-
5
-
-
34250671203
-
VisTrails: Visualization meets data management
-
S. Callahan, J. Freire, E. Santos, C. Scheidegger, C. Silva, and H. Vo. VisTrails: Visualization meets data management. In Proc. ACM SIGMOD Conference, June 2006.
-
Proc. ACM SIGMOD Conference, June 2006
-
-
Callahan, S.1
Freire, J.2
Santos, E.3
Scheidegger, C.4
Silva, C.5
Vo, H.6
-
6
-
-
0345757358
-
Practical Byzantine Fault Tolerance and Proactive Recovery
-
DOI 10.1145/571637.571640
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398-461, 2002. (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
8
-
-
21644483415
-
SHARP: An architecture for secure resource peering
-
Y. Fu, J. Chase, B. Chun, S. Schwab, and A. Vahdat. SHARP: An architecture for secure resource peering. In Proc. ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
-
Proc. ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003
-
-
Fu, Y.1
Chase, J.2
Chun, B.3
Schwab, S.4
Vahdat, A.5
-
9
-
-
85094320514
-
Friday: Global comprehension for distributed replay
-
D. Geels, G. Altekar, P. Maniatis, T. Roscoe, and I. Stoica. Friday: Global comprehension for distributed replay. In Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI), Apr. 2007.
-
Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI), Apr. 2007
-
-
Geels, D.1
Altekar, G.2
Maniatis, P.3
Roscoe, T.4
Stoica, I.5
-
11
-
-
0036554464
-
The stable paths problem and interdomain routing
-
Apr.
-
T. G. Griffin, F. B. Shepherd, and G. Wilfong. The stable paths problem and interdomain routing. IEEE/ACM Transactions on Networking (ToN), 10(2):232-243, Apr. 2002.
-
(2002)
IEEE/ACM Transactions on Networking (ToN)
, vol.10
, Issue.2
, pp. 232-243
-
-
Griffin, T.G.1
Shepherd, F.B.2
Wilfong, G.3
-
12
-
-
82655168057
-
-
Hadoop. http://hadoop.apache.org/.
-
-
-
-
18
-
-
73849140516
-
Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett. Preventing history forgery with secure provenance. ACM Transactions on Storage (TOS), 5(4):1-43, 2009.
-
(2009)
ACM Transactions on Storage (TOS)
, vol.5
, Issue.4
, pp. 1-43
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
23
-
-
74049140718
-
Zyzzyva: Speculative Byzantine fault tolerance
-
Dec.
-
R. Kotla, L. A. M. Dahlin, A. Clement, and E. Wong. Zyzzyva: Speculative Byzantine fault tolerance. ACM Trans. on Comp. Syst. (TOCS), 27(4), Dec. 2009.
-
(2009)
ACM Trans. on Comp. Syst. (TOCS)
, vol.27
, Issue.4
-
-
Kotla, R.1
Dahlin, L.A.M.2
Clement, A.3
Wong, E.4
-
24
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. on Prog. Lang. and Systems (TOPLAS), 4(3):382-401, 1982.
-
(1982)
ACM Trans. on Prog. Lang. and Systems (TOPLAS)
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
25
-
-
72849144813
-
D3S: Debugging deployed distributed systems
-
X. Liu, Z. Guo, X. Wang, F. Chen, X. Lian, J. Tang, M. Wu, M. F. Kaashoek, and Z. Zhang. D3S: debugging deployed distributed systems. In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2008.
-
Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2008
-
-
Liu, X.1
Guo, Z.2
Wang, X.3
Chen, F.4
Lian, X.5
Tang, J.6
Wu, M.7
Kaashoek, M.F.8
Zhang, Z.9
-
26
-
-
70350752327
-
Declarative Networking
-
B. T. Loo, T. Condie, M. Garofalakis, D. E. Gay, J. M. Hellerstein, P. Maniatis, R. Ramakrishnan, T. Roscoe, and I. Stoica. Declarative Networking. CACM, 2009.
-
(2009)
CACM
-
-
Loo, B.T.1
Condie, T.2
Garofalakis, M.3
Gay, D.E.4
Hellerstein, J.M.5
Maniatis, P.6
Ramakrishnan, R.7
Roscoe, T.8
Stoica, I.9
-
27
-
-
85094835396
-
Towards a Secure and Efficient System for End-to-End Provenance
-
P. McDaniel, K. Butler, S. McLaughlin, R. Sion, E. Zadok, and M. Winslett. Towards a Secure and Efficient System for End-to-End Provenance. In Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP), Feb. 2010.
-
Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP), Feb. 2010
-
-
McDaniel, P.1
Butler, K.2
McLaughlin, S.3
Sion, R.4
Zadok, E.5
Winslett, M.6
-
35
-
-
82655163890
-
-
Quagga Routing Suite. http://www.quagga.net/.
-
-
-
-
36
-
-
78650064497
-
-
Technical Report GT-CS-08-02, Georgia Tech
-
A. Ramachandran, K. Bhandankar, M. Bin Tariq, and N. Feamster. Packets with provenance. Technical Report GT-CS-08-02, Georgia Tech, 2008.
-
(2008)
Packets with Provenance
-
-
Ramachandran, A.1
Bhandankar, K.2
Bin Tariq, M.3
Feamster, N.4
-
37
-
-
82655179052
-
-
RapidNet. http://netdb.cis.upenn.edu/rapidnet/.
-
RapidNet
-
-
-
38
-
-
77957793926
-
Pip: Detecting the unexpected in distributed systems
-
P. Reynolds, C. Killian, J. L. Wiener, J. C. Mogul, M. A. Shah, and A. Vahdat. Pip: Detecting the unexpected in distributed systems. In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), May 2006.
-
Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), May 2006
-
-
Reynolds, P.1
Killian, C.2
Wiener, J.L.3
Mogul, J.C.4
Shah, M.A.5
Vahdat, A.6
-
39
-
-
82655169484
-
-
RouteViews project. http://www.routeviews.org/.
-
-
-
-
40
-
-
82655163892
-
-
Secure BGP. http://www.ir.bbn.com/sbgp/.
-
Secure BGP
-
-
-
41
-
-
35248838230
-
ForNet: A distributed forensics network
-
K. Shanmugasundaram, N. Memon, A. Savant, and H. Bronnimann. ForNet: A distributed forensics network. In Proc. Intl. Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), Sept. 2003.
-
Proc. Intl. Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), Sept. 2003
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
-
45
-
-
82655169485
-
-
Vistrails. http://www.vistrails.org/.
-
-
-
-
46
-
-
82655187994
-
-
The Stanford WebBase Project. http: //diglib.stanford.edu/~testbed/doc2/ WebBase/.
-
-
-
-
49
-
-
84875089648
-
TAP: Time-aware provenance for distributed systems
-
W. Zhou, L. Ding, A. Haeberlen, Z. Ives, and B. T. Loo. TAP: Time-aware provenance for distributed systems. In Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP), June 2011.
-
Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP), June 2011
-
-
Zhou, W.1
Ding, L.2
Haeberlen, A.3
Ives, Z.4
Loo, B.T.5
-
50
-
-
82655175514
-
-
Technical Report MS-CIS-11-14, University of Pennsylvania Available at
-
W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. T. Loo, and M. Sherr. Secure network provenance. Technical Report MS-CIS-11-14, University of Pennsylvania, 2011. Available at http://snp.cis.upenn.edu/.
-
(2011)
Secure Network Provenance
-
-
Zhou, W.1
Fei, Q.2
Narayan, A.3
Haeberlen, A.4
Loo, B.T.5
Sherr, M.6
-
51
-
-
77954746819
-
Efficient querying and maintenance of network provenance at Internet-scale
-
W. Zhou, M. Sherr, T. Tao, X. Li, B. T. Loo, and Y. Mao. Efficient querying and maintenance of network provenance at Internet-scale. In Proc. ACM SIGMOD Conference, June 2010.
-
Proc. ACM SIGMOD Conference, June 2010
-
-
Zhou, W.1
Sherr, M.2
Tao, T.3
Li, X.4
Loo, B.T.5
Mao, Y.6
|