-
1
-
-
0036374187
-
Search and replication in unstructured peer-to-peer networks
-
Lv, Q., Cao, P., Cohen, E., Li, K., Shenker, S.: Search and Replication in Unstructured Peer-to-Peer Networks. In: Proceedings of the International Conference on Supercomputing (ICS) (2002)
-
(2002)
Proceedings of the International Conference on Supercomputing (ICS)
-
-
Lv, Q.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
2
-
-
77949427879
-
-
Kutten, S., ?Zerovnik, J. (eds.) SIROCCO 2009. LNCS Springer, Heidelberg
-
Bertier, M., Busnel, Y., Kermarrec, A.-M.: On Gossip and Populations. In: Kutten, S., ?Zerovnik, J. (eds.)) SIROCCO 2009. LNCS, vol. 5869, pp. 72-86. Springer, Heidelberg (2010)
-
(2010)
On Gossip and Populations
, vol.5869
, pp. 72-86
-
-
Bertier, M.1
Busnel, Y.2
Kermarrec, A.-M.3
-
3
-
-
11944253901
-
-
2nd edn Cambridge University Press
-
Bollob?as, B.: Random Graphs, 2nd edn. Cambridge University Press (2001)
-
(2001)
Random Graphs
-
-
Bollobas, B.1
-
4
-
-
85030178366
-
Epidemic algorithms for replicated database management
-
Symposium on Principles of Distributed Computing (PODC
-
Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H., Swinehart, D., Terry, D.: Epidemic algorithms for replicated database management. In: Proceedings of the 6th ACM Symposium on Principles of Distributed Computing (PODC) (1987)
-
(1987)
Proceedings of the 6th ACM
-
-
Demers, A.1
Greene, D.2
Hauser, C.3
Irish, W.4
Larson, J.5
Shenker, S.6
Sturgis, H.7
Swinehart, D.8
Terry, D.9
-
5
-
-
33748700606
-
Peer counting and sampling in overlay networks
-
ACM Press
-
Massoulié, L., Merrer, E.L., Kermarrec, A.M., Ganesh, A.: Peer Counting and Sampling in Overlay Networks: Random Walk Methods. In: Proceedings of the 25th Annual Symposium on Principles of Distributed Computing (PODC), pp. 123-132. ACM Press (2006)
-
(2006)
Random Walk Methods Proceedings of the 25th Annual Symposium on Principles of Distributed Computing (PODC)
, pp. 123-132
-
-
Massoulié, L.1
Merrer, E.L.2
Kermarrec, A.M.3
Ganesh, A.4
-
6
-
-
67349214053
-
On unbiased sampling for unstructured peer-to-peer networks
-
Stutzbach, D., Rejaie, R., Duffield, N., Sen, S., Willinger, W.: On Unbiased Sampling for Unstructured Peer-to-Peer Networks. IEEE/ACM Transactions on Networking 17(2), 377-390 (2009)
-
(2009)
IEEE/ ACM Transactions on Networking
, vol.17
, Issue.2
, pp. 377-390
-
-
Stutzbach, D.1
Rejaie, R.2
Duffield, N.3
Sen, S.4
Willinger, W.5
-
7
-
-
84947265806
-
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS Springer, Heidelberg
-
Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.)) IPTPS 2002. LNCS, vol. 2429, pp. 261-269. Springer, Heidelberg (2002)
-
(2002)
Security Considerations for Peer-to-Peer Distributed Hash Tables
, vol.2429
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
8
-
-
67650523874
-
-
Membership Sampling Computer Networks A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC 2008)
-
Bortnikov, E., Gurevich, M., Keidar, I., Kliot, G., Shraer, A.: Brahms: Byzantine Resilient Random Membership Sampling. Computer Networks 53, 2340-2359 (2009); A former version appeared in the 27th ACM Symposium on Principles of Distributed Computing (PODC) (2008)
-
(2009)
Brahms: Byzantine Resilient Random
, vol.53
, pp. 2340-2359
-
-
Bortnikov, E.1
Gurevich, M.2
Keidar, I.3
Kliot, G.4
Shraer, A.5
-
10
-
-
77955419008
-
Secure peer sampling
-
Jesi, G.P., Montresor, A., van Steen, M.: Secure Peer Sampling. Computer Networks 54(12), 2086-2098 (2010)
-
(2010)
Computer Networks
, vol.54
, Issue.12
, pp. 2086-2098
-
-
Jesi, G.P.1
Montresor, A.2
Van Steen, M.3
-
11
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
Singh, A., Ngan, T.W., Druschel, P., Wallach, D.S.: Eclipse Attacks on Overlay Networks: Threats and Defenses. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM) (2006)
-
(2006)
Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM)
-
-
Singh, A.1
Ngan, T.W.2
Druschel, P.3
Wallach, D.S.4
-
12
-
-
84947273682
-
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS Springer, Heidelberg
-
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.)) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
The Sybil Attack
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
14
-
-
84893396143
-
Performance evaluation of large-scale dynamic systems
-
Anceaume, E., Ludinard, R., Sericola, B.: Performance evaluation of large-scale dynamic systems. SIGMETRICS Performance Evaluation Review 39(4), 108-117 (2012)
-
(2012)
Sigmetrics Performance Evaluation Review
, vol.39
, Issue.4
, pp. 108-117
-
-
Anceaume, E.1
Ludinard, R.2
Sericola, B.3
-
15
-
-
80051689652
-
Dependability evaluation of cluster-based distributed systems
-
Anceaume, E., Brasileiro, F., Ludinard, R., Sericola, B., Tronel, F.: Dependability Evaluation of Cluster-based Distributed Systems. International Journal of Foundations of Computer Science (IJFCS) 5(22) (2011)
-
(2011)
International Journal of Foundations of Computer Science (IJFCS
, vol.5
, Issue.22
-
-
Anceaume, E.1
Brasileiro, F.2
Ludinard, R.3
Sericola, B.4
Tronel, F.5
-
16
-
-
34548273006
-
Gossipbased peer sampling acm
-
Jelasity, M., Voulgaris, S., Guerraoui, R., Kermarrec, A.M., van Steen, M.: Gossipbased Peer Sampling. ACM Transaction on Computer System 25(3) (2007)
-
(2007)
Transaction on Computer System
, vol.25
, pp. 3
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.M.4
Van Steen, M.5
-
17
-
-
0034516311
-
Randomized rumor spreading
-
IEEE Computer Society
-
Karp, R., Schindelhauer, C., Shenker, S., Vocking, B.: Randomized Rumor Spreading. In: The 41st Annual Symposium on Foundations of Computer Science (FOCS), p. 565. IEEE Computer Society (2000)
-
(2000)
The 41st Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 565
-
-
Karp, R.1
Schindelhauer, C.2
Shenker, S.3
Vocking, B.4
-
18
-
-
22044433190
-
Cyclon: Inexpensive membership management for unstructured p2p overlays
-
Voulgaris, S., Gavidia, D., van Steen, M.: CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays. Journal of Network System Management 13(2), 197-217 (2005)
-
(2005)
Journal of Network System Management
, vol.13
, Issue.2
, pp. 197-217
-
-
Voulgaris, S.1
Gavidia, D.2
Van Steen, M.3
-
20
-
-
33749593067
-
Distributed uniform sampling in unstructured peer-to-peer networks
-
Awan, A., Ferreira, R.A., Jagannathan, S., Grama, A.: Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS (2006)
-
(2006)
Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS
-
-
Awan, A.1
Ferreira, R.A.2
Jagannathan, S.3
Grama, A.4
-
21
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure Routing for Structured Peer-to-peer Overlay Networks. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI). ACM (2002)
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI ACM)
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
22
-
-
0034775826
-
A scalable content-addressable network
-
Ratnasamy, S., Francis, P., Handley, M., Karp, R.M., Shenker, S.: A scalable content-addressable network. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (2001)
-
(2001)
Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.M.4
Shenker, S.5
-
23
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transaction on Networks 11(1), 17-32 (2003)
-
(2003)
IEEE/ ACM Transaction on Networks
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
24
-
-
57349142855
-
-
Guerraoui, R. (ed.i Middleware 2001. LNCS Springer, Heidelberg
-
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329-350. Springer, Heidelberg (2001)
-
(2001)
Pastry: Scalable, Decentralized Object Location, and Routing for Large-scale Peer-to-peer Systems
, vol.2218
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
25
-
-
35248832638
-
-
Fich, F.E. (ed. DISC 2003. LNCS Springer, Heidelberg
-
Hildrum, K., Kubiatowicz, J.D.: Asymptotically Efficient Approaches to Faulttolerance in Peer-to-Peer Networks. In: Fich, F.E. (ed.) DISC 2003. LNCS, vol. 2848, pp. 321-336. Springer, Heidelberg (2003)
-
(2003)
Asymptotically Efficient Approaches to Faulttolerance in Peer-to-Peer Networks
, vol.2848
, pp. 321-336
-
-
Hildrum, K.1
Kubiatowicz, J.D.2
-
26
-
-
27144478012
-
-
Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS Springer, Heidelberg
-
Fiat, A., Saia, J., Young, M.: Making Chord Robust to Byzantine Attacks. In: Brodal, G.S., Leonardi, S. (eds.)) ESA 2005. LNCS, vol. 3669, pp. 803-814. Springer, Heidelberg (2005)
-
(2005)
Making Chord Robust to Byzantine Attacks
, vol.3669
, pp. 803-814
-
-
Fiat, A.1
Saia, J.2
Young, M.3
-
27
-
-
57949089624
-
Peercube: An hypercubebased p2p overlay robust against collusion and churn
-
Anceaume, E., Brasileiro, F., Ludinard, R., Ravoaja, A.: PeerCube: an Hypercubebased P2P Overlay Robust against Collusion and Churn. In: Proceedings of the IEEE International Conference on Self-Adaptive and Self-Organizing Systems (2008)
-
(2008)
Proceedings of the IEEE International Conference on Self-Adaptive and Self-Organizing Systems
-
-
Anceaume, E.1
Brasileiro, F.2
Ludinard, R.3
Ravoaja, A.4
-
28
-
-
70949087670
-
Induced churn as shelter from routing-table poisoning
-
Condie, T., Kacholia, V., Sank, S., Hellerstein, J.M., Maniatis, P.: Induced Churn as Shelter from Routing-Table Poisoning. In: Proceedings of the International Network and Distributed System Security Symposium (NDSS) (2006)
-
(2006)
Proceedings of the International Network and Distributed System Security Symposium (NDSS)
-
-
Condie, T.1
Kacholia, V.2
Sank, S.3
Hellerstein, J.M.4
Maniatis, P.5
-
30
-
-
78650874347
-
-
Lu, C., Masuzawa, T., Mosbah, M. (eds.) OPODIS 2010. LNCS Springer, Heidelberg
-
Anceaume, E., Busnel, Y., Gambs, S.: Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes. In: Lu, C., Masuzawa, T., Mosbah, M. (eds.)) OPODIS 2010. LNCS, vol. 6490, pp. 64-78. Springer, Heidelberg (2010)
-
(2010)
Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes
, vol.6490
, pp. 64-78
-
-
Anceaume, E.1
Busnel, Y.2
Gambs, S.3
-
32
-
-
79958295538
-
On the uniformity of peer sampling based on view shuffling
-
Busnel, Y., Beraldi, R., Baldoni, R.: On the Uniformity of Peer Sampling based on View Shuffling. Elsevier Journal of Parallel and Distributed Computing 71(8), 1165-1176 (2011)
-
(2011)
Elsevier Journal of Parallel and Distributed Computing
, vol.71
, Issue.8
, pp. 1165-1176
-
-
Busnel, Y.1
Beraldi, R.2
Baldoni, R.3
-
34
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In: Proceedings of the IEEE Symposium on Security and Privacy (SP) (2008)
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (SP)
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
35
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
Architectures, and Protocols for Computer Communications (SIGCOMM
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: Defending against Sybil Attacks via Social Networks. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (2006)
-
(2006)
Proceedings of the ACM Conference on Applications, Technologies
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
36
-
-
33750291183
-
Minimizing churn in distributed systems
-
Godfrey, P.B., Shenker, S., Stoica, I.: Minimizing churn in distributed systems. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (2006)
-
(2006)
Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
-
-
Godfrey, P.B.1
Shenker, S.2
Stoica, I.3
-
40
-
-
84893350666
-
-
Histoire de l'Academie royale des sciences, avec les Mémoires de Mathématique et de Physique
-
Monge, G.: Mémoire sur la théorie des déblais et des remblais. Histoire de l'Academie royale des sciences, avec les Mémoires de Mathématique et de Physique, 666-704 (1781)
-
Mémoire sur la Théorie des Déblais et des Remblais
, vol.666
, Issue.704
, pp. 1781
-
-
Monge, G.1
|