The Community for Technology Leaders
Peer-to-Peer Computing, IEEE International Conference on (2005)
Konstanz, Germany
Aug. 31, 2005 to Sept. 2, 2005
ISBN: 0-7695-2376-5
Session 1: Overview and Mobile

Proximity Neighbor Selection for a DHT in Wireless Multi-Hop Networks (Abstract)

Thomas Fuhrmann , University of Karlsruhe
Curt Cramer , University of Karlsruhe
pp. 3-10

The Essence of P2P: A Reference Architecture for Overlay Networks (Abstract)

Manfred Hauswirth , Ecole Polytechnique Fédérale de Lausanne
Karl Aberer , Ecole Polytechnique Fédérale de Lausanne
Sarunas Girdzijauskas , Ecole Polytechnique Fédérale de Lausanne
Seif Haridi , Swedish Institute of Computer Science
Luc Onana Alima , Université de Mons-Hainaut
Ali Ghodsi , Swedish Institute of Computer Science
pp. 11-20
Session 2: Grid

On Overlay Schemes to Support Point-in-Range Queries for Scalable Grid Resource Discovery (Abstract)

Junichi Tatemura , NEC Laboratories America, Inc.
Liping Chen , NEC Laboratories America, Inc.
Dirceu Cavendish , NEC Laboratories America, Inc.
Divyakant Agrawal , NEC Laboratories America, Inc.
K. Selçuk Candan , NEC Laboratories America, Inc.
pp. 23-30

Result Verification and Trust-Based Scheduling in Peer-to-Peer Grids (Abstract)

Shanyu Zhao , University of Oregon
Chris GauthierDickey , University of Oregon
Virginia Lo , University of Oregon
pp. 31-38

Self-Stabilizing Structured Ring Topology P2P Systems (Abstract)

Douglas S. Reeves , North California State University
Ayman Shaker , North California State University
pp. 39-46
Session 3: Overlay

Cyclone: A Novel Design Schema for Hierarchical DHTs (Abstract)

Pedro Garc? L?pez , Universitat Rovira i Virgili
Antonio F. G?mez Skarmeta , Universidad de Murcia
Jordi Pujol Ahull? , Universitat Rovira i Virgili
Marc S?nchez Artigas , Universitat Rovira i Virgili
pp. 49-56

Range Queries in Trie-Structured Overlays (Abstract)

Manfred Hauswirth , Ecole Polytechnique Fédérale de Lausanne
Karl Aberer , Ecole Polytechnique Fédérale de Lausanne
Renault John , Ecole Polytechnique Fédérale de Lausanne
Roman Schmidt , Ecole Polytechnique Fédérale de Lausanne
Anwitaman Datta , Ecole Polytechnique Fédérale de Lausanne
pp. 57-66

Techniques for Efficient Routing and Load Balancing in Content-Addressable Networks (Abstract)

Amr El Abbadi , University of California at Santa Barbara
Ozgur D. Sahin , University of California at Santa Barbara
Divyakant Agrawal , University of California at Santa Barbara
pp. 67-74
Session 4: Protocols

Elders Know Best — Handling Churn in Less Structured P2P Systems (Abstract)

Yi Qiao , Northwestern University
Fabián E. Bustamante , Northwestern University
pp. 77-86

Chord on Demand (Abstract)

Ozalp Babaoglu , University of Bologna
Alberto Montresor , University of Bologna
Márk Jelasity , University of Bologna
pp. 87-94
Session 5: E-Commerce

Quantifying Agent Strategies under Reputation (Abstract)

Hector Garcia-Molina , Stanford University
Sergio Marti , Stanford University
pp. 97-105

Peer-to-Peer Direct Sales (Abstract)

Krzysztof Goworek , Warsaw University of Technology
Adam Wierzbicki , Polish-Japanese Institute of Information Technology
pp. 106-113
Session 6: Trust and Reputation

Trusted Computing: Providing Security for Peer-to-Peer Networks (Abstract)

Amit D. Lakhani , University of London
Kenneth G. Paterson , University of London
Shane Balfe , University of London
pp. 117-124

ARA: A Robust Audit to Prevent Free-Riding in P2P Networks (Abstract)

Gul Agha , University of Illinois as Urbana-Champaign
MyungJoo Ham , University of Illinois as Urbana-Champaign
pp. 125-132

Evaluation of Mutual Trust during Matchmaking (Abstract)

G. Byrd , North Carolina State University
D. Brown , North Carolina State University
M. Altunay , North Carolina State University
R. A. Dean , North Carolina State University
pp. 133-140
Session 7 & 8: Short Papers

T-DHT: Topology-based Distributed Hash Tables (PDF)

Olaf Landsiedel , University of Tübingen
Klaus Wehrle , University of Tübingen
Katharina Anna Lehmann , University of Tübingen
pp. 143-144

On the Challenge of Assessing Overlay Topology Adaptation Mechanisms (Abstract)

Hannes Hartenstein , Universität Karlsruhe
Jochen Dinger , Universität Karlsruhe
pp. 145-147

P2P-Based Grid Architecture for Homology Searching (PDF)

Hiroshi Sunaga , NTT Corporation
Toshiyuki Oka , NTT Corporation
Hiroaki Matsumura , NTT Corporation
Kiyoshi Ueda , NTT Corporation
pp. 148-149

Keyword Searching in Hypercubic Manifolds (PDF)

Steven Hand , University of Cambridge
Yu-En Lu , University of Cambridge
Pietro Lió , University of Cambridge
pp. 150-151

Heterogeneity-Aware Distributed Access Structure (PDF)

Alejandra González Beltrán , Queen?s University Belfast
Peter Milligan , Queen?s University Belfast
Paul Sage , Queen?s University Belfast
pp. 152-153

Toward Overlay Network Symbiosis (PDF)

Naoki Wakamiya , Osaka University
Masayuki Murata , Osaka University
pp. 154-155

Peer-to-Peer Networks Based on Hierarchies of Trust (PDF)

Mark van Harmelen , University of Manchester
Barry M. G. Cheetham , University of Manchester
Apostolos Tramantzas , University of Manchester
Alexandria C. Walker , University of Manchester
pp. 160-161
Session 9: Object Location and Retrieval

Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks (Abstract)

Ananth Grama , Purdue University
Ronaldo A. Ferreira , Purdue University
Murali Krishna Ramanathan , Purdue University
Suresh Jagannathan , Purdue University
Asad Awan , Purdue University
pp. 165-172

Supporting Multi-Dimensional Range Queries in Peer-to-Peer Systems (Abstract)

Beng Chin Ooi , National University of Singapore
Yanfeng Shu , National University of Singapore
Kian-Lee Tan , National University of Singapore
Aoying Zhou , Fudan University
pp. 173-180

Finding Rare Data Objects in P2P File-Sharing Systems (Abstract)

Wai Gen Yee , Illinois Institute of Technology
Ophir Frieder , Illinois Institute of Technology
Dongmei Jia , Illinois Institute of Technology
pp. 181-190

An Effective Resource Description Based Approach to Find Similar Peers (Abstract)

Dingyi Han , Shanghai Jiao Tong University
Yong Yu , Shanghai Jiao Tong University
Xing Zhu , Shanghai Jiao Tong University
Weibin Zhu , Shanghai Jiao Tong University
pp. 191-198
Session 10: Storage

Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems (Abstract)

Suresh Jagannathan , Purdue University
Ananth Grama , Purdue University
Murali Krishna Ramanathan , Purdue University
Ronaldo A. Ferreira , Purdue University
pp. 201-208

Presence-Based Availability and P2P Systems (Abstract)

Steven D. Gribble , University of Washington
Richard J. Dunn , University of Washington
Henry M. Levy , University of Washington
John Zahorjan , University of Washington
pp. 209-216

Video Management in Peer-to-Peer Systems (Abstract)

Ying Cai , Iowa State University
Zhan Chen , Iowa State University
Wallapak Tavanapong , Iowa State University
pp. 217-224
Session 11: Middleware

Dynamic and Fault-tolerant Cluster Management (Abstract)

Boris Koldehofe , Swiss Federal Institute of Technology in Lausanne
Marina Papatriantafilou , Chalmers University of Technology
Anders Gidenstam , Chalmers University of Technology
Philippas Tsigas , Chalmers University of Technology
pp. 237-244

Improving Service Performance through Object Replication in Middleware: A Peer-to-Peer Approach (Abstract)

Tianying Chang , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
pp. 245-252
Author Index

Author Index (PDF)

pp. 261-262
78 ms
(Ver 3.3 (11022016))