The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Petros Maniatis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joseph M. Hellerstein, Tyson Condie, Minos N. Garofalakis, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Nina Taft
    Public Health for the Internet (PHI). [Citation Graph (0, 0)][DBLP]
    CIDR, 2007, pp:332-340 [Conf]
  2. Ryan Huebsch, Brent N. Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica, Aydan R. Yumerefendi
    The Architecture of PIER: an Internet-Scale Query Processor. [Citation Graph (0, 0)][DBLP]
    CIDR, 2005, pp:28-43 [Conf]
  3. Petros Maniatis, Mary Baker
    Enabling the Archival Storage of Signed Documents. [Citation Graph (0, 0)][DBLP]
    FAST, 2002, pp:31-45 [Conf]
  4. Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul
    2 P2P or Not 2 P2P? [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:33-43 [Conf]
  5. Tyron Stading, Petros Maniatis, Mary Baker
    Peer-to-Peer Caching Schemes to Address Flash Crowds. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:203-213 [Conf]
  6. Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis
    Induced Churn as Shelter from Routing-Table Poisoning. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  7. Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica
    Declarative networking: language, execution and optimization. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2006, pp:97-108 [Conf]
  8. Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica
    Implementing declarative overlays. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:75-90 [Conf]
  9. Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, Thomas J. Giuli, Yanto Muliadi
    Preserving peer replicas by rate-limited sampled voting. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:44-59 [Conf]
  10. Thomas J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos
    Attrition Defenses for a Peer-to-Peer Digital Preservation System. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:163-178 [Conf]
  11. Mema Roussopoulos, Petros Maniatis, Edward Swierk, Kevin Lai, Guido Appenzeller, Mary Baker
    Person-level Routing in the Mobile People Architecture. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  12. Petros Maniatis, Mary Baker
    Secure History Preservation Through Timeline Entanglement. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:297-312 [Conf]
  13. Petros Maniatis, Mary Baker
    A Historic Name-Trail Service. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2003, pp:88-99 [Conf]
  14. Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale
    A fresh look at the reliability of long-term digital storage. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2006, pp:221-234 [Conf]
  15. Atul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel
    Using queries for distributed monitoring and forensics. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2006, pp:389-402 [Conf]
  16. Petros Maniatis, Mary Baker
    Authenticated Append-only Skip Lists [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  17. Petros Maniatis, Thomas J. Giuli, Mary Baker
    Enabling the Long-Term Archival of Signed Documents through Time Stamping [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  18. Petros Maniatis, Mary Baker
    Secure History Preservation Through Timeline Entanglement [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  19. Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi
    Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  20. David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, Mary Baker
    Notes On The Design Of An Internet Adversary [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  21. Petros Maniatis, Mary Baker
    A Historic Name-Trail Service [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  22. Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul
    2 P2P or Not 2 P2P? [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  23. Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker
    The LOCKSS peer-to-peer digital preservation system. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2005, v:23, n:1, pp:2-50 [Journal]
  24. Minos N. Garofalakis, Joseph M. Hellerstein, Petros Maniatis
    Proof Sketches: Verifiable In-Network Aggregation. [Citation Graph (0, 0)][DBLP]
    ICDE, 2007, pp:996-1005 [Conf]
  25. Dennis Geels, Gautam Altekar, Petros Maniatis, Timothy Roscoe, Ion Stoica
    Friday: Global Comprehension for Distributed Replay. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]
  26. Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz
    Attested append-only memory: making adversaries stick to their word. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:189-204 [Conf]

  27. Tiered Fault Tolerance for Long-Term Integrity. [Citation Graph (, )][DBLP]


  28. The Many Faces of Systems Research - and How to Evaluate Them. [Citation Graph (, )][DBLP]


  29. Augmented Smartphone Applications Through Clone Cloud Execution. [Citation Graph (, )][DBLP]


  30. Loss and Delay Accountability for the Internet. [Citation Graph (, )][DBLP]


  31. BFT Protocols Under Fire. [Citation Graph (, )][DBLP]


  32. Zeno: Eventually Consistent Byzantine-Fault Tolerance. [Citation Graph (, )][DBLP]


  33. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. [Citation Graph (, )][DBLP]


  34. Impeding attrition attacks in P2P systems. [Citation Graph (, )][DBLP]


  35. Diverse Replication for Single-Machine Byzantine-Fault Tolerance. [Citation Graph (, )][DBLP]


  36. Declarative networking. [Citation Graph (, )][DBLP]


  37. A Fresh Look at the Reliability of Long-term Digital Storage [Citation Graph (, )][DBLP]


  38. A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users [Citation Graph (, )][DBLP]


  39. Verifiable Network-Performance Measurements [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002