2009 |
21 | EE | John MacCormick,
Nicholas Murphy,
Venugopalan Ramasubramanian,
Udi Wieder,
Junfeng Yang,
Lidong Zhou:
Kinesis: A new approach to replica placement in distributed storage systems.
TOS 4(4): (2009) |
2008 |
20 | EE | Vijayan Prabhakaran,
Thomas L. Rodeheffer,
Lidong Zhou:
Transactional Flash.
OSDI 2008: 147-160 |
19 | EE | Manuel Costa,
Jon Crowcroft,
Miguel Castro,
Antony I. T. Rowstron,
Lidong Zhou,
Lintao Zhang,
Paul Barham:
Vigilante: End-to-end containment of Internet worm epidemics.
ACM Trans. Comput. Syst. 26(4): (2008) |
18 | EE | John MacCormick,
Chandramohan A. Thekkath,
Marcus Jager,
Kristof Roomp,
Lidong Zhou,
Ryan Peterson:
Niobe: A practical replication protocol.
TOS 3(4): (2008) |
2007 |
17 | EE | Lidong Zhou,
Vijayan Prabhakaran,
Venugopalan Ramasubramanian,
Roy Levin,
Chandramohan A. Thekkath:
Graceful degradation via versions: specifications and implementations.
PODC 2007: 264-273 |
16 | EE | Danny Bickson,
Dahlia Malkhi,
Lidong Zhou:
Peer-to-Peer Rating.
Peer-to-Peer Computing 2007: 211-218 |
15 | EE | Manuel Costa,
Miguel Castro,
Lidong Zhou,
Lintao Zhang,
Marcus Peinado:
Bouncer: securing software by blocking bad input.
SOSP 2007: 117-130 |
2006 |
14 | EE | Martin Hutle,
Dahlia Malkhi,
Ulrich Schmid,
Lidong Zhou:
Brief Announcement: Chasing the Weakest System Model for Implementing Omega and Consensus.
SSS 2006: 576-577 |
13 | EE | Lili Qiu,
Paramvir Bahl,
Ananth Rao,
Lidong Zhou:
Troubleshooting wireless mesh networks.
Computer Communication Review 36(5): 17-28 (2006) |
2005 |
12 | EE | Dahlia Malkhi,
Florian Oprea,
Lidong Zhou:
Omega Meets Paxos: Leader Election and Stability Without Eventual Timely Links.
DISC 2005: 199-213 |
11 | EE | Lidong Zhou,
Michael A. Marsh,
Fred B. Schneider,
Anna Redz:
Distributed Blinding for Distributed ElGamal Re-Encryption.
ICDCS 2005: 815-824 |
10 | EE | Lidong Zhou,
Lintao Zhang,
Frank McSherry,
Nicole Immorlica,
Manuel Costa,
Steve Chien:
A First Look at Peer-to-Peer Worms: Threats and Defenses.
IPTPS 2005: 24-35 |
9 | EE | Lili Qiu,
Paramvir Bahl,
Ananth Rao,
Lidong Zhou:
Troubleshooting multihop wireless networks.
SIGMETRICS 2005: 380-381 |
8 | EE | Manuel Costa,
Jon Crowcroft,
Miguel Castro,
Antony I. T. Rowstron,
Lidong Zhou,
Lintao Zhang,
Paul Barham:
Vigilante: end-to-end containment of internet worms.
SOSP 2005: 133-147 |
7 | EE | Lidong Zhou,
Fred B. Schneider,
Robbert van Renesse:
APSS: proactive secret sharing in asynchronous systems.
ACM Trans. Inf. Syst. Secur. 8(3): 259-286 (2005) |
6 | EE | Fred B. Schneider,
Lidong Zhou:
Implementing Trustworthy Services Using Replicated State Machines.
IEEE Security & Privacy 3(5): 34-43 (2005) |
2004 |
5 | EE | Atul Adya,
Paramvir Bahl,
Jitendra Padhye,
Alec Wolman,
Lidong Zhou:
A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks.
BROADNETS 2004: 344-354 |
4 | EE | Lidong Zhou,
Robbert van Renesse:
P6P: A Peer-to-Peer Approach to Internet Infrastructure.
IPTPS 2004: 75-86 |
3 | EE | John MacCormick,
Nick Murphy,
Marc Najork,
Chandramohan A. Thekkath,
Lidong Zhou:
Boxwood: Abstractions as the Foundation for Storage Infrastructure.
OSDI 2004: 105-120 |
2002 |
2 | EE | Lidong Zhou,
Robbert van Renesse,
Michael A. Marsh:
Implementing IPv6 as a Peer-to-Peer Overlay Network.
SRDS 2002: 347- |
1 | EE | Lidong Zhou,
Fred B. Schneider,
Robbert van Renesse:
COCA: A secure distributed online certification authority.
ACM Trans. Comput. Syst. 20(4): 329-368 (2002) |