Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015‏ - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

A survey and comparison of peer-to-peer overlay network schemes

EK Lua, J Crowcroft, M Pias… - … Surveys & Tutorials, 2005‏ - ieeexplore.ieee.org
Over the Internet today, computing and communications environments are significantly more
complex and chaotic than classical distributed systems, lacking any centralized organization …

[ספר][B] Principles of distributed database systems

MT Özsu, P Valduriez - 1999‏ - Springer
The first edition of this book appeared in 1991 when the technology was new and there were
not too many products. In the Preface to the first edition, we had quoted Michael Stonebraker …

A scalable content-addressable network

S Ratnasamy, P Francis, M Handley, R Karp… - Proceedings of the …, 2001‏ - dl.acm.org
Hash tables-which map" keys" onto" values"-are an essential building block in modern
software systems. We believe a similar functionality would be equally valuable to large …

Tapestry: A resilient global-scale overlay for service deployment

BY Zhao, L Huang, J Stribling, SC Rhea… - IEEE Journal on …, 2004‏ - ieeexplore.ieee.org
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable,
location-independent routing of messages directly to nearby copies of an object or service …

[ספר][B] Handbook of approximation algorithms and metaheuristics

TF Gonzalez - 2007‏ - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …

Democratizing content publication with coral.

MJ Freedman, E Freudenthal, D Mazieres - NSDI, 2004‏ - usenix.org
CoralCDN is a peer-to-peer content distribution network that allows a user to run a web site
that offers high performance and meets huge demand, all for the price of a cheap broadband …

Mercury: supporting scalable multi-attribute range queries

AR Bharambe, M Agrawal, S Seshan - Proceedings of the 2004 …, 2004‏ - dl.acm.org
This paper presents the design of Mercury, a scalable protocol for supporting multi-attribute
range-based searches. Mercury differs from previous range-based query systems in that it …

[PDF][PDF] A survey of solutions to the sybil attack

BN Levine, C Shields, NB Margolin - University of Massachusetts …, 2006‏ - git.gnunet.org
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …

Maan: A multi-attribute addressable network for grid information services

M Cai, M Frank, J Chen, P Szekely - Journal of grid computing, 2004‏ - Springer
Abstract Recent structured Peer-to-Peer (P2P) systems such as Distributed Hash Tables
(DHTs) offer scalable key-based lookup for distributed resources. However, they cannot be …