575
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the tra...
207
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
164
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
Web application workloads are often characterized by a large number of unique read requests and a significant fraction of write requests. Hosting these applications drives the ne...
155
Voted
SIGOPSE
15 years 10 months ago
2004 ACM
In this paper we take the position that current research in the area of distributed systems has all but forgotten about one of the largest collective Internet resources - the NATe...
150
Voted
SIGOPSE
15 years 10 months ago
2004 ACM
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
|