Sciweavers

SIGOPSE
2004
ACM
13 years 11 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
SIGOPSE
2004
ACM
13 years 11 months ago
Energy-efficient cluster-based service discovery for Ubiquitous Computing
: Service discovery in Ubiquitous Computing is a task which has to be done frequently due to dynamically changing environments. The limited battery power of mobile devices requires...
Gregor Schiele, Christian Becker, Kurt Rothermel
SIGOPSE
2004
ACM
13 years 11 months ago
Exploiting semantic clustering in the eDonkey P2P network
Sidath B. Handurukande, Anne-Marie Kermarrec, Fabr...
SIGOPSE
2004
ACM
13 years 11 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
SIGOPSE
2004
ACM
13 years 11 months ago
Impeding attrition attacks in P2P systems
—P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-leve...
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulo...
SIGOPSE
2004
ACM
13 years 11 months ago
Lessons and challenges in automating data dependability
Abstract: Designing and managing dependable systems is a difficult endeavor. In this paper, we describe challenges in this vast problem space, including provisioning and allocatin...
Kimberly Keeton, Dirk Beyer 0002, Jeffrey S. Chase...
SIGOPSE
2004
ACM
13 years 11 months ago
Transactional file systems can be fast
Transactions ensure simple and correct handling of concurrency and failures but are often considered too expensive for use in file systems. This paper argues that performance is ...
Barbara Liskov, Rodrigo Rodrigues
SIGOPSE
2004
ACM
13 years 11 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
SIGOPSE
2004
ACM
13 years 11 months ago
Separating durability and availability in self-managed storage
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the tra...
Geoffrey Lefebvre, Michael J. Feeley
SIGOPSE
2004
ACM
13 years 11 months ago
Utilification
John Wilkes, Jeffrey C. Mogul, Jaap Suermondt