-
1
-
-
10444289683
-
Compact routing on Euclidian metrics
-
ACM, New York, NY
-
ABRAHAM, I. AND MALKHI, D. 2004. Compact routing on Euclidian metrics. In Proceedings of the 23rd Annual ACM Symposium on Principles of Distributed Computing (PODC'04). ACM, New York, NY, 141-149.
-
(2004)
Proceedings of the 23rd Annual ACM Symposium on Principles of Distributed Computing (PODC'04)
, pp. 141-149
-
-
Abraham, I.1
Malkhi, D.2
-
2
-
-
70450248567
-
Matchmaking for online games and other latency-sensitive P2P systems
-
ACM, New York, NY
-
AGARWAL, S. AND LORCH, J. R. 2009. Matchmaking for online games and other latency-sensitive P2P systems. In Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM'09). ACM, New York, NY, 315-326.
-
(2009)
Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM'09).
, pp. 315-326
-
-
Agarwal, S.1
Lorch, J.R.2
-
3
-
-
84855234355
-
-
(accessed 2009)
-
BAMBOO DHT. http://bamboo-dht.org. (accessed 2009).
-
-
-
-
4
-
-
33845989821
-
Can machine learning be secure?
-
DOI 10.1145/1128817.1128824, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
BARRENO, M., NELSON, B., SEARS, R., JOSEPH, A. D., AND TYGAR, J. D. 2006. Can machine learning be secure? In Proceedings of the ACMSymposium on Information, Computer and Communications Security (ASIACCS'06). ACM, New York, NY, 16-25. (Pubitemid 46644722)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
5
-
-
85031236652
-
Operating system support for planetary-scale network services
-
USENIX Association, Berkeley, CA
-
BAVIER, A., BOWMAN, M., CHUN, B., CULLER, D., KARLIN, S., MUIR, S., PETERSON, L., ROSCOE, T., SPALINK, T., AND WAWRZONIAK, M. 2004. Operating system support for planetary-scale network services. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI'04). USENIX Association, Berkeley, CA, 19-19.
-
(2004)
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI'04)
, pp. 19-19
-
-
Bavier, A.1
Bowman, M.2
Chun, B.3
Culler, D.4
Karlin, S.5
Muir, S.6
Peterson, L.7
Roscoe, T.8
Spalink, T.9
Wawrzoniak, M.10
-
6
-
-
32344438389
-
On the establishment of distinct identifies in overlay networks
-
DOI 10.1145/1073814.1073873, Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing, PODC 2005
-
BAZZI, R. A. AND KONJEVOD, G. 2005. On the establishment of distinct identities in overlay networks. In Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing (PODC'05). ACM, New York, NY, 312-320. (Pubitemid 43218411)
-
(2005)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
, vol.24
, pp. 312-320
-
-
Bazzi, R.A.1
Konjevod, G.2
-
7
-
-
78650005480
-
The frog-boiling attack: Limitations of anomaly detection for secure network coordinates
-
CHAN-TIN, E., FELDMAN, D.,KIM, Y., AND HOPPER, N. 2009. The frog-boiling attack: Limitations of anomaly detection for secure network coordinates. In Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm).
-
(2009)
Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm)
-
-
Chan-Tin, E.1
Feldman, D.2
Kim, Y.3
Hopper, N.4
-
8
-
-
65249126676
-
Taming the torrent: A practical approach to reducing cross-isp traffic in peer-to-peer systems
-
CHOFFNES, D. R. AND BUSTAMANTE, F. E. 2008. Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. SIGCOMM Comput. Comm. Rev. 38, 4, 363-374.
-
(2008)
SIGCOMM Comput. Comm. Rev.
, vol.38
, Issue.4
, pp. 363-374
-
-
Choffnes, D.R.1
Bustamante, F.E.2
-
9
-
-
84855222693
-
-
COMMONSENSE (Accessed 2008)
-
COMMONSENSE. 2008. http://www.kimvdlinde.com/professional/programming/ statistics/ commonSense/body.html. (Accessed 2008).
-
(2008)
-
-
-
10
-
-
2442538245
-
PIC: Practical internet coordinates for distance estimation
-
COSTA, M., CASTRO, M., ROWSTRON, A., AND KEY, P. 2004. PIC: Practical internet coordinates for distance estimation. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). 178-187.
-
(2004)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS).
, pp. 178-187
-
-
Costa, M.1
Castro, M.2
Rowstron, A.3
Key, P.4
-
11
-
-
85077046840
-
Census: Location-aware membership management for large-scale distributed systems
-
COWLING, J., PORTS, D., LISKOV, B., POPA, R. A., AND GAIKWAD, A. 2009. Census: Location-aware membership management for large-scale distributed systems. In Proceedings of the USENIX Annual Technical Conference.
-
(2009)
Proceedings of the USENIX Annual Technical Conference
-
-
Cowling, J.1
Ports, D.2
Liskov, B.3
Popa, R.A.4
Gaikwad, A.5
-
12
-
-
21844440623
-
Vivaldi: A decentralized network coordinate system
-
DOI 10.1145/1030194.1015471, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
DABEK, F., COX, R., KAASHOEK, F., AND MORRIS, R. 2004a. Vivaldi: A decentralized network coordinate system. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'04). ACM, New York, NY, 15-26. (Pubitemid 40954866)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 15-26
-
-
Dabek, F.1
Cox, R.2
Kaashoek, F.3
Morris, R.4
-
13
-
-
84875702502
-
Designing a DHT for low latency and high throughput
-
DABEK, F., LI, J., SIT, E., ROBERTSON, J.,KAASHOEK, M. F., AND MORRIS, R. 2004b. Designing a DHT for low latency and high throughput. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI). 85-98.
-
(2004)
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI).
, pp. 85-98
-
-
Dabek, F.1
J, L.I.2
Sit, E.3
Robertson, J.4
Kaashoek, M.F.5
Morris, R.6
-
14
-
-
0023294428
-
An intrusion-detection model
-
DENNING, D. E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 2, 222-232.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
16
-
-
0035481566
-
IDMaps: A global Internet host distance estimation service
-
DOI 10.1109/90.958323, PII S1063669201089932
-
FRANCIS, P., JAMIN, S., JIN, C., JIN, Y., RAZ, D., SHAVITT, Y., AND ZHANG, L. 2001. IDMaps: A global internet host distance estimation service. IEEE/ACM Trans. Netw. 9, 5, 525-540. (Pubitemid 33048405)
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.5
, pp. 525-540
-
-
Francis, P.1
Jamin, S.2
Jin, C.3
Jin, Y.4
Raz, D.5
Shavitt, Y.6
Zhang, L.7
-
17
-
-
0141427800
-
King: Estimating latency between arbitrary internet end hosts
-
ACM, New York, NY
-
GUMMADI, K. P., SAROIU, S., AND GRIBBLE, S. D. 2002. King: Estimating latency between arbitrary internet end hosts. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW'02). ACM, New York, NY, 5-18.
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW'02).
, pp. 5-18
-
-
Gummadi, K.P.1
Saroiu, S.2
Gribble, S.D.3
-
18
-
-
84855244194
-
Reduced state routing in the internet
-
GUMMADI, R., GOVINDAN, R., KOTHARI, N., KARP, B., KIM, Y. J., AND SHENKER, S. 2004. Reduced state routing in the internet. In Proceedings of the ACM Workshop on Hot Topics in Networks.
-
(2004)
Proceedings of the ACM Workshop on Hot Topics in Networks
-
-
Gummadi, R.1
Govindan, R.2
Kothari, N.3
Karp, B.4
Kim, Y.J.5
Shenker, S.6
-
19
-
-
34248326936
-
Real attacks on virtual networks: Vivaldi out of tune
-
DOI 10.1145/1162666.1162672, Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, LSAD'06
-
KAAFAR, M. A., MATHY, L., TURLETTI, T., AND DABBOUS, W. 2006a. Real attacks on virtual networks: Vivaldi out of tune. In Proceedings of the SIGCOMM Workshop on Large-Scale Attack Defense (LSAD'06). ACM, New York, NY, 139-146. (Pubitemid 46740684)
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, LSAD'06
, vol.2006
, pp. 139-146
-
-
Kaafar, M.A.1
Mathy, L.2
Turletti, T.3
Dabbous, W.4
-
20
-
-
77953854188
-
Virtual networks under attack: Disrupting internet coordinate systems
-
ACM, New York, NY, USA
-
KAAFAR, M. A., MATHY, L., TURLETTI, T., AND DABBOUS, W. 2006b. Virtual networks under attack: Disrupting internet coordinate systems. In Proceedings of the ACM CoNEXT Conference (CoNEXT'06). ACM, New York, NY, USA, 1-12.
-
(2006)
Proceedings of the ACM CoNEXT Conference (CoNEXT'06)
, pp. 1-12
-
-
Kaafar, M.A.1
Mathy, L.2
Turletti, T.3
Dabbous, W.4
-
21
-
-
36949037494
-
Securing internet coordinate embedding systems
-
DOI 10.1145/1282380.1282388, ACM SIGCOMM 2007: Conference on Computer Communications
-
KAAFAR, M. A., MATHY, L., BARAKAT, C., SALAMATIAN, K., TURLETTI, T., AND DABBOUS, W. 2007. Securing internet coordinate embedding systems. SIGCOMM Comput. Comm. Rev. 37, 4, 61-72. (Pubitemid 350239773)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 61-72
-
-
Kaafar, M.A.1
Mathy, L.2
Barakat, C.3
Salamatian, K.4
Turletti, T.5
Dabbous, W.6
-
22
-
-
85024429815
-
A new approach to linear filtering and prediction problems
-
Series D
-
KALMAN, R. E. 1960. A new approach to linear filtering and prediction problems. Trans. ASME J. Basic Engin. 82, Series D, 35-45.
-
(1960)
Trans. ASME J. Basic Engin.
, vol.82
, pp. 35-45
-
-
Kalman, R.E.1
-
23
-
-
33947658434
-
Stable and accurate network coordinates
-
IEEE Computer Society, Los Alamitos, CA
-
LEDLIE, J., PIETZUCH, P., AND SELTZER, M. 2006. Stable and accurate network coordinates. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06). IEEE Computer Society, Los Alamitos, CA, 74.
-
(2006)
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
, pp. 74
-
-
Ledlie, J.1
Pietzuch, P.2
Seltzer, M.3
-
26
-
-
18844437041
-
PCoord: Network position estimation using peer-to-peer measurements
-
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
-
LEHMAN, L.-W. AND LERMAN, S. 2004. Pcoord: Network position estimation using peer-to-peer measurements. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA'04). IEEE Computer Society, Los Alamitos, CA, 15-24. (Pubitemid 40681656)
-
(2004)
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
, pp. 15-24
-
-
Lehman, L.-W.1
Lerman, S.2
-
27
-
-
84878730321
-
On the accuracy of embeddings for internet coordinate systems
-
USENIX Association, Berkeley, CA
-
LUA, E. K., GRIFFIN, T., PIAS, M., ZHENG, H., AND CROWCROFT, J. 2005. On the accuracy of embeddings for internet coordinate systems. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05). USENIX Association, Berkeley, CA, 11.
-
(2005)
Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05)
, pp. 11
-
-
Lua, E.K.1
Griffin, T.2
Pias, M.3
Zheng, H.4
Crowcroft, J.5
-
29
-
-
0036346553
-
Predicting internet network distance with coordinates-based approaches
-
NG, T. S. E. AND ZHANG, H. 2001. Predicting internet network distance with coordinates-based approaches. In Proceedings of the IEEE INFOCOM. 170-179.
-
(2001)
Proceedings of the IEEE INFOCOM
, pp. 170-179
-
-
E, N.G.T.S.1
Zhang, H.2
-
30
-
-
84855244197
-
A network positioning system for the internet
-
USENIX Association, Berkeley, CA
-
NG, T. S. E. AND ZHANG, H. 2004. A network positioning system for the internet. In Proceedings of the USENIX Annual Technical Conference (ATEC'04). USENIX Association, Berkeley, CA, 11.
-
(2004)
Proceedings of the USENIX Annual Technical Conference (ATEC'04)
, pp. 11
-
-
E, N.G.T.S.1
Zhang, H.2
-
31
-
-
13244266037
-
Lighthouses for scalable distributed location
-
PIAS, M., CROWCROFT, J., WILBUR, S., HARRIS, T., AND BHATTI, S. 2003. Lighthouses for scalable distributed location. In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS).
-
(2003)
Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS)
-
-
Pias, M.1
Crowcroft, J.2
Wilbur, S.3
Harris, T.4
Bhatti, S.5
-
32
-
-
77951460641
-
Supporting network coordinates on planetlab
-
USENIX Association, Berkeley, CA
-
PIETZUCH, P., LEDLIE, J., AND SELTZER, M. 2005. Supporting network coordinates on planetlab. In Proceedings of the 2nd Conference on Real, Large Distributed Systems (WORLDS'05). USENIX Association, Berkeley, CA, 19-24.
-
(2005)
Proceedings of the 2nd Conference on Real, Large Distributed Systems (WORLDS'05)
, pp. 19-24
-
-
Pietzuch, P.1
Ledlie, J.2
Seltzer, M.3
-
33
-
-
84855244199
-
-
Accessed 2010
-
PLANETLAB. http://planet-lab.org. (Accessed 2010).
-
-
-
-
34
-
-
84855228783
-
-
(Accessed 2009)
-
PYXIDA. http://pyxida.sourceforge.net. (Accessed 2009).
-
-
-
-
35
-
-
33847324622
-
OpenDHT: A public DHT service and its uses
-
DOI 10.1145/1090191.1080102
-
RHEA, S., GODFREY, B., KARP, B., KUBIATOWICZ, J., RATNASAMY, S., SHENKER, S., STOICA, I., AND YU, H. 2005. Opendht: A public dht service and its uses. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'05). ACM, New York, NY, 73-84. (Pubitemid 46323495)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 73-84
-
-
Rhea, S.1
Godfrey, B.2
Karp, B.3
Kubiatowicz, J.4
Ratnasamy, S.5
Shenker, S.6
Stoica, I.7
Yu, H.8
-
36
-
-
37849024689
-
A reputation-based approach for securing Vivaldi embedding system
-
Springer-Verlag, Berlin, Heidelberg
-
SAUCEZ, D., DONNET, B., AND BONAVENTURE, O. 2007. A reputation-based approach for securing Vivaldi embedding system. In Proceedings of the 13th Open European Summer School and IFIP TC6.6 Conference on Dependable and Adaptable Networks and Services (EUNICE'07). Springer-Verlag, Berlin, Heidelberg, 78-85.
-
(2007)
Proceedings of the 13th Open European Summer School and IFIP TC6.6 Conference on Dependable and Adaptable Networks and Services (EUNICE'07)
, pp. 78-85
-
-
Saucez, D.1
Donnet, B.2
Bonaventure, O.3
-
37
-
-
0041472446
-
Big-bang simulation for embedding network distances in Euclidean space
-
SHAVITT, Y. AND TANKEL, T. 2003. Big-bang simulation for embedding network distances in Euclidean space. In Proceedings of the IEEE INFOCOM.
-
(2003)
Proceedings of the IEEE INFOCOM
-
-
Shavitt, Y.1
Tankel, T.2
-
38
-
-
85077073973
-
Veracity: Practical Secure Network Coordinates via Votebased Agreements
-
VUZE. (Accessed 2010).
-
SHERR, M., BLAZE, M., AND LOO, B. T. 2009. Veracity: Practical Secure Network Coordinates via Votebased Agreements. In Proceedings of the USENIX Annual Technical Conference. VUZE. http://azureus.sourceforge.net. (Accessed 2010).
-
(2009)
Proceedings of the USENIX Annual Technical Conference
-
-
Sherr, M.1
Blaze, M.2
Loo, B.T.3
-
39
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
ACM, New York, NY
-
WAGNER, D. AND SOTO, P. 2002. Mimicry attacks on host-based intrusion detection systems. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). ACM, New York, NY, 255-264.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02)
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
40
-
-
63049097135
-
Distributed algorithms for stable and secure network coordinates
-
ACM, New York, NY
-
WANG, G. AND NG, T. E. 2008. Distributed algorithms for stable and secure network coordinates. In Proceedings of the 8th ACMSIGCOMM Conference on Internet Measurement (IMC'08). ACM, New York, NY, 131-144.
-
(2008)
Proceedings of the 8th ACMSIGCOMM Conference on Internet Measurement (IMC'08)
, pp. 131-144
-
-
Wang, G.1
E, N.G.T.2
-
41
-
-
42149099904
-
Towards network triangle inequality violation aware distributed systems
-
ACM, New York, NY
-
WANG, G., ZHANG, B., AND NG, T. S. E. 2007. Towards network triangle inequality violation aware distributed systems. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC'07). ACM, New York, NY, 175-188.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC'07).
, pp. 175-188
-
-
Wang, G.1
Zhang, B.2
E, N.G.T.S.3
-
42
-
-
77952365766
-
On the accuracy of decentralized virtual coordinate systems in adversarial networks
-
ACM, New York, NY
-
ZAGE, D. J. AND NITA-ROTARU, C. 2007. On the accuracy of decentralized virtual coordinate systems in adversarial networks. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). ACM, New York, NY, 214-224.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
, pp. 214-224
-
-
Zage, D.J.1
Nita-Rotaru, C.2
|