The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Byung-Gon Chun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Byung-Gon Chun, Byeong Gi Lee
    Auxiliary Timeout and Selective Packet Discard Schemes to Improve TCP Performance in PCN Environment. [Citation Graph (0, 0)][DBLP]
    ICC (1), 1997, pp:381-385 [Conf]
  2. Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, John Kubiatowicz
    Characterizing Selfishly Constructed Overlay Routing Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  3. Byung-Gon Chun, Ben Y. Zhao, John Kubiatowicz
    Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:264-274 [Conf]
  4. Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos H. Papadimitriou, John Kubiatowicz
    Selfish caching in distributed systems: a game-theoretic analysis. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:21-30 [Conf]
  5. Byung-Gon Chun, Mary Baker
    Evaluation of packet scheduling algorithms in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:36-49 [Journal]
  6. Byung-Gon Chun, Frank Dabek, Andreas Haeberlen, Emil Sit, Hakim Weatherspoon, M. Frans Kaashoek, John Kubiatowicz, Robert Morris
    Efficient Replica Maintenance for Distributed Storage Systems. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  7. Cheng Tien Ee, Vijay Ramachandran, Byung-Gon Chun, Kaushik Lakshminarayanan, Scott Shenker
    Resolving inter-domain policy disputes. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:157-168 [Conf]
  8. Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica
    A data-oriented (and beyond) network architecture. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:181-192 [Conf]
  9. Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz
    Attested append-only memory: making adversaries stick to their word. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:189-204 [Conf]
  10. Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Chun, John Kubiatowicz
    Antiquity: exploiting a secure log for wide-area distributed storage. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:371-384 [Conf]

  11. Tiered Fault Tolerance for Long-Term Integrity. [Citation Graph (, )][DBLP]


  12. Minuet: Rethinking Concurrency Control in Storage Area Networks. [Citation Graph (, )][DBLP]


  13. Augmented Smartphone Applications Through Clone Cloud Execution. [Citation Graph (, )][DBLP]


  14. NetComplex: A Complexity Metric for Networked System Designs. [Citation Graph (, )][DBLP]


  15. Can software routers scale? [Citation Graph (, )][DBLP]


  16. RouteBricks: exploiting parallelism to scale software routers. [Citation Graph (, )][DBLP]


  17. Diverse Replication for Single-Machine Byzantine-Fault Tolerance. [Citation Graph (, )][DBLP]


  18. Macroscope: end-point approach to networked application dependency discovery. [Citation Graph (, )][DBLP]


  19. A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users [Citation Graph (, )][DBLP]


Search in 0.131secs, Finished in 0.132secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002