The decentralized file system Igor-FS as an application for overlay-networks
暂无分享,去创建一个
[1] Gilles Kahn,et al. The Semantics of a Simple Language for Parallel Programming , 1974, IFIP Congress.
[2] Ellen W. Zegura,et al. Bootstrapping in Gnutella: A Measurement Study , 2004, PAM.
[3] Thomas Fuhrmann. A Self-organizing Routing Scheme for Random Networks , 2005, NETWORKING.
[4] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[5] Douglas Thain,et al. Transparent access to Grid resources for user software , 2006, Concurr. Comput. Pract. Exp..
[6] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[7] K. Clarkson. Nearest-Neighbor Searching and Metric Space Dimensions , 2005 .
[8] Andrew Tridgell,et al. Efficient Algorithms for Sorting and Synchronization , 1999 .
[9] R. Card,et al. Design and Implementation of the Second Extended Filesystem , 2001 .
[10] Klaus Wehrle,et al. Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.
[11] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[12] Niels Ferguson,et al. A Simple Algebraic Representation of Rijndael , 2001, Selected Areas in Cryptography.
[13] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[14] David E. Culler,et al. A blueprint for introducing disruptive technology into the Internet , 2003, CCRV.
[15] Thomas Fuhrmann,et al. Bootstrapping locality-aware P2P networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[16] Brad Curtis Johnson. Subject: a Distributed Computing Environment Framework: an Osf Perspective , 1991 .
[17] Rick Adams,et al. Standard for interchange of USENET messages , 1987, RFC.
[18] Maurice Lorrain Schlumberger,et al. De bruijn communications networks. , 1974 .
[19] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[20] Thomas Fuhrmann,et al. Churn Resistant de Bruijn Networks for Wireless on Demand Systems , 2006 .
[21] Mike Eisler. XDR: External Data Representation Standard , 2006, RFC.
[22] J Walker,et al. SHARE IT !-A RIGHTS-MANAGED NETWORK OF PEER-TO-PEER SET-TOP-BOXES-SYSTEM ARCHITECTURE , 2003 .
[23] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[24] Thomas Fuhrmann,et al. Distributed Job Scheduling in a Peer-to-Peer Video Recording System , 2004, GI Jahrestagung.
[25] Benoit des Ligneris,et al. Virtualization of Linux based computers: the Linux-VServer project , 2005, 19th International Symposium on High Performance Computing Systems and Applications (HPCS'05).
[26] Sam Hartman,et al. The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2 , 2005, RFC.
[27] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[28] Krishna P. Gummadi,et al. The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.
[29] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[30] Brent Callaghan,et al. NFS Version 3 Protocol Specification , 1995, RFC.
[31] Robert Thurlow,et al. RPC: Remote Procedure Call Protocol Specification Version 2 , 2009, RFC.
[32] Burton S. Kaliski,et al. The MD2 Message-Digest Algorithm , 1992, RFC.
[33] Mahadev Satyanarayanan,et al. Andrew: a distributed personal computing environment , 1986, CACM.
[34] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[35] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[36] Hui Zhang,et al. Predicting Internet network distance with coordinates-based approaches , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[37] Song Jiang,et al. Efficient distributed disk caching in data grid management , 2003, 2003 Proceedings IEEE International Conference on Cluster Computing.
[38] Tatu Ylönen,et al. The Secure Shell (SSH) Protocol Architecture , 2006, RFC.
[39] Gurmeet Singh Manku,et al. Symphony: Distributed Hashing in a Small World , 2003, USENIX Symposium on Internet Technologies and Systems.
[40] Rudolf Bayer,et al. Binary B-trees for virtual memory , 1971, SIGFIDET '71.
[41] Aladdin Enterprises,et al. ZLIB Compressed Data Format Specification version 3.3 , 1996 .
[42] George D. Stamoulis,et al. Distributed Scheduling of Recording Tasks with Interconnected Servers , 2004, NETWORKING.
[43] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[44] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[45] Russ Housley,et al. Security flaws in 802.11 data link protocols , 2003, CACM.
[46] David Robinson,et al. Network File System (NFS) version 4 Protocol , 2003, RFC.
[47] J. G. Fletcher,et al. An Arithmetic Checksum for Serial Transmissions , 1982, IEEE Trans. Commun..
[48] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[49] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[50] Moisés Aranda,et al. the birthday problem , 2008 .
[51] Daishi Kato,et al. Evaluating DHT Implementations in Complex Environments by Network Emulator , 2007, IPTPS.
[52] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.
[53] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[54] Paul Francis,et al. IDMaps: a global internet host distance estimation service , 2001, TNET.
[55] Mahadev Satyanarayanan,et al. Coda: A Highly Available File System for a Distributed Workstation Environment , 1990, IEEE Trans. Computers.
[56] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[57] Antony Rowstron,et al. Virtual ring routing: network routing inspired by DHTs , 2006, SIGCOMM 2006.
[58] Ronald L. Rivest,et al. The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms , 1996, RFC.
[59] Clive D. W. Feather. Network News Transfer Protocol (NNTP) , 2006, RFC.
[60] Robert J. Sparks. Actions Addressing Identified Issues with the Session Initiation Protocol's (SIP) Non-INVITE Transaction , 2006, RFC.
[61] Ben Y. Zhao,et al. Distributed Object Location in a Dynamic Network , 2004, Theory of Computing Systems.
[62] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .
[63] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[64] Oskar Sandberg,et al. Distributed Routing in Small-World Networks , 2006, ALENEX.
[65] M. Newman. Power laws, Pareto distributions and Zipf's law , 2005 .
[66] John H. Howard,et al. On Overview of the Andrew File System , 1988, USENIX Winter.
[67] Robert Tappan Morris,et al. Designing a DHT for Low Latency and High Throughput , 2004, NSDI.
[68] Robert Tappan Morris,et al. Bandwidth-efficient management of DHT routing tables , 2005, NSDI.
[69] Philipp Obreiter,et al. Lanes - A Lightweight Overlay for Service Discovery in Mobile Ad Hoc Networks , 2003 .
[70] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[71] William Stallings,et al. PGP Message Exchange Formats , 1996, RFC.
[72] Steve Muir. The Seven Deadly Sins of Distributed Systems , 2004, WORLDS.
[73] Robert Devine,et al. Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm , 1993, FODO.
[74] L. Vivier,et al. The new ext 4 filesystem : current status and future plans , 2007 .
[75] Roger Faulkner,et al. The Process File System and Process Model in UNIX System V , 1991, USENIX Winter.
[76] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[77] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[78] Moni Naor,et al. Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.
[79] Russ Housley,et al. Cryptographic Message Syntax (CMS) , 2002, RFC.
[80] Paul England,et al. The Darknet and the Future of Content Protection , 2002, Digital Rights Management Workshop.
[81] W. Richard Stevens,et al. Unix network programming , 1990, CCRV.
[82] Lyndon Ong,et al. An Introduction to the Stream Control Transmission Protocol (SCTP) , 2002, RFC.
[83] Pierre L'Ecuyer,et al. Tables of linear congruential generators of different sizes and good lattice structure , 1999, Math. Comput..
[84] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[85] David Mazières,et al. Democratizing Content Publication with Coral , 2004, NSDI.
[86] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[87] Eric Allman,et al. DomainKeys Identified Mail (DKIM) Signatures , 2007, RFC.
[88] Mark Handley,et al. Datagram Congestion Control Protocol (DCCP) , 2006, RFC.
[89] Paolo Toth,et al. Knapsack Problems: Algorithms and Computer Implementations , 1990 .
[90] Emin Gün Sirer,et al. Meridian: a lightweight network location service without virtual coordinates , 2005, SIGCOMM '05.
[91] Frank Dabek,et al. A cooperative file system , 2001 .
[92] Brighten Godfrey,et al. OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.
[93] Ben Y. Zhao,et al. Towards a Common API for Structured Peer-to-Peer Overlays , 2003, IPTPS.
[94] Mario Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .
[95] Bruce Schneier,et al. Improved Cryptanalysis of Rijndael , 2000, FSE.
[96] Thure Etzold,et al. SRS - an indexing and retrieval tool for flat file data libraries , 1993, Comput. Appl. Biosci..
[97] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[98] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1999, Theory of Computing Systems.
[99] Arun Venkataramani,et al. A structural approach to latency prediction , 2006, IMC '06.
[100] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[101] Frank B. Schmuck,et al. GPFS: A Shared-Disk File System for Large Computing Clusters , 2002, FAST.
[102] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[103] Qi Xia,et al. Fully decentralized DHT based approach to grid service discovery using overlay networks , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[104] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[105] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[106] John Linn,et al. Generic Security Service Application Program Interface Version 2, Update 1 , 2000, RFC.
[107] Jon Postel,et al. Internet Control Message Protocol , 1981, RFC.
[108] Dietmar Kaletta,et al. Improved adaptive replacement algorithm for disk caches in HSM systems , 1999, 16th IEEE Symposium on Mass Storage Systems in cooperation with the 7th NASA Goddard Conference on Mass Storage Systems and Technologies (Cat. No.99CB37098).
[109] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[110] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.
[111] Ross W. Callon. The Twelve Networking Truths , 1996, RFC.
[112] Erez Petrank,et al. Implementing an on-the-fly garbage collector for Java , 2000, ISMM '00.
[113] Ben Y. Zhao,et al. Pond: The OceanStore Prototype , 2003, FAST.
[114] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[115] Jörg Widmer,et al. Extremum Feedback with Partial Knowledge , 2003, Networked Group Communication.
[116] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[117] Douglas Thain,et al. Parrot: Transparent User-Level Middleware for Data-Intensive Computing , 2005, Scalable Comput. Pract. Exp..
[118] Thomas Fuhrmann,et al. Measuring Large Overlay Networks - The Overnet Example , 2005, KiVS.
[119] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[120] Francois Yergeau,et al. UTF-8, a transformation format of ISO 10646 , 1998, RFC.
[121] Larry L. Peterson,et al. Reliability and Security in the CoDeeN Content Distribution Network , 2004, USENIX Annual Technical Conference, General Track.
[122] Burton S. Kaliski,et al. PKCS #7: Cryptographic Message Syntax Version 1.5 , 1998, RFC.
[123] Hans-Joachim Hof,et al. A Generic, Self-organizing, and Distributed Bootstrap Service for Peer-to-Peer Networks , 2007, IWSOS.
[124] P. Biondi,et al. Silver Needle in the Skype , 2006 .
[125] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[126] Robert Tappan Morris,et al. Practical, distributed network coordinates , 2004, Comput. Commun. Rev..
[127] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[128] Stephen Tweedie,et al. Planned Extensions to the Linux Ext2/Ext3 Filesystem , 2002, USENIX Annual Technical Conference, FREENIX Track.
[129] Witold Litwin,et al. LH*—a scalable, distributed data structure , 1996, TODS.
[130] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[131] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[132] Satish Rao,et al. A note on the nearest neighbor in growth-restricted metrics , 2004, SODA '04.
[133] Richard M. Karp,et al. Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..
[134] Stephen E. Deering,et al. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.