default search action
26th PODC 2007: Portland, Oregon, USA
- Indranil Gupta, Roger Wattenhofer:
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007. ACM 2007, ISBN 978-1-59593-616-5 - Marc Tremblay:
Transactional memory for a modern microprocessor. 1 - Tom Leighton:
The Akamai approach to achieving performance and reliability on the internet. 2
Multiprocessor, multicore, shared memory
- Wojciech M. Golab, Vassos Hadzilacos, Danny Hendler, Philipp Woelfel:
Constant-RMR implementations of CAS and other synchronization primitives using read and write operations. 3-12 - Faith Ellen, Yossi Lev, Victor Luchangco, Mark Moir:
SNZI: scalable NonZero indicators. 13-22 - Marcos Kawazoe Aguilera, Svend Frølund, Vassos Hadzilacos, Stephanie Lorraine Horn, Sam Toueg:
Abortable and query-abortable objects and their efficient implementation. 23-32 - Panagiota Fatourou, Nikolaos D. Kallimanis:
Time-optimal, space-efficient single-scanner snapshots & multi-scanner snapshots using CAS. 33-42
Graph algorithms
- Ittai Abraham, Mahesh Balakrishnan, Fabian Kuhn, Dahlia Malkhi, Venugopalan Ramasubramanian, Kunal Talwar:
Reconstructing approximate tree metrics. 43-52 - Beat Gfeller, Elias Vicari:
A randomized distributed algorithm for the maximal independent set problem in growth-bounded graphs. 53-60 - Costas Busch, Ryan LaFortune, Srikanta Tirthapura:
Improved sparse covers for graphs excluding a fixed minor. 61-70 - Goran Konjevod, Andréa W. Richa, Donglin Xia, Hai Yu:
Compact routing with slack in low doubling dimension. 71-80 - Michael Dinitz:
Compact routing with slack. 81-88
Peer-to-peer systems
- Aleksandrs Slivkins:
Towards fast decentralized construction of locality-aware overlay networks. 89-98 - George Giakkoupis, Vassos Hadzilacos:
On the complexity of greedy routing in ring-based peer-to-peer networks. 99-108 - Gregory V. Chockler, Roie Melamed, Yoav Tock, Roman Vitenberg:
Constructing scalable overlays for pub-sub with many topics. 109-118
Security
- Rachid Guerraoui, Marko Vukolic:
Refined quorum systems. 119-128 - Christian Cachin, Abhi Shelat, Alexander Shraer:
Efficient fork-linearizable access to untrusted shared memory. 129-138 - James Hendricks, Gregory R. Ganger, Michael K. Reiter:
Verifying distributed erasure-coded data. 139-146 - Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov:
Truth in advertising: lightweight verification of route integrity. 147-156 - James Caverlee, Ling Liu:
Countering web spam with credibility-based link analysis. 157-166
Local & dynamic algorithms
- Zvi Lotker, Boaz Patt-Shamir, Adi Rosén:
Distributed approximate matching. 167-174 - Amos Korman, Shay Kutten:
Controller and estimator for dynamic networks. 175-184 - Michael Elkin:
A near-optimal distributed fully dynamic algorithm for maintaining sparse spanners. 185-194
Radio networks and aggregation
- Yuval Emek, Leszek Gasieniec, Erez Kantor, Andrzej Pelc, David Peleg, Chang Su:
Broadcasting in udg radio networks with unknown topology. 195-204 - Andrea E. F. Clementi, Francesco Pasquale, Angelo Monti, Riccardo Silvestri:
Communication in dynamic radio networks. 205-214 - Graham Cormode, Srikanta Tirthapura, Bojian Xu:
Time-decaying sketches for sensor data aggregation. 215-224 - Edith Cohen, Haim Kaplan:
Summarizing data using bottom-k sketches. 225-234
Fault tolerance
- Rachid Guerraoui, Maurice Herlihy, Petr Kouznetsov, Nancy A. Lynch, Calvin C. Newport:
On the weakest failure detector ever. 235-243 - Martin Biely, Josef Widder, Bernadette Charron-Bost, Antoine Gaillard, Martin Hutle, André Schiper:
Tolerating corrupted communication. 244-253 - Haifeng Yu, Phillip B. Gibbons:
Optimal inter-object correlation when replicating for availability. 254-263 - Lidong Zhou, Vijayan Prabhakaran, Venugopalan Ramasubramanian, Roy Levin, Chandramohan A. Thekkath:
Graceful degradation via versions: specifications and implementations. 264-273
Economical aspects
- Baruch Awerbuch, Rohit Khandekar:
Greedy distributed optimization of multi-commodity flows. 274-283 - Baruch Awerbuch, Rohit Khandekar:
Distributed network monitoring and multicommodity flows: a primal-dual approach. 284-291 - Erik D. Demaine, MohammadTaghi Hajiaghayi, Hamid Mahini, Morteza Zadimoghaddam:
The price of anarchy in network creation games. 292-298 - Stefano Leonardi, Piotr Sankowski:
Network formation games with local coalitions. 299-305
Brief announcements - track A
- Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu:
Partition approach to failure detectors for k-set agreement. 306-307 - Alejandro Cornejo, Sergio Rajsbaum, Michel Raynal, Corentin Travers:
Failure detectors are schedulers. 308-309 - Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi:
Bounded wait-free implementation of optimally resilient byzantine storage without (unproven) cryptographic assumptions. 310-311 - Marcos Kawazoe Aguilera, Ram Swaminathan:
Remote storage with byzantine servers. 312-313 - Achour Mostéfaoui, Gilles Trédan:
Towards the minimal synchrony for byzantine consensus. 314-315 - Lásaro J. Camargos, Rodrigo Schmidt, Fernando Pedone:
Multicoordinated Paxos. 316-317 - Hagit Attiya, Faith Ellen, Panagiota Fatourou:
The complexity of updating multi-writer snapshot objects. 318-319 - Antonio Fernández, Michel Raynal:
From an intermittent rotating star to a leader. 320-321 - Arpita Patra, Ashish Choudhary, Chandrasekaran Pandu Rangan:
Constant phase efficient protocols for secure message transmission in directed networks. 322-323 - Keke Chen, Ling Liu:
Space adaptation: privacy-preserving multiparty collaborative mining with geometric perturbation. 324-325 - Yitao Duan, John F. Canny:
Practical private computation of vector addition-based functions. 326-327 - Aameek Singh, Madhukar R. Korupolu, Bhuvan Bamba:
Integrated resource allocation in heterogeneous SAN data centers. 328-329 - Ajay Gulati, Arif Merchant, Peter J. Varman:
d-clock: distributed QoS in heterogeneous resource environments. 330-331 - Bob Mungamuru, Hector Garcia-Molina, Christopher Olston:
Configurations: a model for distributed data storage. 332-333 - Chryssis Georgiou, Peter M. Musial, Alexander A. Shvartsman, Elaine L. Sonderegger:
A formal treatment of an abstract channel implementation using java sockets and TCP. 334-335 - Michael L. Scott, Michael F. Spear, Luke Dalessandro, Virendra J. Marathe:
Transactions and privatization in Delaunay triangulation. 336-337 - Michael F. Spear, Virendra J. Marathe, Luke Dalessandro, Michael L. Scott:
Privatization techniques for software transactional memory. 338-339 - Torvald Riegel, Christof Fetzer, Heiko Sturzrehm, Pascal Felber:
From causal to z-linearizable transactional memory. 340-341 - Hagit Attiya, Eshcar Hillel:
The power of DCAS: highly-concurrent software transactional memory. 342-343 - Ming Zhong, Kai Shen, Joel I. Seiferas:
Object replication degree customization for high availability. 344-345 - Augustin Chaintreau:
Sharpness, a tight condition for throughput scalability. 346-347 - Du Li, Rui Li:
An analysis of intention preservation in group editors. 348-349 - HariGovind V. Ramasamy, Mouna Seri, William H. Sanders:
The coBFIT toolkit. 350-351
Brief announcements - track B
- Cyril Gavoille, Arnaud Labourel:
On local representation of distances in trees. 352-353 - Baruch Awerbuch, Rohit Khandekar:
Minimizing the total cost of network measurements in a distributed manner: a primal-dual approach. 354-355 - Shlomi Dolev, Elad Michael Schiller, Paul G. Spirakis, Philippas Tsigas:
Game authority for robust andscalable distributed selfish-computer systems. 356-357 - Allen Clement, Jeff Napper, Harry C. Li, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin:
Theory of BAR games. 358-359 - Davide Bilò, Luca Forlizzi, Luciano Gualà, Guido Proietti:
An algorithm composition scheme preserving monotonicity. 360-361 - Rica Gonen, Elan Pavlov:
An incentive-compatible multi-armed bandit mechanism. 362-363 - Baruch Awerbuch, Rohit Khandekar:
On cost sharing mechanisms in the network design game. 364-365 - Baruch Awerbuch, Aviv Nisgav, Boaz Patt-Shamir:
Asynchronous recommendation systems. 366-367 - Anat Bremler-Barr, Nir Chen, Jussi Kangasharju, Osnat Mokryn, Yuval Shavitt:
Bringing order to BGP: decreasing time and message complexity. 368-369 - Baruch Awerbuch, Christian Scheideler:
A denial-of-service resistant DHT. 370-371 - Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly:
Measuring robustness of superpeer topologies. 372-373 - Tassos Dimitriou, Ghassan Karame, Ioannis T. Christou:
SuperTrust: a secure and efficient framework for handling trust in super-peer networks. 374-375 - Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky:
Toward an optimal social network defense against Sybil attacks. 376-377 - Alex Brodsky, Dmitry Brodsky:
Trinity: distributed defense against transient spam-bots. 378-379 - Philippe Duchon, Nicole Eggemann, Nicolas Hanusse:
Non-searchability of random scale-free graphs. 380-381 - Michael Langberg, Moshe Schwartz, Jehoshua Bruck:
Distributed broadcasting and mapping protocols in directed anonymous networks. 382-383 - Nicolas Schiper, Fernando Pedone:
Optimal atomic broadcast and multicast algorithms for wide area networks. 384-385 - Roberto Baldoni, Kleoni Ioannidou, Alessia Milani:
Solvability of geocasting in mobile ad-hoc networks. 386-387 - Hariharan Narayanan:
Geographic gossip on geometric random graphs via affine combinations. 388-389 - Wesley W. Terpstra, Christof Leng, Alejandro P. Buchmann:
Practical summation via gossip. 390-391 - Lan Lin, Hyunyoung Lee:
Distributed algorithms for dynamic coverage in sensor networks. 392-393 - Haifeng Yu:
DoS-resilient secure aggregation queries in sensor networks. 394-395 - Joffroy Beauquier, Julien Clément, Stéphane Messika, Laurent Rosaz, Brigitte Rozoy:
Self-stabilizing counting in mobile sensor networks. 396-397 - Tushar Deepak Chandra, Robert Griesemer, Joshua Redstone:
Paxos made live: an engineering perspective. 398-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.