


default search action
IPTPS 2002: Cambridge, MA, USA
- Peter Druschel, M. Frans Kaashoek, Antony I. T. Rowstron:

Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Lecture Notes in Computer Science 2429, Springer 2002, ISBN 3-540-44179-4 - Richard Clayton:

Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems. 1-21
Structure Overlay Routing Protocols: State of the Art and Future Directions
- David Liben-Nowell, Hari Balakrishnan, David R. Karger

:
Observations on the Dynamic Evolution of Peer-to-Peer Networks. 22-33 - Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz:

Brocade: Landmark Routing on Overlay Networks. 34-44 - Sylvia Ratnasamy, Ion Stoica, Scott Shenker:

Routing Algorithms for DHTs: Some Open Questions. 45-52 - Petar Maymounkov, David Mazières:

Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. 53-65 - Michael J. Freedman, Radek Vingralek:

Efficient Peer-to-Peer Lookup Based on a Distributed Trie. 66-75 - Amin Vahdat, Jeffrey S. Chase, Rebecca Braynard, Dejan Kostic, Patrick Reynolds, Adolfo Rodriguez:

Self-Organizing Subsets: From Each According to His Abilities, to Each According to His Needs. 76-84
Deployed Peer-to-Peer Systems
- Matei Ripeanu, Ian T. Foster

:
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems. 85-93 - Qin Lv, Sylvia Ratnasamy, Scott Shenker:

Can Heterogeneity Make Gnutella Scalable? 94-103 - Bryce Wilcox-O'Hearn:

Experiences Deploying a Large-Scale Emergent Network. 104-110
Anonymous Overlays
- Andrei Serjantov:

Anonymizing Censorship Resistant Systems. 111-120 - Michael J. Freedman, Emil Sit, Josh Cates, Robert Morris:

Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. 121-129
Applications
- Steven Hand, Timothy Roscoe:

Mnemosyne: Peer-to-Peer Steganographic Storage. 130-140 - Sameer Ajmani, Dwaine E. Clarke, Chuang-Hue Moh, Steven Richman:

ConChord: Cooperative SDSI Certificate Storage and Name Resolution. 141-154 - Russ Cox, Athicha Muthitacharoen, Robert T. Morris:

Serving DNS Using a Peer-to-Peer Lookup Service. 155-165 - Sridhar Srinivasan, Ellen W. Zegura:

Network Measurement as a Cooperative Enterprise. 166-177 - Venkata N. Padmanabhan, Kunwadee Sripanidkulchai:

The Case for Cooperative Networking. 178-190 - Ion Stoica, Daniel Adkins, Sylvia Ratnasamy, Scott Shenker, Sonesh Surana, Shelley Zhuang:

Internet Indirection Infrastructure. 191-202 - Tyron Stading, Petros Maniatis, Mary Baker:

Peer-to-Peer Caching Schemes to Address Flash Crowds. 203-213
Evaluation
- Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble:

Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS. 214-224 - Peter J. Keleher, Bobby Bhattacharjee, Bujor D. Silaghi:

Are Virtualized Overlay Networks Too Much of a Good Thing? 225-231
Searching and Indexing
- Adriana Iamnitchi

, Matei Ripeanu, Ian T. Foster
:
Locating Data in (Small-World?) Peer-to-Peer Scientific Collaborations. 232-241 - Matthew Harren, Joseph M. Hellerstein, Ryan Huebsch, Boon Thau Loo, Scott Shenker, Ion Stoica:

Complex Queries in DHT-based Peer-to-Peer Networks. 242-259 - John R. Douceur:

The Sybil Attack. 251-260 - Emil Sit, Robert Morris:

Security Considerations for Peer-to-Peer Distributed Hash Tables. 261-269 - Jared Saia, Amos Fiat, Steven D. Gribble, Anna R. Karlin, Stefan Saroiu:

Dynamically Fault-Tolerant Content Addressable Networks. 270-279
Data Management
- Robbert van Renesse, Kenneth P. Birman

, Dan Dumitriu, Werner Vogels:
Scalable Management and Data Mining Using Astrolabe. 280-294 - Nancy A. Lynch, Dahlia Malkhi, David Ratajczak:

Atomic Data Access in Distributed Hash Tables. 295-305 - Yan Chen, Randy H. Katz, John Kubiatowicz:

Dynamic Replica Placement for Scalable Content Delivery. 306-318 - Brian F. Cooper, Hector Garcia-Molina:

Peer-to-Peer Resource Trading in a Reliable Distributed System. 319-327 - Hakim Weatherspoon, John Kubiatowicz:

Erasure Coding Vs. Replication: A Quantitative Comparison. 328-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














