2009 | ||
---|---|---|
21 | EE | John MacCormick, Nicholas Murphy, Venugopalan Ramasubramanian, Udi Wieder, Junfeng Yang, Lidong Zhou: Kinesis: A new approach to replica placement in distributed storage systems. TOS 4(4): (2009) |
2008 | ||
20 | EE | Vijayan Prabhakaran, Thomas L. Rodeheffer, Lidong Zhou: Transactional Flash. OSDI 2008: 147-160 |
19 | EE | Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham: Vigilante: End-to-end containment of Internet worm epidemics. ACM Trans. Comput. Syst. 26(4): (2008) |
18 | EE | John MacCormick, Chandramohan A. Thekkath, Marcus Jager, Kristof Roomp, Lidong Zhou, Ryan Peterson: Niobe: A practical replication protocol. TOS 3(4): (2008) |
2007 | ||
17 | EE | Lidong Zhou, Vijayan Prabhakaran, Venugopalan Ramasubramanian, Roy Levin, Chandramohan A. Thekkath: Graceful degradation via versions: specifications and implementations. PODC 2007: 264-273 |
16 | EE | Danny Bickson, Dahlia Malkhi, Lidong Zhou: Peer-to-Peer Rating. Peer-to-Peer Computing 2007: 211-218 |
15 | EE | Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Zhang, Marcus Peinado: Bouncer: securing software by blocking bad input. SOSP 2007: 117-130 |
2006 | ||
14 | EE | Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou: Brief Announcement: Chasing the Weakest System Model for Implementing Omega and Consensus. SSS 2006: 576-577 |
13 | EE | Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou: Troubleshooting wireless mesh networks. Computer Communication Review 36(5): 17-28 (2006) |
2005 | ||
12 | EE | Dahlia Malkhi, Florian Oprea, Lidong Zhou: Omega Meets Paxos: Leader Election and Stability Without Eventual Timely Links. DISC 2005: 199-213 |
11 | EE | Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz: Distributed Blinding for Distributed ElGamal Re-Encryption. ICDCS 2005: 815-824 |
10 | EE | Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien: A First Look at Peer-to-Peer Worms: Threats and Defenses. IPTPS 2005: 24-35 |
9 | EE | Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou: Troubleshooting multihop wireless networks. SIGMETRICS 2005: 380-381 |
8 | EE | Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham: Vigilante: end-to-end containment of internet worms. SOSP 2005: 133-147 |
7 | EE | Lidong Zhou, Fred B. Schneider, Robbert van Renesse: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8(3): 259-286 (2005) |
6 | EE | Fred B. Schneider, Lidong Zhou: Implementing Trustworthy Services Using Replicated State Machines. IEEE Security & Privacy 3(5): 34-43 (2005) |
2004 | ||
5 | EE | Atul Adya, Paramvir Bahl, Jitendra Padhye, Alec Wolman, Lidong Zhou: A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. BROADNETS 2004: 344-354 |
4 | EE | Lidong Zhou, Robbert van Renesse: P6P: A Peer-to-Peer Approach to Internet Infrastructure. IPTPS 2004: 75-86 |
3 | EE | John MacCormick, Nick Murphy, Marc Najork, Chandramohan A. Thekkath, Lidong Zhou: Boxwood: Abstractions as the Foundation for Storage Infrastructure. OSDI 2004: 105-120 |
2002 | ||
2 | EE | Lidong Zhou, Robbert van Renesse, Michael A. Marsh: Implementing IPv6 as a Peer-to-Peer Overlay Network. SRDS 2002: 347- |
1 | EE | Lidong Zhou, Fred B. Schneider, Robbert van Renesse: COCA: A secure distributed online certification authority. ACM Trans. Comput. Syst. 20(4): 329-368 (2002) |