default search action
22nd PODC 2003: Boston, Massachusetts, USA
- Elizabeth Borowsky, Sergio Rajsbaum:
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, PODC 2003, Boston, Massachusetts, USA, July 13-16, 2003. ACM 2003, ISBN 1-58113-708-7 - Ross J. Anderson:
Cryptography and competition policy: issues with 'trusted computing'. 3-10 - Nancy A. Lynch:
Working with mike on distributed computing theory, 1978--1992. 11 - Silvio Micali:
Simple and fast optimistic protocols for fair electronic exchange. 12-19 - Rebecca N. Wright:
Fischer's cryptographic protocols. 20-22 - Fabian Kuhn, Roger Wattenhofer:
Constant-time distributed dominating set approximation. 25-32 - Yossi Azar, Shay Kutten, Boaz Patt-Shamir:
Distributed error confinement. 33-42 - Marta Arias, Lenore Cowen, Kofi A. Laing:
Compact roundtrip routing with topology-independent node names. 43-52 - J. J. Garcia-Luna-Aceves, Marc Mosko, Charles E. Perkins:
A new approach to on-demand loop-free routing in ad hoc networks. 53-62 - Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger:
Geometric ad-hoc routing: of theory and practice. 63-72 - Dariusz R. Kowalski, Andrzej Pelc:
Broadcasting in undirected ad hoc radio networks. 73-82 - Srikant Kuppa, Mansi Ramakrishnan Thoppian, Srinivasan Krishnamurthy, Subbarayan Venkatesan:
Brief announcement: cluster-based control mechanism for communication networks. 83 - Danny Hendler, Nir Shavit:
Operation-valency and the cost of coordination. 84-91 - Maurice Herlihy, Victor Luchangco, Mark Moir, William N. Scherer III:
Software transactional memory for dynamic-sized data structures. 92-101 - Ori Shalev, Nir Shavit:
Split-ordered lists: lock-free extensible hash tables. 102-111 - Srikanta Tirthapura:
Brief announcement: concurrent counting is harder than queuing. 112 - André Schiper:
Brief announcement: dynamic group communication. 113 - Moni Naor, Udi Wieder:
Scalable and dynamic quorum systems. 114-122 - Baruch Awerbuch, Christian Scheideler:
Peer-to-peer systems for prefix search. 123-132 - Gurmeet Singh Manku:
Routing networks for distributed hash tables. 133-142 - Ittai Abraham, Danny Dolev:
Asynchronous resource discovery. 143-150 - Pierre Fraigniaud, Philippe Gauron:
Brief announcement: an overview of the content-addressable network D2B. 151 - Nicholas J. A. Harvey, J. Ian Munro:
Brief announcement: deterministic skipnet. 152 - Christian Cachin:
An asynchronous protocol for distributed computation of RSA inverses and its applications. 153-162 - Benoît Libert, Jean-Jacques Quisquater:
Efficient revocation and threshold pairing based cryptosystems. 163-171 - Jung-Min Park, Edwin K. P. Chong, Howard Jay Siegel:
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. 172-181 - Ninghui Li, Wenliang Du, Dan Boneh:
Oblivious signature-based envelope. 182-189 - Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable public-key tracing and revoking. 190-199 - Yehuda Lindell:
Brief announcement: impossibility results for concurrent secure two-party computation. 200 - Shin'ichiro Matsuo, Wakaha Ogata:
Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer. 201 - S. Amitanand, I. Sanketh, K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Distributed consensus in the presence of sectional faults. 202-210 - Matthias Fitzi, Juan A. Garay:
Efficient player-optimal protocols for strong and differential consensus. 211-220 - Maurice Herlihy, Lucia Draque Penso:
tight bounds for k-set agreement with limited-scope failure detectors. 221 - Fabrice Le Fessant, Philippe Raipin Parvédy, Michel Raynal:
Brief announcement: early decision despite general process omission failures. 222 - Michael Backes, Christian Cachin, Reto Strobl:
Proactive secure message transmission in asynchronous networks. 223-232 - Amos Beimel, Lior Malka:
Efficient reliable communication over partially authenticated networks. 233-242 - Justin Goshi, Richard E. Ladner:
Algorithms for dynamic multicast key distribution trees. 243-251 - K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Brief announcement: efficient perfectly secure communication over synchronous networks. 252 - Benjie Chen, Thomer M. Gil, Athicha Muthitacharoen, Robert Tappan Morris:
Brief announcement: building data structures on untrusted peer-to-peer storage with per-participant logs. 253 - Arnon Rosenthal, Edward Sciore:
Brief announcement: extending SQL access control to derived and distributed data. 254 - Grzegorz Malewicz:
A work-optimal deterministic algorithm for the asynchronous certified write-all problem. 255-264 - Dariusz R. Kowalski, Alexander A. Shvartsman:
Performing work with asynchronous processors: message-delay-sensitive bounds. 265-274 - Prasad Jayanti, Srdjan Petrovic, King Tan:
Fair group mutual exclusion. 275-284 - Prasad Jayanti, Srdjan Petrovic:
Efficient and practical constructions of LL/SC variables. 285-294 - Prasad Jayanti:
Adaptive and efficient abortable mutual exclusion. 295-304 - Yoah Bar-David, Gadi Taubenfeld:
Automatic discovery of mutual exclusion algorithms. 305 - Marcos Kawazoe Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, Sam Toueg:
On implementing omega with weak reliability and synchrony assumptions. 306-314 - Marcos Kawazoe Aguilera, Burkhard Englert, Eli Gafni:
On using network attached disks as shared memory. 315-324 - Panagiotis Manolios, Richard J. Trefler:
A lattice-theoretic characterization of safety and liveness. 325-333 - Panagiotis Manolios:
Brief announcement: branching time refinement. 334 - Rui Fan, Nancy A. Lynch:
Brief announcement: efficient replication of large data objects. 335 - Farnoush Banaei Kashani, Cyrus Shahabi:
Brief announcement: efficient flooding in power-law networks. 336 - Aditya Akella, Shuchi Chawla, Arvind Kannan, Srinivasan Seshan:
Scaling properties of the Internet graph. 337-346 - Alex Fabrikant, Ankur Luthra, Elitza N. Maneva, Christos H. Papadimitriou, Scott Shenker:
On a network creation game. 347-351 - Alexander Kesselman, Yishay Mansour:
Adaptive AIMD congestion control. 352-359 - Baruch Awerbuch, Yishay Mansour:
Adapting to a reliable network path. 360-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.