default search action
IPTPS 2002: Cambridge, MA, USA
- Peter Druschel, M. Frans Kaashoek, Antony I. T. Rowstron:
Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Lecture Notes in Computer Science 2429, Springer 2002, ISBN 3-540-44179-4 - Richard Clayton:
Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems. 1-21
Structure Overlay Routing Protocols: State of the Art and Future Directions
- David Liben-Nowell, Hari Balakrishnan, David R. Karger:
Observations on the Dynamic Evolution of Peer-to-Peer Networks. 22-33 - Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Brocade: Landmark Routing on Overlay Networks. 34-44 - Sylvia Ratnasamy, Ion Stoica, Scott Shenker:
Routing Algorithms for DHTs: Some Open Questions. 45-52 - Petar Maymounkov, David Mazières:
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. 53-65 - Michael J. Freedman, Radek Vingralek:
Efficient Peer-to-Peer Lookup Based on a Distributed Trie. 66-75 - Amin Vahdat, Jeffrey S. Chase, Rebecca Braynard, Dejan Kostic, Patrick Reynolds, Adolfo Rodriguez:
Self-Organizing Subsets: From Each According to His Abilities, to Each According to His Needs. 76-84
Deployed Peer-to-Peer Systems
- Matei Ripeanu, Ian T. Foster:
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems. 85-93 - Qin Lv, Sylvia Ratnasamy, Scott Shenker:
Can Heterogeneity Make Gnutella Scalable? 94-103 - Bryce Wilcox-O'Hearn:
Experiences Deploying a Large-Scale Emergent Network. 104-110
Anonymous Overlays
- Andrei Serjantov:
Anonymizing Censorship Resistant Systems. 111-120 - Michael J. Freedman, Emil Sit, Josh Cates, Robert Tappan Morris:
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. 121-129
Applications
- Steven Hand, Timothy Roscoe:
Mnemosyne: Peer-to-Peer Steganographic Storage. 130-140 - Sameer Ajmani, Dwaine E. Clarke, Chuang-Hue Moh, Steven Richman:
ConChord: Cooperative SDSI Certificate Storage and Name Resolution. 141-154 - Russ Cox, Athicha Muthitacharoen, Robert Tappan Morris:
Serving DNS Using a Peer-to-Peer Lookup Service. 155-165 - Sridhar Srinivasan, Ellen W. Zegura:
Network Measurement as a Cooperative Enterprise. 166-177 - Venkata N. Padmanabhan, Kunwadee Sripanidkulchai:
The Case for Cooperative Networking. 178-190 - Ion Stoica, Daniel Adkins, Sylvia Ratnasamy, Scott Shenker, Sonesh Surana, Shelley Zhuang:
Internet Indirection Infrastructure. 191-202 - Tyron Stading, Petros Maniatis, Mary Baker:
Peer-to-Peer Caching Schemes to Address Flash Crowds. 203-213
Evaluation
- Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble:
Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS. 214-224 - Peter J. Keleher, Bobby Bhattacharjee, Bujor D. Silaghi:
Are Virtualized Overlay Networks Too Much of a Good Thing? 225-231
Searching and Indexing
- Adriana Iamnitchi, Matei Ripeanu, Ian T. Foster:
Locating Data in (Small-World?) Peer-to-Peer Scientific Collaborations. 232-241 - Matthew Harren, Joseph M. Hellerstein, Ryan Huebsch, Boon Thau Loo, Scott Shenker, Ion Stoica:
Complex Queries in DHT-based Peer-to-Peer Networks. 242-259 - John R. Douceur:
The Sybil Attack. 251-260 - Emil Sit, Robert Tappan Morris:
Security Considerations for Peer-to-Peer Distributed Hash Tables. 261-269 - Jared Saia, Amos Fiat, Steven D. Gribble, Anna R. Karlin, Stefan Saroiu:
Dynamically Fault-Tolerant Content Addressable Networks. 270-279
Data Management
- Robbert van Renesse, Kenneth P. Birman, Dan Dumitriu, Werner Vogels:
Scalable Management and Data Mining Using Astrolabe. 280-294 - Nancy A. Lynch, Dahlia Malkhi, David Ratajczak:
Atomic Data Access in Distributed Hash Tables. 295-305 - Yan Chen, Randy H. Katz, John Kubiatowicz:
Dynamic Replica Placement for Scalable Content Delivery. 306-318 - Brian F. Cooper, Hector Garcia-Molina:
Peer-to-Peer Resource Trading in a Reliable Distributed System. 319-327 - Hakim Weatherspoon, John Kubiatowicz:
Erasure Coding Vs. Replication: A Quantitative Comparison. 328-338
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.