The Community for Technology Leaders
Peer-to-Peer Computing, IEEE International Conference on (2004)
Z?rich, Switzerland
Aug. 25, 2004 to Aug. 27, 2004
ISBN: 0-7695-2156-8
TABLE OF CONTENTS
Introduction
Session: Object Location and Retrieval

Percolation Search in Power Law Networks: Making Unstructured Peer-to-Peer Networks Scalable (Abstract)

P. Oscar Boykin , University of California at Los Angeles
Vwani P. Roychowdhury , University of California at Los Angeles
Nima Sarshar , University of California at Los Angeles
pp. 2-9

Cache Updates in a Peer-to-Peer Network of Mobile Agents (Abstract)

Elias Leontiadis , University of Ioannina
Evaggelia Pitoura , University of Ioannina
Vassilios V. Dimakopoulos , University of Ioannina
pp. 10-17
Session: Security

Information Leak in the Chord Lookup Protocol (Abstract)

Vinod Vaikuntanathan , Massachussets Institute of Technology
Charles W. O'Donnell , Massachussets Institute of Technology
pp. 28-35

On the Security of Polling Protocols in Peer-to-Peer Systems (Abstract)

Mukesh Singhal , University of Kentucky
Bartlomiej Sieka , University of Illinois at Chicago
Ajay D. Kshemkalyani , University of Illinois at Chicago
pp. 36-44

PKI-Based Security for Peer-to-Peer Information Sharing (Abstract)

Artur Muratas , Lawrence Berkeley National Laboratory
Karlo Berket , Lawrence Berkeley National Laboratory
Abdelilah Essiari , Lawrence Berkeley National Laboratory
pp. 45-52

Adaptive Peer-to-Peer Topologies (Abstract)

Sepandar D. Kamvar , Stanford University
Hector Garcia-Molina , Stanford University
Tyson Condie , Stanford University
pp. 53-62
Session: Storage Systems

Update Propagation through Replica Chain in Decentralized and Unstructured P2P Systems (Abstract)

Zhijun Wang , University of Texas at Arlington
Sajal K. Das , University of Texas at Arlington
Mohan Kumar , University of Texas at Arlington
Huaping Shen , University of Texas at Arlington
pp. 64-71

PeerStore: Better Performance by Relaxing in Peer-to-Peer Backup (Abstract)

Martin Landers , Technische Universität München
Kian-Lee Tan , National University of Singapore
Han Zhang , National University of Singapore
pp. 72-79

Improving Bandwidth Efficiency of Peer-to-Peer Storage (Abstract)

John Kubiatowicz , University of California at Berkeley
Patrick Eaton , University of California at Berkeley
Emil Ong , University of California at Berkeley
pp. 80-89

Erasure Code Replication Revisited (Abstract)

W. K. Lin , Chinese University of Hong Kong
D. M. Chiu , Chinese University of Hong Kong
Y. B. Lee , Chinese University of Hong Kong
pp. 90-97
Session: Trust and Reputation

P2P Scrabble. Can P2P Games Commence? (Abstract)

Adam Wierzbicki , Polish-Japanese Institute of Information Technology
Tomasz Kucharski , Polish-Japanese Institute of Information Technology
pp. 100-107

Collaborative Automated Trust Negotiation in Peer-to-Peer Systems (Abstract)

Song Ye , Dartmouth College
James Ford , Dartmouth College
Fillia Makedon , Dartmouth College
pp. 108-115

SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks (Abstract)

Nikos Ntarmos , R.A. Computer Technology Institute and University of Patras
Peter Triantafillou , R.A. Computer Technology Institute and University of Patras
pp. 116-123
Session: Network Management

A Placement Scheme for Peer-to-Peer Networks Based on Principles from Geometry (Abstract)

Michael Kleis , Fraunhofer Institute FOKUS
Xiaoming Zhou , Delft University of Technology
pp. 134-141

Analysis and Application of Passive Peer Influence on Peer-to-Peer Inter-Domain Traffic (Abstract)

Atsushi Tagami , KDDI R&D Laboratories
Teruyuki Hasegawa , KDDI R&D Laboratories
Toru Hasegawa , KDDI R&D Laboratories
pp. 142-150

On de Bruijn Routing in Distributed Hash Tables: There and Back Again (Abstract)

Karl Aberer , Swiss Federal Institute of Technology Lausanne
Anwitaman Datta , Swiss Federal Institute of Technology Lausanne
Sarunas Girdzijauskas , Swiss Federal Institute of Technology Lausanne
pp. 159-166
Session: Application

P2P-Based Collaborative Spam Detection and Filtering (Abstract)

Ernesto Damiani , Università degli Studi di Milano
Sabrina De Capitani di Vimercati , Università degli Studi di Milano
Pierangela Samarati , Università degli Studi di Milano
Stefano Paraboschi , Università degli Studi di Bergamo
pp. 176-183

Semantic-Laden Peer-to-Peer Service Directory (Abstract)

Aruna Sereviratne , University of New South Wales
Sebastien Ardon , University of New South Wales
Tim Hsin-ting Hu , University of New South Wales
pp. 184-191

Cooperative Pull-Push Cycle for Searching a Hybrid P2P Network (Abstract)

Nadir Gül , University of Bonn
Jasmin Grigull , University of Bonn
Armin B. Cremers , University of Bonn
Melanie Gnasa , University of Bonn
Sascha Alda , University of Bonn
pp. 192-199
Session: Overlay Architectures

Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems (Abstract)

Douglas S. Reeves , North Carolina State University
Young June Pyun , North Carolina State University
pp. 210-218

ICN: Interest-Based Clustering Network (Abstract)

Peng Zhang , Helsinki University of Technology
Raimo Kantola , Helsinki University of Technology
Xiaole Bai , Helsinki University of Technology
Shuping Liu , Helsinki University of Technology
pp. 219-226

Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave (Abstract)

Michael Gähwiler , Swiss Federal Institute of Technology
Keno Albrecht , Swiss Federal Institute of Technology
Ruedi Arnold , Swiss Federal Institute of Technology
Roger Wattenhofer , Swiss Federal Institute of Technology
pp. 227-234

Reliable Peer-to-Peer End System Multicasting through Replication (Abstract)

Jianjun Zhang , Georgia Institute of Technology
Ling Liu , Georgia Institute of Technology
Mostafa Ammar , Georgia Institute of Technology
Calton Pu , Georgia Institute of Technology
pp. 235-242
Session: Overview Papers

The Different Dimensions of Dynamicity (Abstract)

Nalini Venkatasubramanian , University of California at Irvine
Mayur Deshpande , University of California at Irvine
pp. 244-251
Session: Short Papers

Distributed Search in P2P Networks through Secure-Authenticated Content Management Systems (CMSs) (PDF)

Vassilios Stathopoulos , National Technical University of Athens
Manolis Solidakis , National Technical University of Athens
Dimitrios Tsesmetzis , National Technical University of Athens
Nikolaos Mitrou , National Technical University of Athens
pp. 260-261

A Framework for Testing Distributed Systems (PDF)

Geoff Coulson , Lancaster University
Phil Greenwood , Lancaster University
Daniel Hughes , Lancaster University
pp. 262-263

P2P-4-DL: Digital Library over Peer-to-Peer (PDF)

Paul Rayson , Lancaster University
James Walkerdine , Lancaster University
pp. 264-265

Highways: Proximity Clustering for Scalable Peer-to-Peer Network (PDF)

Marcelo Pias , Intel Research Laboratory
Jon Crowcroft , University of Cambridge
Eng Keong Lua , University of Cambridge
pp. 266-267

Building Adaptive Peer-To-Peer Systems (PDF)

Evangelia Kalyvianaki , University of Cambridge
Ian Pratt , University of Cambridge
pp. 268-269

P2P Applications Using the Semantic Information Oriented Network (PDF)

Kiyoshi Ueda , NTT Corporation
Tetsuya Iwata , NTT Corporation
Kazuhiro Kikuma , NTT Corporation
Hiroshi Sunaga , NTT Corporation
Michiharu Takemoto , NTT Corporation
pp. 272-273

Performance of Pastry in a Heterogeneous System (PDF)

Richard Gold , Uppsala University
Lars-Åke Larzon , Uppsala University
Fredrik Bjurefors , Uppsala University
pp. 278-279

PROST: A Programmable Structured Peer-to-Peer Overlay Network (PDF)

Sebastien Ardon , University of New South Wales
Aruna Seneviratne , University of New South Wales
Marius Portmann , University of Queensland
Patrick Senac , ENSICA
pp. 280-281

A Framework for Developing Reflective and Dynamic P2P Networks (RaDP2P) (PDF)

Geoff Coulson , Lancaster University
Daniel Hughes , Lancaster University
Ian Warren , Lancaster University
pp. 282-283
Author Index

Author Index (PDF)

pp. 285-286
96 ms
(Ver )