ผลต่างระหว่างรุ่นของ "Research reading list"
ไปยังการนำทาง
ไปยังการค้นหา
(→ณัฐ) |
(→ณัฐ) |
||
แถว 11: | แถว 11: | ||
* Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. ''SybilGuard: defending against sybil attacks via social networks''. SIGCOMM'06 ([http://portal.acm.org/citation.cfm?id=1151659.1159945 link]) | * Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. ''SybilGuard: defending against sybil attacks via social networks''. SIGCOMM'06 ([http://portal.acm.org/citation.cfm?id=1151659.1159945 link]) | ||
+ | |||
+ | * Dinger, J. Hartenstein, H. ''Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration''. Availability, Reliability and Security, 2006. ([http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=34117&arnumber=1625383&count=143&index=102 link]) | ||
* Alice Cheng and Eric Friedman. ''Sybilproof reputation mechanisms''. SIGCOMM 2005 workshop on Economics of peer-to-peer systems. ([http://portal.acm.org/citation.cfm?id=1080202 link]) | * Alice Cheng and Eric Friedman. ''Sybilproof reputation mechanisms''. SIGCOMM 2005 workshop on Economics of peer-to-peer systems. ([http://portal.acm.org/citation.cfm?id=1080202 link]) |
รุ่นแก้ไขเมื่อ 08:28, 7 มีนาคม 2550
รายชื่อบทความวิจัยสำหรับสมาชิกแต่ละคน (เรียงตามตัวอักษร)
จุ่ง
Distance labelings
- Cyril Gavoille, Michal Katz, Nir A. Katz, Christophe Paul, David Peleg. Approximate Distance Labeling Schemes. ESA'01. (link)
- Gavoille and Paul. Distance labeling scheme and split decomposition (link)
ณัฐ
papers:
- John R. Douceur. The Sybil Attack. (link)
- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. SybilGuard: defending against sybil attacks via social networks. SIGCOMM'06 (link)
- Dinger, J. Hartenstein, H. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration. Availability, Reliability and Security, 2006. (link)
- Alice Cheng and Eric Friedman. Sybilproof reputation mechanisms. SIGCOMM 2005 workshop on Economics of peer-to-peer systems. (link)
- Newsome, James, Elaine Shi, Dawn Song, and Adrian Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In the Third International Symposium on Information Processing in Sensor Networks (IPSN), April, 2004. (link)
ทอป
Papers
- Ozery-Flato and Shamir, An O(n^3/2\sqrt{log(n)}) Algorithm for Sorting by Reciprocal Translocations. CPM'06. (link)
- Eric Tannier and Marie-France Sagot, Sorting by Reversals in Subquadratic Time. CPM'06. (link)
บัณฑิต
- ดูที่ ผู้ใช้:Bundit
เป้
Conferences:
Resources:
- Learning Reductions by John Langford