|
Search the dblp DataBase
Lidong Zhou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Atul Adya, Paramvir Bahl, Jitendra Padhye, Alec Wolman, Lidong Zhou
A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. [Citation Graph (0, 0)][DBLP] BROADNETS, 2004, pp:344-354 [Conf]
- Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz
Distributed Blinding for Distributed ElGamal Re-Encryption. [Citation Graph (0, 0)][DBLP] ICDCS, 2005, pp:815-824 [Conf]
- Lidong Zhou, Robbert van Renesse
P6P: A Peer-to-Peer Approach to Internet Infrastructure. [Citation Graph (0, 0)][DBLP] IPTPS, 2004, pp:75-86 [Conf]
- Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien
A First Look at Peer-to-Peer Worms: Threats and Defenses. [Citation Graph (0, 0)][DBLP] IPTPS, 2005, pp:24-35 [Conf]
- John MacCormick, Nick Murphy, Marc Najork, Chandramohan A. Thekkath, Lidong Zhou
Boxwood: Abstractions as the Foundation for Storage Infrastructure. [Citation Graph (0, 0)][DBLP] OSDI, 2004, pp:105-120 [Conf]
- Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou
Troubleshooting multihop wireless networks. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2005, pp:380-381 [Conf]
- Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham
Vigilante: end-to-end containment of internet worms. [Citation Graph (0, 0)][DBLP] SOSP, 2005, pp:133-147 [Conf]
- Lidong Zhou, Robbert van Renesse, Michael A. Marsh
Implementing IPv6 as a Peer-to-Peer Overlay Network. [Citation Graph (0, 0)][DBLP] SRDS, 2002, pp:347-0 [Conf]
- Dahlia Malkhi, Florian Oprea, Lidong Zhou
Omega Meets Paxos: Leader Election and Stability Without Eventual Timely Links. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:199-213 [Conf]
- Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou
Troubleshooting wireless mesh networks. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2006, v:36, n:5, pp:17-28 [Journal]
- Fred B. Schneider, Lidong Zhou
Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:5, pp:34-43 [Journal]
- Lidong Zhou, Fred B. Schneider, Robbert van Renesse
APSS: proactive secret sharing in asynchronous systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:3, pp:259-286 [Journal]
- Lidong Zhou, Fred B. Schneider, Robbert van Renesse
COCA: A secure distributed online certification authority. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2002, v:20, n:4, pp:329-368 [Journal]
- Lidong Zhou, Vijayan Prabhakaran, Venugopalan Ramasubramanian, Roy Levin, Chandramohan A. Thekkath
Graceful degradation via versions: specifications and implementations. [Citation Graph (0, 0)][DBLP] PODC, 2007, pp:264-273 [Conf]
- Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Zhang, Marcus Peinado
Bouncer: securing software by blocking bad input. [Citation Graph (0, 0)][DBLP] SOSP, 2007, pp:117-130 [Conf]
- Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou
Brief Announcement: Chasing the Weakest System Model for Implementing Omega and Consensus. [Citation Graph (0, 0)][DBLP] SSS, 2006, pp:576-577 [Conf]
Wave Computing in the Cloud. [Citation Graph (, )][DBLP]
MODIST: Transparent Model Checking of Unmodified Distributed Systems. [Citation Graph (, )][DBLP]
Transactional Flash. [Citation Graph (, )][DBLP]
Peer-to-Peer Rating. [Citation Graph (, )][DBLP]
Vertical paxos and primary-backup replication. [Citation Graph (, )][DBLP]
Comet: batched stream processing for data intensive distributed computing. [Citation Graph (, )][DBLP]
Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|