Search the dblp DataBase
Byung-Gon Chun :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Byung-Gon Chun , Byeong Gi Lee Auxiliary Timeout and Selective Packet Discard Schemes to Improve TCP Performance in PCN Environment. [Citation Graph (0, 0)][DBLP ] ICC (1), 1997, pp:381-385 [Conf ] Byung-Gon Chun , Rodrigo Fonseca , Ion Stoica , John Kubiatowicz Characterizing Selfishly Constructed Overlay Routing Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Byung-Gon Chun , Ben Y. Zhao , John Kubiatowicz Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks. [Citation Graph (0, 0)][DBLP ] IPTPS, 2005, pp:264-274 [Conf ] Byung-Gon Chun , Kamalika Chaudhuri , Hoeteck Wee , Marco Barreno , Christos H. Papadimitriou , John Kubiatowicz Selfish caching in distributed systems: a game-theoretic analysis. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:21-30 [Conf ] Byung-Gon Chun , Mary Baker Evaluation of packet scheduling algorithms in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2002, v:6, n:3, pp:36-49 [Journal ] Byung-Gon Chun , Frank Dabek , Andreas Haeberlen , Emil Sit , Hakim Weatherspoon , M. Frans Kaashoek , John Kubiatowicz , Robert Morris Efficient Replica Maintenance for Distributed Storage Systems. [Citation Graph (0, 0)][DBLP ] NSDI, 2006, pp:- [Conf ] Cheng Tien Ee , Vijay Ramachandran , Byung-Gon Chun , Kaushik Lakshminarayanan , Scott Shenker Resolving inter-domain policy disputes. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:157-168 [Conf ] Teemu Koponen , Mohit Chawla , Byung-Gon Chun , Andrey Ermolinskiy , Kye Hyun Kim , Scott Shenker , Ion Stoica A data-oriented (and beyond) network architecture. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:181-192 [Conf ] Byung-Gon Chun , Petros Maniatis , Scott Shenker , John Kubiatowicz Attested append-only memory: making adversaries stick to their word. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:189-204 [Conf ] Hakim Weatherspoon , Patrick R. Eaton , Byung-Gon Chun , John Kubiatowicz Antiquity: exploiting a secure log for wide-area distributed storage. [Citation Graph (0, 0)][DBLP ] EuroSys, 2007, pp:371-384 [Conf ] Tiered Fault Tolerance for Long-Term Integrity. [Citation Graph (, )][DBLP ] Minuet: Rethinking Concurrency Control in Storage Area Networks. [Citation Graph (, )][DBLP ] Augmented Smartphone Applications Through Clone Cloud Execution. [Citation Graph (, )][DBLP ] NetComplex: A Complexity Metric for Networked System Designs. [Citation Graph (, )][DBLP ] Can software routers scale? [Citation Graph (, )][DBLP ] RouteBricks: exploiting parallelism to scale software routers. [Citation Graph (, )][DBLP ] Diverse Replication for Single-Machine Byzantine-Fault Tolerance. [Citation Graph (, )][DBLP ] Macroscope: end-point approach to networked application dependency discovery. [Citation Graph (, )][DBLP ] A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users [Citation Graph (, )][DBLP ] Search in 0.131secs, Finished in 0.132secs