메뉴 건너뛰기




Volumn , Issue , 2011, Pages 12-19

Characterizing the adversarial power in uniform and ergodic node sampling

Author keywords

Algorithms; Theory

Indexed keywords

ERGODICS; INPUT STREAMS; LARGE-SCALE DYNAMICS; LOWER BOUNDS; MALICIOUS NODES; NODE IDENTIFIERS; NODE SAMPLING; REALISTIC MODEL; SAMPLING STRATEGIES; THEORY;

EID: 80053911680     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2031792.2031795     Document Type: Conference Paper
Times cited : (3)

References (23)
  • 5
    • 34548024641 scopus 로고    scopus 로고
    • TERA: Topic-based event routing for peer-to-peer architectures
    • DOI 10.1145/1266894.1266898, Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, DEBS'07
    • R. Baldoni, R. Beraldi, V. Quema, L. Querzoni, and S. Tucci-Piergiovanni. TERA: Topic-based Event Routing for Peer-to-peer Architectures. In Proceedings of the International Conference on Distributed Event-Based Systems (DEBS), pages 2-13. ACM, 2007. (Pubitemid 47281501)
    • (2007) ACM International Conference Proceeding Series , vol.233 , pp. 2-13
    • Baldoni, R.1    Beraldi, R.2    Quema, V.3    Querzoni, L.4    Tucci-Piergiovanni, S.5
  • 7
    • 67650523874 scopus 로고    scopus 로고
    • Brahms: Byzantine resilient random membership sampling
    • A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC), 2008
    • E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer. Brahms: Byzantine Resilient Random Membership Sampling. Computer Networks, 53:2340-2359, 2009. A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC), 2008.
    • (2009) Computer Networks , vol.53 , pp. 2340-2359
    • Bortnikov, E.1    Gurevich, M.2    Keidar, I.3    Kliot, G.4    Shraer, A.5
  • 23
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • DOI 10.1145/1151659.1159945
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil Attacks via Social Networks. In Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pages 267-278, 2006. (Pubitemid 44623733)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.