You are here

Bibliography

Export 11 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is Y  [Clear All Filters]
2011
Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y. Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. Berlin, Germany: ACM; 2011. pp. 259–268. Available from: http://doi.acm.org/10.1145/2068816.2068841
2008
Yang X. Auction, but don't block. In: NetEcon'08. Proceedings of the 3rd International Workshop on Economics of Networked Systems. NetEcon'08. Proceedings of the 3rd International Workshop on Economics of Networked Systems. Seattle, WA, USA: ACM; 2008. pp. 19–24. Available from: http://doi.acm.org/10.1145/1403027.1403032
2003
Yang B, Garcia-Molina H. PPay: micropayments for peer-to-peer systems. In: CCS'03. Proceedings od the 10th ACM Conference on Computer and Communications Security. CCS'03. Proceedings od the 10th ACM Conference on Computer and Communications Security. Washington, DC, USA: ACM; 2003. pp. 300-310.
2005
Yang M, Zhang Z, Li X, Dai Y. An empirical study of free-riding behavior in the maze p2p file-sharing system. In: Proceedings of the 4th international conference on Peer-to-Peer Systems. Proceedings of the 4th international conference on Peer-to-Peer Systems. Berlin, Heidelberg: Springer-Verlag; 2005. Available from: http://dx.doi.org/10.1007/11558989_17
1982
Yao AC. Protocols for Secure Computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Washington, DC, USA: IEEE Computer Society; 1982. Available from: http://dx.doi.org/10.1109/SFCS.1982.88
2010
Yeoh W, Felner A, Koenig S. BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm. Journal of Artificial Intelligence Research [Internet]. 2010 ;38:85-133. Available from: http://www.jair.org/papers/paper2849.html
2005
You LL, Pollack KT, Long DDE. Deep Store: An archival storage system architecture. In: In Proceedings of the 21st International Conference on Data Engineering (ICDE ’05. In Proceedings of the 21st International Conference on Data Engineering (ICDE ’05. IEEE; 2005. pp. 804–815. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.6928
2006
Yu H, Kaminsky M, Gibbons PB, Flaxman A. SybilGuard: defending against sybil attacks via social networks. In: SIGCOMM'06. Proceedings of the 2006 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. SIGCOMM'06. Proceedings of the 2006 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Pisa, Italy: ACM; 2006. pp. 267–278. Available from: http://doi.acm.org/10.1145/1159913.1159945