The space complexity of approximating the frequency moments, Proceedings of the twentyeighth annual ACM symposium on Theory of computing (STOC), pp.20-29, 1996. ,
Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes, Proceedings of the 14th International Conference On Principles Of Distributed Systems (OPODIS), pp.64-78, 2010. ,
DOI : 10.1007/11561071_71
URL : https://hal.archives-ouvertes.fr/hal-00554219
Counting Distinct Elements in a Data Stream, Proceedings of the 6th International Workshop on Randomization and Approximation Techniques (RANDOM), pp.1-10, 2002. ,
DOI : 10.1007/3-540-45726-7_1
Random Graphs ? 2nd Edition, 2001. ,
Brahms, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, pp.2340-2359, 2009. ,
DOI : 10.1145/1400751.1400772
A near-optimal algorithm for computing the entropy of a stream, ACM-SIAM Symposium on Discrete Algorithms, pp.328-335, 2007. ,
Finding frequent items in data streams, Theoretical Computer Science, vol.312, issue.1, pp.3-15, 2004. ,
DOI : 10.1016/S0304-3975(03)00400-6
An improved data stream summary: the count-min sketch and its applications, Journal of Algorithms, vol.55, issue.1, pp.58-75, 2005. ,
DOI : 10.1016/j.jalgor.2003.12.001
Epidemic algorithms for replicated database mangement, Proceedings of the 6th ACM Symposium on Principles of Distributed Computing (PODC), 1987. ,
The Sybil Attack, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Probabilistic counting algorithms for data base applications, Journal of Computer and System Sciences, vol.31, issue.2, pp.182-209, 1985. ,
DOI : 10.1016/0022-0000(85)90041-8
URL : https://hal.archives-ouvertes.fr/inria-00076244
Minimizing churn in distributed systems, Proceedings of the ACM SIGCOMM, 2006. ,
DOI : 10.1145/1151659.1159931
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.8082
Secure peer sampling, Computer Networks, vol.54, issue.12, pp.2086-2098, 2010. ,
DOI : 10.1016/j.comnet.2010.03.020
An optimal algorithm for the distinct elements problem, Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems of data, PODS '10, 2010. ,
DOI : 10.1145/1807085.1807094
Finite Markov Chains, 1976. ,
On Information and Sufficiency, The Annals of Mathematical Statistics, vol.22, issue.1, pp.79-86, 1951. ,
DOI : 10.1214/aoms/1177729694
Data streaming algorithms for estimating entropy of network traffic, Proceedings of the joint international conference on Measurement and modeling of computer systems (SIGMETRICS, 2006. ,
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), 2005. ,
Search and Replication in Unstructured Peer-to-Peer Networks, Proceedings of the International Conference on Supercomputing (ICS), pp.84-95, 2002. ,
Distributed Algorithms, 1996. ,
Peer counting and sampling in overlay networks, Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing , PODC '06, pp.123-132, 2006. ,
DOI : 10.1145/1146381.1146402
Data Streams: Algorithms and Applications, Foundations and Trends?? in Theoretical Computer Science, vol.1, issue.2, 2005. ,
DOI : 10.1561/0400000002
On weak lumpability in Markov chains, Journal of Applied Probability, vol.26, 1989. ,
URL : https://hal.archives-ouvertes.fr/inria-00075764
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
On Unbiased Sampling for Unstructured Peer-to-Peer Networks, IEEE/ACM Transactions on Networking, vol.17, issue.2, pp.377-390, 2009. ,
DOI : 10.1109/TNET.2008.2001730