• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

The Architecture of PIER: an Internet-Scale Query Processor (2005)

Cached

  • Download as a PDF

Download Links

  • [www.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [berkeley.intel-research.net]
  • [www.cidrdb.org]
  • [http.cs.berkeley.edu]
  • [netdb.cis.upenn.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.umd.edu]
  • [people.inf.ethz.ch]
  • [db.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.huebsch.org]
  • [www.cis.upenn.edu]
  • [now.cs.berkeley.edu]
  • [db.cs.berkeley.edu]
  • [www.eecs.harvard.edu]
  • [www.theether.org]
  • [www.seas.upenn.edu]
  • [www.inf.ethz.ch]
  • [www-db.cs.wisc.edu]
  • [www.eecs.harvard.edu]
  • [berkeley.intel-research.net]
  • [berkeley.intel-research.net]
  • [berkeley.intel-research.net]
  • [project-iris.net]
  • [iris.csail.mit.edu]
  • [iris.csail.mit.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Ryan Huebsch , Brent Chun , Joseph M. Hellerstein , Boon Thau Loo , Petros Maniatis , Timothy Roscoe , Scott Shenker , Ion Stoica , Aydan R. Yumerefendi
Venue:In CIDR
Citations:88 - 8 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

Citations

4466 Chord: A scalable peer-to-peer lookup service for internet applications - Stoica, Morris, et al. - 2001
3369 A scalable content-addressable network - Ratnasamy, Francis, et al. - 2001
1512 The sybil attack - Douceur - 2002
1165 The Click modular router - Kohler, Morris, et al. - 2000
1148 B.: Oceanstore: An architecture for global-scale persistent storage - Kubiatowicz, Bindel, et al.
998 Wide-area cooperative storage with cfs - DABEK, KAASHOEK, et al. - 2001
725 Domain names - implementation and specification", - Mockapetris - 1987
658 Scribe: A large-scale and decentralized application-level multicast infrastructure - Castro, Druschel, et al. - 2002
593 A blueprint for introducing disruptive technology into the Internet," - Peterson, Culler, et al. - 2002
551 The design philosophy of the DARPA internet protocols - Clark - 1988
522 Seda: An architecture for well-conditioned, scalable internet services. - Welsh, Culler, et al. - 2001
473 Secure routing for structured peer-to-peer overlay networks. - Castro, Drushel, et al. - 2002
449 Handling churn in a dht - Rhea, Geels, et al. - 2004
411 Eddies: Continuously adaptive query processing - Avnur, Hellerstein - 2000
401 Aurora: A new model and architecture for data stream management,” - Abadi, Carney, et al. - 2003
377 Protocols for public key cryptosystems - Merkle - 1980
372 Application-Level Multicast Using Content-Addressable Networks, - Ratnasamy, Handley, et al. - 2001
340 Querying the internet with PIER. - Huebsch, Hellerstein, et al. - 2003
299 Approximate aggregation techniques for sensor databases - Considine, Li, et al. - 2004
274 Synopsis diffusion for robust aggregation in sensor networks - Nath, Gibbons, et al. - 2004
272 The Gamma database machine project - Dewitt, Ghandeharizadeh, et al. - 1990
256 Robust Incentive Techniques for Peer-to-Peer Networks. - FELDMAN, LAI, et al. - 2004
253 SIA: secure information aggregation in sensor networks - Przydatek, Song, et al.
226 An adaptive query execution system for data integration - Ives, Florescu, et al. - 1999
216 Koorde: A simple degreeoptimal distributed hash table. - Kaashoek, Karger - 2003
210 Encapsulation of parallelism in the Volcano query processing system. - Graefe - 1990
210 Dataflow query execution in a parallel main-memory environment. - Wilschut, Apers - 1993
204 IrisNet: An architecture for a worldwide sensor web - GIBBONS, KARP, et al.
202 Schema mediation in peer data management systems - Halevy, Ives, et al. - 2003
198 Complex queries in DHT-based peer-to-peer networks. Peer-to-Peer Systems, - Harren, Hellerstein, et al. - 2002
198 Mariposa: a wide-area distributed database system. - Stonebraker, Aoki, et al. - 1996
190 A scalable distributed information management system - Yalagandula, Dahlin - 2004
173 Lessons from giant-scale services - Brewer
169 Capriccio: Scalable Threads for Internet Services. - Behren, Condit, et al. - 2003
160 Éva Tardos. Maximizing the spread of influence through a social network - Kempe, Kleinberg - 2003
127 Global Intrusion Detection in the DOMINO Overlay System,” - Yegneswaran, Barford, et al. - 2004
117 What can databases do for peer-to-peer - Gribble, Halevy, et al. - 2001
110 R* optimizer validation and performance evaluation for distributed queries. - Mackert, Lohman - 1986
101 A survey of peer-to-peer security issues. - Wallach - 2002
97 Sophia: An information plane for networked systems - Wawrzoniak, Peterson, et al. - 2004
91 A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: - Goodrich, Tamassia, et al. - 2001
91 The Case for a Hybrid P2P Search Infrastructure, - Loo, Huebsch, et al. - 2004
80 Enhancing P2P File-Sharing with an Internet-Scale Query Processor. In: - Loo, Huebsch, et al. - 2004
75 Querying Peer-to-Peer Networks Using PTrees. In: - Crainiceanu, Linga, et al. - 2004
73 Secure history preservation through timeline entanglement - Maniatis, Baker
71 Mercury: A scalable publish-subscribe system for internet games,” in - Bharambe, Rao, et al. - 2002
71 Tuple Routing Strategies for Distributed Eddies. - Tian, DeWitt - 2003
64 Using State Modules for Adaptive Query Processing. - Raman, Deshpande, et al. - 2003
61 Adaptive parallel aggregation algorithms - Shatdal, Naughton - 1995
55 Lifting the burden of history from adaptive query processing, in: VLDB, - Deshpande, Hellerstein - 2004
52 Scalable Management and Data Mining Using Astrolabe - Rennesse, Birman, et al. - 2002
38 Query-flood dos attacks in gnutella - Daswani, Garcia-Molina - 2002
37 H.: Improving search in peer-to-peer systems - Yang, Garcia-Molina
34 Eliminating Counterevidence with Applications to Accountable CertificateManagement. J. Computer Security, 2002. (Originally in CCS 2000.) [5 - Buldas, Laud, et al.
30 Zaihrayeu I. Data management for peer-to-peer computing: A vision - Bernstein, Giunchiglia, et al. - 2002
29 Range queries over dhts - Ratnasamy, Hellerstein, et al. - 2003
24 Toward network data independence - HELLERSTEIN
17 Rothnie Jr.: Query Processing in a System for Distributed Databases (SDD-1 - Bernstein, Goodman, et al. - 1981
17 Impeding attrition attacks in P2P systems. - Maniatis, Giuli, et al.
16 Java Support for Data-Intensive Systems: Experiences Building the Telegraph Dataflow System - Shah, Madden, et al. - 2001
9 Customizable Routing with Declarative Queries - Loo, Hellerstein, et al. - 2004
8 Trust but verify: Accountability for Internet services - Yumerefendi, Chase - 2004
7 Rajeev Motwani. The price of validity in dynamic networks - Bawa, Gionis, et al. - 2004
6 El Abbadi A.: “Approximate Range Selection Queries - Gupta, Agrawal - 2003
6 Evolution and revolutions in LDAP directory caches - Kapitskaia, Ng, et al.
6 Beng Chin Ooi Kian-Lee Tan Aoying Zhou, PeerDB: A P2P-based System for Distributed Data Sharing - Siong, Ng
5 Ronitt Rubinfeld, and Mahesh Viswanathan. Spot-checkers - Ergun, Kannan, et al. - 1998
4 S.: FREddies: DHT-based adaptive query processing via FedeRated Eddies - Huebsch, Jeffery - 2004
4 Continuously Adaptive Continuous Queries - Madden
1 on PlanetLab: Initial Experience and Open Problems - PIER - 2003
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University