-
1
-
-
0141610192
-
Randomized protocols for asynchronous consensus
-
Sept.
-
J. Aspnes. Randomized protocols for asynchronous consensus. Distributed Computing 16(2-3): pp. 165-175, Sept. 2003.
-
(2003)
Distributed Computing
, vol.16
, Issue.2-3
, pp. 165-175
-
-
Aspnes, J.1
-
3
-
-
32344438389
-
On the establishment of distinct identities in overlay networks
-
July
-
R. Bazzi and G. Konjevod, "On the establishment of distinct identities in overlay networks," in Proc. ACM Symp. Principles of Distributed Computing (PODC), Las Vegas, NV, pp. 312-320, July 2005.
-
(2005)
Proc. ACM Symp. Principles of Distributed Computing (PODC), Las Vegas, NV
, pp. 312-320
-
-
Bazzi, R.1
Konjevod, G.2
-
4
-
-
0000720752
-
A note on the isoperimetric constant
-
P. Buser, "A note on the isoperimetric constant," Ann. Sci. cole Norm, Sup.(4)15, no.2, 213-230, 1982.
-
(1982)
Ann. Sci. Cole Norm, Sup.(4)
, vol.15
, Issue.2
, pp. 213-230
-
-
Buser, P.1
-
5
-
-
29244445484
-
Sybilproof reputation mechanisms
-
Aug.
-
A. Cheng and E. Friedman, "Sybilproof reputation mechanisms," in Proc. ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON), Philadelphia, PA, pp. 128-132, Aug. 2005.
-
(2005)
Proc. ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON), Philadelphia, PA
, pp. 128-132
-
-
Cheng, A.1
Friedman, E.2
-
7
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A reputation-based approach for choosing reliable resources in peer-to-peer networks," in Proc. ACM CCS, 2002.
-
Proc. ACM CCS, 2002
-
-
Damiani, E.1
Di Vimercati, D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
8
-
-
85180633166
-
SybilInfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal, "SybilInfer: Detecting sybil nodes using social networks," in Proc. NDSS, San Diego, CA, Feb. 2009.
-
Proc. NDSS, San Diego, CA, Feb. 2009
-
-
Danezis, G.1
Mittal, P.2
-
9
-
-
84971390717
-
A Measurement of Mixing Time in Social Networks
-
M. Dell'Amico and Y. Roudier, "A Measurement of Mixing Time in Social Networks," in Proc. 5th International Workshop on Security and Trust Management, Saint Malo, France, Sept. 2009.
-
Proc. 5th International Workshop on Security and Trust Management, Saint Malo, France, Sept. 2009
-
-
Dell'Amico, M.1
Roudier, Y.2
-
12
-
-
0027201424
-
Global Min-cuts in RNC, and Other Ramifications of a Simple Min-Cut Algorithm
-
D.R. Karger, "Global Min-cuts in RNC, and Other Ramifications of a Simple Min-Cut Algorithm" in Proc. ACM/SIAM Symp. Discrete Algorithms, pp. 21-30, 1993.
-
(1993)
Proc. ACM/SIAM Symp. Discrete Algorithms
, pp. 21-30
-
-
Karger, D.R.1
-
15
-
-
70450277218
-
A sybil-proof referral system based on multiplicative reputation chains
-
Nov.
-
G. Kesidis, A. Tangpong and C. Griffin, "A sybil-proof referral system based on multiplicative reputation chains," IEEE Comm. Letters, pp. 862-864, Nov. 2009.
-
(2009)
IEEE Comm. Letters
, pp. 862-864
-
-
Kesidis, G.1
Tangpong, A.2
Griffin, C.3
-
16
-
-
0012488850
-
Quality Matching and Local Improvement for Multilevel Graph-Partitioning
-
Monien, B., R. Preis, and R. Diekmann, "Quality Matching and Local Improvement for Multilevel Graph-Partitioning.," Parallel Computing 26(12): pp. 1605-1634, 2000.
-
(2000)
Parallel Computing
, vol.26
, Issue.12
, pp. 1605-1634
-
-
Monien, B.1
Preis, R.2
Diekmann, R.3
-
17
-
-
77954583930
-
-
NetLogo. Center for Connected Learning and Computer-Based Modeling, Evanston, IL
-
NetLogo itself: Wilensky, U. 1999. NetLogo. http://ccl.northwestern.edu/ netlogo/. Center for Connected Learning and Computer-Based Modeling, Northwestern University. Evanston, IL.
-
(1999)
NetLogo itself
-
-
Wilensky, U.1
-
18
-
-
0035420732
-
Random graphs with arbitrary degree distributions and their applications
-
M.E.J. Newman, S.H. Strogatz, and D.J. Watts, "Random graphs with arbitrary degree distributions and their applications," Phys. Rev. E, 64, 2001.
-
(2001)
Phys. Rev. E
, vol.64
-
-
Newman, M.E.J.1
Strogatz, S.H.2
Watts, D.J.3
-
19
-
-
72049098575
-
Karmanet: Leveraging trusted social path to create judicious forwarders
-
M. Spear, X. Lu, N. Matloff, and S. F. Wu, "Karmanet: Leveraging trusted social path to create judicious forwarders," in Proc. Future Information Networks, 2009. ICFIN, pp. 218-223, 2009.
-
(2009)
Proc. Future Information Networks, 2009. ICFIN
, pp. 218-223
-
-
Spear, M.1
Lu, X.2
Matloff, N.3
Wu, S.F.4
-
20
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
May
-
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proc. Eurocrypt 2003, Warsaw, Poland, pp. 294-311, May 2003.
-
(2003)
Proc. Eurocrypt 2003, Warsaw, Poland
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
21
-
-
45749109010
-
SybilGuard: Defending Against Sybil Attacks via Social Networks
-
June
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," IEEE Trans. Networking, 16(3), pp. 576-589, June 2008.
-
(2008)
IEEE Trans. Networking
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|