2009 |
33 | EE | Byung-Gon Chun,
Petros Maniatis,
Scott Shenker,
John Kubiatowicz:
Tiered Fault Tolerance for Long-Term Integrity.
FAST 2009: 267-282 |
2008 |
32 | EE | Atul Singh,
Tathagata Das,
Petros Maniatis,
Peter Druschel,
Timothy Roscoe:
BFT Protocols Under Fire.
NSDI 2008: 189-204 |
31 | EE | Byung-Gon Chun,
Petros Maniatis,
Scott Shenker:
Diverse Replication for Single-Machine Byzantine-Fault Tolerance.
USENIX Annual Technical Conference 2008: 287-292 |
30 | EE | Tyson Condie,
David Chu,
Joseph M. Hellerstein,
Petros Maniatis:
Evita raced: metacompilation for declarative networks.
PVLDB 1(1): 1153-1165 (2008) |
2007 |
29 | EE | Joseph M. Hellerstein,
Tyson Condie,
Minos N. Garofalakis,
Boon Thau Loo,
Petros Maniatis,
Timothy Roscoe,
Nina Taft:
Public Health for the Internet (PHI).
CIDR 2007: 332-340 |
28 | EE | Minos N. Garofalakis,
Joseph M. Hellerstein,
Petros Maniatis:
Proof Sketches: Verifiable In-Network Aggregation.
ICDE 2007: 996-1005 |
27 | EE | Katerina J. Argyraki,
Petros Maniatis,
O. Irzak,
S. Ashish,
Scott Shenker:
Loss and Delay Accountability for the Internet.
ICNP 2007: 194-205 |
26 | EE | Dennis Geels,
Gautam Altekar,
Petros Maniatis,
Timothy Roscoe,
Ion Stoica:
Friday: Global Comprehension for Distributed Replay.
NSDI 2007 |
25 | EE | Byung-Gon Chun,
Petros Maniatis,
Scott Shenker,
John Kubiatowicz:
Attested append-only memory: making adversaries stick to their word.
SOSP 2007: 189-204 |
2006 |
24 | EE | Mary Baker,
Mehul A. Shah,
David S. H. Rosenthal,
Mema Roussopoulos,
Petros Maniatis,
Thomas J. Giuli,
Prashanth P. Bungale:
A fresh look at the reliability of long-term digital storage.
EuroSys 2006: 221-234 |
23 | EE | Atul Singh,
Petros Maniatis,
Timothy Roscoe,
Peter Druschel:
Using queries for distributed monitoring and forensics.
EuroSys 2006: 389-402 |
22 | EE | Tyson Condie,
Varun Kacholia,
Sriram Sank,
Joseph M. Hellerstein,
Petros Maniatis:
Induced Churn as Shelter from Routing-Table Poisoning.
NDSS 2006 |
21 | EE | Boon Thau Loo,
Tyson Condie,
Minos N. Garofalakis,
David E. Gay,
Joseph M. Hellerstein,
Petros Maniatis,
Raghu Ramakrishnan,
Timothy Roscoe,
Ion Stoica:
Declarative networking: language, execution and optimization.
SIGMOD Conference 2006: 97-108 |
2005 |
20 | EE | Ryan Huebsch,
Brent N. Chun,
Joseph M. Hellerstein,
Boon Thau Loo,
Petros Maniatis,
Timothy Roscoe,
Scott Shenker,
Ion Stoica,
Aydan R. Yumerefendi:
The Architecture of PIER: an Internet-Scale Query Processor.
CIDR 2005: 28-43 |
19 | EE | Boon Thau Loo,
Tyson Condie,
Joseph M. Hellerstein,
Petros Maniatis,
Timothy Roscoe,
Ion Stoica:
Implementing declarative overlays.
SOSP 2005: 75-90 |
18 | EE | Thomas J. Giuli,
Petros Maniatis,
Mary Baker,
David S. H. Rosenthal,
Mema Roussopoulos:
Attrition Defenses for a Peer-to-Peer Digital Preservation System.
USENIX Annual Technical Conference, General Track 2005: 163-178 |
17 | EE | Petros Maniatis,
Mema Roussopoulos,
Thomas J. Giuli,
David S. H. Rosenthal,
Mary Baker:
The LOCKSS peer-to-peer digital preservation system.
ACM Trans. Comput. Syst. 23(1): 2-50 (2005) |
16 | EE | Mary Baker,
Mehul A. Shah,
David S. H. Rosenthal,
Mema Roussopoulos,
Petros Maniatis,
Thomas J. Giuli,
Prashanth P. Bungale:
A Fresh Look at the Reliability of Long-term Digital Storage
CoRR abs/cs/0508130: (2005) |
2004 |
15 | EE | Petros Maniatis,
Thomas J. Giuli,
Mema Roussopoulos,
David S. H. Rosenthal,
Mary Baker:
Impeding attrition attacks in P2P systems.
ACM SIGOPS European Workshop 2004: 12 |
14 | EE | Mema Roussopoulos,
Mary Baker,
David S. H. Rosenthal,
Thomas J. Giuli,
Petros Maniatis,
Jeffrey C. Mogul:
2 P2P or Not 2 P2P?
IPTPS 2004: 33-43 |
13 | EE | David S. H. Rosenthal,
Petros Maniatis,
Mema Roussopoulos,
Thomas J. Giuli,
Mary Baker:
Notes On The Design Of An Internet Adversary
CoRR cs.DL/0411078: (2004) |
2003 |
12 | EE | Petros Maniatis,
David S. H. Rosenthal,
Mema Roussopoulos,
Mary Baker,
Thomas J. Giuli,
Yanto Muliadi:
Preserving peer replicas by rate-limited sampled voting.
SOSP 2003: 44-59 |
11 | EE | Petros Maniatis,
Mary Baker:
A Historic Name-Trail Service.
WMCSA 2003: 88-99 |
10 | EE | Petros Maniatis,
Mary Baker:
Authenticated Append-only Skip Lists
CoRR cs.CR/0302010: (2003) |
9 | EE | Petros Maniatis,
Mema Roussopoulos,
Thomas J. Giuli,
David S. H. Rosenthal,
Mary Baker,
Yanto Muliadi:
Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS
CoRR cs.DC/0303026: (2003) |
8 | EE | Mema Roussopoulos,
Mary Baker,
David S. H. Rosenthal,
Thomas J. Giuli,
Petros Maniatis,
Jeffrey C. Mogul:
2 P2P or Not 2 P2P?
CoRR cs.NI/0311017: (2003) |
2002 |
7 | EE | Petros Maniatis,
Mary Baker:
Enabling the Archival Storage of Signed Documents.
FAST 2002: 31-45 |
6 | EE | Tyron Stading,
Petros Maniatis,
Mary Baker:
Peer-to-Peer Caching Schemes to Address Flash Crowds.
IPTPS 2002: 203-213 |
5 | EE | Petros Maniatis,
Mary Baker:
Secure History Preservation Through Timeline Entanglement.
USENIX Security Symposium 2002: 297-312 |
4 | EE | Petros Maniatis,
Mary Baker:
Secure History Preservation Through Timeline Entanglement
CoRR cs.DC/0202005: (2002) |
3 | EE | Petros Maniatis,
Mary Baker:
A Historic Name-Trail Service
CoRR cs.NI/0210019: (2002) |
2001 |
2 | EE | Petros Maniatis,
Thomas J. Giuli,
Mary Baker:
Enabling the Long-Term Archival of Signed Documents through Time Stamping
CoRR cs.DC/0106058: (2001) |
1999 |
1 | EE | Mema Roussopoulos,
Petros Maniatis,
Edward Swierk,
Kevin Lai,
Guido Appenzeller,
Mary Baker:
Person-level Routing in the Mobile People Architecture.
USENIX Symposium on Internet Technologies and Systems 1999 |