-
2
-
-
80051689652
-
Dependability evaluation of cluster-based distributed systems
-
E. Anceaume, F. V. Brasileiro, R. Ludinard, B. Sericola, and F. Tronel. Dependability Evaluation of Cluster-based Distributed Systems. International Journal of Foundations of Computer Science (IJFCS), 5(22), 2011.
-
(2011)
International Journal of Foundations of Computer Science (IJFCS)
, vol.5
, Issue.22
-
-
Anceaume, E.1
Brasileiro, F.V.2
Ludinard, R.3
Sericola, B.4
Tronel, F.5
-
3
-
-
78650874347
-
Uniform and ergodic sampling in unstructured peer-to-peer systems with malicious nodes
-
E. Anceaume, Y. Busnel, and S. Gambs. Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes. In Proceedings of the 14th International Conference On Principles Of Distributed Systems (OPODIS), volume 6490, pages 64-78, 2010.
-
(2010)
Proceedings of the 14th International Conference on Principles of Distributed Systems (OPODIS)
, vol.6490
, pp. 64-78
-
-
Anceaume, E.1
Busnel, Y.2
Gambs, S.3
-
5
-
-
34548024641
-
TERA: Topic-based event routing for peer-to-peer architectures
-
DOI 10.1145/1266894.1266898, Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, DEBS'07
-
R. Baldoni, R. Beraldi, V. Quema, L. Querzoni, and S. Tucci-Piergiovanni. TERA: Topic-based Event Routing for Peer-to-peer Architectures. In Proceedings of the International Conference on Distributed Event-Based Systems (DEBS), pages 2-13. ACM, 2007. (Pubitemid 47281501)
-
(2007)
ACM International Conference Proceeding Series
, vol.233
, pp. 2-13
-
-
Baldoni, R.1
Beraldi, R.2
Quema, V.3
Querzoni, L.4
Tucci-Piergiovanni, S.5
-
7
-
-
67650523874
-
Brahms: Byzantine resilient random membership sampling
-
A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC), 2008
-
E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer. Brahms: Byzantine Resilient Random Membership Sampling. Computer Networks, 53:2340-2359, 2009. A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC), 2008.
-
(2009)
Computer Networks
, vol.53
, pp. 2340-2359
-
-
Bortnikov, E.1
Gurevich, M.2
Keidar, I.3
Kliot, G.4
Shraer, A.5
-
12
-
-
34548273006
-
Gossip-based peer sampling
-
M. Jelasity, S. Voulgaris, R. Guerraoui, A.-M. Kermarrec, and M. van Steen. Gossip-based Peer Sampling. ACM Transaction on Computer System, 25(3), 2007.
-
(2007)
ACM Transaction on Computer System
, vol.25
, Issue.3
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.-M.4
Van Steen, M.5
-
13
-
-
77955419008
-
Secure peer sampling
-
G. P. Jesi, A. Montresor, and M. van Steen. Secure Peer Sampling. Computer Networks, 54(12):2086-2098, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.12
, pp. 2086-2098
-
-
Jesi, G.P.1
Montresor, A.2
Van Steen, M.3
-
15
-
-
70549094225
-
Finding good partners in availability-aware P2P networks
-
Springer-Verlag
-
S. Le Blond, F. Le Fessant, and E. Le Merrer. Finding Good Partners in Availability-Aware P2P Networks. In Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), pages 472-484. Springer-Verlag, 2009.
-
(2009)
Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)
, pp. 472-484
-
-
Le Blond, S.1
Le Fessant, F.2
Le Merrer, E.3
-
17
-
-
0036374187
-
Search and replication in unstructured peer-to-peer networks
-
Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and Replication in Unstructured Peer-to-Peer Networks. In Proceedings of the International Conference on Supercomputing (ICS), pages 84-95, 2002. (Pubitemid 35039987)
-
(2002)
Proceedings of the International Conference on Supercomputing
, pp. 84-95
-
-
Lv, Q.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
19
-
-
33748700606
-
Peer counting and sampling in overlay networks: Random walk methods
-
Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing 2006
-
L. Massoulié, E. L. Merrer, A.-M. Kermarrec, and A. Ganesh. Peer Counting and Sampling in Overlay Networks: Random Walk Methods. In Proceedings of the 25th Annual Symposium on Principles of Distributed Computing (PODC), pages 123-132. ACM Press, 2006. (Pubitemid 44393700)
-
(2006)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
, vol.2006
, pp. 123-132
-
-
Massoulie, L.1
Le Merrer, E.2
Kermarrec, A.-M.3
Ganesh, A.4
-
22
-
-
45749116664
-
SybilLimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In Proceedings of the IEEE Symposium on Security and Privacy (SP), pages 3-17, 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (SP)
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
23
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil Attacks via Social Networks. In Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pages 267-278, 2006. (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|