You are here

Bibliography

Export 1152 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
2
Garbacki P, Iosup A, Epema DHJ, van Steen M. 2Fast: Collaborative Downloads in P2P Networks. In: P2P 2006. 6th IEEE International Conference on Peer-to-Peer Computing. P2P 2006. 6th IEEE International Conference on Peer-to-Peer Computing. Cambridge, UK: IEEE Computer Society; 2006. Available from: http://www.arnetminer.org/viewpub.do?pid=525534
A
Cooley J, Taylor C, Peacock A. ABS: The Apportioned Backup System. [Internet]. 2004 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.6858
Widmer J. ABSTRACT Network Coding for Efficient Communication in Extreme Networks. [Internet]. 2005 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.5368
Koç E. Access Control in Peer-to-Peer Storage Systems. Department of Information Technology and Electrical Engineering [Internet]. 2006 ;Communication Systems:159. Available from: http://webcache.googleusercontent.com/u/ethweb?oe=utf8&GO.x=0&GO.y=0&hl=es&q=cache:7sJLnyzj1TcJ:http://www.zisc.ethz.ch/events/ISC20067Slides/MA_Report_Erol_Koc.pdf+Erol+Ko%C3%A7&ct=clnk
Bagai R, Lu H, Li R, Tang B. An Accurate System-Wide Anonymity Metric for Probabilistic Attacks. In: PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium. PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium. Waterloo, Canada; 2011.
Fu X, Graham B, Bettati R, Zhao W. Active Traffic Analysis Attacks and Countermeasures. In: Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing. Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing. IEEE Computer Society Washington, DC, USA; 2003. pp. 31–39. Available from: http://portal.acm.org/citation.cfm?id=950964
Anderegg L, Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom '03: Proceedings of the 9th annual international conference on Mobile computing and networking. MobiCom '03: Proceedings of the 9th annual international conference on Mobile computing and networking. New York, NY, USA: ACM; 2003. pp. 245–259. Available from: http://portal.acm.org/citation.cfm?id=939011#
Polot B. Adapting Blackhat Approaches to Increase the Resilience of Whitehat Application Scenarios. Computer Science. 2010 ;M.S.
Heimbigner D. Adapting Publish/Subscribe Middleware to Achieve Gnutella-like Functionality. In: In Proc. of SAC. In Proc. of SAC. ; 2000. pp. 176–181. Available from: http://serl.cs.colorado.edu/~serl/papers/CU-CS-909-00.pdf
Boulkenafed M, Issarny V. AdHocFS: Sharing Files in WLANs. [Internet]. 2002 . Available from: http://portal.acm.org/citation.cfm?id=825345
Nisan N, Ronen A. Algorithmic Mechanism Design. In: STOC'99. Proceedings of the thirty-first Annual ACM Symposium On Theory of Computing. STOC'99. Proceedings of the thirty-first Annual ACM Symposium On Theory of Computing. Atlanta, Georgia, USA: ACM; 1999. pp. 129–140. Available from: http://doi.acm.org/10.1145/301250.301287
Hall J, Hartline JD, Karlin AR, Saia J, Wilkes J. On Algorithms for Efficient Data Migration. [Internet]. 2001 . Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.26.1365&rep=rep1&type=pdf
Nisan N. Algorithms for Selfish Agents. In: STAC'99. Symposium on Theoretical Aspects of Computer Science. STAC'99. Symposium on Theoretical Aspects of Computer Science. Trier, Germany: Springer-Verlag; 1999. pp. 1–15. Available from: http://dl.acm.org/citation.cfm?id=1764891.1764893
Kumar S, Dharmapurikar S, Yu F, Crowley P, Turner J. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. SIGCOMM Comput. Commun. Rev. [Internet]. 2006 ;36:339–350. Available from: http://doi.acm.org/10.1145/1151659.1159952
Kumar S, Dharmapurikar S, Yu F, Crowley P, Turner J. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. SIGCOMM Comput. Commun. Rev. [Internet]. 2006 ;36:339–350. Available from: http://doi.acm.org/10.1145/1151659.1159952
Gode DK, Sunder S. Allocative Efficiency of Markets with Zero-Intelligence Traders: Market as a Partial Substitute for Individual Rationality. Journal of Political Economy [Internet]. 1993 ;101(1):119-137. Available from: http://www.jstor.org/stable/2138676
Boneh D, Golle P. Almost Entirely Correct Mixing With Application to Voting. In: Atluri V Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). Washington, DC: ACM New York, NY, USA; 2002. pp. 68–77. Available from: http://portal.acm.org/citation.cfm?id=586121
Eickhold J, Fuhrmann T, Saballus B, Schlender S, Suchy T. AmbiComp: A platform for distributed execution of Java programs on embedded systems by offering a single system image . In: AmI-Blocks'08, European Conference on Ambient Intelligence 2008 manuscript No. AmI-Blocks'08, European Conference on Ambient Intelligence 2008 manuscript No. ; 2008.
Fuhrmann T, Harbaum T, Schöller M, Zitterbart M. AMnet 2.0: An Improved Architecture for Programmable Networks. In: IWAN '02: Proceedings of the IFIP-TC6 4th International Working Conference on Active Networks. IWAN '02: Proceedings of the IFIP-TC6 4th International Working Conference on Active Networks. London, UK: Springer-Verlag; 2002. pp. 162–176. Available from: http://portal.acm.org/citation.cfm?id=664025#
Garbacki P, Epema DHJ, van Steen M. An Amortized Tit-For-Tat Protocol for Exchanging Bandwidth instead of Content in P2P Networks. In: SASO 2007. Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems. SASO 2007. Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems. Boston, Massachusetts: IEEE Computer Society; 2007. pp. 119–128. Available from: http://dx.doi.org/10.1109/SASO.2007.9
Garbacki P, Epema DHJ, van Steen M. An Amortized Tit-For-Tat Protocol for Exchanging Bandwidth instead of Content in P2P Networks. In: SASO 2007. Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems. SASO 2007. Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems. Boston, Massachusetts: IEEE Computer Society; 2007. pp. 119–128. Available from: http://dx.doi.org/10.1109/SASO.2007.9
Rennhard M, Rafaeli S, Mathy L, Plattner B, Hutchison D. Analysis of an Anonymity Network for Web Browsing. In: Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002). Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE 2002). Pittsburgh, USA: IEEE Computer Society Washington, DC, USA; 2002. pp. 49–54. Available from: http://portal.acm.org/citation.cfm?id=759973
Henson V. An analysis of compare-by-hash. In: HOTOS'03: Proceedings of the 9th conference on Hot Topics in Operating Systems. HOTOS'03: Proceedings of the 9th conference on Hot Topics in Operating Systems. Berkeley, CA, USA: USENIX Association; 2003. pp. 3–3. Available from: http://portal.acm.org/citation.cfm?id=1251057#
Kügler D. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks. In: Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Springer-Verlag; 2003. pp. 161–176.
Borisov N. An Analysis of Parallel Mixing with Attacker-Controlled Inputs. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 12–25. Available from: http://www.springerlink.com/content/b0t0714165846m42/

Pages