. Comput. Pract. Exp. 20, 2, 127-138.
-
(2007)
Concurr. Comput. Pract. Exp.
, vol.20
, Issue.2
, pp. 127-138
-
-
Pouwelse, J.1
Garbacki, P.2
Wang, J.3
Bakker, A.4
Yang, J.5
Iosup, A.6
Epema, D.7
Reinders, M.8
Van Steen, M.9
Sips, H.10
-
56
-
-
84883600951
-
Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays
-
USENIX, Berkeley, CA
-
RAMASUBRAMANIAN, V. AND SIRER, E. G. 2004a. Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX, Berkeley, CA, 99-112.
-
(2004)
Proceedings of the 1st Symposium on Networked Systems Design and Implementation
, pp. 99-112
-
-
Ramasubramanian, V.1
Sirer, E.G.2
-
58
-
-
35248856084
-
Load balancing in structured P2P systems
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germanny
-
RAO, A., LAKSHMINARAYANAN, K., SURANA, S., KARP, R. M., AND STOICA, I. 2003. Load balancing in structured P2P systems. In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2735. Springer-Verlag, Berlin, Germanny, 68-79.
-
(2003)
Proceedings of the 2nd International Workshop on Peer-to-Peer Systems
, vol.2735
, pp. 68-79
-
-
Rao, A.1
Lakshminarayanan, K.2
Surana, S.3
Karp, R.M.4
Stoica, I.5
-
59
-
-
0034775826
-
A scalable content-addressable network
-
DOI 10.1145/964723.383072
-
RATNASAMY, S., FRANCIS, P., HANDLEY, M., KARP, R., AND SCHENKER, S. 2001. A scalable content-addressable Network. In Proceedings of the ACM SIGCOMM Data Communications Festival. ACM Press, New York, NY, 161-172. (Pubitemid 32981962)
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Schenker, S.5
-
60
-
-
33746506086
-
Malicious behaviour in content-addressable peer-to-peer networks
-
DOI 10.1109/CNSR.2005.39, 1429987, Proceedings of the 3rd Annual Communication Networks and Services Research Conference
-
REIDEMEISTER, T., BOHM, K., WARD, P. A. S., AND BUCHMANN, E. 2005. Malicious behaviour in content-addressable peer-to-peer networks. In Proceedings of the 3rd Annual Communication Networks and Services Research Conference. IEEE Computer Society Press, Los Alamitos, CA, 319-326. (Pubitemid 44130672)
-
(2005)
Proceedings of the 3rd Annual Communication Networks and Services Research Conference
, vol.2005
, pp. 319-326
-
-
Reidemeister, T.1
Ward, P.A.S.2
Bohm, K.3
Buchmann, E.4
-
61
-
-
85091111009
-
Handling churn in a DHT
-
USENIX, Berkeley, CA
-
RHEA, S., GEELS, D., ROSCOE, T., AND KUBIATOWICZ, J. 2004. Handling churn in a DHT. In Proceedings of the USENIX Annual Technical Conference. USENIX, Berkeley, CA, 127-140.
-
(2004)
Proceedings of the USENIX Annual Technical Conference
, pp. 127-140
-
-
Rhea, S.1
Geels, D.2
Roscoe, T.3
Kubiatowicz, J.4
-
62
-
-
33748779477
-
-
Ph.D. dissertation, University of California at Berkeley, Berkeley, CA
-
RHEA, S. C. 2005. OpenDHT: A public DHT service. Ph.D. dissertation, University of California at Berkeley, Berkeley, CA.
-
(2005)
OpenDHT: A Public DHT Service
-
-
Rhea, S.C.1
-
63
-
-
33646057696
-
High availability in DHTs: Erasure coding vs. replication
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
RODRIGUES, R. AND LISKOV, B. 2005. High availability in DHTs: Erasure coding vs. replication. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 3640. Springer-Verlag, Berlin, Germany, 226-239.
-
(2005)
Proceedings of the 4th International Workshop on Peer-to-Peer Systems
, vol.3640
, pp. 226-239
-
-
Rodrigues, R.1
Liskov, B.2
-
64
-
-
34548349212
-
Limiting sybil attacks in structured P2P networks
-
DOI 10.1109/INFCOM.2007.328, 4215910, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
ROWAIHY, H., ENCK, W., MCDANIEL, P., AND LA PORTA, T. 2007. Limiting Sybil attacks in structured peer-to-peer networks. In Proceedings of the 26th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE Computer Society Press, Los Alamitos, CA, 2596-2600. (Pubitemid 47334528)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 2596-2600
-
-
Rowaihy, H.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
65
-
-
57349142855
-
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
-
Middleware 2001
-
ROWSTRON, A. AND DRUSCHEL, P. 2001a. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of theMiddleware Conference. Lecture Notes on Computer Science, vol. 2218. Springer-Verlag, Berlin, Germany, 329-350. (Pubitemid 33362020)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2218
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
66
-
-
0036038685
-
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
-
DOI 10.1145/502059.502053
-
ROWSTRON, A. AND DRUSCHEL, P. 2001b. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th Symposium on Operating System Principles. ACM Press, New York, NY, 188-201. (Pubitemid 33612614)
-
(2001)
Operating Systems Review (ACM)
, vol.35
, Issue.5
, pp. 188-201
-
-
Rowstron, A.1
Druschel, P.2
-
67
-
-
84947222272
-
Dynamically fault-tolerant content addressable networks
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
SAIA, J., FIAT, A., GRIBBLE, S. D., KARLIN, A. R., AND SAROIU, S. 2002. Dynamically fault-tolerant content addressable networks. In Proceedings of the 1st InternationalWorkshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 270-279.
-
(2002)
Proceedings of the 1st InternationalWorkshop on Peer-to-Peer Systems
, vol.2429
, pp. 270-279
-
-
Saia, J.1
Fiat, A.2
Gribble, S.D.3
Karlin, A.R.4
Saroiu, S.5
-
68
-
-
30144446253
-
A novel methodology for constructing secure multipath overlays
-
DOI 10.1109/MIC.2005.117
-
SÁNCHEZ ARTIGAS, M.,GARCÍA LÓPEZ, P., AND GÓMEZ SKARMETA, A. F. 2005. A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9, 6, 50-57. (Pubitemid 43051368)
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 50-57
-
-
Sanchez Artigas, M.1
Garcia Lopez, P.2
Gomez Skarmeta, A.F.3
-
69
-
-
27144447960
-
How to spread adversarial nodes? Rotate!
-
DOI 10.1145/1060590.1060694, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
SCHEIDELER, C. 2005. How to spread adversarial nodes? Rotate! In Proceedings of the 37th Symposium on Theory of Computing. ACM Press, New York, NY, 704-713. (Pubitemid 43098643)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 704-713
-
-
Scheideler, C.1
-
70
-
-
62949249262
-
Scalaris: Reliable transactional P2P key/value store
-
ACM Press, New York, NY
-
SCHÜTT, T., SCHINTKE, F., AND REINEFELD, A. 2008. Scalaris: Reliable transactional P2P key/value store. In Proceedings of the 7th ACM SIGPLAN Workshop on ERLANG (ERLANG). ACM Press, New York, NY, 41-48.
-
(2008)
Proceedings of the 7th ACM SIGPLAN Workshop on ERLANG (ERLANG)
, pp. 41-48
-
-
Schütt, T.1
Schintke, F.2
Reinefeld, A.3
-
71
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
IEEE Computer Society Press, Los Alamitos, CA
-
SINGH, A., NGAN, T.-W., DRUSCHEL, P., AND WALLACH, D. S. 2006. Eclipse attacks on overlay networks: Threats and defenses. In Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communiations Societies. IEEE Computer Society Press, Los Alamitos, CA, 1-12.
-
(2006)
Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communiations Societies
, pp. 1-12
-
-
Singh, A.1
Ngan, T.-W.2
Druschel, P.3
Wallach, D.S.4
-
72
-
-
84947265806
-
Security considerations for peer-to-peer distributed hash tables
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
SIT, E. AND MORRIS, R. 2002. Security considerations for peer-to-peer distributed hash tables. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 261-269.
-
(2002)
Proceedings of the 1st International Workshop on Peer-to-Peer Systems
, vol.2429
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
73
-
-
85206041623
-
-
SKYPE LIMITED
-
SKYPE LIMITED. 2008. Skype. http://www.skype.com.
-
(2008)
-
-
-
74
-
-
21644471550
-
Vulnerabilities and security threats in structured overlay networks: A quantitative analysis
-
Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004
-
SRIVATSA, M. AND LIU, L. 2004. Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In Proceedings of the 20th Annual Computer Security Applications Conference. IEEE Computer Society Press, Los Alamitos, CA, 252-261. (Pubitemid 40931080)
-
(2004)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 252-261
-
-
Srivatsa, M.1
Liu, L.2
-
75
-
-
84947238430
-
Peer-to-peer caching schemes to address flash crowds
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
STADING, T., MANIATIS, P., AND BAKER, M. 2002. Peer-to-peer caching schemes to address flash crowds. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 203-213.
-
(2002)
Proceedings of the 1st International Workshop on Peer-to-Peer Systems
, vol.2429
, pp. 203-213
-
-
Stading, T.1
Maniatis, P.2
Baker, M.3
-
77
-
-
84876244094
-
Exploiting KAD: Possible uses and misuses
-
STEINER, M., EN-NAJJARY, T., AND BIERSACK, E. W. 2007b. Exploiting KAD: Possible uses and misuses. ACM Comput. Comm. Rev. 37, 5, 65-70.
-
(2007)
ACM Comput. Comm. Rev.
, vol.37
, Issue.5
, pp. 65-70
-
-
Steiner, M.1
En-Najjary, T.2
Biersack, E.W.3
-
78
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for Internet applications
-
STOICA, I., MORRIS, R., LIBEN-NOWELL, D., KARGER, D. R., KAASHOEK, M. F., DABEK, F., AND BALAKRISHNAN, H. 2003. Chord: A scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Trans. Netw. 11, 1, 17-32.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
79
-
-
4544319822
-
Scalable cooperative latency estimation
-
IEEE Computer Society Press, Los Alamitos, CA
-
SZYMANIAK, M., PIERRE, G., AND VAN STEEN, M. 2004. Scalable cooperative latency estimation. In Proceedings of the 10th International Conference on Parallel and Distributed Systems. IEEE Computer Society Press, Los Alamitos, CA, 367-376.
-
(2004)
Proceedings of the 10th International Conference on Parallel and Distributed Systems
, pp. 367-376
-
-
Szymaniak, M.1
Pierre, G.2
Van Steen, M.3
-
80
-
-
41449083054
-
Practical large-scale latency estimation
-
SZYMANIAK, M., PRESOTTO, D., PIERRE, G., AND VAN STEEN, M. 2008. Practical large-scale latency estimation. Comput. Netw. 52, 7, 1343-1364.
-
(2008)
Comput. Netw.
, vol.52
, Issue.7
, pp. 1343-1364
-
-
Szymaniak, M.1
Presotto, D.2
Pierre, G.3
Van Steen, M.4
-
81
-
-
0041992437
-
PSearch: Information retrieval in structured overlays
-
TANG, C., XU, Z., AND MAHALINGAM, M. 2003. pSearch: Information retrieval in structured overlays. ACM Comput. Comm. Rev. 33, 1, 89-94.
-
(2003)
ACM Comput. Comm. Rev.
, vol.33
, Issue.1
, pp. 89-94
-
-
Tang, C.1
Xu, Z.2
Mahalingam, M.3
-
82
-
-
33845373081
-
A survey of peer-to-peer security issues
-
Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
-
WALLACH, D. 2002. A survey of peer-to-peer security issues. In Proceedings of the International Symposium on Software Security. Lecture Notes on Computer Science, vol. 2609. Springer-Verlag, Berlin, Germany, 42-57.
-
(2002)
Proceedings of the International Symposium on Software Security
, vol.2609
, pp. 42-57
-
-
Wallach, D.1
-
83
-
-
33751438006
-
An efficient and secure peer-to-peer overlay network
-
DOI 10.1109/LCN.2005.27, 1550961, Proceedings - The IEEE Conference on Local Computer Networks - 30th Anniversary, LCN 2005
-
WANG, H., ZHU, Y., AND HU, Y. 2005. An efficient and secure peer-to-peer overlay network. In Proceedings of the 30th Local Computer Networks. IEEE Computer Society Press, Los Alamitos, CA, 764-771. (Pubitemid 44815680)
-
(2005)
Proceedings - Conference on Local Computer Networks, LCN
, vol.2005
, pp. 764-771
-
-
Wang, H.1
Zhu, Y.2
Hu, Y.3
-
84
-
-
77955973071
-
-
Tech. rep. Digital Technology Center, University of Minnesota at Twin Cities, Minneapolis/St. Paul, MN
-
WANG, P.,OSIPKOV, I.,HOPPER, N., AND KIM, Y. 2007. Myrmic: Secure and robust DHT routing. Tech. rep. Digital Technology Center, University of Minnesota at Twin Cities, Minneapolis/St. Paul, MN.
-
(2007)
Myrmic: Secure and Robust DHT Routing
-
-
Wang, P.1
Osipkov, I.2
Hopper, N.3
Kim, Y.4
-
85
-
-
42549093012
-
Proof: A DHT-based peer-to-peer search engine
-
IEEE Computer Society Press, Los Alamitos, CA
-
YANG, K.-H. AND HO, J.-M. 2006. Proof: A DHT-based peer-to-peer search engine. In Proceedings of the International Conference on Web Intelligence (WI). IEEE Computer Society Press, Los Alamitos, CA, 702-708.
-
(2006)
Proceedings of the International Conference on Web Intelligence (WI).
, pp. 702-708
-
-
Yang, K.-H.1
Ho, J.-M.2
-
86
-
-
45749116664
-
SybilLimit: A near-optimal social network defense against sybil attacks
-
IEEE Computer Society Press, Los Alamitos, CA
-
YU, H., GIBBONS, P. B., KAMINSKY, M., AND XIAO, F. 2008. SybilLimit: A near-optimal social network defense against sybil attacks. In Proceedings of the International Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 3-17.
-
(2008)
Proceedings of the International Symposium on Security and Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
87
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
YU, H., KAMINSKY, M., GIBBONS, P. B., AND FLAXMAN, A. 2006. SybilGuard: Defending against Sybil attacks via social networks. In Proceedings of the ACM SIGCOMMN Data Communications Festival. ACM Press, New York, NY, 267-278. (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
88
-
-
24944569301
-
Leopard: A locality aware Peer-to-peer system with no hot spot
-
NETWORKING 2005 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Commun. Syst.: 4th Int. IFIP-TC6 Networking Conf., Proc.
-
YU, Y., LEE, S., AND ZHANG, Z.-L. 2005. Leopard: A locality aware peer-to-peer system with no hot spot. In Proceedings of the 4th International Networking Conference (NETWORKING). Lecture Notes on Computer Science, vol. 3462. Springer-Verlag, Berlin, Germany, 27-39. (Pubitemid 41312782)
-
(2005)
Lecture Notes in Computer Science
, vol.3462
, pp. 27-39
-
-
Yu, Y.1
Lee, S.2
Zhang, Z.-L.3
-
89
-
-
0742267177
-
Tapestry: A resilient globalscale overlay for service deployment
-
ZHAO, B., HUANG, L., STRIBLING, J., RHEA, S., JOSEPH, A., AND KUBIATOWICZ, J. 2004. Tapestry: A resilient globalscale overlay for service deployment. IEEE J. Select. Areas Comm. 22, 1, 41-53.
-
(2004)
IEEE J. Select. Areas Comm.
, vol.22
, Issue.1
, pp. 41-53
-
-
Zhao, B.1
Huang, L.2
Stribling, J.3
Rhea, S.4
Joseph, A.5
Kubiatowicz, J.6
-
90
-
-
23944477365
-
P6P: A peer-to-peer approach to internet infrastructure
-
Peer-to-Peer Systems III - Third International Workshop, IPTPS 2004
-
ZHOU, L. AND VAN RENESSE, R. 2004. P6P: A peer-to-peer approach to Internet infrastructure. In Proceedings of the 3rd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 3279. Springer-Verlag, Berlin, Germany, 75-86. (Pubitemid 41190540)
-
(2004)
Lecture Notes in Computer Science
, vol.3279
, pp. 75-86
-
-
Zhou, L.1
Van Renesse, R.2
-
91
-
-
17844398227
-
Efficient, proximity-aware load balancing for DHT-based P2P systems
-
DOI 10.1109/TPDS.2005.46
-
ZHU, Y. AND HU, Y. 2005. Efficient, proximity-aware load balancing for DHT-based P2P systems. IEEE Trans. Parallel Distrib. Syst. 16, 4, 349-361. (Pubitemid 40589983)
-
(2005)
IEEE Transactions on Parallel and Distributed Systems
, vol.16
, Issue.4
, pp. 349-361
-
-
Zhu, Y.1
Hu, Y.2
|