-
1
-
-
33644905683
-
-
PhD thesis, Pittsburgh, PA, USA, Co-Chair-Guy Blelloch and Co-Chair-Robert Harper
-
U. A. Acar. Self-adjusting computation. PhD thesis, Pittsburgh, PA, USA, 2005. Co-Chair-Guy Blelloch and Co-Chair-Robert Harper.
-
(2005)
Self-adjusting computation
-
-
Acar, U. A.1
-
2
-
-
0023581508
-
Optimal distributed algorithms for minimum weight spanning tree, counting, leader election and related problems (detailed summary)
-
ACM
-
B. Awerbuch. Optimal distributed algorithms for minimum weight spanning tree, counting, leader election and related problems (detailed summary). In STOC, pages 230–240. ACM, 1987.
-
(1987)
STOC
, pp. 230-240
-
-
Awerbuch, B.1
-
3
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
New York, NY, USA, ACM
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In OSDI’02: Proceedings of the 5th symposium on Operating systems design and implementation, pages 299–314, New York, NY, USA, 2002. ACM.
-
(2002)
OSDI’02: Proceedings of the 5th symposium on Operating systems design and implementation
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D. S.5
-
6
-
-
33646038920
-
Sybil-resistant dht routing
-
G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson. Sybil-resistant dht routing. In ESORICS 2005: Proceedings of the European Symp. Research in Computer Security, pages 305–318, 2005.
-
(2005)
ESORICS 2005: Proceedings of the European Symp. Research in Computer Security
, pp. 305-318
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M. F.3
Anderson, R.4
-
7
-
-
85084161366
-
Tor: the second-generation onion router
-
Berkeley, CA, USA, USENIX Association
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: the second-generation onion router. In SSYM’04: Proceedings of the 13th conference on USENIX Security Symposium, pages 21–21, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM’04: Proceedings of the 13th conference on USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
10
-
-
77956890234
-
Monte carlo sampling methods using markov chains and their applications
-
April
-
W. K. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1):97–109, April 1970.
-
(1970)
Biometrika
, vol.57
, Issue.1
, pp. 97-109
-
-
Hastings, W. K.1
-
11
-
-
4243128193
-
On clusterings: Good, bad and spectral
-
R. Kannan, S. Vempala, and A. Vetta. On clusterings: Good, bad and spectral. J. ACM, 51(3):497–515, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.3
, pp. 497-515
-
-
Kannan, R.1
Vempala, S.2
Vetta, A.3
-
12
-
-
84976699318
-
The byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401, 1982.
-
(1982)
ACM Trans. Program. Lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
14
-
-
85084162792
-
Attack-resistant trust metrics for public key certification
-
Berkeley, CA, USA, USENIX Association
-
R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In SSYM’98: Proceedings of the 7th conference on USENIX Security Symposium, pages 18–18, Berkeley, CA, USA, 1998. USENIX Association.
-
(1998)
SSYM’98: Proceedings of the 7th conference on USENIX Security Symposium
, pp. 18-18
-
-
Levien, R.1
Aiken, A.2
-
15
-
-
0004272772
-
-
Cambridge University Press, New York, NY, USA
-
D. J. C. MacKay. Information Theory, Inference & Learning Algorithms. Cambridge University Press, New York, NY, USA, 2002.
-
(2002)
Information Theory, Inference & Learning Algorithms
-
-
MacKay, D. J. C.1
-
18
-
-
84877951088
-
Anonymity in the wild: Mixes on unstructured networks
-
N. Borisov and P. Golle, editors, Ottawa, Canada, June Springer
-
S. Nagaraja. Anonymity in the wild: Mixes on unstructured networks. In N. Borisov and P. Golle, editors, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. Springer.
-
(2007)
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)
-
-
Nagaraja, S.1
-
19
-
-
0030533269
-
Defending the boundaries: Identifying and countering threats in a usenet newsgroup
-
D. J. Phillips. Defending the boundaries: Identifying and countering threats in a usenet newsgroup. Inf. Soc., 12(1), 1996.
-
(1996)
Inf. Soc
, vol.12
, Issue.1
-
-
Phillips, D. J.1
-
20
-
-
33644645085
-
Rapidly mixing markov chains with applications in computer science and physics
-
D. Randall. Rapidly mixing markov chains with applications in computer science and physics. Computing in Science and Engineering, 8(2):30–41, 2006.
-
(2006)
Computing in Science and Engineering
, vol.8
, Issue.2
, pp. 30-41
-
-
Randall, D.1
-
21
-
-
0036187056
-
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
-
Aug
-
M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design. IEEE Internet Computing Journal, 6(1), Aug. 2002.
-
(2002)
IEEE Internet Computing Journal
, vol.6
, Issue.1
-
-
Ripeanu, M.1
Foster, I.2
Iamnitchi, A.3
-
22
-
-
85180632457
-
-
Secondlife: secondlife.com.
-
-
-
-
24
-
-
0037298256
-
Chord: a scalable peer-to-peer lookup protocol for internet applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw., 11(1):17–32, 2003.
-
(2003)
IEEE/ACM Trans. Netw
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D. R.4
Kaashoek, M. F.5
Dabek, F.6
Balakrishnan, H.7
-
25
-
-
35248831179
-
Captcha: Using hard ai problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford. Captcha: Using hard ai problems for security. In In Proceedings of EUROCRYPT 03, Lecture Notes in Computer Science, 2003.
-
(2003)
Proceedings of EUROCRYPT 03, Lecture Notes in Computer Science
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
26
-
-
45749116664
-
Sybil-limit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybil-limit: A near-optimal social network defense against sybil attacks. In IEEE Symposium on Security and Privacy, pages 3–17, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P. B.2
Kaminsky, M.3
Xiao, F.4
-
27
-
-
33750285481
-
Sybilguard: defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev., 36(4):267–278, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P. B.3
Flaxman, A.4
-
28
-
-
85180620639
-
-
del.icio.us: delicious.com.
-
-
-
-
29
-
-
84886287589
-
-
Facebook: www.facebook.com.
-
Facebook
-
-
-
30
-
-
85180626180
-
-
Orkut
-
Orkut: www.orkut.com.
-
-
-
-
31
-
-
85180625451
-
-
Wikipedia
-
Wikipedia: www.wikipedia.org.
-
-
-
|