Back to Results
First PageMeta Content
Graph theory / Computing / Network theory / Chord / Node / Peer-to-peer / Routing / Topology / Sybil attack / Distributed data storage / Networks / Electronics


On Network formation, (Sybil attacks and Reputation systems) (Position Paper)
Add to Reading List

Document Date: 2007-01-11 10:31:39


Open Document

File Size: 83,59 KB

Share Result on Facebook

City

n∈N / n ∈ N / /

Company

IEEE Journal / /

IndustryTerm

real work networks / internet applications / sized networks / peer-topeer lookup protocol / makes networks / systems / deterministic network formation algorithm / reputation systems / realistic networks / resource sharing networks / power law / social networks / real world networks / network formation algorithm / power law distribution / Internet communications / /

Person

Nash Equilibrium / David Liben-Nowell / John R. Douceur / David R. Karger / Game / Hari Balakrishnan / M. Frans Kaashoek / Jon M. Kleinberg / Stefan Schiffner / George Danezis / Frank Dabek / Antony I. T. Rowstron / Ion Stoica / Robert Morris / /

Position

unbalanced random model / simple model / model of network formation / player / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

peer-topeer lookup protocol / Peer-to-peer / network formation algorithm / computing technology / Simulation / deterministic network formation algorithm / /

SocialTag