Distributed construction of a fault-tolerant network from a tree
暂无分享,去创建一个
[1] Nicholas C. Wormald,et al. Generating Random Regular Graphs Quickly , 1999, Combinatorics, Probability and Computing.
[2] David A. Patterson,et al. X-Tree: A tree structured multi-processor computer architecture , 1978, ISCA '78.
[3] Kurt Rothermel,et al. A robust and efficient mechanism for constructing multicast acknowledgement trees , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).
[4] Christian Scheideler,et al. The Effect of Faults on Network Expansion , 2004, SPAA '04.
[5] L. Asz. Random Walks on Graphs: a Survey , 2022 .
[6] János Komlós,et al. An 0(n log n) sorting network , 1983, STOC.
[7] Guillaume Urvoy-Keller,et al. Hierarchical Peer-To-Peer Systems , 2003, Parallel Process. Lett..
[8] E. Szemerédi,et al. O(n LOG n) SORTING NETWORK. , 1983 .
[9] Peter Druschel,et al. Topology-aware routing in structured peer-to-peer overlay networks , 2003 .
[10] Christos Gkantsidis,et al. Random walks in peer-to-peer networks , 2004, IEEE INFOCOM 2004.
[11] Miguel Castro,et al. Dynamic Lookup Networks , 2003, Future Directions in Distributed Computing.
[12] Zvi Galil,et al. Explicit Constructions of Linear-Sized Superconcentrators , 1981, J. Comput. Syst. Sci..
[13] Kerry Raymond,et al. A tree-based algorithm for distributed mutual exclusion , 1989, TOCS.
[14] Kai-Yeung Siu,et al. Distributed construction of random expander networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[15] Daniel A. Spielman,et al. Expander codes , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[16] Michael K. Reiter,et al. Delegation of cryptographic servers for capture-resilient devices , 2001, CCS '01.
[17] Jon Crowcroft,et al. Highways: proximity clustering for scalable peer-to-peer network , 2004 .
[18] Niko Kotilainen,et al. Mobile Chedar - a peer-to-peer middleware for mobile devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[19] László Lovász,et al. Random Walks on Graphs: A Survey , 1993 .
[20] Daniel J. Kleitman,et al. Methods for investigating the connectivity of large graphs , 1969 .
[21] Oliver Vornberger,et al. The Complexity of Testing Whether a Graph is a Superconcentrator , 1981, Inf. Process. Lett..
[22] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[23] Eli Upfal,et al. Building low-diameter P2P networks , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[24] Michael K. Reiter,et al. Networked cryptographic devices resilient to capture , 2003, International Journal of Information Security.
[25] Dahlia Malkhi,et al. Estimating network size from local information , 2003, Information Processing Letters.
[26] Noga Alon,et al. Eigenvalues and expanders , 1986, Comb..
[27] Geng Lin,et al. Fault-tolerant circuit-switching networks , 1992, SPAA '92.
[28] E. Szemerédi,et al. Sorting inc logn parallel steps , 1983 .
[29] Richard E. Ladner,et al. Algorithms for dynamic multicast key distribution trees , 2003, PODC '03.
[30] Haibin Lu,et al. A novel high-order tree for secure multicast key management , 2005, IEEE Transactions on Computers.
[31] Jon Crowcroft,et al. Highways: proximity clustering for scalable peer-to-peer network , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..
[32] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[33] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[34] Andreas Goerdt. Random Regular Graphs with Edge Faults: Expansion through Cores , 1998, ISAAC.
[35] Maurice Herlihy,et al. The Arrow Distributed Directory Protocol , 1998, DISC.
[36] David Reeves Boggs. Internet broadcasting , 1982 .
[37] A. Grama,et al. Distributed Uniform Sampling in Real- World Networks , 2004 .
[38] Michael K. Reiter,et al. The design and implementation of a JCA-compliant capture protection infrastructure , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[39] Joel Friedman,et al. On the second eigenvalue and random walks in randomd-regular graphs , 1991, Comb..
[40] Carlo H. Séquin,et al. Hypertree: A Multiprocessor Interconnection Topology , 1981, IEEE Transactions on Computers.
[41] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[42] Richard J. Lipton,et al. Random walks, universal traversal sequences, and the complexity of maze problems , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[43] Mukesh Singhal,et al. A fault tolerant algorithm for distributed mutual exclusion , 1990, Proceedings Ninth Symposium on Reliable Distributed Systems.
[44] Li Xiao,et al. Location-aware topology matching in P2P systems , 2004, IEEE INFOCOM 2004.
[45] Van H. Vu,et al. Generating Random Regular Graphs , 2003, STOC '03.
[46] S. Wang,et al. A tree-based distributed algorithm for the K-entry critical section problem , 1994, Proceedings of 1994 International Conference on Parallel and Distributed Systems.
[47] Mohamed Naimi,et al. A Log(N) Distributed Mutual Exclusion Algorithm Based on Path Reversal , 1996, J. Parallel Distributed Comput..
[48] Stephen P. Boyd,et al. Fastest Mixing Markov Chain on a Graph , 2004, SIAM Rev..
[49] Béla Bollobás,et al. A Probabilistic Proof of an Asymptotic Formula for the Number of Labelled Regular Graphs , 1980, Eur. J. Comb..
[50] Richard D. Schlichting,et al. Fail-stop processors: an approach to designing fault-tolerant computing systems , 1983, TOCS.
[51] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[52] Guillaume Urvoy-Keller,et al. Hierarchical Peer-To-Peer Systems , 2003, Parallel Process. Lett..
[53] Andreas Goerdt,et al. Random regular graphs with edge faults: Expansion through cores , 1998, Theor. Comput. Sci..
[54] Dmitri Loguinov,et al. Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience , 2003, IEEE/ACM Transactions on Networking.
[55] Achour Mostéfaoui,et al. A General Scheme for Token- and Tree-Based Distributed Mutual Exclusion Algorithms , 1994, IEEE Trans. Parallel Distributed Syst..