The SCEAS System
Navigation Menu

Conferences in DBLP

ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) (podc)
2003 (conf/podc/2003)

  1. Ross J. Anderson
    Cryptography and competition policy: issues with 'trusted computing'. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:3-10 [Conf]
  2. Nancy A. Lynch
    Working with mike on distributed computing theory, 1978--1992. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:11- [Conf]
  3. Silvio Micali
    Simple and fast optimistic protocols for fair electronic exchange. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:12-19 [Conf]
  4. Rebecca N. Wright
    Fischer's cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:20-22 [Conf]
  5. Fabian Kuhn, Roger Wattenhofer
    Constant-time distributed dominating set approximation. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:25-32 [Conf]
  6. Yossi Azar, Shay Kutten, Boaz Patt-Shamir
    Distributed error confinement. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:33-42 [Conf]
  7. Marta Arias, Lenore Cowen, Kofi A. Laing
    Compact roundtrip routing with topology-independent node names. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:43-52 [Conf]
  8. J. J. Garcia-Luna-Aceves, Marc Mosko, Charles E. Perkins
    A new approach to on-demand loop-free routing in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:53-62 [Conf]
  9. Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger
    Geometric ad-hoc routing: of theory and practice. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:63-72 [Conf]
  10. Dariusz R. Kowalski, Andrzej Pelc
    Broadcasting in undirected ad hoc radio networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:73-82 [Conf]
  11. Srikant Kuppa, Mansi Ramakrishnan Thoppian, Srinivasan Krishnamurthy, S. Venkatesan
    Brief announcement: cluster-based control mechanism for communication networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:83- [Conf]
  12. Danny Hendler, Nir Shavit
    Operation-valency and the cost of coordination. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:84-91 [Conf]
  13. Maurice Herlihy, Victor Luchangco, Mark Moir, William N. Scherer III
    Software transactional memory for dynamic-sized data structures. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:92-101 [Conf]
  14. Ori Shalev, Nir Shavit
    Split-ordered lists: lock-free extensible hash tables. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:102-111 [Conf]
  15. Srikanta Tirthapura
    Brief announcement: concurrent counting is harder than queuing. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:112- [Conf]
  16. André Schiper
    Brief announcement: dynamic group communication. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:113- [Conf]
  17. Moni Naor, Udi Wieder
    Scalable and dynamic quorum systems. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:114-122 [Conf]
  18. Baruch Awerbuch, Christian Scheideler
    Peer-to-peer systems for prefix search. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:123-132 [Conf]
  19. Gurmeet Singh Manku
    Routing networks for distributed hash tables. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:133-142 [Conf]
  20. Ittai Abraham, Danny Dolev
    Asynchronous resource discovery. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:143-150 [Conf]
  21. Pierre Fraigniaud, Philippe Gauron
    Brief announcement: an overview of the content-addressable network D2B. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:151- [Conf]
  22. Nicholas J. A. Harvey, J. Ian Munro
    Brief announcement: deterministic skipnet. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:152- [Conf]
  23. Christian Cachin
    An asynchronous protocol for distributed computation of RSA inverses and its applications. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:153-162 [Conf]
  24. Benoît Libert, Jean-Jacques Quisquater
    Efficient revocation and threshold pairing based cryptosystems. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:163-171 [Conf]
  25. Jung Min Park, Edwin K. P. Chong, Howard Jay Siegel
    Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:172-181 [Conf]
  26. Ninghui Li, Wenliang Du, Dan Boneh
    Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:182-189 [Conf]
  27. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
    Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:190-199 [Conf]
  28. Yehuda Lindell
    Brief announcement: impossibility results for concurrent secure two-party computation. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:200- [Conf]
  29. Shin'ichiro Matsuo, Wakaha Ogata
    Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:201- [Conf]
  30. S. Amitanand, I. Sanketh, K. Srinathan, V. Vinod, C. Pandu Rangan
    Distributed consensus in the presence of sectional faults. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:202-210 [Conf]
  31. Matthias Fitzi, Juan A. Garay
    Efficient player-optimal protocols for strong and differential consensus. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:211-220 [Conf]
  32. Maurice Herlihy, Lucia Draque Penso
    tight bounds for k-set agreement with limited-scope failure detectors. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:221- [Conf]
  33. Fabrice Le Fessant, Philippe Raipin Parvédy, Michel Raynal
    Brief announcement: early decision despite general process omission failures. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:222- [Conf]
  34. Michael Backes, Christian Cachin, Reto Strobl
    Proactive secure message transmission in asynchronous networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:223-232 [Conf]
  35. Amos Beimel, Lior Malka
    Efficient reliable communication over partially authenticated networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:233-242 [Conf]
  36. Justin Goshi, Richard E. Ladner
    Algorithms for dynamic multicast key distribution trees. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:243-251 [Conf]
  37. K. Srinathan, V. Vinod, C. Pandu Rangan
    Brief announcement: efficient perfectly secure communication over synchronous networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:252- [Conf]
  38. Benjie Chen, Thomer M. Gil, Athicha Muthitacharoen, Robert Morris
    Brief announcement: building data structures on untrusted peer-to-peer storage with per-participant logs. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:253- [Conf]
  39. Arnon Rosenthal, Edward Sciore
    Brief announcement: extending SQL access control to derived and distributed data. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:254- [Conf]
  40. Grzegorz Malewicz
    A work-optimal deterministic algorithm for the asynchronous certified write-all problem. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:255-264 [Conf]
  41. Dariusz R. Kowalski, Alexander A. Shvartsman
    Performing work with asynchronous processors: message-delay-sensitive bounds. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:265-274 [Conf]
  42. Prasad Jayanti, Srdjan Petrovic, King Tan
    Fair group mutual exclusion. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:275-284 [Conf]
  43. Prasad Jayanti, Srdjan Petrovic
    Efficient and practical constructions of LL/SC variables. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:285-294 [Conf]
  44. Prasad Jayanti
    Adaptive and efficient abortable mutual exclusion. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:295-304 [Conf]
  45. Yoah Bar-David, Gadi Taubenfeld
    Automatic discovery of mutual exclusion algorithms. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:305- [Conf]
  46. Marcos Kawazoe Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, Sam Toueg
    On implementing omega with weak reliability and synchrony assumptions. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:306-314 [Conf]
  47. Marcos Kawazoe Aguilera, Burkhard Englert, Eli Gafni
    On using network attached disks as shared memory. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:315-324 [Conf]
  48. Panagiotis Manolios, Richard J. Trefler
    A lattice-theoretic characterization of safety and liveness. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:325-333 [Conf]
  49. Panagiotis Manolios
    Brief announcement: branching time refinement. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:334- [Conf]
  50. Rui Fan, Nancy A. Lynch
    Brief announcement: efficient replication of large data objects. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:335- [Conf]
  51. Farnoush Banaei Kashani, Cyrus Shahabi
    Brief announcement: efficient flooding in power-law networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:336- [Conf]
  52. Aditya Akella, Shuchi Chawla, Arvind Kannan, Srinivasan Seshan
    Scaling properties of the Internet graph. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:337-346 [Conf]
  53. Alex Fabrikant, Ankur Luthra, Elitza N. Maneva, Christos H. Papadimitriou, Scott Shenker
    On a network creation game. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:347-351 [Conf]
  54. Alexander Kesselman, Yishay Mansour
    Adaptive AIMD congestion control. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:352-359 [Conf]
  55. Baruch Awerbuch, Yishay Mansour
    Adapting to a reliable network path. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:360-367 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002