Academia.eduAcademia.edu

Outline

P2p-computing

Abstract

The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.

References (351)

  1. Integrate the mobile device into an already existing peer-to-peer network. Ex- amples of such systems are Symella 9 or Symtorrent 10 which connect to Gnutella and to BitTorrent, respectively. These applications are implementations for the Symbian mobile platform of the usual peer-to-peer client software. As such, they 6 http://www.cloudtrade.com.
  2. Emulab-total network testbed, http://www.emulab.com
  3. Folding@home, http://folding.stanford.edu
  4. Freenet, http://freenet.sourceforge.net
  5. Furi, http://www.jps.net/williamw/furi
  6. Gnewtella, http://sourceforge.net/projects/gnewtella
  7. Gnotella, http://www.overnet-download.de/filesharing/gnotella.html
  8. Gnutella, http://gnutella.wego.com
  9. The Gnutella protocol specification v0.4, http://www.clip2.com
  10. Icq, http://www.icq.com
  11. JXTA Project Home Page, http://www.jxta.org
  12. Magi, http://www.endeavors.com
  13. Napster, http://www.napster.com
  14. Napster protocol, http://david.weekly.org/code
  15. The Network Simulator-ns-2, http://www.isi.edu/nsnam/ns/
  16. K. Aberer, P-Grid: a self-organizing access structure for P2P information systems, in Pro- ceedings of the 9th International Conference on Cooperative Information Systems (CoopIS), 2001
  17. K. Aberer, P. Cudre-Mauroux, M. Hauswirth, The chatty web: emergent semantics through gossiping, in Proceedings of the 12th World Wide Web Conference (WWW), 2003
  18. K. Aberer, Z. Despotovic, Managing trust in a peer-2-peer information system, in Proceed- ings of the 10th ACM International Conference on Information and Knowledge Management (CIKM), 2001
  19. L.A. Adamic, R.M. Lukose, A.R. Puniyani, B.A. Huberman, Search in power-law networks. Phys. Rev. 64 (2001)
  20. E. Adar, B.A. Huberman, Free riding on Gnutella. First Monday 5(10) (2000)
  21. D.A. Agarwal, O. Chevassut, M.R. Thompson, G. Tsudik, An integrated solution for secure group communication in wide-area networks, in Proceedings of the 6th IEEE Symposium on Computers and Communications, pp. 22-28, Hammamet, Tunisia, July 2001
  22. R. Albert, H. Jeong, A. Barabasi, Error and attack tolerance in complex networks. Nature 406, 378-382 (2000)
  23. M. Altinel, M. Franklin, Efficient filtering of XML documents for selective dissemination, in Proceedings of the 26th International Conference on Very Large Databases (VLDB), 2000
  24. Amazon, http://www.amazon.com
  25. Amazon Auctions, http://auctions.amazon.com Q.H. Vu et al., Peer-to-Peer Computing, DOI 10.1007/978-3-642-03514-2, © Springer-Verlag Berlin Heidelberg 2010 References
  26. K.G. Anagnostakis, M.B. Greenwald, Exchange-based incentive mechanisms for peer-to- peer file sharing, in Proceedings of the 24th International Conference on Distributed Com- puting Systems (ICDCS), pp. 524-533, Tokyo, Japan, March 2004
  27. D. Anderson, SETI@home, in Peer-to-Peer: Harnessing the Power of Disruptive Technolo- gies (O'Reilly & Associates, 2001), pp. 67-76
  28. A. Andrzejak, Z. Xu, Scalable, efficient range queries for grid information services, in Pro- ceedings of the 2nd International Conference on Peer-To-Peer Computing, pp. 33-40, 2002
  29. M. Arenas, V. Kantere, A. Kementsietsidis, I. Kiringa, R. Miller, J. Mylopoulos, The Hyper- ion project: from data integration to data coordination. SIGMOD Rec. 32(3) (2003)
  30. J. Aspnes, G. Shah, Skip graphs, in Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 384-393, 2003
  31. R. Axelrod, The Evolution of Cooperation (Basic Books, New York, 1984)
  32. R.A. Baeza-Yates, B.A. Ribeiro-Neto, Modern Information Retrieval (ACM Press/Addison- Wesley, New York, 1999)
  33. B. Bakos, L. Farkas, Nomadic sharing of media: proximity delivery of mass content within P2P social networks, in Proceedings of IWUC, 2006
  34. H. Balakrishnan, M.F. Kaashoek, D. Karger, R. Morris, I. Stoica, Looking up data in P2P systems. Commun. ACM 46(2), 43-48 (2003)
  35. I. Balbin, K. Ramamohanarao, A generalization of the differential approach to recursive query emulation. J. Log. Program. 4(3) (1987)
  36. B. Barber, Logic and Limits of Trust (Rutgers University Press, New Jersey, 1983)
  37. C. Batten, K. Barr, A. Saraf, S. Treptin, pStore: a secure peer-to-peer backup system. Tech- nical Memo MIT-LCS-TM-632, MIT Laboratory for Computer Science, December 2001
  38. M. Bawa, T. Condie, P. Ganesan, LSH forest: self-tuning indexes for similarity search, in Proceedings of the 14th World Wide Web Conference (WWW), pp. 651-660, 2005
  39. D. Bedell, Search for extraterrestrials or extra cash, in The Dallas Morning News, December 1999
  40. M. Bender, S. Michel, C. Zimmer, G. Weikum, The MINERVA project: database selection in the Context of P2P search, in Proceedings of the GI-Fachtagung fur Datenbanksysteme in Business, Technologie und Web (BTW), 2005
  41. J.L. Bentley, Multidimensional binary search trees used for associative searching. Commun. ACM 18(9), 509-517 (1975)
  42. S. Berchtold, C. Bohm, H.-P. Kriegel, The Pyramid-technique: towards breaking the curse of dimensionality, in Proceedings of the ACM SIGMOD International Conference on Manage- ment of Data, pp. 142-153, 1998
  43. S. Berchtold, D.A. Keim, H.-P. Kriegel, The X-tree: an index structure for high-dimensional data, in Proceedings of the 22nd International Conference on Very Large Databases (VLDB), 1996
  44. K. Berket, A. Essiari, A. Muratas, PKI-based security for peer-to-peer information sharing, in Proceedings of the 4th IEEE International Conference on Peer-to-Peer Computing, August 2004
  45. P.A. Bernstein, F. Giunchiglia, A. Kementsietsidis, J. Mylopoulos, L. Serafini, I. Zaihrayeu, Data management for peer-to-peer computing: a vision, in Proceedings of the 5th Interna- tional Workshop on the Web and Databases (WebDB), 2002
  46. M. Berry, Z. Drmac, E. Jessup, Matrices, vector spaces, and information retrieval. SIAM Rev. 41(2), 335-362 (1999)
  47. E. Bertino, E. Ferrari, A.C. Squicciarini, Trust-X: a peer-to-peer framework for trust estab- lishment. IEEE Trans. Knowl. Data Eng. 7, 827-842 (2004)
  48. A.R. Bharambe, M. Agrawal, S. Seshan, Mercury: supporting scalable multi-attribute range queries, in Proceedings of the ACM SIGCOMM Conference, 2004
  49. M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis, The KeyNote trust management sys- tem, version 2. RFC-2704. IETF, 1999
  50. M. Blaze, J. Feigenbaum, Decentralized trust management, in Proceedings of the IEEE Sym- posium on Security and Privacy (S&P), 1996
  51. Blizzard, http://www.blizzard.com/, 2001
  52. B.H. Bloom, Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422-426 (1970)
  53. S. Boag, D. Chamberlin, M.F. Fernandez, D. Florescu, J. Robie, J. Simeon, M. Stefanescu, XQuery 1.0: An XML query language. W3C working draft, April 2002
  54. W.J. Bolosky, J.R. Douceur, D. Ely, M. Theimer, Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs, in Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (ACM, New York, 2000), pp. 34-43
  55. A. Broder, M. Mitzenmacher, Network applications of bloom filters: a survey, in Allerton, 2002
  56. S. Burleigh, V. Cerf, R. Durst, K. Fall, A. Hooke, K. Scott, H. Weiss, The interplanetary internet: a communications infrastructure for Mars exploration, in Proceedings of the Inter- national Astronautical Congress, 2002
  57. J. Byers, J. Considine, M. Mitzenmacher, Simple load balancing for distributed hash tables, in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), 2003
  58. J.W. Byers, M. Luby, M. Mitzenmacher, A. Rege, A digital fountain approach to reliable distribution of bulk data, in Proceedings of the ACM SIGCOMM Conference, pp. 56-67, 1998
  59. R. Caceres, F. Douglis, A. Feldmann, G. Glass, M. Rabinovich, Web proxy caching: the devil is in the details, in Proceedings of the 2nd Workshop on Internet Server Performance (WISP), 1999
  60. M. Cai, M. Frank, J. Chen, P. Szekely, MAAN: a multi-attribute addressable network for grid information services, in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), 2003
  61. D. Carney, U. Cetintemel, M. Cherniack, C. Convey, S. Lee, G. Seidman, M. Stonebraker, N. Tatbul, S. Zdonik, Monitoring streams: a new class of data management applications, in Proceedings of the 28th International Conference on Very Large Databases (VLDB), 2002
  62. D. Carroll, C. Rahmlow, T. Psiaki, G. Wojtaszczyk, Distributing science. http://boinc. berkeley.edu/trac/wiki/BoincPapers, 2005
  63. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D.S. Wallach, Security for peer-to-peer routing overlays, in Proceedings of the 5th USENIX Symposium on Operating Systems De- sign and Implementation (OSDI), Boston, Massachusetts, December 2002
  64. J. Cates, Robust and efficient data management for a distributed hash table. Master's thesis, Massachusetts Institute of Technology, 2003
  65. V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, H. Weiss, Delay- tolerant network architecture. IETF RFC 4838, http://www.ietf.org/rfc/rfc4838.txt, April 2007
  66. S. Ceri, G. Gottlob, L. Tanca, Logic Programming and Databases. Surveys in Computer Science (Springer, Berlin, 1990)
  67. C. Chan, P. Felber, M. Garofalakis, R. Rastogi, Efficient filtering of XML documents with XPath expressions, in Proceedings of the 18th IEEE International Conference on Data En- gineering (ICDE), 2002
  68. S. Chandrasekaran, O. Cooper, A. Deshpande, M.J. Franklin, J.M. Hellerstein, W. Hong, S. Krishnamurthy, S.R. Madden, V. Raman, F. Reiss, M.A. Shah, TelegraphCQ: continuous dataflow processing for an uncertain world, in Proceedings of the 1st Conference on Innova- tive Data Systems Research (CIDR), 2003
  69. D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 4(2) (1982)
  70. J. Chen, D.J. DeWitt, F. Tian, Y. Wang, NiagaraCQ: a scalable continuous query system for internet databases, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2000
  71. Y. Chen, R.H. Katz, J. Kubiatowicz, Dynamic replica placement for scalable content delivery, in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), pp. 306- 318, 2002
  72. M. Cherniack, H. Balakrishnan, M. Balazinska, Scalable distributed stream processing, in Proceedings of the 1st Conference on Innovative Data Systems Research (CIDR), 2003
  73. S. Cheshire, M. Krochmal, DNS-Based Service Discovery. http://tools.ietf.org/html/draft- cheshire-dnsext-dns-sd
  74. Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, M. Strauss, REFEREE: trust manage- ment for web applications. Comput. Netw. ISDN Syst. 29(8-13), 953-964 (1997)
  75. B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson, M. Wawrzoniak, M. Bowman, Plan- etlab: an overlay testbed for broad-coverage services. ACM SIGCOMM Comput. Commun. Rev. 33(3) (2003)
  76. P. Ciaccia, M. Patella, P. Zezula, M-Tree: an efficient access method for similarity search in metric spaces, in Proceedings of the 23rd International Conference on Very Large Databases (VLDB), pp. 426-435, 1997
  77. I. Clark, O. Sandberg, B. Wiley, T. Hong, Freenet: a distributed anonymous information storage and retrieval system, in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability (DIAU), Berkeley, CA, 2000
  78. I. Clarke, T.W. Hong, S.G. Miller, O. Sandberg, B. Wiley, Protecting free expression online with Freenet. IEEE Internet Comput. 6(1), 40-49 (2002)
  79. E. Cohen, S. Shenker, Replication strategies in unstructured peer-to-peer networks, in Pro- ceedings of the ACM SIGCOMM Conference, pp. 177-190, 2002
  80. T.E. Condie, S.D. Kamvar, H. Garcia-Molina, Adaptive peer-to-peer topologies, in Proceed- ings of the 4th IEEE International Conference on Peer-to-Peer Computing, August 2004
  81. B. Cooper, M. Bawa, N. Daswani, H. Garcia-Molina, Protecting the pipe from malicious peers. Technical report, Computer Sciences Dept, Stanford University, 2002
  82. F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, P. Samarati, Choosing reputable servents in a P2P network, in Proceedings of the 11th World Wide Web Conference (WWW), 2002
  83. L.P. Cox, C.D. Murray, B.D. Noble, Pastiche: making backup cheap and easy, in Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, December 2002
  84. L.P. Cox, B.D. Noble, Samsara: honor among thieves in peer-to-peer storage, in Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003
  85. A. Crainiceanu, P. Linga, J. Gehrke, J. Shanmugasundaram, Querying peer-to-peer networks using P-trees, in Proceedings of the 7th International Workshop on the Web and Databases (WebDB), pp. 25-30, 2004
  86. A. Crainiceanu, P. Linga, A. Machanavajjhala, J. Gehrke, J. Shanmugasundaram, P-Ring: an efficient and robust P2P range index structure, in Proceedings of the ACM SIGMOD Inter- national Conference on Management of Data, 2007
  87. A. Crespo, H. Garcia-Molina, Routing indices for peer-to-peer systems, in Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), 2002
  88. A. Crespo, H. Garcia-Molina, Routing indices for peer-to-peer systems, in Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), 2002
  89. A. Crespo, H. Garcia-Molina, Semantic overlay networks for P2P systems. Technical report, Computer Science Department, Stanford University, 2003
  90. F. Cuenca-Acuna, T. Nguyen, Text-based content search and retrieval in ad hoc P2P commu- nities. Technical Report DCS-TR-483, Rutgers University, 2002
  91. F.M. Cuenca-Acuna, C. Peery, R.P. Martin, T.D. Nguyen, PlanetP: using gossiping to build content addressable peer-to-peer information sharing communities, in Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC), 2003
  92. F. Dabek, M.F. Kaashoek, D. Karger, R. Morris, I. Stoica, Wide-area cooperative storage with CFS, in Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), 2001
  93. E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), 2002
  94. N. Daswani, H. Garcia-Molina, Query-flood DoS attacks in Gnutella, in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pp. 181-192, Washington, DC, 2002
  95. A. Datta, M. Hauswirth, K. Aberer, Updates in highly unreliable, replicated peer-to-peer systems, in Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), 2003
  96. A. Datta, M. Hauswirth, R. John, R. Schmidt, K. Aberer, Range queries in tree-structured overlays, in Proceedings of the 3rd International Workshop on Databases, Information Sys- tems and Peer-to-Peer Computing (DBISP2P), 2005
  97. I. Daubechies, Ten Lectures on Wavelets (Society for Industrial and Applied Mathematics, Philadelphia, 1992)
  98. J. Dawei, X. Han, M. Lupu, B.C. Ooi, H.T. Vo, Q.H. Vu, S. Wu, BestPeer: a peer-to-peer based platform for corporate network applications in Distributed Online Aggregation, ed. by S. Wu, S. Jiang, B.C. Ooi, K.L. Tan. Proceedings of the International Conference on Very Large Data Bases, July 2008 (National University of Singapore, Singapore, 2009)
  99. M. Dean, D. Connolly, F. van Harmelen, J. Hendler, I. Horrocks, D. McGuinness, P. Patel- Schneider, L. Stein, OWL web ontology language 1.0 reference, 2002
  100. G. Decandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasub- ramanian, P. Vosshall, W. Vogels, Dynamo: Amazon's highly available key-value store, in Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP), pp. 205- 220, 2007
  101. S. Deerwester, S. Dumais, G. Furnas, R. Harshman, Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41, 391-407 (1990)
  102. M. Deutsch, Cooperation and trust: some theoretical notes, in Nebraska Symposium on Mo- tivation, 1962
  103. M. Deutsch, The Resolution of Conflict (Yale University Press, New Haven, 1973)
  104. P. Devanbu, M. Gertz, C. Martel, S.G. Stubblebine, Authentic data publication over the in- ternet. J. Comput. Secur. 11(3), 291-314 (2003)
  105. Y. Diao, P. Fischer, M. Franklin, R. To, YFilter: efficient and scalable filtering of XML doc- uments, in Proceedings of the 18th IEEE International Conference on Data Engineering (ICDE), 2002
  106. P. Digital, Magic mirror backup, 2003
  107. R. Dingledine, M. Freedman, D. Molnar, Free Haven, in Peer-to-Peer: Harnessing the Power of Disruptive Technologies (O'Reilly & Associates, 2001), pp. 159-187
  108. S. Djilali, P2P-rpc: programming scientific applications on peer-to-peer systems with remote procedure call, in Proceedings of the 3st International Symposium on Cluster Computing and the Grid (CCGRID) (IEEE Computer Society, Washington, 2003), pp. 406-413
  109. S. Djilali, T. Herault, O. Lodygensky, T. Morlier, G. Fedak, F. Cappello, RPC-V: toward fault-tolerant rpc for internet connected desktop grids with volatile nodes, in Proceedings of the ACM/IEEE conference on Supercomputing (SC) (IEEE Computer Society, Washington, 2004), p. 39
  110. J.R. Douceur, The Sybil attack, in Proceedings of the 1st International Workshop on Peer- to-Peer Systems (IPTPS), pp. 251-260, Cambridge, MA, 2002
  111. C. Doulkeridis, A. Vlachou, Y. Kotidis, M. Vazirgiannis, Peer-to-peer similarity search in metric spaces, in Proceedings of the 33rd International Conference on Very Large Databases (VLDB), 2007
  112. B. Dragovic, B. Kotsovinos, S. Hand, P.R. Pietzuch, Xenotrust: event-based distributed trust management, in Proceedings of the 2nd International Workshop on Trust and Privacy in Digital Business (TrustBus), 2003
  113. P. Druschel, A. Rowstron, PAST: a large-scale, persistent peer-to-peer storage utility, in Pro- ceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS) (IEEE Computer Society Press, Los Alamitos, 2001), pp. 75-80 References
  114. W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, in Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS), pp. 4-11, Tokyo, Japan, March 2004
  115. eBay, http://www.ebay.com
  116. H. Evans, P. Dickman, Peer-to-peer programming with Teaq, in Proceedings of the Workshop on Web Engineering and Peer-to-Peer Computing, pp. 289-294, 2002
  117. J. Feigenbaum, C. Papadimitriou, R. Sami, S. Shenker, A BGP-based mechanism for lowest- cost routing, in Proceedings of the 21st ACM Symposium on Principles of Distributed Com- puting (PODC), pp. 173-182, 2002
  118. J. Feigenbaum, C. Papadimitriou, S. Shenker, Sharing the cost of multicast transmissions. J. Comput. Syst. Sci. 63, 21-41 (2001)
  119. M. Feldman, K. Lai, J. Chuang, I. Stoica, Quantifying disincentives in peer-to-peer networks, in Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems (P2PEcon), Berkeley, CA, June 2003
  120. I. Foster, A. Iamnitchi, On death, taxes, and the convergence of peer-to-peer and grid com- puting, in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), Berkeley, CA, USA, 2003
  121. I. Foster, C. Kesselman (eds.), The Grid: Blueprint for a New Computing Infrastructure (Morgan Kaufmann, San Mateo, 1998)
  122. M.J. Freedman, R. Morris, Tarzan: a peer-to-peer anonymizing network layer, in Proceed- ings of the 9th ACM Conference on Computer and Communications Security (CCS) (ACM, Washington, 2002), pp. 193-206
  123. D. Gambetta, Trust (Blackwell, Oxford, 1990)
  124. P. Ganesan, M. Bawa, H. Garcia-Molina, Online balancing of range-partitioned data with applications to peer-to-peer systems, in Proceedings of the 30th International Conference on Very Large Databases (VLDB), 2004
  125. P. Ganesan, K. Gummadi, H. Garcia-Molina, Canon in G major: designing DHTs with hier- archical structure, in Proceedings of the 24th International Conference on Distributed Com- puting Systems (ICDCS), pp. 263-272, 2004
  126. L. Garber, Denial-of-service attacks rip the internet. Computer 33(4), 12-17 (2000)
  127. L. Ge, J. Luo, Y. Xu, Developing and managing trust in peer-to-peer systems, in Proceedings of the 17th International Conference on Database and Expert Systems Applications (DEXA), 2006
  128. B. Gedik, L. Liu, PeerCQ: a decentralized and self-configuring peer-to-peer information monitoring system, in Proceedings of the 23rd International Conference on Distributed Com- puting Systems (ICDCS), 2003
  129. Genome@home, http://genomeathome.stanford.edu/
  130. A. Ghodsi, L.O. Alima, S. Haridi, Symmetric replication for structured peer-to-peer systems, in Proceedings of the 3rd International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P), 2005
  131. G. Giakkoupis, V. Hadzilacos, A scheme for load balancing in heterogenous distributed hash tables, in Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC), 2005
  132. Gnutella, http://www.gnutella.com
  133. P.B. Godfrey, I. Stoica, Heterogeneity and load balance in distributed hash tables, in Proceed- ings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2005
  134. C.H. Goh, S. Bressan, S. Madnick, M. Siegel, Context interchange: new features and for- malisms for the intelligent integration of information. ACM Trans. Inf. Syst. 17(3), 270-293 (1999)
  135. Google. Google web toolkit. http://code.google.com/webtoolkit/
  136. T.J. Green, G. Miklau, M. Onizuka, D. Suciu, Processing XML streams with deterministic automata, in Proceedings of ICDT'2003, 2003
  137. S. Gribble, A. Halevy, Z. Ives, M. Rodrig, D. Suciu, What can databases do for peer-to-peer, in Proceedings of the 4th International Workshop on the Web and Databases (WebDB), 2001
  138. Groove, http://www.groove.net
  139. S. Guha, N. Daswani, R. Jain, An experimental study of the Skype peer-to-peer VoIP system, in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS), 2006
  140. A. Gupta, D. Agrawal, A.E. Abbadi, Approximate range selection queries in peer-to-peer systems, in Proceedings of the 1st Conference on Innovative Data Systems Research (CIDR), 2003
  141. A.K. Gupta, A.Y. Halevy, D. Suciu, View selection for stream processing, in Proceedings of the 5th International Workshop on the Web and Databases (WebDB), 2002
  142. A.K. Gupta, D. Suciu, Stream processing of XPath queries with predicates, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2003
  143. A.K. Gupta, D. Suciu, A.Y. Halevy, The view selection problem for XML content based routing, in Proceedings of the 22nd ACM Symposium on Principles of Database Systems (PODS), 2003
  144. A. Guttman, R-trees: a dynamic index structure for spatial searching, in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 47-57, 1984
  145. A. Halevy, O. Etzioni, A. Doan, Z. Ives, J. Madhavan, L. McDowell, I. Tatarinov, Cross- ing the structure chasm, in Proceedings of the 1st Conference on Innovative Data Systems Research (CIDR), 2003
  146. A. Halevy, Z. Ives, P. Monk, I. Tatarinov, Piazza: data management infrastructure for se- mantic web applications, in Proceedings of the 12th World Wide Web Conference (WWW), 2003
  147. A. Halevy, Z. Ives, P. Mork, I. Tatarinov, Piazza: data management infrastructure for se- mantic web applications, in Proceedings of the 12th World Wide Web Conference (WWW), 2003
  148. A. Halevy, Z. Ives, D. Suciu, I. Tatarinov, Schema mediation in peer data management systems, in Proceedings of the 19th IEEE International Conference on Data Engineering (ICDE), 2003
  149. S. Hand, T. Harris, E. Kotsovinos, I. Pratt, Controlling the XenoServer open platform, in Proceedings of the 6th IEEE Conference on Open Architectures and Network Programming (OpenArch), 2003
  150. E.N. Hanson, C. Carnes, L. Huang, M. Konyala, L. Noronha, S. Parthasarathy, J.B. Park, A. Vernon, Scalable trigger processing, in Proceedings of the 15th IEEE International Con- ference on Data Engineering (ICDE), 1999
  151. G. Hardin, The tragedy of the commons. Science 162, 1243-1248 (1968)
  152. M. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, I. Stoica, Complex queries in DHT-based peer-to-peer networks, in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002
  153. N.J.A. Harvey, M.B. Jones, S. Sarioiu, M. Theimer, A. Wolman, SkipNet: a scalable overlay network with practical locality properties, in Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS), 2003
  154. Free Haven, http://www.freehaven.net/
  155. K. Hinrichs, J. Nievergelt, The grid file: a data structure designed to support proximity queries on spatial objects, in Proceedings of the 9th International Workshop on Graph- Theoretic Concepts in Computer Science (WG), 1983
  156. HiveCache, Swarmbackup: a peer-to-peer backup system, 2003
  157. R. Housley, W. Ford, W. Polk, D. Solo, Internet x.509 public key infrastructure certificate and crl profile, in RFC 2459, 1999
  158. R. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, I. Stoica, Querying the inter- net with PIER, in Proceedings of the 29th International Conference on Very Large Databases (VLDB), 2003
  159. P. Indyk, R. Motwani, Approximate nearest neighbor-towards removing the curse of dimen- sionality, in Proceedings of the 30th Annual ACM Symposium on the Theory of Computing (STOC), 1998
  160. M. Ingram, Online music-swap firm napster forms strategic alliance with media giant bertles- mann. http://www.wsws.org/articles/2000/nov2000/nap-n04.shtml, November 2000 References
  161. International Telegraph and Telephone Consultative Committee (CCITT). The Directory- Authentication Framework, Recommendation X. 509. 1993 update
  162. S. Iyer, A. Rowstron, P. Drusche, SQUIRREL: a decentralized, peer-to-peer web cache, in Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC), 2002
  163. Jabber, http://www.jabber.org/
  164. H.V. Jagadish, B.C. Ooi, K.-L. Tan, C. Yu, R. Zhang, iDistance: an adaptive B + -tree based indexing method for nearest neighbor search. ACM Trans. Database Syst. 30(2), 364-397 (2005)
  165. H.V. Jagadish, B.C. Ooi, Q.H. Vu, BATON: a balanced tree structure for peer-to-peer networks, in Proceedings of the 31st International Conference on Very Large Databases (VLDB), pp. 661-672, 2005
  166. H.V. Jagadish, B.C. Ooi, Q.H. Vu, R. Zhang, A. Zhou, VBI-tree: a peer-to-peer framework for supporting multi-dimensional indexing schemes, in Proceedings of the 22nd IEEE Inter- national Conference on Data Engineering (ICDE), 2006
  167. Joost. Joost P2P tv. http://www.joost.com/
  168. P. Kalnis, W.S. Ng, B.C. Ooi, D. Papadias, K.-L. Tan, An adaptive peer-to-peer network for distributed caching of OLAP results, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2002
  169. V. Kalogeraki, D. Gunopulos, D. Zeinalipour-yazti, A local search mechanism for peer-to- peer networks, in Proceedings of the 11th ACM International Conference on Information and Knowledge Management (CIKM), 2002
  170. S. Kamvar, M. Schlosser, H. Garcia-Molina, Eigenrep: reputation management in P2P net- works, in Proceedings of the 12th World Wide Web Conference (WWW), 2003
  171. G. Kan, Gnutella, in Peer-to-Peer: Harnessing the Power of Disruptive Technologies (O'Reilly & Associates, 2001), pp. 94-122
  172. D. Karger, F. Kaashoek, I. Stoica, R. Morris, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for internet applications, in Proceedings of the ACM SIGCOMM Conference, pp. 149-160, 2001
  173. D. Karger, M. Ruhl, Simple efficient load balancing algorithms for peer-to-peer systems, in Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS), 2004
  174. D.R. Karger, M.F. Kaashoek, Koorde: a simple degree-optimal distributed hash table, in Pro- ceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), 2003
  175. T. Katchaounov, V. Josifovski, T. Risch, Scalable view expansion in a peer mediator sys- tem, in Proceedings of the 8th International Conference on Database Systems for Advanced Applications (DASFAA), 2003
  176. D. Kato, GISP: global information sharing protocol-a distributed index for peer-to-peer systems, in Proceedings of 2nd IEEE International Conference on Peer-to-Peer Computing, 2002
  177. A. Kementsietsidis, M. Arenas, Data sharing through query translation in autonomous sources, in Proceedings of the 30th International Conference on Very Large Databases (VLDB), 2004
  178. A. Kementsietsidis, M. Arenas, R.J. Miller, Managing data mappings in the Hyperion project, in Proceeding of the 19th IEEE International Conference on Data Engineering (ICDE), 2003
  179. A. Kementsietsidis, M. Arenas, R.J. Miller, Mapping data in peer-to-peer systems: semantics and algorithmic issues, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2003
  180. A. Kementsietsidis, M. Arenas, R.J. Miller, Mapping data in peer-to-peer systems: semantics and algorithmic issues, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2003
  181. K. Kenthapadi, G.S. Manku, Decentralized algorithms using both local and random probes for P2P load balancing, in Proceedings of the ACM Symposium on Parallel Algorithms and Architectures (SPAA), 2004
  182. P. Keyani, B. Larson, M. Senthil, Peer pressure: Distributed recovery from attacks in peer- to-peer systems. Lect. Notes Comput. Sci. 2376, 306-320 (2002)
  183. C. Killian, J.W. Anderson, R. Braud, R. Jhala, A. Vahdat, Mace: language support for build- ing distributed systems, in Proceedings of PLDI Conference, 2007
  184. R.A. Kowalski, The early years of logic programming. Commun. ACM 31(1), 38-43 (1988)
  185. J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weath- erspoon, W. Weimer, C. Wells, B. Zhao, Oceanstore: an architecture for global-scale per- sistent storage, in Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (ACM, New York, 2000), pp. 190-201
  186. V. Kumar, Trust and security in peer-to-peer system, in Proceedings of the 17th International Conference on Database and Expert Systems Applications (DEXA), pp. 703-707, 2006
  187. M. Landers, H. Zhang, K.-L. Tan, PeerStore: better performance by relaxing in peer-to-peer backup, in Proceedings of the 4th IEEE International Conference on Peer-to-Peer Comput- ing, pp. 72-79, August 2004
  188. A. Langley, Freenet, in Peer-to-Peer: Harnessing the Power of Disruptive Technologies (O'Reilly & Associates, 2001), pp. 123-132
  189. J. Lee, H. Lee, S. Kang, S. Choe, J. Song, CISS: an efficient object clustering framework for DHT-based peer-to-peer applications, in Proceedings of the 2nd International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P), pp. 215-229, 2004
  190. S. Lee, R. Sherwood, B. Bhattacharjee, Cooperative peer groups in nice, in Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFO- COM), 2003
  191. M. Li, W.-C. Lee, A. Sivasubramaniam, DPTree: a balanced tree based indexing framework for peer-to-peer systems, in Proceedings of the 14th International Conference on Network Protocols (ICNP), 2006
  192. X. Li, J. Wu, Searching techniques in peer-to-peer networks, in Handbook of Theoretical and Algorithmic Aspects of Ad Hoc, Sensor and Peer-to-Peer Network, pp. 613-642. Averbach, 2006
  193. C.Y. Liau, W.S. Ng, Y. Shu, K.-L. Tan, S. Bressan, Efficient range queries and fast lookup services for scalable P2P networks, in Proceedings of the 2nd International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P), pp. 78-92, 2004
  194. M. Lillibridge, S. Elnikety, A. Birrel, M. Burrows, M. Isard, A cooperative internet backup scheme, in Proceedings of the USENIX Annual Technical Conference, pp. 29-41, 2003
  195. B. Ling, Z. Lu, W.S. Ng, B.C. Ooi, K.-L. Tan, A. Zhou, A content-based resource location mechanism in PeerIS, in Proceedings of the 3rd International Conference on Web Informa- tion Systems Engineering (WISE), pp. 279-290, 2002
  196. L. Liu, C. Pu, W. Tang, Continual queries for internet scale event-driven information delivery. IEEE Trans. Knowl. Data Eng., Special Issue on Web Technology (1999)
  197. B.T. Loo, The design and implementation of declarative networks. PhD thesis, University of California at Berkeley, 2006
  198. B.T. Loo, R. Huebsch, I. Stoica, J. Hellerstein, The case for a hybrid P2P search infrastruc- ture, in Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS), 2004
  199. Sharman Networks Ltd. Kazaa media desktop. http://www.kazaa.com, 2001
  200. J. Lu, J. Callan, Content-based retrieval in hybrid peer-to-peer networks, in Proceedings of the 12th ACM International Conference on Information and Knowledge Management (CIKM), pp. 199-206, 2003
  201. J. Lu, J. Callan, Federated search of text-based digital libraries in hierarchical peer-to-peer networks, in Proceedings of the 27th European Conference on Information Retrieval (ECIR), pp. 52-66, 2005
  202. S. Ludwig, J. Beda, P. Saint-Andre, R. McQueen, S. Egan, J. Hildebrand, Jingle: XMPP extension protocol 0166. http://xmpp.org/extensions/xep-0166.html
  203. N. Luhmann, Trust and Power (Wiley, Chichester, 1979) References
  204. M. Lupu, J. Li, B.C. Ooi, S. Shi, Clustering wavelets to speed-up data dissemination in structured P2P MANETs, in Proceeding of the 23rd IEEE International Conference on Data Engineering (ICDE), 2007
  205. M. Lupu, S. Madnick, Implementing the COntext INterchange (COIN) approach through use of semantic web tools, in LNCS, vol. 5005 (Springer, Berlin, 2008), pp. 77-98
  206. M. Lupu, B.C. Ooi, Y.C. Tay, Paths to stardom: calibrating the potential of a peer-based data management system, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008
  207. M. Lupu, B. Yu, HiWaRPP-hierarchical wavelet-based retrieval on peer-to-peer network, in Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE), p. 133, 2006
  208. T. Luu, F. Klemm, I. Podnar, M. Rajman, K. Aberer, Alvis peers: a scalable full-text peer-to- peer retrieval engine, in Proceedings of P2PIR, pp. 41-48, 2006
  209. Q. Lv, P. Cao, E. Cohen, K. Li, S. Shenker, Search and replication in unstructured peer-to- peer networks, in Proceedings of the 16th ACM International Conference on Supercomputing (ICS), pp. 84-95, 2002
  210. S. Madden, M. Shah, J.M. Hellerstein, V. Raman, Continuously adaptive continuous queries over streams, in Proceedings of the ACM SIGMOD International Conference on Manage- ment of Data, 2002
  211. J. Madhavan, A. Halevy, Composing mappings among data sources, in Proceedings of the 29th International Conference on Very Large Databases (VLDB), 2003
  212. D. Malkhi, M. Naor, D. Ratajczak, Viceroy: a scalable and dynamic emulation of the but- terfly, in Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC), 2002
  213. U. Manber, Finding similar files in a large file system, in Proceedings of the USENIX Winter 1994 Technical Conference, pp. 1-10, 17-21, San Fransisco, CA, USA, 1994
  214. G.S. Manku, Balanced binary trees for ID management and load balance in distributed hash tables, in Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC), 2004
  215. S. Marsh, Formalising trust as a computational concept. PhD thesis, University of Stirling, Stirling, 1994
  216. E. Martinian, Distributed Internet Backup System (DIBS), 2003
  217. P. Maymounkov, D. Mazieres, Kademlia: a peer-to-peer information system based on the xor metric, in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), March 2002
  218. McAfee, McAfee rumor technology. http://www.mcafeeasap.com/intl/EN/content/ virusscan_asap/rumor.asp
  219. R.C. Merkle, A certified digital signature, in Proceedings of the 9th International Cryptology Conference (CRYPTO), pp. 218-238, Santa Barbara, CA, August 1989
  220. Microsoft, Peer name resolution protocol (PNRP) version 4.0 specification. http://msdn.microsoft.com/en-us/library/cc239047.aspx, 2008
  221. J. Miller, Jabber: conversational technologies, in Peer-to-Peer: Harnessing the Power of Dis- ruptive Technologies (O'Reilly & Associates, 2001), pp. 77-88
  222. M. Mitzenmacher, The power of two choices in randomized load balancing. IEEE Trans. Parallel Distrib. Syst. 12(10), 1094-1104 (2001)
  223. A.T. Mizrak, Y. Cheng, V. Kumar, S. Savage, Structured superpeers: leveraging heterogene- ity to provide constant-time lookup, in Proceedings of the 3rd IEEE Workshop on Internet Applications (WIAPP), 2003
  224. A. Mondal, Y. Lifu, M. Kitsuregawa, P2PR-Tree: an R-tree-based spatial index for peer-to- peer environments, in Proceedings of the EDBT Workshop on P2P and Databases (P2PDB), 2004
  225. Napster filesharing system, shutdown as of March 2001. http://www.napster.com, 2000
  226. R.M. Needham, Denial-of-service: an example. Commun. ACM 37(11), 42-46 (1994)
  227. W. Nejdl, W. Siberski, M. Sintek, Design issues and challenges for rdf-and schema-based peer-to-peer systems. SIGMOD Rec. 32(3), 41-46 (2003)
  228. W. Nejdl, B. Wolf, C. Qu, S. Decker, M. Sintek, A. Naeve, M. Nilsson, M. Palmer, T. Risch, Edutella: a P2P networking infrastructure based on rdf, in Proceedings of the 11th World Wide Web Conference (WWW), 2002
  229. Net-Z, http://www.proksim.com/
  230. P.G. Neumann, Inside risks: denial-of-service attacks. Commun. ACM 43(4), 136-136 (2000)
  231. C.H. Ng, K.C. Sia, Peer clustering and firework query model, in Proceedings of the 11th World Wide Web Conference (WWW), 2002
  232. W.S. Ng, B.C. Ooi, Y.F. Shu, K.-L. Tan, W.H. Tok, Efficient distributed CQ processing using peers, in Proceedings of the 12th World Wide Web Conference (WWW), 2003
  233. W.S. Ng, B.C. Ooi, K.L. Tan, BestPeer: a self-configurable peer-to-peer system, in Proceed- ings of the 18th IEEE International Conference on Data Engineering (ICDE), p. 272, San Jose, CA, April 2002
  234. W.S. Ng, B.C. Ooi, K.-L. Tan, A. Zhou, PeerDB: a P2P-based system for distributed data sharing, in Proceedings of the 19th IEEE International Conference on Data Engineering (ICDE) (IEEE Press, New York, 2003)
  235. W.S. Ng, W.H. Tok, B.C. Ooi, K.-L. Tan, A. Zhou, Efficient pervasive continuous query processing using peers. Technical report, Department of Computer Science, National Uni- versity of Singapore, 2002
  236. T.-W. Ngan, D. Wallach, P. Druschel, Enforcing fair sharing of peer-to-peer resources, in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), Berkeley, CA, USA, 2003
  237. NICE, http://www.cs.umd.edu/projects/nice/
  238. M. Nottingham, Caching tutorial for web authors and webmasters. http://www.mnot.net/ cache_docs/, 2003
  239. D. Novak, P. Zezula, M-Chord: a scalable distributed similarity search structure, in Proceed- ings of the 1st International Conference on Scalable Information Systems (INFOSCALE), 2006
  240. M.A. Nowak, K. Sigmund, Evolution of indirect reciprocity by image scoring. Nature 393, 573-577 (1998)
  241. OceanStore, http://oceanstore.cs.berkeley.edu/
  242. C. O'Donnell, V. Vaikuntanathan, Information leak in the chord lookup protocol, in Proceed- ings of the 4th IEEE International Conference on Peer-to-Peer Computing, August 2004
  243. L. Oliveira, L. Lopes, F. Silva, P3: parallel peer to peer an internet parallel programming environment, in Proceedings of the Workshop on Web Engineering and Peer-to-Peer Com- puting, pp. 274-288, 2002
  244. B.C. Ooi, K.-L. Tan, C. Yu, S. Bressan, indexing the edges-a simple and yet efficient ap- proach to high-dimensional indexing, in Proceedings of the 19th ACM Symposium on Prin- ciples of Database Systems (PODS), pp. 166-174, 2000
  245. Openext, http://www.openext.com/
  246. A. Oram (ed.), Peer-to-Peer: Harnessing the Power of Disruptive Technologies (O'Reilly & Associates, 2001)
  247. A. Oram, Gnutella and Freenet represent true technological innovation. http://www.openp2p. com/pub/a/208, 2003
  248. J. Ott, D. Kutscher, Applying DTN to mobile internet access: an experiment with HTTP. Technical Report tr-tzi-050701, Helsinki University of Technology, Networking Laboratory, 2005
  249. H. Pang, K.-L. Tan, Authenticating query results in edge computing, in Proceedings of the 20th IEEE Conference on Data Engineering (ICDE) (IEEE Press, New York, 2004), pp. 572-583
  250. X. Pang, B. Catania, K.-L. Tan, Securing your data in agent-based P2P systems, in Proceed- ings of the 8th International Conference on Database Systems for Advanced Applications (DASFAA), 2003
  251. V. Papadimos, D. Maier, Mutant query plans. Inf. Softw. Technol. 44(4), 197-206 (2002) References
  252. V. Papadimos, D. Maier, K. Tufte, Distributed query processing and catalogs for peer-to-peer systems, in Proceedings of the 1st Conference on Innovative Data Systems Research (CIDR), 2003
  253. M. Papazoglou, Web Services: Principles and Technology (Addison-Wesley Longman, Read- ing, 2007)
  254. A. Pfitzmann, M. Köhntopp, Anonymity, unobservability, and pseudonymity: a proposal for terminology. http://www.koehntopp.de/marit/pub/anon/Anon_Terminology_IHW.pdf, 2001
  255. M. Pitkanen, J. Ott, Enabling opportunistic storage for mobile DTNs. in Pervasive and Mo- bile Computing, 2008
  256. C. Plaxton, R. Rajaraman, A. Richa, Accessing nearby copies of replicated objects in a dis- tributed environment, in Proceedings of the ACM Symposium on Parallel Algorithms and Architectures (SPAA), pp. 311-320, 1997
  257. C.G. Plaxton, R. Rajaraman, A.W. Richa, Accessing nearby copies of replicated objects in a distributed environment, in Proceedings of the ACM Symposium on Parallel Algorithms and Architectures (SPAA), pp. 311-320, 1997
  258. V. Pless, Introduction to the Theory of Error-Correcting Codes, 3rd edn. (Wiley, New York, 1998)
  259. W. Pugh, Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33(6), 668- 676 (1990)
  260. J. Pujol, R. Sanguesa, Extracting reputation in multi agent systems by means of social net- work topology, in Proceedings of the 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), 2002
  261. C. Qu, W. Nejdl, M. Kriesell, Cayley DHTs-a group theoretic framework for analyzing DHTs based on Cayley graphs, in Proceedings of the 2nd International Symposium on Par- allel and Distributed Processing and Applications (ISPA), 2004
  262. V. Ramasubramanian, E.G. Sirer, Beehive: exploiting power law query distributions for O(1) lookup performance in peer to peer overlays, in Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp. 331-342, 2004
  263. A. Rao, K. Lakshminarayanan, S. Surana, R. Karp, I. Stoica, Load balancing in structured P2P systems, in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), 2003
  264. D. Ratajczak, J.M. Hellerstein, Deconstructing DHTs. Technical Report IRB-TR-04-042, Intel Research Berkeley, November 2003
  265. S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content-addressable network, in Proceedings of the ACM SIGCOMM Conference, pp. 161-172, 2001
  266. D. Reed, I. Pratt, P. Menage, S. Early, N. Stratford, Xenoservers: accounted execution of untrusted code, in Proceedings of the 7th Workshop on Hot Topics in Operating Systems (HotOS), 1999
  267. M.E. Renada, J. Callan, The robustness of content-based search in hierarchical peer to peer networks, in Proceedings of the 13th ACM International Conference on Information and Knowledge Management (CIKM), pp. 562-570, 2004
  268. P. Reynolds, A. Vahdat, Efficient peer-to-peer keyword searching, in Proceedings of the In- ternational Conference on Middleware, pp. 21-40, 2003
  269. S.C. Rhea, J. Kubiatowicz, Probabilistic location and routing, in Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2002
  270. R.L. Rivest, RFC 1321: the MD5 message-digest algorithm, in Internet Activities Board, April 1992
  271. A. Rodriguez, C. Killian, S. Bhat, D. Kostic, A. Vahdat, MACEDON: methodology for au- tomatically creating, evaluating and designing overlay networks, in Proceedings of NSDI Symposium, 2004
  272. P. Rodriguez-Gianolli, A. Kementsietsidis, M. Garzetti, I. Kiringa, L. Jiang, M. Masud, R.J. Miller, J. Mylopoulos, Data sharing in the Hyperion peer database system, in Proceedings of the 31st International Conference on Very Large Databases (VLDB), 2005
  273. M. Roussopoulos, M. Baker, CUP: Controlled update propagation in peer-to-peer networks, in Proceedings of the 2003 USENIX Annual Technical Conference, 2003
  274. A. Rowstron, P. Druschel, Pastry: scalable, distributed object location and routing for large- scale peer-to-peer systems, in Proceedings of the 18th IFIP/ACM International Conference of Distributed Systems Platforms (Middleware), pp. 329-350, 2001
  275. A. Rowstron, P. Druschel, Storage management and caching in PAST: a large-scale, persis- tent peer-to-peer storage utility, in Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), pp. 188-201, Banff, Canada, October 2001
  276. J. Sabater, C. Sierra, Regret: a reputation model for gregarious societies, in Proceedings of the 4th Workshop on Deception, Fraud and Trust in Agetn Societies, 2001
  277. H. Sagan, Space-Filling Curves (Springer, Berlin, 1994)
  278. O.D. Sahin, F. Emekci, D. Agrawal, A.E. Abbadi, Content-based similarity search over peer- to-peer systems, in Proceedings of the 2nd International Workshop On Databases, Informa- tion Systems and Peer-to-Peer Computing (DBISP2P), pp. 61-78, 2004
  279. O.D. Sahin, A. Gulbeden, F. Emekci, D. Agrawal, A. El Abbadi, PRISM: indexing multi- dimensional data in P2P networks using reference vectors, in Proceedings of the 13th annual ACM International Conference on Multimedia, pp. 946-955, 2005
  280. O.D. Sahin, A. Gupta, D. Agrawal, A. El Abbadi, A peer-to-peer framework for caching range queries, in Proceedings of the 20th IEEE International Conference on Data Engineer- ing (ICDE), 2004
  281. P. Saint-Andre, Serverless messaging: XMPP extension protocol 0174. http://xmpp.org/ extensions/xep-0174.html
  282. G. Salton, A. Wong, C.S. Yang, A vector space model for automatic indexing. Commun. ACM 18(11), 613-620 (1975)
  283. S. Saroiu, P.K. Gummadi, S.D. Gribble, A measurement study of peer-to-peer file sharing systems, in Proceedings of the 9th Multimedia Computing and Networking (MMCN), 2002
  284. M. Schlosser, M. Sintek, S. Decker, W. Nejdl, A scalable and ontology-based P2P infrastruc- ture for semantic web services, in Proceedings of 2nd IEEE International Conference on Peer-to-Peer Computing, 2002
  285. M.T. Schlosser, M. Sintek, S. Decker, W. Nejdl, HyperCuP-hypercubes, ontologies, and efficient search on peer-to-peer networks, in Proceedings of the International Workshop on Agents and Peer-to-Peer Computing (AP2PC), pp. 112-124, 2002
  286. C. Schmidt, M. Parashar, Flexible information discovery in decentralized distributed sys- tems, in Proceedings of the 12th International Symposium on High Performance Distributed Computing (HPDC), 2003
  287. SETI@home, http://setiathome.ssl.berkeley.edu/
  288. Shareaza, http://www.shareaza.com/
  289. H. Shen, Y. Shu, B. Yu, Efficient semantic-based content search in P2P network. IEEE Trans. Knowl. Data Eng. 16(7), 813-826 (2004)
  290. C. Shirky, Listening to Napster, in Peer-to-Peer: Harnessing the Power of Disruptive Tech- nologies. (O'Reilly & Associates, 2001)
  291. C. Shirky, What is P2P. . . and what isn't. http://www.openp2p.com/pub/a/p2p/2000/11/24/ shirky1-whatisp2p.html
  292. Y. Shu, K.-L. Tan, A. Zhou, Adapting the content native space for load balanced, in Proceed- ings of the 2nd International Workshop On Databases, Information Systems and Peer-to-Peer Computing (DBISP2P), pp. 122-135, 2004
  293. K. Shudo, Y. Tanaka, S. Sekiguchi, Overlay weaver: an overlay construction toolkit. Comput. Commun. 31(2) (2008)
  294. A. Singla, C. Rohrs, Ultrapeers: another step towards Gnutella scalability. http://groups. yahoo.com/group/the_gdf/files/Proposals/Working%20Proposals/Ultrapeer/, 2002
  295. E. Sit, J. Cates, R. Cox, A DHT-based backup system, in Proceedings of the 1st IRIS Student Workshop, 2003
  296. E. Sit, A. Haeberlen, F. Dabek, B.-G. Chun, H. Weatherspoon, R. Morris, M.F. Kaashoek, J. Kubiatowicz, Proactive replication, for data durability, in Proceedings of the 3rd Interna- tional Workshop on Peer-to-Peer Systems (IPTPS), 2006
  297. E. Sit, R. Morris, Security considerations for peer-to-peer distributed hash tables, in Pro- ceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), pp. 261-269, Cambridge, MA, 2002
  298. M. Slee, A. Agarwal, M. Kwiatkowski, Thrift: scalable cross-language services implemen- tation. http://developers.facebook.com/thrift/, 2007
  299. A.C. Snoeren, K. Conley, D.K. Gifford, Mesh-based content routing using XML, in Proceed- ings of the 18th ACM Symposium on Operating Systems Principles (SOSP), 2001
  300. K. Sripanidkulchai, B. Maggs, H. Zhang, Efficient content location using interest-based lo- cality in peer-to-peer systems, in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2003
  301. M. Srivatsa, L. Xiong, L. Liu, Trustguard: countering vulnerabilities in reputation manage- ment for decentralized overlay networks, in Proceedings of the 14th World Wide Web Con- ference (WWW), 2005
  302. N. Stakhanova, S. Basu, J. Wang, O. Stakhanov, Trust framework for P2P networks using peer-profile based anamoly technique, in Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS), 2005
  303. W.R. Stevens, UNIX Network Programming (Prentice-Hall, New York, 1998)
  304. J. Stribling, I.G. Councill, J. Li, M.F. Kaashoek, D.R. Karger, R. Morris, S. Shenker, OverCite: a cooperative digital research library, in Proceedings of the 4th International Work- shop on Peer-to-Peer Systems (IPTPS), pp. 69-79, 2005
  305. T. Suel, C. Mathur, J. Wu, J. Zhang, A. Delis, M. Kharrazi, X. Long, K. Shanmugasundaram, ODISSEA: a peer-to-peer architecture for scalable web search and information retrieval, in Proceedings of the 6th International Workshop on the Web and Databases (WebDB), 2003
  306. Q. Sun, H. Garcia-Molina, SLIC: a selfish link-based incentive mechanism for unstructured peer-to-peer networks, in Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS), pp. 506-515, Tokyo, Japan, March 2004
  307. G. Suryanarayana, R.N. Taylor, A survey of trust management and resource discovery tech- nologies in peer-to-peer applications. Technical report, UC Irvine, July 2004
  308. A.S. Tanenbaum, Modern Operating Systems (Prentice-Hall, Upper Saddle River, 2001)
  309. C. Tang, S. Dwarkadas, Hybrid global-local indexing for efficient peer-to-peer information retrieval, in Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp. 211-224, 2004
  310. C. Tang, Z. Xu, S. Dwarkadas, Peer-to-peer information retrieval using self-organizing se- mantic overlay networks, in Proceedings of the ACM SIGCOMM Conference, pp. 175-186, 2003
  311. C. Tang, Z. Xu, M. Mahalingam, pSearch: information retrieval in structured overlays, in Proceedings of the 1st Workshop on Hot Topics in Networks (HotNets), 2002
  312. I. Tatarinov, A. Halevy, Efficient query reformulation in peer-data management systems, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004
  313. The TLS Protocol Version 1.0. IETF RFC 2246. http://www.ietf.org/rfc/rfc2246.txt
  314. M.R. Thompson, A. Essiari, S. Mudumbai, Certificate-based authorization policy in a PKI environment. ACM Trans. Inf. Syst. Secur. 6(4), 566-588 (2003)
  315. W.H. Tok, S. Bressan, Efficient and adaptive processing of multiple continuous queries, in Proceedings of the 8th International Conference on Extending Database Technology (EDBT), 2002
  316. B. Traversat, M. Abdelaziz, E. Pouyoul, Project jxta: a loosely-consistent dht rendezvous walker, 2003
  317. P. Triantafillow, C. Xiruhaki, M. Koubarakis, N. Ntarmos, Towards high performance peer- to-peer content and resource sharing systems, in Proceedings of the 1st Conference on Inno- vative Data Systems Research (CIDR), 2003
  318. A. Tridgell, Efficient algorithms for sorting and synchronization. PhD thesis, Australian Na- tional University, 1999
  319. C. Tryfonopoulos, S. Idreos, M. Koubarakis, LibraRing: an architecture for distributed digital libraries based on DHTs, in Proceedings of the 9th European Conference on Research and Advanced Technology for Digital Libraries (ECDL), pp. 25-36, 2005
  320. D. Tsoumakos, N. Roussopoulos, Adaptive probabilistic search in peer-to-peer networks, in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), 2003
  321. VeriSign, Addressing the effective enterprise communication challenge. White paper, Octo- ber 2007
  322. A. Vlachou, C. Doulkeridis, Y. Kotidis, M. Vazirgiannis, SKYPEER: efficient subspace sky- line computation over distributed data, in Proceedings of the 23rd IEEE International Con- ference on Data Engineering (ICDE), 2007
  323. Q.H. Vu, B.C. Ooi, D. Papadias, A.K.H. Tung, A graph method for keyword-based selection of the top-K databases, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008
  324. W3C, Simple object access protocol recommendation (second edition). http://www.w3. org/TR/soap/, April 2007
  325. M. Waldman, L. Cranor, A. Rubin, Publius, in Peer-to-Peer: Harnessing the Power of Dis- ruptive Technologies (O'Reilly & Associates, 2001), pp. 145-158
  326. D. Wallach, A survey on peer-to-peer security issues, in Proceedings of the International Symposium on Software Security, Tokyo, Japan, November 2002
  327. J. Wang, A survey of web caching schemes for the internet. ACM Comput. Commun. Rev. 25(9), 36-46 (1999)
  328. S. Wang, B.C. Ooi, A.K.H. Tung, L. Xu, Efficient skyline query processing on peer-to-peer networks, in Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE), 2007
  329. X. Wang, W.S. Ng, B.C. Ooi, K.-L. Tan, A. Zhou, BuddyWeb: a P2P-based collaborative web caching system, in Proceedings of the Web Engineering and Peer-to-Peer Computing, Networking Workshops, pp. 247-251, Pisa, Italy, 2002
  330. Y. Wang, V. Viradharajan, Trust 2 : developing trust in peer-to-peer environments, in Proceed- ings of the IEEE International Conference on Services Computing (SCC), pp. 24-31, 2005
  331. Y. Wang, V. Viradharajan, Dynamictrust: the trust development in peer-to-peer environments, in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 302-305, 2006
  332. H. Weatherspoon, J. Kubiatowicz, Erasure coding vs. replication: a quantitative comparison, in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), March 2002
  333. H. Weatherspoon, J. Kubiatowicz, Naming and integrity: self-verifying data in peer-to-peer systems, in Proceedings of the International Workshop on Future Directions in Distributed Computing (FuDiCo), pp. 142-147, 2003
  334. A. Wierzbicki, N. Leibowitz, M. Ripeanu, R. Wozniak, Cache replacement policies revisited: the case of P2P traffic, in Proceedings of the 4th International Workshop on Global and Peer- to-Peer Computing (GP2P), 2004
  335. S.K.M. Wong, W. Ziarko, V.V. Raghavan, P.C.N. Wong, On modeling of information retrieval concepts in vector spaces. ACM Trans. Database Syst. 12(3), 299-321 (1987)
  336. P. Wu, C. Zhang, Y. Feng, B.Y. Zhao, D. Agrawal, A.E. Abbadi, Parallelizing skyline queries for scalable distribution, in Proceedings of the 10th International Conference on Extending Database Technology (EDBT), pp. 112-130, 2006
  337. S. Wu, S. Jiang, B.C. Ooi, K.L. Tan, Distributed online aggregation, in Proceedings of the International Conference on Very Large Data Bases, 2009
  338. S. Wu, J. Li, B.C. Ooi, K.-L. Tan, Just-in-time query retrieval over partially indexed data on structured P2P overlays, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008
  339. L. Xiong, L. Liu, Peertrust: supporting reputation-based trust for peer-to-peer electronic com- munities. IEEE Trans. Knowl. Data Eng. 7, 843-857 (2004)
  340. B. Yang, H. Garcia-Molina, Comparing hybrid peer-to-peer systems, in Proceedings of the 27th International Conference on Very Large Data Bases (VLDB), 2001
  341. B. Yang, H. Garcia-Molina, Efficient search in peer-to-peer networks, in Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS), 2001 References
  342. B. Yang, H. Garcia-Molina, Improving search in peer-to-peer networks, in Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), 2002
  343. B. Yang, H. Garcia-Molina, Designing a super-peer network, in Proceedings of the 19th IEEE International Conference on Data Engineering (ICDE), 2003
  344. P.N. Yianilos, Data structures and algorithms for nearest neighbor search in general metric spaces, in Proceedings of the 4th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1993
  345. B. Yu, G. Li, K. Sollins, A.K.H. Tung, Effective keyword-based selection of relational data- bases, in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007
  346. M.J. Yuan, Mobile P2P messaging. http://www.ibm.com/developerworks/wireless/library/ wi-p2pmsg/, December 2002
  347. C. Zhang, A. Krishnamurthy, R.Y. Wang, SkipIndex: towards a scalable peer-to-peer index service for high dimensional data. Technical Report TR-703-04, Princeton University, 2004
  348. B.Y. Zhao, J.D. Kubiatowicz, A.D. Joseph, Tapestry: an infrastructure for fault-tolerant wide- area location and routing. Technical Report UCB/CSD-01-1141, Computer Science Division, University of California, Berkeley, Berkeley, CA, 2001
  349. R. Zhou, K. Hwang, Powertrust: a robust and scalable reputation system for trusted peer-to- peer computing. IEEE Trans. Parallel Distrib. Syst. 29(8-13), 953-964 (2006)
  350. S. Zhou, Z. Zhang, W. Qian, A. Zhou, SIPPER: selecting informative peers in structured P2P environment for content-based retrieval, in Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE), p. 161, 2006
  351. P. Zimmermann, PGP User's Guide (MIT Press, Cambridge, 1994)