2010 | ||
---|---|---|
35 | Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun: A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users CoRR abs/1002.0298: (2010) | |
2009 | ||
34 | Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz: Tiered Fault Tolerance for Long-Term Integrity. FAST 2009: 267-282 | |
33 | Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica: Declarative networking. Commun. ACM 52(11): 87-95 (2009) | |
2008 | ||
32 | Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, Timothy Roscoe: BFT Protocols Under Fire. NSDI 2008: 189-204 | |
31 | Byung-Gon Chun, Petros Maniatis, Scott Shenker: Diverse Replication for Single-Machine Byzantine-Fault Tolerance. USENIX Annual Technical Conference 2008: 287-292 | |
30 | Tyson Condie, David Chu, Joseph M. Hellerstein, Petros Maniatis: Evita raced: metacompilation for declarative networks. PVLDB 1(1): 1153-1165 (2008) | |
2007 | ||
29 | Joseph M. Hellerstein, Tyson Condie, Minos N. Garofalakis, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Nina Taft: Public Health for the Internet (PHI). CIDR 2007: 332-340 | |
28 | Minos N. Garofalakis, Joseph M. Hellerstein, Petros Maniatis: Proof Sketches: Verifiable In-Network Aggregation. ICDE 2007: 996-1005 | |
27 | Katerina J. Argyraki, Petros Maniatis, O. Irzak, S. Ashish, Scott Shenker: Loss and Delay Accountability for the Internet. ICNP 2007: 194-205 | |
26 | Dennis Geels, Gautam Altekar, Petros Maniatis, Timothy Roscoe, Ion Stoica: Friday: Global Comprehension for Distributed Replay. NSDI 2007 | |
25 | Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz: Attested append-only memory: making adversaries stick to their word. SOSP 2007: 189-204 | |
2006 | ||
24 | Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale: A fresh look at the reliability of long-term digital storage. EuroSys 2006: 221-234 | |
23 | Atul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel: Using queries for distributed monitoring and forensics. EuroSys 2006: 389-402 | |
22 | Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis: Induced Churn as Shelter from Routing-Table Poisoning. NDSS 2006 | |
21 | Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica: Declarative networking: language, execution and optimization. SIGMOD Conference 2006: 97-108 | |
2005 | ||
20 | Ryan Huebsch, Brent N. Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica, Aydan R. Yumerefendi: The Architecture of PIER: an Internet-Scale Query Processor. CIDR 2005: 28-43 | |
19 | Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica: Implementing declarative overlays. SOSP 2005: 75-90 | |
18 | Thomas J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos: Attrition Defenses for a Peer-to-Peer Digital Preservation System. USENIX Annual Technical Conference, General Track 2005: 163-178 | |
17 | Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker: The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23(1): 2-50 (2005) | |
16 | Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale: A Fresh Look at the Reliability of Long-term Digital Storage CoRR abs/cs/0508130: (2005) | |
2004 | ||
15 | Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker: Impeding attrition attacks in P2P systems. ACM SIGOPS European Workshop 2004: 12 | |
14 | Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul: 2 P2P or Not 2 P2P? IPTPS 2004: 33-43 | |
13 | David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, Mary Baker: Notes On The Design Of An Internet Adversary CoRR cs.DL/0411078: (2004) | |
2003 | ||
12 | Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, Thomas J. Giuli, Yanto Muliadi: Preserving peer replicas by rate-limited sampled voting. SOSP 2003: 44-59 | |
11 | Petros Maniatis, Mary Baker: A Historic Name-Trail Service. WMCSA 2003: 88-99 | |
10 | Petros Maniatis, Mary Baker: Authenticated Append-only Skip Lists CoRR cs.CR/0302010: (2003) | |
9 | Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi: Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS CoRR cs.DC/0303026: (2003) | |
8 | Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, Thomas J. Giuli, Petros Maniatis, Jeffrey C. Mogul: 2 P2P or Not 2 P2P? CoRR cs.NI/0311017: (2003) | |
2002 | ||
7 | Petros Maniatis, Mary Baker: Enabling the Archival Storage of Signed Documents. FAST 2002: 31-45 | |
6 | Tyron Stading, Petros Maniatis, Mary Baker: Peer-to-Peer Caching Schemes to Address Flash Crowds. IPTPS 2002: 203-213 | |
5 | Petros Maniatis, Mary Baker: Secure History Preservation Through Timeline Entanglement. USENIX Security Symposium 2002: 297-312 | |
4 | Petros Maniatis, Mary Baker: Secure History Preservation Through Timeline Entanglement CoRR cs.DC/0202005: (2002) | |
3 | Petros Maniatis, Mary Baker: A Historic Name-Trail Service CoRR cs.NI/0210019: (2002) | |
2001 | ||
2 | Petros Maniatis, Thomas J. Giuli, Mary Baker: Enabling the Long-Term Archival of Signed Documents through Time Stamping CoRR cs.DC/0106058: (2001) | |
1999 | ||
1 | Mema Roussopoulos, Petros Maniatis, Edward Swierk, Kevin Lai, Guido Appenzeller, Mary Baker: Person-level Routing in the Mobile People Architecture. USENIX Symposium on Internet Technologies and Systems 1999 |