-
2
-
-
33745224219
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
Dec
-
A. Adya, W. Bolosky, M. Castro, R. Chaiken, G. Cermak, J. Douceur, J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. In 5th OSDI, Dec 2002.
-
(2002)
5th OSDI
-
-
Adya, A.1
Bolosky, W.2
Castro, M.3
Chaiken, R.4
Cermak, G.5
Douceur, J.6
Howell, J.7
Lorch, J.8
Theimer, M.9
Wattenhofer, R.10
-
3
-
-
18144409187
-
Selfish behavior and stability of the internet: A game-theoretic analysis of tcp
-
ACM Press
-
A. Akella, S. Seshan, R. Karp, S. Shenker, and C. Papadimitriou. Selfish behavior and stability of the internet: a game-theoretic analysis of tcp. In Proc. SIGCOMM, pages 117-130. ACM Press, 2002.
-
(2002)
Proc. SIGCOMM
, pp. 117-130
-
-
Akella, A.1
Seshan, S.2
Karp, R.3
Shenker, S.4
Papadimitriou, C.5
-
4
-
-
0002430114
-
Subjectivity and correlation in randomized strategies
-
R. J. Aumann. Subjectivity and correlation in randomized strategies. Journal of Mathematical Economics, 1(1):67-96, 1974.
-
(1974)
Journal of Mathematical Economics
, vol.1
, Issue.1
, pp. 67-96
-
-
Aumann, R.J.1
-
5
-
-
4544387814
-
-
Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science, October
-
C. Batten, K. Barr, A. Saraf, and S. Trepetin. pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science, October 2002.
-
(2002)
pStore: A Secure Peer-to-peer Backup System
-
-
Batten, C.1
Barr, K.2
Saraf, A.3
Trepetin, S.4
-
6
-
-
0022144724
-
Asynchronous consensus and broadcast protocols
-
G. Bracha and S. Toueg. Asynchronous consensus and broadcast protocols. J. ACM, 32(4):824-840, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.4
, pp. 824-840
-
-
Bracha, G.1
Toueg, S.2
-
9
-
-
0347133884
-
-
Technical Report 92-15, TR 92-15, Dept. of Computer Science, Hebrew University
-
R. Canetti and T. Rabin. Optimal Asynchronous Byzantine Agreement. Technical Report 92-15, TR 92-15, Dept. of Computer Science, Hebrew University, 1992.
-
(1992)
Optimal Asynchronous Byzantine Agreement
-
-
Canetti, R.1
Rabin, T.2
-
10
-
-
0345757358
-
Practical Byzantine Fault Tolerance and Proactive Recovery
-
DOI 10.1145/571637.571640
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst., 20(4):398-461, 2002. (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
11
-
-
33845415380
-
Sharp: An architecture for secure resource peering
-
J. Chase, B. Chun, Y. Fu, S. Schwab, and A. Vahdat. Sharp: An architecture for secure resource peering. In SOSP, 2003.
-
(2003)
SOSP
-
-
Chase, J.1
Chun, B.2
Fu, Y.3
Schwab, S.4
Vahdat, A.5
-
12
-
-
84885587031
-
-
The game of chicken. http://www.gametheory.net/Dictionary/Games/ GameofChicken.html.
-
The Game of Chicken
-
-
-
14
-
-
4544312693
-
Incentives build robustness in bittorrent
-
B. Cohen. Incentives build robustness in bittorrent. In Proc. 2nd IPTPS, 2003.
-
Proc. 2nd IPTPS, 2003
-
-
Cohen, B.1
-
16
-
-
21644455728
-
Samsara: Honor among thieves in peer-to-peer storage
-
L. P. Cox and B. D. Noble. Samsara: honor among thieves in peer-to-peer storage. In Proc. 19th SOSP, pages 120-132, 2003.
-
(2003)
Proc. 19th SOSP
, pp. 120-132
-
-
Cox, L.P.1
Noble, B.D.2
-
18
-
-
84947273682
-
The Sybil attack
-
Springer-Verlag
-
J. R. Douceur. The Sybil attack. In Proc. 1st IPTPS, pages 251-260. Springer-Verlag, 2002.
-
(2002)
Proc. 1st IPTPS
, pp. 251-260
-
-
Douceur, J.R.1
-
19
-
-
0036655944
-
Fault tolerant implementation
-
K. Eliaz. Fault tolerant implementation. Review of Economic Studies, 69:589-610, Aug 2002. (Pubitemid 35036838)
-
(2002)
Review of Economic Studies
, vol.69
, Issue.3
, pp. 589-610
-
-
Eliaz, K.1
-
20
-
-
0035416195
-
Sharing the cost of multicast transmissions
-
DOI 10.1006/jcss.2001.1754, Internet Algorithms
-
J. Feigenbaum, C. H. Papadimitriou, and S. Shenker. Sharing the cost of multicast transmissions. J. Comput. Syst. Sci., 63(1):21-41, 2001. (Pubitemid 32932560)
-
(2001)
Journal of Computer and System Sciences
, vol.63
, Issue.1
, pp. 21-41
-
-
Feigenbaum, J.1
Papadimitriou, C.H.2
Shenker, S.3
-
21
-
-
10444248045
-
Mechanism design for policy routing
-
ACM Press
-
J. Feigenbaum, R. Sami, and S. Shenker. Mechanism design for policy routing. In Proc. 23rd PODC, pages 11-20. ACM Press, 2004.
-
(2004)
Proc. 23rd PODC
, pp. 11-20
-
-
Feigenbaum, J.1
Sami, R.2
Shenker, S.3
-
22
-
-
0036982153
-
Distributed algorithmic mechanism design: Recent results and future directions
-
ACM Press, New York
-
J. Feigenbaum and S. Shenker. Distributed algorithmic mechanism design: Recent results and future directions. In Proc. 6th DIALM, pages 1-13. ACM Press, New York, 2002.
-
(2002)
Proc. 6th DIALM
, pp. 1-13
-
-
Feigenbaum, J.1
Shenker, S.2
-
23
-
-
11244327782
-
Free-riding and whitewashing in peer-to-peer systems
-
ACM Press
-
M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica. Free-riding and whitewashing in peer-to-peer systems. In Proc. PINS, pages 228-236. ACM Press, 2004.
-
(2004)
Proc. PINS
, pp. 228-236
-
-
Feldman, M.1
Papadimitriou, C.2
Chuang, J.3
Stoica, I.4
-
24
-
-
0022045868
-
IMPOSSIBILITY OF DISTRIBUTED CONSENSUS WITH ONE FAULTY PROCESS
-
DOI 10.1145/3149.214121
-
M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, 1985. (Pubitemid 15488351)
-
(1985)
Journal of the ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
26
-
-
0012525797
-
Fully Polynomial Byzantine Agreement for n>3t Processors in t + 1 Rounds
-
J. Garay and Y. Moses. Fully Polynomial Byzantine Agreement for n>3t Processors in t + 1 Rounds. SIAM J. of Computing, 27(1), 1998.
-
(1998)
SIAM J. of Computing
, vol.27
, Issue.1
-
-
Garay, J.1
Moses, Y.2
-
27
-
-
2442461224
-
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
-
K. P. Gummadi, R. J. Dunn, S. Saroio, S. D. Gribbl, H. M. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In Proc. 19th SOSP, 2003.
-
Proc. 19th SOSP, 2003
-
-
Gummadi, K.P.1
Dunn, R.J.2
Saroio, S.3
Gribbl, S.D.4
Levy, H.M.5
Zahorjan, J.6
-
28
-
-
0001233090
-
A general theory of rational behavior in game situations
-
Jul.
-
J. Harsanyi. A general theory of rational behavior in game situations. Econometrica, 34(3):613-634, Jul. 1966.
-
(1966)
Econometrica
, vol.34
, Issue.3
, pp. 613-634
-
-
Harsanyi, J.1
-
30
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382-401, 1982.
-
(1982)
ACM Trans. Program. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
31
-
-
48749099314
-
A cooperative internet backup scheme
-
june
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative internet backup scheme. In USENIX ATC, june 2003.
-
(2003)
USENIX ATC
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
32
-
-
84860058221
-
Charity gives 40,000 pcs a fresh start
-
February 4
-
M. Loney. Charity gives 40,000 pcs a fresh start. CNET News.com, February 4 2005. http://news.com.com/Charity+gives+403421.html.
-
(2005)
CNET News.Com
-
-
Loney, M.1
-
34
-
-
0001281582
-
Do people play Nash equilibrium? Lessons from evolutionary game theory
-
G. J. Mailath. Do people play Nash equilibrium? lessons from evolutionary game theory. Journal of Economic Literature, 36 (September 1998), 1347-1374, 1998.
-
(1998)
Journal of Economic Literature
, vol.36
, Issue.SEPTEMBER 1998
, pp. 1347-1374
-
-
Mailath, G.J.1
-
35
-
-
33845430997
-
Making threats credible
-
Mar.
-
D. Malhotra. Making threats credible. Negotiation, 8(3), Mar. 2005.
-
(2005)
Negotiation
, vol.8
, Issue.3
-
-
Malhotra, D.1
-
36
-
-
0032306029
-
Byzantine quorum systems
-
D. Malkhi and M. Reiter. Byzantine quorum systems. Distributed Computing 11/4, pages 203-213, 1998. (Pubitemid 128489949)
-
(1998)
Distributed Computing
, vol.11
, Issue.4
, pp. 203-213
-
-
Malkhi, D.1
Reiter, M.2
-
38
-
-
21644485107
-
Preserving peer replicas by rate-limited sampled voting
-
ACM Press
-
P. Maniatis, D. S. H. Rosenthal, M. Roussopoulos, M. Baker, T. Giuli, and Y. Muliadi. Preserving peer replicas by rate-limited sampled voting. In Proc. 19th SOSP, pages 44-59. ACM Press, 2003.
-
(2003)
Proc. 19th SOSP
, pp. 44-59
-
-
Maniatis, P.1
Rosenthal, D.S.H.2
Roussopoulos, M.3
Baker, M.4
Giuli, T.5
Muliadi, Y.6
-
39
-
-
33845448737
-
-
Technical Report TR-05-10, Department of Computer Sciences, The University of Texas at Austin, Mar.
-
J.-P. Martin, A. S. Aiyer, L. Alvisi, A. Clement, M. Dahlin, and C. Porth. BAR tolerance for cooperative services. Technical Report TR-05-10, Department of Computer Sciences, The University of Texas at Austin, Mar. 2005.
-
(2005)
BAR Tolerance for Cooperative Services
-
-
Martin, J.-P.1
Aiyer, A.S.2
Alvisi, L.3
Clement, A.4
Dahlin, M.5
Porth, C.6
-
40
-
-
0000788149
-
Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
-
N. H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. ACM Trans. Softw. Eng. Methodol., 9(3):273-305, 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, Issue.3
, pp. 273-305
-
-
Minsky, N.H.1
Ungureanu, V.2
-
41
-
-
0001730497
-
Non-cooperative games
-
Sept
-
J. Nash. Non-cooperative games. The Annals of Mathematics, 54:286-295, Sept 1951.
-
(1951)
The Annals of Mathematics
, vol.54
, pp. 286-295
-
-
Nash, J.1
-
45
-
-
0000421874
-
Algorithmic Mechanism Design
-
DOI 10.1006/game.1999.0790
-
N. Nisan and A. Ronenc. Algorithmic mechanism design. Games and Economic Behavior, 35:166-196, April 2001. (Pubitemid 33668164)
-
(2001)
Games and Economic Behavior
, vol.35
, Issue.1-2
, pp. 166-196
-
-
Nisan, N.1
Ronen, A.2
-
47
-
-
0003629990
-
-
N. I. of Standards and Technology. Technical report, U.S. Department of Commerce, August
-
N. I. of Standards and Technology. Secure hash standard. Technical report, U.S. Department of Commerce, August 2002.
-
(2002)
Secure Hash Standard
-
-
-
48
-
-
0034836562
-
Algorithms, games, and the internet
-
ACM Press
-
C. Papadimitriou. Algorithms, games, and the internet. In Proc. 33rd STOC, pages 749-753. ACM Press, 2001.
-
(2001)
Proc. 33rd STOC
, pp. 749-753
-
-
Papadimitriou, C.1
-
49
-
-
84948956297
-
The Rampart toolkit for building high-integrity services
-
M. Reiter. The Rampart toolkit for building high-integrity services. In Dagstuhl Seminar on Dist. Sys., pages 99-110, 1994.
-
(1994)
Dagstuhl Seminar on Dist. Sys.
, pp. 99-110
-
-
Reiter, M.1
-
50
-
-
84943547553
-
Pond: The oceanstore prototype
-
S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz. Pond: The oceanstore prototype. In FAST, 2003.
-
(2003)
FAST
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
51
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
reprint
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems (reprint). Commun. ACM, 26(1):96-99, 1983.
-
(1983)
Commun. ACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
52
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
L. Rizzo. Effective erasure codes for reliable computer communication protocols. SIGCOMM Comput. Commun. Rev., 27(2):24-36, 1997. (Pubitemid 127566056)
-
(1997)
Computer Communication Review
, vol.27
, Issue.2
, pp. 24-36
-
-
Rizzo, L.1
-
53
-
-
0036036816
-
BASE: Using abstraction to improve fault tolerance
-
ACM Press, Oct.
-
R. Rodrigues, M. Castro, and B. Liskov. BASE: using abstraction to improve fault tolerance. In Proc. 18th SOSP, pages 15-28. ACM Press, Oct. 2001.
-
(2001)
Proc. 18th SOSP
, pp. 15-28
-
-
Rodrigues, R.1
Castro, M.2
Liskov, B.3
-
54
-
-
0036038685
-
Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility
-
ACM Press
-
A. Rowstron and P. Druschel. Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. In Proc. 18th SOSP, pages 188-201. ACM Press, 2001.
-
(2001)
Proc. 18th SOSP
, pp. 188-201
-
-
Rowstron, A.1
Druschel, P.2
-
55
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
F. B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Comput. Surv., 22(4):299-319, 1990.
-
(1990)
ACM Comput. Surv.
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
56
-
-
33845420226
-
Distributed Computing
-
(Editor: Sape Mullender), chapter 2, ACM Press, second edition
-
F. B. Schneider. Distributed Computing (Editor: Sape Mullender), chapter 2, "What Good are Models and What Models are Good?", pages 17-26. ACM Press, second edition, 1993.
-
(1993)
What Good Are Models and What Models Are Good?
, pp. 17-26
-
-
Schneider, F.B.1
-
57
-
-
84885579967
-
-
"seti@home". http://setiathome.ssl.berkeley.edu/.
-
Seti@home
-
-
-
59
-
-
10444240238
-
Specification faithfulness in networks with rational nodes
-
ACM Press
-
J. Shneidman and D. C. Parkes. Specification faithfulness in networks with rational nodes. In Proc. 23rd PODC, pages 88-97. ACM Press, 2004.
-
(2004)
Proc. 23rd PODC
, pp. 88-97
-
-
Shneidman, J.1
Parkes, D.C.2
-
60
-
-
33845447473
-
Faithfulness in internet algorithms
-
J. Shneidman, D. C. Parkes, and L. Massoulie. Faithfulness in internet algorithms. In Proc. PINS, Portland, USA, 2004.
-
Proc. PINS, Portland, USA, 2004
-
-
Shneidman, J.1
Parkes, D.C.2
Massoulie, L.3
-
62
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
Boston, MA, Dec. USENIX Association
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proc. 5th OSDI, pages 255-270, Boston, MA, Dec. 2002. USENIX Association.
-
(2002)
Proc. 5th OSDI
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
63
-
-
21644446595
-
Separating agreement from execution for Byzantine fault tolerant services
-
ACM Press, Oct.
-
J. Yin, J.-P. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin. Separating agreement from execution for Byzantine fault tolerant services. In Proc. 19th SOSP, pages 253-267. ACM Press, Oct. 2003.
-
(2003)
Proc. 19th SOSP
, pp. 253-267
-
-
Yin, J.1
Martin, J.-P.2
Venkataramani, A.3
Alvisi, L.4
Dahlin, M.5
|