Awarded Best Student Paper! - Pond: The OceanStore Prototype
暂无分享,去创建一个
Ben Y. Zhao | John Kubiatowicz | Hakim Weatherspoon | Patrick R. Eaton | Sean C. Rhea | Dennis Geels | Patrick Eaton | Sean Rhea | J. Kubiatowicz | Dennis Geels | Hakim Weatherspoon
[1] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[2] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[3] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[4] John Kubiatowicz,et al. Replica management should be a game , 2002, EW 10.
[5] Michael Stonebraker,et al. The Design of the POSTGRES Storage System , 1988, VLDB.
[6] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[7] Mahadev Satyanarayanan,et al. Scalable, secure, and highly available distributed file access , 1990, Computer.
[8] John Kubiatowicz,et al. Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.
[9] Marvin Theimer,et al. The Bayou Architecture: Support for Data Sharing Among Mobile Users , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[10] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[11] Randy H. Katz,et al. SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network , 2002, Pervasive.
[12] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[13] Timothy Roscoe,et al. Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.
[14] Ben Y. Zhao,et al. Distributed Object Location in a Dynamic Network , 2002, SPAA '02.
[15] Dan Boneh,et al. Building intrusion tolerant applications , 1999, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[16] David Mazières,et al. A Toolkit for User-Level File Systems , 2001, USENIX Annual Technical Conference, General Track.
[17] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[18] Mahadev Satyanarayanan,et al. Disconnected operation in the Coda File System , 1992, TOCS.
[19] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[20] Andrew V. Goldberg,et al. Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.
[21] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[22] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[23] Pradeep K. Khosla,et al. Survivable Information Storage Systems , 2000, Computer.
[24] John Kubiatowicz,et al. Probabilistic location and routing , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[25] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[26] Michael K. Reiter,et al. Persistent objects in the Fleet system , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[27] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[28] John Kubiatowicz,et al. Introspective failure analysis: avoiding correlated failures in peer-to-peer systems , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..
[29] Dennis Shasha,et al. The dangers of replication and a solution , 1996, SIGMOD '96.
[30] John Kubiatowicz,et al. Naming and integrity: self-verifying data in peer-to-peer systems , 2003 .
[31] Marek Karpinski,et al. An XOR-based erasure-resilient coding scheme , 1995 .
[32] David E. Culler,et al. SEDA: an architecture for well-conditioned, scalable internet services , 2001, SOSP.
[33] John Kubiatowicz,et al. Efficient heartbeats and repair of softstate in decentralized object location and routing systems , 2002, EW 10.
[34] Norman C. Hutchinson,et al. Deciding when to forget in the Elephant file system , 1999, SOSP.
[35] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[36] Moni Naor,et al. Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.
[37] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .