ผลต่างระหว่างรุ่นของ "Research reading list"

จาก Theory Wiki
ไปยังการนำทาง ไปยังการค้นหา
แถว 11: แถว 11:
  
 
* Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. ''SybilGuard: defending against sybil attacks via social networks''. SIGCOMM'06 ([http://portal.acm.org/citation.cfm?id=1151659.1159945 link])
 
* Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. ''SybilGuard: defending against sybil attacks via social networks''. SIGCOMM'06 ([http://portal.acm.org/citation.cfm?id=1151659.1159945 link])
 +
 +
* Dinger, J.  Hartenstein, H. ''Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration''.  Availability, Reliability and Security, 2006. ([http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=34117&arnumber=1625383&count=143&index=102 link])
  
 
* Alice Cheng and Eric Friedman. ''Sybilproof reputation mechanisms''. SIGCOMM 2005 workshop on Economics of peer-to-peer systems. ([http://portal.acm.org/citation.cfm?id=1080202 link])
 
* Alice Cheng and Eric Friedman. ''Sybilproof reputation mechanisms''. SIGCOMM 2005 workshop on Economics of peer-to-peer systems. ([http://portal.acm.org/citation.cfm?id=1080202 link])

รุ่นแก้ไขเมื่อ 08:28, 7 มีนาคม 2550

รายชื่อบทความวิจัยสำหรับสมาชิกแต่ละคน (เรียงตามตัวอักษร)

จุ่ง

Distance labelings

  • Cyril Gavoille, Michal Katz, Nir A. Katz, Christophe Paul, David Peleg. Approximate Distance Labeling Schemes. ESA'01. (link)
  • Gavoille and Paul. Distance labeling scheme and split decomposition (link)

ณัฐ

papers:

  • John R. Douceur. The Sybil Attack. (link)
  • Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. SybilGuard: defending against sybil attacks via social networks. SIGCOMM'06 (link)
  • Dinger, J. Hartenstein, H. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration. Availability, Reliability and Security, 2006. (link)
  • Alice Cheng and Eric Friedman. Sybilproof reputation mechanisms. SIGCOMM 2005 workshop on Economics of peer-to-peer systems. (link)
  • Newsome, James, Elaine Shi, Dawn Song, and Adrian Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In the Third International Symposium on Information Processing in Sensor Networks (IPSN), April, 2004. (link)

ทอป

Conferences: RECOMB, WABI,CPM

Papers

  • Ozery-Flato and Shamir, An O(n^3/2\sqrt{log(n)}) Algorithm for Sorting by Reciprocal Translocations. CPM'06. (link)
  • Eric Tannier and Marie-France Sagot, Sorting by Reversals in Subquadratic Time. CPM'06. (link)

บัณฑิต

ดูที่ ผู้ใช้:Bundit

เป้

Conferences:

Resources:

โย

อ๋อย