The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ben Y. Zhao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Kubiatowicz, David Bindel, Yan Chen, Steven E. Czerwinski, Patrick R. Eaton, Dennis Geels, Ramakrishna Gummadi, Sean C. Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, Ben Y. Zhao
    OceanStore: An Architecture for Global-Scale Persistent Storage. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:190-201 [Conf]
  2. Ping Wu, Caijie Zhang, Ying Feng, Ben Y. Zhao, Divyakant Agrawal, Amr El Abbadi
    Parallelizing Skyline Queries for Scalable Distribution. [Citation Graph (0, 0)][DBLP]
    EDBT, 2006, pp:112-130 [Conf]
  3. Sean C. Rhea, Patrick R. Eaton, Dennis Geels, Hakim Weatherspoon, Ben Y. Zhao, John Kubiatowicz
    Pond: The OceanStore Prototype. [Citation Graph (0, 0)][DBLP]
    FAST, 2003, pp:- [Conf]
  4. Qiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, Ben Y. Zhao
    Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:132-146 [Conf]
  5. Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz
    Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:246-257 [Conf]
  6. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
    Choosing an Accurate Network Model using Domain Analysis. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:100-104 [Conf]
  7. Byung-Gon Chun, Ben Y. Zhao, John Kubiatowicz
    Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:264-274 [Conf]
  8. Frank Dabek, Ben Y. Zhao, Peter Druschel, John Kubiatowicz, Ion Stoica
    Towards a Common API for Structured Peer-to-Peer Overlays. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2003, pp:33-44 [Conf]
  9. Ruixiong Tian, Yongqiang Xiong, Qian Zhang, Bo Li, Ben Y. Zhao, Xing Li
    Hybrid Overlay Structure Based on Random Walks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:152-162 [Conf]
  10. Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz
    Brocade: Landmark Routing on Overlay Networks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:34-44 [Conf]
  11. Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz
    Rapid Mobility via Type Indirection. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:64-74 [Conf]
  12. Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth
    Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:82-90 [Conf]
  13. Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz
    Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    Middleware, 2003, pp:1-20 [Conf]
  14. Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, Randy H. Katz
    An Architecture for a Secure Service Discovery Service. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1999, pp:24-35 [Conf]
  15. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig
    A Markov-based channel model algorithm for wireless networks. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2001, pp:28-36 [Conf]
  16. Shelley Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John Kubiatowicz
    Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2001, pp:11-20 [Conf]
  17. Kirsten Hildrum, John Kubiatowicz, Satish Rao, Ben Y. Zhao
    Distributed object location in a dynamic network. [Citation Graph (0, 0)][DBLP]
    SPAA, 2002, pp:41-52 [Conf]
  18. Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin Zheng
    Understanding user behavior in large-scale video-on-demand systems. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2006, pp:333-344 [Conf]
  19. Ben Y. Zhao, John Kubiatowicz, Anthony D. Joseph
    Tapestry: a fault-tolerant wide-area application infrastructure. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:81- [Journal]
  20. Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, S. Ross, Ben Y. Zhao
    The Ninja architecture for robust Internet-scale systems and services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:4, pp:473-497 [Journal]
  21. Sean C. Rhea, Chris Wells, Patrick R. Eaton, Dennis Geels, Ben Y. Zhao, Hakim Weatherspoon, John Kubiatowicz
    Maintenance-Free Global Data Storage. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2001, v:5, n:5, pp:40-49 [Journal]
  22. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
    Determining model accuracy of network traces. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:7, pp:1156-1171 [Journal]
  23. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig
    A Markov-Based Channel Model Algorithm for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2003, v:9, n:3, pp:189-199 [Journal]
  24. Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz
    An Architecture for Secure Wide-Area Service Discovery. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:2-3, pp:213-230 [Journal]
  25. Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yafei Dai, Xiaoming Li
    An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:56- [Conf]
  26. Matthew S. Allen, Ben Y. Zhao, Richard Wolski
    Deploying Video-on-Demand Services on Cable Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:63- [Conf]
  27. Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Ben Y. Zhao
    Towards Location-aware Topology in both Unstructured and Structured P2P Systems. [Citation Graph (0, 0)][DBLP]
    ICPP, 2007, pp:30- [Conf]
  28. Li Zhuang, Feng Zhou, Ben Y. Zhao, Antony I. T. Rowstron
    Cashmere: Resilient Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]

  29. Integrated Data Location in Multihop Wireless Networks. [Citation Graph (, )][DBLP]


  30. Multi-channel Jamming Attacks using Cognitive Radios. [Citation Graph (, )][DBLP]


  31. Searching for Rare Objects Using Index Replication. [Citation Graph (, )][DBLP]


  32. Rome: Performance and Anonymity using Route Meshes. [Citation Graph (, )][DBLP]


  33. Supporting Demanding Wireless Applications with Frequency-agile Radios. [Citation Graph (, )][DBLP]


  34. Brief announcement: revisiting the power-law degree distribution for social graph analysis. [Citation Graph (, )][DBLP]


  35. Towards Reliable Reputations for Dynamic Networked Systems. [Citation Graph (, )][DBLP]


  36. Probabilistic Failure Detection for Efficient Distributed Storage Maintenance. [Citation Graph (, )][DBLP]


  37. Measurement-calibrated graph models for social network experiments. [Citation Graph (, )][DBLP]


  38. User interactions in social networks and their implications. [Citation Graph (, )][DBLP]


  39. StarClique: guaranteeing user privacy in social networks against intersection attacks. [Citation Graph (, )][DBLP]


  40. Special Issue: Recent Advances in Peer-to-Peer Systems and Security. [Citation Graph (, )][DBLP]


  41. Exploring the feasibility of proactive reputations. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002