메뉴 건너뛰기




Volumn , Issue , 2012, Pages 551-569

Towards robust and efficient computation in dynamic Peer-to-Peer networks

Author keywords

Distributed algorithm; Dynamic network; Expander graph; Peer to Peer network; Randomized algorithm; Stable agreement

Indexed keywords

COMPUTATIONAL EFFICIENCY; PARALLEL ALGORITHMS; PEER TO PEER NETWORKS; PROBABILITY;

EID: 84860120033     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1137/1.9781611973099.47     Document Type: Conference Paper
Times cited : (76)

References (54)
  • 1
    • 0023589502 scopus 로고
    • Applying static network protocols to dynamic networks
    • Yehuda Afek, Baruch Awerbuch, and Eli Gafni. Applying static network protocols to dynamic networks. In FOCS'87, pages 358-370, 1987.
    • (1987) FOCS'87 , pp. 358-370
    • Afek, Y.1    Awerbuch, B.2    Gafni, E.3
  • 2
    • 0026965763 scopus 로고
    • The slide mechanism with applications in dynamic networks
    • Yehuda Afek, Eli Gafni, and Adi Rosen. The slide mechanism with applications in dynamic networks. In ACM PODC, pages 35-46, 1992.
    • (1992) ACM PODC , pp. 35-46
    • Afek, Y.1    Gafni, E.2    Rosen, A.3
  • 4
    • 38449106733 scopus 로고    scopus 로고
    • Worm versus alert: Who wins in a battle for control of a large-scale network?
    • James Aspnes, Navin Rustagi, and Jared Saia. Worm versus alert: Who wins in a battle for control of a large-scale network? In OPODIS, pages 443-456, 2007.
    • (2007) OPODIS , pp. 443-456
    • Aspnes, J.1    Rustagi, N.2    Saia, J.3
  • 7
    • 0028123963 scopus 로고
    • Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks
    • May
    • B. Awerbuch and F. T. Leighton. Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks. In ACM STOC, pages 487-496, May 1994.
    • (1994) ACM STOC , pp. 487-496
    • Awerbuch, B.1    Leighton, F.T.2
  • 8
    • 25144514330 scopus 로고    scopus 로고
    • Anycasting in adversarial systems: Routing and admission control
    • Baruch Awerbuch, Andr Brinkmann, and Christian Scheideler. Anycasting in adversarial systems: Routing and admission control. In ICALP'03, pages 1153-1168, 2003.
    • (2003) ICALP'03 , pp. 1153-1168
    • Awerbuch, B.1    Brinkmann, A.2    Scheideler, C.3
  • 9
    • 0026971188 scopus 로고
    • Adapting to asynchronous dynamic networks
    • Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, and Michael E. Saks. Adapting to asynchronous dynamic networks. In STOC'92, pages 557-570, 1992.
    • (1992) STOC'92 , pp. 557-570
    • Awerbuch, B.1    Patt-Shamir, B.2    Peleg, D.3    Saks, M.E.4
  • 12
    • 70350641357 scopus 로고    scopus 로고
    • Parsimonious flooding in dynamic graphs
    • Hervé Baumann, Pierluigi Crescenzi, and Pierre Fraigniaud. Parsimonious flooding in dynamic graphs. In PODC, pages 260-269, 2009.
    • (2009) PODC , pp. 260-269
    • Baumann, H.1    Crescenzi, P.2    Fraigniaud, P.3
  • 13
    • 0003661490 scopus 로고
    • Fast consensus in networks of bounded degree
    • Piotr Berman and Juan A. Garay. Fast consensus in networks of bounded degree. Distributed Computing, 7(2):67-73, 1993.
    • (1993) Distributed Computing , vol.7 , Issue.2 , pp. 67-73
    • Berman, P.1    Garay, J.A.2
  • 17
    • 84860158577 scopus 로고    scopus 로고
    • Website of
    • Website of Cloudmark Inc. http://cloudmark.com/.
  • 18
    • 0031353179 scopus 로고    scopus 로고
    • Size-estimation framework with applications to transitive closure and reachability
    • Edith Cohen. Size-estimation framework with applications to transitive closure and reachability. J. Comput. Syst. Sci., 55(3):441-453, 1997.
    • (1997) J. Comput. Syst. Sci. , vol.55 , Issue.3 , pp. 441-453
    • Cohen, E.1
  • 20
    • 84860206470 scopus 로고    scopus 로고
    • Large deviations techniques and applications
    • A. Dembo and O. Zeitouni. Large deviations techniques and applications. Elearn, 1998.
    • (1998) Elearn
    • Dembo, A.1    Zeitouni, O.2
  • 21
    • 79959660547 scopus 로고    scopus 로고
    • Stabilizing consensus with the power of two choices
    • Benjamin Doerr, Leslie Ann Goldberg, Lorenz Minder, Thomas Sauerwald, and Christian Scheideler. Stabilizing consensus with the power of two choices. In SPAA, pages 149-158, 2011.
    • (2011) SPAA , pp. 149-158
    • Doerr, B.1    Goldberg, L.A.2    Minder, L.3    Sauerwald, T.4    Scheideler, C.5
  • 22
    • 0004294555 scopus 로고    scopus 로고
    • MIT Press, Cambridge, MA, USA
    • Shlomi Dolev. Self-stabilization. MIT Press, Cambridge, MA, USA, 2000.
    • (2000) Self-stabilization
    • Dolev, S.1
  • 23
    • 0024091299 scopus 로고
    • Fault tolerance in networks of bounded degree
    • Cynthia Dwork, David Peleg, Nicholas Pippenger, and Eli Upfal. Fault tolerance in networks of bounded degree. SIAM J. Comput., 17(5):975-988, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.5 , pp. 975-988
    • Dwork, C.1    Peleg, D.2    Pippenger, N.3    Upfal, E.4
  • 25
    • 84968779644 scopus 로고    scopus 로고
    • Censorship resistant peer-to-peer content addressable networks
    • Amos Fiat and Jared Saia. Censorship resistant peer-to-peer content addressable networks. In SODA, pages 94-103, 2002.
    • (2002) SODA , pp. 94-103
    • Fiat, A.1    Saia, J.2
  • 26
    • 0019516256 scopus 로고
    • Distributed algorithms for generating loop-free routes in networks with frequently changing topology
    • E. Gafni and B. Bertsekas. Distributed algorithms for generating loop-free routes in networks with frequently changing topology. IEEE Trans. Comm., 29(1):1118, 1981.
    • (1981) IEEE Trans. Comm. , vol.29 , Issue.1 , pp. 1118
    • Gafni, E.1    Bertsekas, B.2
  • 27
    • 85018107502 scopus 로고    scopus 로고
    • Vanish: Increasing data privacy with self-destructing data
    • Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy. Vanish: Increasing data privacy with self-destructing data. In USENIX Security Symposium, pages 299-316, 2009.
    • (2009) USENIX Security Symposium , pp. 299-316
    • Geambasu, R.1    Kohno, T.2    Levy, A.A.3    Levy, H.M.4
  • 29
    • 33645756088 scopus 로고    scopus 로고
    • A measurement study of napster and gnutella as examples of peer-to-peer file sharing systems
    • P. Krishna Gummadi, Stefan Saroiu, and Steven D. Gribble. A measurement study of napster and gnutella as examples of peer-to-peer file sharing systems. Computer Communication Review, 32(1):82, 2002.
    • (2002) Computer Communication Review , vol.32 , Issue.1 , pp. 82
    • Gummadi, P.K.1    Saroiu, S.2    Gribble, S.D.3
  • 30
    • 79959749930 scopus 로고    scopus 로고
    • Analyzing network coding gossip made easy
    • Bernhard Haeupler. Analyzing network coding gossip made easy. In ACM STOC, pages 293-302, 2011.
    • (2011) ACM STOC , pp. 293-302
    • Haeupler, B.1
  • 31
    • 79959879013 scopus 로고    scopus 로고
    • Faster information dissemination in dynamic networks via network coding
    • Bernhard Haeupler and David Karger. Faster information dissemination in dynamic networks via network coding. In ACM PODC, pages 381-390, 2011.
    • (2011) ACM PODC , pp. 381-390
    • Haeupler, B.1    Karger, D.2
  • 32
    • 35248832638 scopus 로고    scopus 로고
    • Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks
    • DISC, Springer
    • Kirsten Hildrum and John Kubiatowicz. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In DISC, volume 2848 of Lecture Notes in Computer Science, pages 321-336. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2848 , pp. 321-336
    • Hildrum, K.1    Kubiatowicz, J.2
  • 33
    • 77956543874 scopus 로고    scopus 로고
    • Fast asynchronous byzantine agreement and leader election with full information
    • Bruce M. Kapron, David Kempe, Valerie King, Jared Saia, and Vishal Sanwalani. Fast asynchronous byzantine agreement and leader election with full information. ACM Transactions on Algorithms, 6(4), 2010.
    • (2010) ACM Transactions on Algorithms , vol.6 , Issue.4
    • Kapron, B.M.1    Kempe, D.2    King, V.3    Saia, J.4    Sanwalani, V.5
  • 34
    • 79960819698 scopus 로고    scopus 로고
    • 2) bit barrier: Scalable byzantine agreement with an adaptive adversary
    • July
    • 2) bit barrier: Scalable byzantine agreement with an adaptive adversary. J. ACM, 58:18:1-18:24, July 2011.
    • (2011) J. ACM , vol.58
    • King, V.1    Saia, J.2
  • 35
    • 33244463798 scopus 로고    scopus 로고
    • Scalable leader election
    • Valerie King, Jared Saia, Vishal Sanwalani, and Erik Vee. Scalable leader election. In SODA, pages 990-999, 2006.
    • (2006) SODA , pp. 990-999
    • King, V.1    Saia, J.2    Sanwalani, V.3    Vee, E.4
  • 36
    • 38049008242 scopus 로고    scopus 로고
    • Towards secure and scalable computation in peer-to-peer networks
    • Valerie King, Jared Saia, Vishal Sanwalani, and Erik Vee. Towards secure and scalable computation in peer-to-peer networks. In FOCS, pages 87-98, 2006.
    • (2006) FOCS , pp. 87-98
    • King, V.1    Saia, J.2    Sanwalani, V.3    Vee, E.4
  • 37
    • 79959907809 scopus 로고    scopus 로고
    • Dynamic networks: Models and algorithms
    • F. Kuhn and R. Oshman. Dynamic networks: Models and algorithms. SIGACT News, 42(1):82-96, 2011.
    • (2011) SIGACT News , vol.42 , Issue.1 , pp. 82-96
    • Kuhn, F.1    Oshman, R.2
  • 38
    • 77954733147 scopus 로고    scopus 로고
    • Distributed computation in dynamic networks
    • Fabian Kuhn, Nancy Lynch, and Rotem Oshman. Distributed computation in dynamic networks. In ACM STOC, pages 513-522, 2010.
    • (2010) ACM STOC , pp. 513-522
    • Kuhn, F.1    Lynch, N.2    Oshman, R.3
  • 40
    • 77954867373 scopus 로고    scopus 로고
    • Towards worst-case churn resistant peer-to-peer systems
    • Fabian Kuhn, Stefan Schmid, and Roger Wattenhofer. Towards worst-case churn resistant peer-to-peer systems. Distributed Computing, 22(4):249-267, 2010.
    • (2010) Distributed Computing , vol.22 , Issue.4 , pp. 249-267
    • Kuhn, F.1    Schmid, S.2    Wattenhofer, R.3
  • 42
    • 0004215089 scopus 로고    scopus 로고
    • Morgan Kaufman Publishers, Inc., San Francisco, USA
    • Nancy Lynch. Distributed Algorithms. Morgan Kaufman Publishers, Inc., San Francisco, USA, 1996.
    • (1996) Distributed Algorithms
    • Lynch, N.1
  • 43
    • 31844455702 scopus 로고    scopus 로고
    • Host-based detection of worms through peer-to-peer cooperation
    • Vijay Atluri and Angelos D. Keromytis, editors, ACM Press
    • David J. Malan and Michael D. Smith. Host-based detection of worms through peer-to-peer cooperation. In Vijay Atluri and Angelos D. Keromytis, editors, WORM, pages 72-80. ACM Press, 2005.
    • (2005) WORM , pp. 72-80
    • Malan, D.J.1    Smith, M.D.2
  • 44
    • 46749116895 scopus 로고    scopus 로고
    • Fast distributed algorithms for computing separable functions
    • Damon Mosk-Aoyama and Devavrat Shah. Fast distributed algorithms for computing separable functions. IEEE Transactions on Information Theory, 54(7):2997-3007, 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.7 , pp. 2997-3007
    • Mosk-Aoyama, D.1    Shah, D.2
  • 45
    • 34248566417 scopus 로고    scopus 로고
    • A simple fault tolerant distributed hash table
    • Moni Naor and Udi Wieder. A simple fault tolerant distributed hash table. In IPTPS, pages 88-97, 2003.
    • (2003) IPTPS , pp. 88-97
    • Naor, M.1    Wieder, U.2
  • 46
    • 33745832709 scopus 로고    scopus 로고
    • Information dissemination in highly dynamic graphs
    • Regina O'Dell and Roger Wattenhofer. Information dissemination in highly dynamic graphs. In DIALM-POMC, pages 104-110, 2005.
    • (2005) DIALM-POMC , pp. 104-110
    • O'Dell, R.1    Wattenhofer, R.2
  • 47
    • 0035179634 scopus 로고    scopus 로고
    • Building low-diameter P2P networks
    • Gopal Pandurangan, Prabhakar Raghavan, and Eli Upfal. Building low-diameter P2P networks. In FOCS, pages 492-499, 2001.
    • (2001) FOCS , pp. 492-499
    • Pandurangan, G.1    Raghavan, P.2    Upfal, E.3
  • 48
    • 79959917345 scopus 로고    scopus 로고
    • Xheal: Localized self-healing using expanders
    • Gopal Pandurangan and Amitabh Trehan. Xheal: localized self-healing using expanders. In PODC, pages 301-310, 2011.
    • (2011) PODC , pp. 301-310
    • Pandurangan, G.1    Trehan, A.2
  • 49
    • 27144447960 scopus 로고    scopus 로고
    • How to spread adversarial nodes?: Rotate!
    • Christian Scheideler. How to spread adversarial nodes?: rotate! In STOC, pages 704-713, 2005.
    • (2005) STOC , pp. 704-713
    • Scheideler, C.1
  • 50
    • 70449092008 scopus 로고    scopus 로고
    • A distributed and oblivious heap
    • Automata, Languages and Programming, Springer Berlin / Heidelberg
    • Christian Scheideler and Stefan Schmid. A distributed and oblivious heap. In Automata, Languages and Programming, volume 5556 of Lecture Notes in Computer Science, pages 571-582. Springer Berlin / Heidelberg, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5556 , pp. 571-582
    • Scheideler, C.1    Schmid, S.2
  • 53
    • 0012609620 scopus 로고
    • Tolerating a linear number of faults in networks of bounded degree
    • Eli Upfal. Tolerating a linear number of faults in networks of bounded degree. Inf. Comput., 115(2):312-320, 1994.
    • (1994) Inf. Comput. , vol.115 , Issue.2 , pp. 312-320
    • Upfal, E.1
  • 54
    • 2342522755 scopus 로고    scopus 로고
    • Security applications of peer-to-peer networks
    • June
    • Vasileios Vlachos, Stephanos Androutsellis-Theotokis, and Diomidis Spinellis. Security applications of peer-to-peer networks. Comput Netw., 45:195-205, June 2004.
    • (2004) Comput Netw. , vol.45 , pp. 195-205
    • Vlachos, V.1    Androutsellis-Theotokis, S.2    Spinellis, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.