Public Health for the Internet (') Towards A New Grand Challenge for Information Management
暂无分享,去创建一个
Joseph M. Hellerstein | Boon Thau Loo | Timothy Roscoe | Petros Maniatis | Nina Taft | Tyson Condie | Minos Garofalakis | U. Pennsylvania | J. Hellerstein | M. Garofalakis | Timothy Roscoe | Tyson Condie | B. T. Loo | N. Taft | Petros Maniatis | U. Pennsylvania
[1] Yossi Matias,et al. DIMACS Series in Discrete Mathematicsand Theoretical Computer Science Synopsis Data Structures for Massive Data , 2007 .
[2] Graham Cormode,et al. Sketching Streams Through the Net: Distributed Approximate Query Tracking , 2005, VLDB.
[3] Ion Stoica,et al. Implementing declarative overlays , 2005, SOSP '05.
[4] Ion Stoica,et al. Declarative routing: extensible routing with declarative queries , 2005, SIGCOMM '05.
[5] Ion Stoica,et al. Declarative networking with distributed recursive query processing , 2006 .
[6] David E. Culler,et al. A blueprint for introducing disruptive technology into the Internet , 2003, CCRV.
[7] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[8] Jaideep Chandrashekar,et al. When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions , 2006, AAAI.
[9] Judea Pearl,et al. Fusion, Propagation, and Structuring in Belief Networks , 1986, Artif. Intell..
[10] J. Hellerstein,et al. A Wakeup Call for Internet Monitoring Systems : The Case for Distributed Triggers , 2004 .
[11] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[12] Graham Cormode,et al. Communication-efficient distributed monitoring of thresholded counts , 2006, SIGMOD Conference.
[13] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[14] Michael I. Jordan,et al. Loopy Belief Propagation for Approximate Inference: An Empirical Study , 1999, UAI.
[15] David A. Maltz,et al. Toward a Framework for Internet Forensic Analysis , 2004 .
[16] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[17] Joseph M. Hellerstein,et al. Proof Sketches: Verifiable In-Network Aggregation , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[18] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[19] Scott Shenker,et al. The Architecture of PIER: an Internet-Scale Query Processor , 2005, CIDR.
[20] References , 1971 .
[21] David A. Maltz,et al. Worm origin identification using random moonwalks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[22] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[23] Samuel Madden,et al. MauveDB: supporting model-based user views in database systems , 2006, SIGMOD Conference.
[24] Ling Huang,et al. Communication-Efficient Online Detection of Network-Wide Anomalies , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[25] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[26] Jennifer Widom,et al. The Lowell database research self-assessment , 2003, CACM.
[27] Christophe Diot,et al. The CoMo white paper , 2004 .
[28] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[29] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..
[30] Frederick Reiss,et al. Compact histograms for hierarchical identifiers , 2006, VLDB.