-
1
-
-
0023589502
-
Applying static network protocols to dynamic networks
-
Yehuda Afek, Baruch Awerbuch, and Eli Gafni. Applying static network protocols to dynamic networks. In FOCS'87, pages 358-370, 1987.
-
(1987)
FOCS'87
, pp. 358-370
-
-
Afek, Y.1
Awerbuch, B.2
Gafni, E.3
-
2
-
-
0026965763
-
The slide mechanism with applications in dynamic networks
-
Yehuda Afek, Eli Gafni, and Adi Rosen. The slide mechanism with applications in dynamic networks. In ACM PODC, pages 35-46, 1992.
-
(1992)
ACM PODC
, pp. 35-46
-
-
Afek, Y.1
Gafni, E.2
Rosen, A.3
-
3
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung. Network information flow. Transactions on Information Theory, 46(4):1204-1216, 2000.
-
(2000)
Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
4
-
-
38449106733
-
Worm versus alert: Who wins in a battle for control of a large-scale network?
-
James Aspnes, Navin Rustagi, and Jared Saia. Worm versus alert: Who wins in a battle for control of a large-scale network? In OPODIS, pages 443-456, 2007.
-
(2007)
OPODIS
, pp. 443-456
-
-
Aspnes, J.1
Rustagi, N.2
Saia, J.3
-
6
-
-
0035166168
-
Simple routing strategies for adversarial systems
-
B. Awerbuch, P. Berenbrink, A. Brinkmann, and C. Scheideler. Simple routing strategies for adversarial systems. In IEEE FOCS, pages 158-167, 2001.
-
(2001)
IEEE FOCS
, pp. 158-167
-
-
Awerbuch, B.1
Berenbrink, P.2
Brinkmann, A.3
Scheideler, C.4
-
7
-
-
0028123963
-
Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks
-
May
-
B. Awerbuch and F. T. Leighton. Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks. In ACM STOC, pages 487-496, May 1994.
-
(1994)
ACM STOC
, pp. 487-496
-
-
Awerbuch, B.1
Leighton, F.T.2
-
8
-
-
25144514330
-
Anycasting in adversarial systems: Routing and admission control
-
Baruch Awerbuch, Andr Brinkmann, and Christian Scheideler. Anycasting in adversarial systems: Routing and admission control. In ICALP'03, pages 1153-1168, 2003.
-
(2003)
ICALP'03
, pp. 1153-1168
-
-
Awerbuch, B.1
Brinkmann, A.2
Scheideler, C.3
-
9
-
-
0026971188
-
Adapting to asynchronous dynamic networks
-
Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, and Michael E. Saks. Adapting to asynchronous dynamic networks. In STOC'92, pages 557-570, 1992.
-
(1992)
STOC'92
, pp. 557-570
-
-
Awerbuch, B.1
Patt-Shamir, B.2
Peleg, D.3
Saks, M.E.4
-
11
-
-
33845285547
-
The effect of faults on network expansion
-
Amitabha Bagchi, Ankur Bhargava, Amitabh Chaudhary, David Eppstein, and Christian Scheideler. The effect of faults on network expansion. Theory Comput. Syst., 39(6):903-928, 2006.
-
(2006)
Theory Comput. Syst.
, vol.39
, Issue.6
, pp. 903-928
-
-
Bagchi, A.1
Bhargava, A.2
Chaudhary, A.3
Eppstein, D.4
Scheideler, C.5
-
12
-
-
70350641357
-
Parsimonious flooding in dynamic graphs
-
Hervé Baumann, Pierluigi Crescenzi, and Pierre Fraigniaud. Parsimonious flooding in dynamic graphs. In PODC, pages 260-269, 2009.
-
(2009)
PODC
, pp. 260-269
-
-
Baumann, H.1
Crescenzi, P.2
Fraigniaud, P.3
-
13
-
-
0003661490
-
Fast consensus in networks of bounded degree
-
Piotr Berman and Juan A. Garay. Fast consensus in networks of bounded degree. Distributed Computing, 7(2):67-73, 1993.
-
(1993)
Distributed Computing
, vol.7
, Issue.2
, pp. 67-73
-
-
Berman, P.1
Garay, J.A.2
-
16
-
-
79960672673
-
Optimal regional consecutive leader election in mobile ad-hoc networks
-
ACM
-
Hyun Chul Chung, Peter Robinson, and Jennifer L. Welch. Optimal regional consecutive leader election in mobile ad-hoc networks. In Proceedings of the 7th ACM ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing, FOMC '11, pages 52-61. ACM, 2011.
-
(2011)
Proceedings of the 7th ACM ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing, FOMC '11
, pp. 52-61
-
-
Chung, H.C.1
Robinson, P.2
Welch, J.L.3
-
17
-
-
84860158577
-
-
Website of
-
Website of Cloudmark Inc. http://cloudmark.com/.
-
-
-
-
18
-
-
0031353179
-
Size-estimation framework with applications to transitive closure and reachability
-
Edith Cohen. Size-estimation framework with applications to transitive closure and reachability. J. Comput. Syst. Sci., 55(3):441-453, 1997.
-
(1997)
J. Comput. Syst. Sci.
, vol.55
, Issue.3
, pp. 441-453
-
-
Cohen, E.1
-
19
-
-
33947403146
-
Distributed data mining in peer-to-peer networks
-
Souptik Datta, Kanishka Bhaduri, Chris Giannella, Ran Wolff, and Hillol Kargupta. Distributed data mining in peer-to-peer networks. IEEE Internet Computing, 10(4):18-26, 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.4
, pp. 18-26
-
-
Datta, S.1
Bhaduri, K.2
Giannella, C.3
Wolff, R.4
Kargupta, H.5
-
20
-
-
84860206470
-
Large deviations techniques and applications
-
A. Dembo and O. Zeitouni. Large deviations techniques and applications. Elearn, 1998.
-
(1998)
Elearn
-
-
Dembo, A.1
Zeitouni, O.2
-
21
-
-
79959660547
-
Stabilizing consensus with the power of two choices
-
Benjamin Doerr, Leslie Ann Goldberg, Lorenz Minder, Thomas Sauerwald, and Christian Scheideler. Stabilizing consensus with the power of two choices. In SPAA, pages 149-158, 2011.
-
(2011)
SPAA
, pp. 149-158
-
-
Doerr, B.1
Goldberg, L.A.2
Minder, L.3
Sauerwald, T.4
Scheideler, C.5
-
22
-
-
0004294555
-
-
MIT Press, Cambridge, MA, USA
-
Shlomi Dolev. Self-stabilization. MIT Press, Cambridge, MA, USA, 2000.
-
(2000)
Self-stabilization
-
-
Dolev, S.1
-
23
-
-
0024091299
-
Fault tolerance in networks of bounded degree
-
Cynthia Dwork, David Peleg, Nicholas Pippenger, and Eli Upfal. Fault tolerance in networks of bounded degree. SIAM J. Comput., 17(5):975-988, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.5
, pp. 975-988
-
-
Dwork, C.1
Peleg, D.2
Pippenger, N.3
Upfal, E.4
-
24
-
-
42149083231
-
Profiling a million user dht
-
Jarret Falkner, Michael Piatek, John P. John, Arvind Krishnamurthy, and Thomas E. Anderson. Profiling a million user dht. In Internet Measurement Comference, pages 129-134, 2007.
-
(2007)
Internet Measurement Comference
, pp. 129-134
-
-
Falkner, J.1
Piatek, M.2
John, J.P.3
Krishnamurthy, A.4
Anderson, T.E.5
-
25
-
-
84968779644
-
Censorship resistant peer-to-peer content addressable networks
-
Amos Fiat and Jared Saia. Censorship resistant peer-to-peer content addressable networks. In SODA, pages 94-103, 2002.
-
(2002)
SODA
, pp. 94-103
-
-
Fiat, A.1
Saia, J.2
-
26
-
-
0019516256
-
Distributed algorithms for generating loop-free routes in networks with frequently changing topology
-
E. Gafni and B. Bertsekas. Distributed algorithms for generating loop-free routes in networks with frequently changing topology. IEEE Trans. Comm., 29(1):1118, 1981.
-
(1981)
IEEE Trans. Comm.
, vol.29
, Issue.1
, pp. 1118
-
-
Gafni, E.1
Bertsekas, B.2
-
27
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy. Vanish: Increasing data privacy with self-destructing data. In USENIX Security Symposium, pages 299-316, 2009.
-
(2009)
USENIX Security Symposium
, pp. 299-316
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.A.3
Levy, H.M.4
-
29
-
-
33645756088
-
A measurement study of napster and gnutella as examples of peer-to-peer file sharing systems
-
P. Krishna Gummadi, Stefan Saroiu, and Steven D. Gribble. A measurement study of napster and gnutella as examples of peer-to-peer file sharing systems. Computer Communication Review, 32(1):82, 2002.
-
(2002)
Computer Communication Review
, vol.32
, Issue.1
, pp. 82
-
-
Gummadi, P.K.1
Saroiu, S.2
Gribble, S.D.3
-
30
-
-
79959749930
-
Analyzing network coding gossip made easy
-
Bernhard Haeupler. Analyzing network coding gossip made easy. In ACM STOC, pages 293-302, 2011.
-
(2011)
ACM STOC
, pp. 293-302
-
-
Haeupler, B.1
-
31
-
-
79959879013
-
Faster information dissemination in dynamic networks via network coding
-
Bernhard Haeupler and David Karger. Faster information dissemination in dynamic networks via network coding. In ACM PODC, pages 381-390, 2011.
-
(2011)
ACM PODC
, pp. 381-390
-
-
Haeupler, B.1
Karger, D.2
-
32
-
-
35248832638
-
Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks
-
DISC, Springer
-
Kirsten Hildrum and John Kubiatowicz. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In DISC, volume 2848 of Lecture Notes in Computer Science, pages 321-336. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2848
, pp. 321-336
-
-
Hildrum, K.1
Kubiatowicz, J.2
-
33
-
-
77956543874
-
Fast asynchronous byzantine agreement and leader election with full information
-
Bruce M. Kapron, David Kempe, Valerie King, Jared Saia, and Vishal Sanwalani. Fast asynchronous byzantine agreement and leader election with full information. ACM Transactions on Algorithms, 6(4), 2010.
-
(2010)
ACM Transactions on Algorithms
, vol.6
, Issue.4
-
-
Kapron, B.M.1
Kempe, D.2
King, V.3
Saia, J.4
Sanwalani, V.5
-
34
-
-
79960819698
-
2) bit barrier: Scalable byzantine agreement with an adaptive adversary
-
July
-
2) bit barrier: Scalable byzantine agreement with an adaptive adversary. J. ACM, 58:18:1-18:24, July 2011.
-
(2011)
J. ACM
, vol.58
-
-
King, V.1
Saia, J.2
-
35
-
-
33244463798
-
Scalable leader election
-
Valerie King, Jared Saia, Vishal Sanwalani, and Erik Vee. Scalable leader election. In SODA, pages 990-999, 2006.
-
(2006)
SODA
, pp. 990-999
-
-
King, V.1
Saia, J.2
Sanwalani, V.3
Vee, E.4
-
36
-
-
38049008242
-
Towards secure and scalable computation in peer-to-peer networks
-
Valerie King, Jared Saia, Vishal Sanwalani, and Erik Vee. Towards secure and scalable computation in peer-to-peer networks. In FOCS, pages 87-98, 2006.
-
(2006)
FOCS
, pp. 87-98
-
-
King, V.1
Saia, J.2
Sanwalani, V.3
Vee, E.4
-
37
-
-
79959907809
-
Dynamic networks: Models and algorithms
-
F. Kuhn and R. Oshman. Dynamic networks: Models and algorithms. SIGACT News, 42(1):82-96, 2011.
-
(2011)
SIGACT News
, vol.42
, Issue.1
, pp. 82-96
-
-
Kuhn, F.1
Oshman, R.2
-
38
-
-
77954733147
-
Distributed computation in dynamic networks
-
Fabian Kuhn, Nancy Lynch, and Rotem Oshman. Distributed computation in dynamic networks. In ACM STOC, pages 513-522, 2010.
-
(2010)
ACM STOC
, pp. 513-522
-
-
Kuhn, F.1
Lynch, N.2
Oshman, R.3
-
39
-
-
79959879836
-
Coordinated consensus in dynamic networks
-
ACM
-
Fabian Kuhn, Rotem Oshman, and Yoram Moses. Coordinated consensus in dynamic networks. In Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '11, pages 1-10. ACM, 2011.
-
(2011)
Proceedings of the 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC '11
, pp. 1-10
-
-
Kuhn, F.1
Oshman, R.2
Moses, Y.3
-
40
-
-
77954867373
-
Towards worst-case churn resistant peer-to-peer systems
-
Fabian Kuhn, Stefan Schmid, and Roger Wattenhofer. Towards worst-case churn resistant peer-to-peer systems. Distributed Computing, 22(4):249-267, 2010.
-
(2010)
Distributed Computing
, vol.22
, Issue.4
, pp. 249-267
-
-
Kuhn, F.1
Schmid, S.2
Wattenhofer, R.3
-
42
-
-
0004215089
-
-
Morgan Kaufman Publishers, Inc., San Francisco, USA
-
Nancy Lynch. Distributed Algorithms. Morgan Kaufman Publishers, Inc., San Francisco, USA, 1996.
-
(1996)
Distributed Algorithms
-
-
Lynch, N.1
-
43
-
-
31844455702
-
Host-based detection of worms through peer-to-peer cooperation
-
Vijay Atluri and Angelos D. Keromytis, editors, ACM Press
-
David J. Malan and Michael D. Smith. Host-based detection of worms through peer-to-peer cooperation. In Vijay Atluri and Angelos D. Keromytis, editors, WORM, pages 72-80. ACM Press, 2005.
-
(2005)
WORM
, pp. 72-80
-
-
Malan, D.J.1
Smith, M.D.2
-
44
-
-
46749116895
-
Fast distributed algorithms for computing separable functions
-
Damon Mosk-Aoyama and Devavrat Shah. Fast distributed algorithms for computing separable functions. IEEE Transactions on Information Theory, 54(7):2997-3007, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.7
, pp. 2997-3007
-
-
Mosk-Aoyama, D.1
Shah, D.2
-
45
-
-
34248566417
-
A simple fault tolerant distributed hash table
-
Moni Naor and Udi Wieder. A simple fault tolerant distributed hash table. In IPTPS, pages 88-97, 2003.
-
(2003)
IPTPS
, pp. 88-97
-
-
Naor, M.1
Wieder, U.2
-
46
-
-
33745832709
-
Information dissemination in highly dynamic graphs
-
Regina O'Dell and Roger Wattenhofer. Information dissemination in highly dynamic graphs. In DIALM-POMC, pages 104-110, 2005.
-
(2005)
DIALM-POMC
, pp. 104-110
-
-
O'Dell, R.1
Wattenhofer, R.2
-
47
-
-
0035179634
-
Building low-diameter P2P networks
-
Gopal Pandurangan, Prabhakar Raghavan, and Eli Upfal. Building low-diameter P2P networks. In FOCS, pages 492-499, 2001.
-
(2001)
FOCS
, pp. 492-499
-
-
Pandurangan, G.1
Raghavan, P.2
Upfal, E.3
-
48
-
-
79959917345
-
Xheal: Localized self-healing using expanders
-
Gopal Pandurangan and Amitabh Trehan. Xheal: localized self-healing using expanders. In PODC, pages 301-310, 2011.
-
(2011)
PODC
, pp. 301-310
-
-
Pandurangan, G.1
Trehan, A.2
-
49
-
-
27144447960
-
How to spread adversarial nodes?: Rotate!
-
Christian Scheideler. How to spread adversarial nodes?: rotate! In STOC, pages 704-713, 2005.
-
(2005)
STOC
, pp. 704-713
-
-
Scheideler, C.1
-
50
-
-
70449092008
-
A distributed and oblivious heap
-
Automata, Languages and Programming, Springer Berlin / Heidelberg
-
Christian Scheideler and Stefan Schmid. A distributed and oblivious heap. In Automata, Languages and Programming, volume 5556 of Lecture Notes in Computer Science, pages 571-582. Springer Berlin / Heidelberg, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5556
, pp. 571-582
-
-
Scheideler, C.1
Schmid, S.2
-
51
-
-
0141650540
-
Analyzing peer-to-peer traffic across large networks
-
New York, NY, USA, ACM
-
Subhabrata Sen and Jia Wang. Analyzing peer-to-peer traffic across large networks. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, IMW '02, pages 137-150, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, IMW '02
, pp. 137-150
-
-
Sen, S.1
Wang, J.2
-
52
-
-
34547453122
-
Understanding churn in peer-to-peer networks
-
New York, NY, USA, ACM
-
Daniel Stutzbach and Reza Rejaie. Understanding churn in peer-to-peer networks. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, pages 189-202, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06
, pp. 189-202
-
-
Stutzbach, D.1
Rejaie, R.2
-
53
-
-
0012609620
-
Tolerating a linear number of faults in networks of bounded degree
-
Eli Upfal. Tolerating a linear number of faults in networks of bounded degree. Inf. Comput., 115(2):312-320, 1994.
-
(1994)
Inf. Comput.
, vol.115
, Issue.2
, pp. 312-320
-
-
Upfal, E.1
|