Default Cover Image

2006 6th IEEE International Conference on Peer-to-Peer Computing

Sept. 6 2006 to Sept. 8 2006

Cambridge

Table of Contents

Introduction
Message from the Conference ChairsFreely available from IEEE.pp. viii
SESSION 5: Search
Dynamic Prefix Tree for Service Discovery within Large Scale GridsFull-text access may be available. Sign in or learn about subscription options.pp. 106-116
SESSION 1: Index Overlays
GosSkip, an Efficient, Fault-Tolerant and Self Organizing Overlay Using Gossip-based Construction and Skip-Lists PrinciplesFull-text access may be available. Sign in or learn about subscription options.pp. 12-22
Introduction
Organizing CommitteeFreely available from IEEE.pp. ix
Introduction
Program CommitteeFreely available from IEEE.pp. x
Introduction
ReviewersFreely available from IEEE.pp. xi-xi
SESSION 1: Index Overlays
eQuus: A Provably Robust and Locality-Aware Peer-to-Peer SystemFull-text access may be available. Sign in or learn about subscription options.pp. 3-11
SESSION 2: Cooperation
2Fast : Collaborative Downloads in P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
SESSION 2: Cooperation
Comparison of Robust Cooperation Strategies for P2P Content Distribution Networks with Multiple Source DownloadFull-text access may be available. Sign in or learn about subscription options.pp. 31-38
SESSION 2: Cooperation
Bandwidth Trading in Unstructured P2P Content Distribution NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
SESSION 3: Distributed Hash Tables 1
Cuckoo Ring: BalancingWorkload for Locality Sensitive HashFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
SESSION 3: Distributed Hash Tables 1
The Effect of Replica Placement on Routing Robustness in Distributed Hash TablesFull-text access may be available. Sign in or learn about subscription options.pp. 57-6
SESSION 4: Short Papers 1
Multi-Dimensional Prefix Search in P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 67-68
SESSION 4: Short Papers 1
Route Fingerprinting in Anonymous CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
SESSION 4: Short Papers 1
Schema Caching for Improved XML Query Processing in P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 73-74
SESSION 4: Short Papers 1
Solving Overlay Mismatching of Unstructured P2P Networks using Physical Locality InformationFull-text access may be available. Sign in or learn about subscription options.pp. 75-76
SESSION 4: Short Papers 1
Tag Indexed DHT for Scalable Search Infrastructure in Social NetworkApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 77-78
SESSION 5: Search
Cost-Aware Processing of Similarity Queries in Structured OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 81-89
SESSION 5: Search
Conjunction Dysfunction: The Weakness of Conjunctive Queries in Peer-to-Peer File-sharing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
SESSION 5: Search
Comparison of Image Similarity Queries in P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
SESSION 6: Services
Ordered Slicing of Very Large-Scale Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
SESSION 6: Services
Implicit Group Messaging over Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
SESSION 6: Services
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 133-144
SESSION 7: Multicast 1
State Aware Data Dissemination over Structured OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 145-152
SESSION 7: Multicast 1
Peer-to-Peer Error Recovery for Hybrid Satellite-Terrestrial NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 153-160
SESSION 7: Multicast 1
Risk Driven Semantic P2P Service RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
SESSION 8: Security
Computational Puzzles as Sybil DefensesFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
SESSION 8: Security
Certificate-based Access Control in Pure P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
SESSION 8: Security
Defense against Intrusion in a Live Streaming Multicast SystemFull-text access may be available. Sign in or learn about subscription options.pp. 185-192
SESSION 8: Security
A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer GridsFull-text access may be available. Sign in or learn about subscription options.pp. 193-202
SESSION 9: P2P in MANETs
Towards Scalable Mobility in Distributed Hash TablesFull-text access may be available. Sign in or learn about subscription options.pp. 203-209
SESSION 9: P2P in MANETs
W-Grid: a Cross-Layer Infrastructure for Multi-Dimensional Indexing, Querying and Routing in Wireless Ad-Hoc and Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 210-220
SESSION 10: Short Papers 2
Video Streaming on the Internet Using Split and Merge MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 221-222
SESSION 10: Short Papers 2
P^22P - Prepaid Peer-to-Peer ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 223-224
SESSION 10: Short Papers 2
A Middleware-based Telecom Service Architecture for Peer-to-peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 225-226
SESSION 10: Short Papers 2
Internet Scale Testing of PNRP Using WiDS Network SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 227-228
SESSION 10: Short Papers 2
Experiences Developing Mobile P2P Applications with LightPeersFull-text access may be available. Sign in or learn about subscription options.pp. 229-230
SESSION 11: Distrubuted Hash Tables 2
Cost-Based Analysis of Hierarchical DHT DesignFull-text access may be available. Sign in or learn about subscription options.pp. 233-239
SESSION 11: Distrubuted Hash Tables 2
Self-Organizing Content Distribution in a Data Indexed DHT NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 241-248
SESSION 11: Distrubuted Hash Tables 2
Analytical Study on Improving DHT Lookup Performance under ChurnFull-text access may be available. Sign in or learn about subscription options.pp. 249-258
SESSION 12: Multicast 2
Scalable Blind Search and Broadcasting in Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 259-266
SESSION 12: Multicast 2
Reinforcement Learning for Query-Oriented Routing Indices in Unstructured Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 267-274
SESSION 12: Multicast 2
The Orchard Algorithm: P2P Multicasting without Free-RidingFull-text access may be available. Sign in or learn about subscription options.pp. 275-282
Author Index
Author IndexFreely available from IEEE.pp. 283-284
Showing 47 out of 47