Default Cover Image

2007 7th International Conference on Peer-to-Peer Computing

Sept. 2 2007 to Sept. 5 2007

Galway

Table of Contents

Introduction
Message from the Conference ChairsFreely available from IEEE.pp. viii
Introduction
Conference OrganizersFreely available from IEEE.pp. ix
Introduction
Program CommitteeFreely available from IEEE.pp. x
Globase.KOM - A P2P Overlay for Fully Retrievable Location-based SearchFull-text access may be available. Sign in or learn about subscription options.pp. 87-96
Introduction
ReviewersFreely available from IEEE.pp. xii
Introduction
Additional reviewersFreely available from IEEE.pp. xiii
Session: Security, Trust and Reputation 1
Rescuing Tit-for-Tat with Source CodingFull-text access may be available. Sign in or learn about subscription options.pp. 3-10
Session: Security, Trust and Reputation 1
Bounds on the Performance of P2P Networks Using Tit-for-Tat StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
On Routing in Distributed Hash TablesFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Session: Security, Trust and Reputation 1
Modelling Real P2P Networks: The Effect of AltruismFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Session: Security, Trust and Reputation 1
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash TablesFull-text access may be available. Sign in or learn about subscription options.pp. 27-36
Session: Security, Trust and Reputation 2
Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrentFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Session: Security, Trust and Reputation 2
A Trust-Based Exchange Framework for Multiple Services in P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 45-52
Session: Security, Trust and Reputation 2
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
Session: Security, Trust and Reputation 2
A Feasibility Study on Defending Against Ultra-Fast TopologicalWormsFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Session: Searching and Query Management
Completeness Estimation of Range Queries in Structured OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 71-78
Impact of Vertical Handovers on Cooperative Content Distribution SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
Session: Searching and Query Management
Predicting Query Duplication with Box-Jenkins Models and Its ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Session: Routing
Price of Structured Routing and Its Mitigation in P2P Systems under ChurnFull-text access may be available. Sign in or learn about subscription options.pp. 97-104
Session: Routing
An Efficient Eigenvalue-based P2P XML Routing FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 105-112
Session: Overlay Networks
An End-to-End Solution to Scalable Unstructured P2P NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 123-131
Fabric: Synergistic Proximity Neighbour Selection MethodFull-text access may be available. Sign in or learn about subscription options.pp. 229-230
Session: Overlay Networks
Handling Network Partitions and Mergers in Structured Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 132-139
Session: Overlay Networks
Cooperative Keep-Alives: An Efficient Outage Detection Algorithm for P2P Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 140-150
Session: Data Management
A Data Placement Scheme with Time-Related Model for P2P StoragesFull-text access may be available. Sign in or learn about subscription options.pp. 151-158
Session: Data Management
W*-Grid: A Robust Decentralized Cross-layer Infrastructure for Routing and Multi-Dimensional Data Management in Wireless Ad-Hoc Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 159-166
Session: Data Management
Distributed, Automatic File Description Tuning in Peer-to-Peer File-Sharing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 167-176
Session: Services and Applications
A DHT-based Infrastructure for Content-based Publish/Subscribe ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 185-192
Session: Services and Applications
Grid Resource Scheduling with Gossiping ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 193-202
Session: Overlay Construction
Self-Stabilization in Preference-Based NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 203-210
Session: Overlay Construction
Peer-to-Peer RatingFull-text access may be available. Sign in or learn about subscription options.pp. 211-218
Session: Overlay Construction
Mapping Small WorldsFull-text access may be available. Sign in or learn about subscription options.pp. 219-228
Short Papers
The BitCod Client: A BitTorrent Clone using Network CodingFull-text access may be available. Sign in or learn about subscription options.pp. 231-232
Short Papers
P2P-IM: A P2P Presence System for the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 233-234
Short Papers
Private Peer-to-Peer Overlay for Real-Time Monitoring of a Deployed Internet-Scale Peer-to-Peer OverlayFull-text access may be available. Sign in or learn about subscription options.pp. 235-236
Short Papers
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash TablesFull-text access may be available. Sign in or learn about subscription options.pp. 237-238
Short Papers
How stable are large superpeer networks against attack?Full-text access may be available. Sign in or learn about subscription options.pp. 239-242
Demonstration Papers
A P2PSIP Demonstrator Powered by OverSimFull-text access may be available. Sign in or learn about subscription options.pp. 243-244
Demonstration Papers
Running the Windows P2P Infrastructure on Mobile PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 245-246
Demonstration Papers
PEPINO: PEer-to-Peer network INspectOrFull-text access may be available. Sign in or learn about subscription options.pp. 247-248
Demonstration Papers
The Effect of Viral Media on Business Usage of P2PFull-text access may be available. Sign in or learn about subscription options.pp. 249-250
Demonstration Papers
PISA: P2P Wi-Fi Internet Sharing ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 251-252
Author Index
Author IndexFreely available from IEEE.pp. 253
Showing 46 out of 46