Biblio

Export 216 results:
[ Aŭtoro(Desc)] Titolo Tipo Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Dean J. Designs, lessons and advice from building large distributed systems. Keynote from LADIS. 2009 .
DeCandia G, Hastorun D, Jampani M, Kakulapati G, Lakshman A, Pilchin A, Sivasubramanian S, Vosshall P, Vogels W. Dynamo: amazon's highly available key-value store. In: ACM Symposium on Operating Systems Principles: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles. ACM Symposium on Operating Systems Principles: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles. ; 2007.
do DeFigueiredo DB, Barr ET. TrustDavis: A Non-Exploitable Online Reputation System. In: Proceedings of the Seventh IEEE International Conference on E-Commerce Technology. Proceedings of the Seventh IEEE International Conference on E-Commerce Technology. Washington, DC, USA: IEEE Computer Society; 2005. pp. 274–283. Available from: http://portal.acm.org/citation.cfm?id=1097108.1097189
Delaviz R, Andrade N, Pouwelse JA. Improving Accuracy and Coverage in an Internet-Deployed Reputation Mechanism. In: Peer-to-Peer Computing. Peer-to-Peer Computing. ; 2010. pp. 1-9. Improving Accuracy and Coverage in an Internet Deployed Reputation Mechanism.pdf (267.8 KB)
Dhungel P, Steiner M, Rimac I, Hilt V, Ross KW. Waiting for Anonymity: Understanding Delays in the Tor Overlay. In: Peer-to-Peer Computing. Peer-to-Peer Computing. ; 2010. pp. 1-4. TorIEEEp2p.pdf (335.45 KB)
Dingledine R, Mathewson N, Syverson P. Tor: The Second-Generation Onion Router. In: In Proceedings of the 13th USENIX Security Symposium. In Proceedings of the 13th USENIX Security Symposium. ; 2004. pp. 303–320.
Dingledine R, Mathewson N, Syverson P. Reputation in P2P Anonymity Systems. In: In Workshop on Economics of Peer-to-Peer Systems. In Workshop on Economics of Peer-to-Peer Systems. ; 2003. reputation-econp2p03.pdf (102.4 KB)
Dingledine R, Freedman MJ, Molnar D. The Free Haven Project: Distributed Anonymous Storage Service. In: In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. ; 2000. pp. 67–95.
Dostoyevsky F. The Brothers Karamazov. [Internet]. 2010 . Available from: http://librivox.org/the-brothers-karamazov-by-fyodor-dostoyevsky/
Douceur JR. The Sybil Attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems. Revised Papers from the First International Workshop on Peer-to-Peer Systems. London, UK: Springer-Verlag; 2002. pp. 251–260. Available from: http://dl.acm.org/citation.cfm?id=646334.687813 sybilattack.pdf (97.75 KB)
Druschel P, Rowstron A. PAST: A large-scale, persistent peer-to-peer storage utility. In: In HotOS VIII. In HotOS VIII. ; 2001. pp. 75–80.
F
Fackler A, Manista N. Stop Mocking, Start Testing. PyCon US 2012 [Internet]. 2012 . Available from: http://www.youtube.com/watch?feature=player_embedded&v=Xu5EhKVZdV8
Felber P, Rajman M, Riviere E, Schiavoni V, Valerio J. SPADS: Publisher Anonymization for DHT Storage. In: Peer-to-Peer Computing. Peer-to-Peer Computing. ; 2010. pp. 1-10.
Foord M. Mock and Django. Canonical Knowledge Sharing [Internet]. 2012 . Available from: http://www.youtube.com/watch?v=yFA-FFaEZPo
Foord M. Why use Mock?. Canonical Knowledge Sharing [Internet]. 2012 . Available from: http://www.youtube.com/watch?v=ADIcwu2GeEU
Foord M. A Gentle Introduction to Mock for Python. Canonical Knowledge Sharing. 2012 .
Fowler M. Mocks Aren't Stubs. [Internet]. 2007 ;2013. Available from: http://martinfowler.com/articles/mocksArentStubs.html
Friedman EJ, Resnick P. The Social Cost of Cheap Pseudonyms. Journal of Economics and Management Strategy. 2000 ;10:173–199. cheappseudonyms.pdf (228.74 KB)
Fujimoto RM. Parallel and distributed simulation. In: Simulation Conference Proceedings, 1999 Winter. Simulation Conference Proceedings, 1999 Winter. IEEE; 1999.
G
Ghosh A, Mahdian M, Reeves DM, Pennock DM, Fugger R. Mechanism Design on Trust Networks. 2007 .
Gkantsidis C, Rodriguez P. Network Coding for Large Scale Content Distribution. In: ; 2005. networkcoding.pdf (413.28 KB)
Goldberg AV, Yianilos PN. Towards an Archival Intermemory. In: Proceedings of the Advances in Digital Libraries Conference. Proceedings of the Advances in Digital Libraries Conference. Washington, DC, USA: IEEE Computer Society; 1998. p. 147–. Available from: http://portal.acm.org/citation.cfm?id=582987.785953
Goldschlag D, Reed M, Syverson P. Onion routing. Commun. ACM [Internet]. 1999 ;42:39–41. Available from: http://doi.acm.org/10.1145/293411.293443 onionrouting.pdf (238.3 KB)
Golle P, Leyton-Brown K, Mironov I, Lillibridge M. Incentives for Sharing in Peer-to-Peer Networks. In: Proceedings of the Second International Workshop on Electronic Commerce. Proceedings of the Second International Workshop on Electronic Commerce. London, UK: Springer-Verlag; 2001. pp. 75–87. Available from: http://portal.acm.org/citation.cfm?id=647064.714876
Gray J. Why do computers stop and what can be done about it. In: Symposium on reliability in distributed software and database systems. Symposium on reliability in distributed software and database systems. Los Angeles, CA, USA; 1986.

Paĝoj