The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lidong Zhou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Atul Adya, Paramvir Bahl, Jitendra Padhye, Alec Wolman, Lidong Zhou
    A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2004, pp:344-354 [Conf]
  2. Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz
    Distributed Blinding for Distributed ElGamal Re-Encryption. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:815-824 [Conf]
  3. Lidong Zhou, Robbert van Renesse
    P6P: A Peer-to-Peer Approach to Internet Infrastructure. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:75-86 [Conf]
  4. Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien
    A First Look at Peer-to-Peer Worms: Threats and Defenses. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:24-35 [Conf]
  5. John MacCormick, Nick Murphy, Marc Najork, Chandramohan A. Thekkath, Lidong Zhou
    Boxwood: Abstractions as the Foundation for Storage Infrastructure. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:105-120 [Conf]
  6. Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou
    Troubleshooting multihop wireless networks. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:380-381 [Conf]
  7. Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham
    Vigilante: end-to-end containment of internet worms. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:133-147 [Conf]
  8. Lidong Zhou, Robbert van Renesse, Michael A. Marsh
    Implementing IPv6 as a Peer-to-Peer Overlay Network. [Citation Graph (0, 0)][DBLP]
    SRDS, 2002, pp:347-0 [Conf]
  9. Dahlia Malkhi, Florian Oprea, Lidong Zhou
    Omega Meets Paxos: Leader Election and Stability Without Eventual Timely Links. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:199-213 [Conf]
  10. Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou
    Troubleshooting wireless mesh networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2006, v:36, n:5, pp:17-28 [Journal]
  11. Fred B. Schneider, Lidong Zhou
    Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:34-43 [Journal]
  12. Lidong Zhou, Fred B. Schneider, Robbert van Renesse
    APSS: proactive secret sharing in asynchronous systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:3, pp:259-286 [Journal]
  13. Lidong Zhou, Fred B. Schneider, Robbert van Renesse
    COCA: A secure distributed online certification authority. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2002, v:20, n:4, pp:329-368 [Journal]
  14. Lidong Zhou, Vijayan Prabhakaran, Venugopalan Ramasubramanian, Roy Levin, Chandramohan A. Thekkath
    Graceful degradation via versions: specifications and implementations. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:264-273 [Conf]
  15. Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Zhang, Marcus Peinado
    Bouncer: securing software by blocking bad input. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:117-130 [Conf]
  16. Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou
    Brief Announcement: Chasing the Weakest System Model for Implementing Omega and Consensus. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:576-577 [Conf]

  17. Wave Computing in the Cloud. [Citation Graph (, )][DBLP]


  18. MODIST: Transparent Model Checking of Unmodified Distributed Systems. [Citation Graph (, )][DBLP]


  19. Transactional Flash. [Citation Graph (, )][DBLP]


  20. Peer-to-Peer Rating. [Citation Graph (, )][DBLP]


  21. Vertical paxos and primary-backup replication. [Citation Graph (, )][DBLP]


  22. Comet: batched stream processing for data intensive distributed computing. [Citation Graph (, )][DBLP]


  23. Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002