You are here

Bibliography

Export 29 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is distributed hash table  [Clear All Filters]
2011
Furness J, Kolberg M. Considering Complex Search Techniques in DHTs under Churn. In: CCNC 2011 - IEEE Consumer Communications and Networking Conference. CCNC 2011 - IEEE Consumer Communications and Networking Conference. Las Vegas, NV, USA: IEEE Computer Society; 2011.
Mittal P, Caesar M, Borisov N. X-Vine: Secure and Pseudonymous Routing Using Social Networks. Computer Research Repository [Internet]. 2011 ;abs/1109.0971. Available from: http://dblp.uni-trier.de/db/journals/corr/corr1109.html#abs-1109-0971
2010
Cholez T, Chrisment I, Festor O. Efficient DHT attack mitigation through peers’ ID distribution . In: HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. Atlanta, Georgia, USA; 2010.
Locher T, Mysicka D, Schmid S, Wattenhofer RP. Poisoning the Kad network. In: ICDCN'10 - Proceedings of the 11th International Conference on Distributed Computing and Networking. ICDCN'10 - Proceedings of the 11th International Conference on Distributed Computing and Networking. Kolkata, India: Springer-Verlag; 2010. pp. 195–206. Available from: http://dl.acm.org/citation.cfm?id=2018057.2018085
2009
Cholez T, Chrisment I, Festor O. Evaluation of Sybil Attacks Protection Schemes in KAD. In: AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Vol. 5637. AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Enschede, The Netherlands: Springer-Verlag; 2009. pp. 70–82. Available from: http://dx.doi.org/10.1007/978-3-642-02627-0_6
2007
Steiner M, En-Najjary T, Biersack EW. Analyzing Peer Behavior in KAD. Sophia Antipolis: Institut Eurecom; 2007. Available from: http://www.eurecom.fr/~btroup/kadtraces/
Binzenhöfer A, Leibnitz K. Estimating churn in structured P2P networks. In: ITC-20'07 - Proceedings of the 20th International Teletraffic Conference on Managing Traffic Performance in Converged Networks. ITC-20'07 - Proceedings of the 20th International Teletraffic Conference on Managing Traffic Performance in Converged Networks. Ottawa, Canada: Springer-Verlag; 2007. pp. 630–641. Available from: http://dl.acm.org/citation.cfm?id=1769187.1769257
Amann B. Secure asynchronous change notifications for a distributed file system. Chair for Network Architectures. 2007 ;Computer Science:74.
2006
Ghodsi A. Distributed k-ary System: Algorithms for Distributed Hash Tables. Department of Electronic, Computer, and Software Systems [Internet]. 2006 :209. Available from: http://eprints.sics.se/516/
Godfrey BP, Shenker S, Stoica I. Minimizing churn in distributed systems. SIGCOMM Computer Communication Review [Internet]. 2006 ;36(4):147–158. Available from: http://doi.acm.org/10.1145/1151659.1159931
2005
Wehrle K, Götz S, Rieche S. Distributed Hash Tables. In: Peer-to-Peer Systems and Applications. Vol. 3485. Peer-to-Peer Systems and Applications. Springer; 2005.
Rhea S, Chun BG, Kubiatowicz J, Shenker S. Fixing the embarrassing slowness of OpenDHT on PlanetLab. In: Proc. of the Second USENIX Workshop on Real, Large Distributed Systems. Proc. of the Second USENIX Workshop on Real, Large Distributed Systems. ; 2005. pp. 25–30.
Rodrigues R, Liskov B. High Availability in DHTs: Erasure Coding vs. Replication. In: IPTPS'05 - Proceedings of the 4th International Workshop in Peer-to-Peer Systems. Vol. 3640. IPTPS'05 - Proceedings of the 4th International Workshop in Peer-to-Peer Systems. Ithaca, New York: Springer; 2005.
Anon. OpenDHT: a public DHT service and its uses. In: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM; 2005. pp. 73–84. Available from: http://doi.acm.org/10.1145/1080091.1080102
Busca J-M, Picconi F, Sens P. Pastis: A Highly-Scalable Multi-user Peer-to-Peer File System. In: Euro-Par'05 Parallel Processing. Euro-Par'05 Parallel Processing. Lisboa, Portugal: Springer-Verlag; 2005. pp. 1173-1182.
Götz S, Rieche S, Wehrle K. Selected DHT Algorithms. In: Peer-to-Peer Systems and Applications. Vol. 3485. Peer-to-Peer Systems and Applications. Springer; 2005. pp. 95-117. Available from: http://dblp.uni-trier.de/db/conf/p2p/p2p2005lncs.html#GotzRW05
2004
Dabek F, Li J, Sit E, Robertson J, Kaashoek FM, Morris R. Designing a DHT for Low Latency and High Throughput. In: NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . San Francisco, CA, USA: USENIX Association; 2004. pp. 7–7. Available from: http://dl.acm.org/citation.cfm?id=1251175.1251182
Androutsellis-Theotokis S, Spinellis D. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys [Internet]. 2004 ;36(4):335–371. Available from: http://doi.acm.org/10.1145/1041680.1041681
2003
Gummadi KP, Gummadi R, Gribble SD, Ratnasamy S, Shenker S, Stoica I. The impact of DHT routing geometry on resilience and proximity. In: SIGCOMM '03 - Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. SIGCOMM '03 - Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe, Germany: ACM; 2003. pp. 381–394. Available from: http://doi.acm.org/10.1145/863955.863998
Li X, Kim YJ, Govindan R, Hong W. Multi-dimensional range queries in sensor networks. In: Proceedings of the 1st international conference on Embedded networked sensor systems. Proceedings of the 1st international conference on Embedded networked sensor systems. New York, NY, USA: ACM; 2003. pp. 63–75. Available from: http://doi.acm.org/10.1145/958491.958500

Pages