메뉴 건너뛰기




Volumn 8290 LNCS, Issue , 2013, Pages 102-126

On the power of the adversary to solve the node sampling problem

Author keywords

Byzantine adversary; Data stream; Freshness; Kullback Leibler divergence; Uniform sampling

Indexed keywords

BYZANTINE ADVERSARY; DATA STREAM; FRESHNESS; KULLBACK LEIBLER DIVERGENCE; UNIFORM SAMPLING;

EID: 84893351003     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-45269-7_5     Document Type: Article
Times cited : (3)

References (40)
  • 2
    • 77949427879 scopus 로고    scopus 로고
    • Kutten, S., ?Zerovnik, J. (eds.) SIROCCO 2009. LNCS Springer, Heidelberg
    • Bertier, M., Busnel, Y., Kermarrec, A.-M.: On Gossip and Populations. In: Kutten, S., ?Zerovnik, J. (eds.)) SIROCCO 2009. LNCS, vol. 5869, pp. 72-86. Springer, Heidelberg (2010)
    • (2010) On Gossip and Populations , vol.5869 , pp. 72-86
    • Bertier, M.1    Busnel, Y.2    Kermarrec, A.-M.3
  • 3
    • 11944253901 scopus 로고    scopus 로고
    • 2nd edn Cambridge University Press
    • Bollob?as, B.: Random Graphs, 2nd edn. Cambridge University Press (2001)
    • (2001) Random Graphs
    • Bollobas, B.1
  • 7
    • 84947265806 scopus 로고    scopus 로고
    • Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS Springer, Heidelberg
    • Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.)) IPTPS 2002. LNCS, vol. 2429, pp. 261-269. Springer, Heidelberg (2002)
    • (2002) Security Considerations for Peer-to-Peer Distributed Hash Tables , vol.2429 , pp. 261-269
    • Sit, E.1    Morris, R.2
  • 8
    • 67650523874 scopus 로고    scopus 로고
    • Membership Sampling Computer Networks A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC 2008)
    • Bortnikov, E., Gurevich, M., Keidar, I., Kliot, G., Shraer, A.: Brahms: Byzantine Resilient Random Membership Sampling. Computer Networks 53, 2340-2359 (2009); A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC) (2008)
    • (2009) Brahms: Byzantine Resilient Random , vol.53 , pp. 2340-2359
    • Bortnikov, E.1    Gurevich, M.2    Keidar, I.3    Kliot, G.4    Shraer, A.5
  • 12
    • 84947273682 scopus 로고    scopus 로고
    • Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS Springer, Heidelberg
    • Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.)) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
    • (2002) The Sybil Attack , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 18
    • 22044433190 scopus 로고    scopus 로고
    • Cyclon: Inexpensive membership management for unstructured p2p overlays
    • Voulgaris, S., Gavidia, D., van Steen, M.: CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays. Journal of Network System Management 13(2), 197-217 (2005)
    • (2005) Journal of Network System Management , vol.13 , Issue.2 , pp. 197-217
    • Voulgaris, S.1    Gavidia, D.2    Van Steen, M.3
  • 26
    • 27144478012 scopus 로고    scopus 로고
    • Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS Springer, Heidelberg
    • Fiat, A., Saia, J., Young, M.: Making Chord Robust to Byzantine Attacks. In: Brodal, G.S., Leonardi, S. (eds.)) ESA 2005. LNCS, vol. 3669, pp. 803-814. Springer, Heidelberg (2005)
    • (2005) Making Chord Robust to Byzantine Attacks , vol.3669 , pp. 803-814
    • Fiat, A.1    Saia, J.2    Young, M.3
  • 40
    • 84893350666 scopus 로고    scopus 로고
    • Histoire de l'Academie royale des sciences, avec les Mémoires de Mathématique et de Physique
    • Monge, G.: Mémoire sur la théorie des déblais et des remblais. Histoire de l'Academie royale des sciences, avec les Mémoires de Mathématique et de Physique, 666-704 (1781)
    • Mémoire sur la Théorie des Déblais et des Remblais , vol.666 , Issue.704 , pp. 1781
    • Monge, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.