The Community for Technology Leaders
Peer-to-Peer Computing, IEEE International Conference on (2007)
Galway, Ireland
Sept. 2, 2007 to Sept. 5, 2007
ISBN: 0-7695-2986-0
TABLE OF CONTENTS
Introduction

Reviewers (PDF)

pp. xii
Session: Security, Trust and Reputation 1

Rescuing Tit-for-Tat with Source Coding (Abstract)

Stefan Schmid , Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland
Thomas Locher , Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland
Roger Wattenhofer , Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland
pp. 3-10

Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies (Abstract)

Dimitri DeFigueiredo , University of California, Davis
Balaji Venkatachalam , University of California, Davis
S. Felix Wu , University of California, Davis
pp. 11-18

Modelling Real P2P Networks: The Effect of Altruism (Abstract)

Dimitrios K. Vassilakis , Athens University of Economics and Business
Vasilis Vassalos , Athens University of Economics and Business
pp. 19-26
Session: Security, Trust and Reputation 2

Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent (Abstract)

Marlom A. Konrath , UNISINOS University - Universidade do Vale do Rio dos Sinos, Brazil
Marinho P. Barcellos , UNISINOS University - Universidade do Vale do Rio dos Sinos, Brazil
Rodrigo B. Mansilha , UNISINOS University - Universidade do Vale do Rio dos Sinos, Brazil
pp. 37-44

A Trust-Based Exchange Framework for Multiple Services in P2P Systems (Abstract)

Anna Satsiou , University of Thessaly, 38221 Volos, Greece
Leandros Tassiulas , University of Thessaly, 38221 Volos, Greece
pp. 45-52

Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems (Abstract)

Cristiano Costa , Federal University of Minas Gerais Belo Horizonte, MG, Brazil
Jussara Almeida , Federal University of Minas Gerais Belo Horizonte, MG, Brazil
pp. 53-60

A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms (Abstract)

Liang Xie , Penn State University
Sencun Zhu , Penn State University
pp. 61-70
Session: Searching and Query Management

Completeness Estimation of Range Queries in Structured Overlays (Abstract)

Marcel Karnstedt , TU Ilmenau, Germany
Roman Schmidt , Ecole Polytechnique Federale
Kai-Uwe Sattler , TU Ilmenau, Germany
pp. 71-78

Predicting Query Duplication with Box-Jenkins Models and Its Applications (Abstract)

Shicong Meng , Shanghai Jiao Tong University
Xinyao Hu , Shanghai Jiao Tong University
Cong Shi , Shanghai Jiao Tong University
Yong Yu , Shanghai Jiao Tong University
Dingyi Han , Shanghai Jiao Tong University
pp. 79-86

Globase.KOM - A P2P Overlay for Fully Retrievable Location-based Search (Abstract)

Nicolas Liebau , Technische Universitat Darmstadt, Germany
Ralf Steinmetz , Technische Universitat Darmstadt, Germany
Aleksandra Kovacevic , Technische Universitat Darmstadt, Germany
pp. 87-96
Session: Routing

An Efficient Eigenvalue-based P2P XML Routing Framework (Abstract)

M. Tamer Ozsu , Univ. of Waterloo, Canada
Qiang Wang , Univ. of Waterloo, Canada
pp. 105-112

On Routing in Distributed Hash Tables (Abstract)

Fabius Klemm , Ecole Polytechnique F?ed?erale de Lausanne (EPFL), Switzerland
Sarunas Girdzijauskas , Ecole Polytechnique F?ed?erale de Lausanne (EPFL), Switzerland
Jean-Yves Le Boudec , Ecole Polytechnique F?ed?erale de Lausanne (EPFL), Switzerland
Karl Aberer , Ecole Polytechnique F?ed?erale de Lausanne (EPFL), Switzerland
pp. 113-122
Session: Overlay Networks

An End-to-End Solution to Scalable Unstructured P2P Networking (Abstract)

Vwani P. Roychowdhury , University of California, Los Angeles, CA,
Nima Sarshar , University of Regina, Regina SK, Canada
pp. 123-131

Handling Network Partitions and Mergers in Structured Overlay Networks (Abstract)

Ali Ghodsi , Swedish Institute of Computer Science (SICS)
Tallat M. Shafaat , Royal Institute of Technology (KTH)
Seif Haridi , Royal Institute of Technology (KTH)
pp. 132-139

Cooperative Keep-Alives: An Efficient Outage Detection Algorithm for P2P Overlay Networks (Abstract)

Alexander Hofmann , University of Passau
Bernhard Sick , University of Passau
Ivan Dedinski , University of Passau
pp. 140-150
Session: Data Management

A Data Placement Scheme with Time-Related Model for P2P Storages (Abstract)

Yafei Dai , Peking University
Zhi Yang , Peking University
Jing Tian , Peking University
pp. 151-158

Distributed, Automatic File Description Tuning in Peer-to-Peer File-Sharing Systems (Abstract)

Ophir Frieder , Georgetown University
Wai Gen Yee , Illinois Institute of Technology
Dongmei Jia , Illinois Institute of Technology
Linh Thai Nguyen , Illinois Institute of Technology
pp. 167-176
Session: Services and Applications

Impact of Vertical Handovers on Cooperative Content Distribution Systems (Abstract)

Michael Duelli , University of Wurzburg
Dirk Staehle , University of Wurzburg
Tobias Hobfeld , University of Wurzburg
pp. 177-184

A DHT-based Infrastructure for Content-based Publish/Subscribe Services (Abstract)

Xiaoyu Yang , University of Cincinnati, Cincinnati, OH
Yiming Hu , University of Cincinnati, Cincinnati, OH
pp. 185-192

Grid Resource Scheduling with Gossiping Protocols (Abstract)

Michael J. Lewis , Binghamton University
Deger Cenk Erdil , Binghamton University
pp. 193-202
Session: Overlay Construction

Self-Stabilization in Preference-Based Networks (Abstract)

Fabien Mathieu , Orange Labs, Issy-les-Moulineaux, France
pp. 203-210

Peer-to-Peer Rating (Abstract)

Lidong Zhou , Microsoft Research, Silicon Valley
Danny Bickson , Hebrew University of Jerusalem
Dahlia Malkhi , Microsoft Research, Silicon Valley
pp. 211-218

Mapping Small Worlds (Abstract)

Matteo Dell?Amico , Universit? di Genova, Italy
pp. 219-228
Short Papers

Fabric: Synergistic Proximity Neighbour Selection Method (Abstract)

Piotr Karwaczynski , Wroclaw University of Technology
pp. 229-230

The BitCod Client: A BitTorrent Clone using Network Coding (Abstract)

Roy Borer , Hebrew University of Jerusalem
Danny Bickson , Hebrew University of Jerusalem
pp. 231-232

P2P-IM: A P2P Presence System for the Internet (Abstract)

Sandeep K. Singhal , Microsoft Corporation
Ravi Rao , Microsoft Corporation
pp. 233-234

The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables (Abstract)

Douglas M. Blough , Georgia Institute of Technology
Cyrus Harvesf , Georgia Institute of Technology
pp. 237-238

How stable are large superpeer networks against attack? (Abstract)

Niloy Ganguly , Indian Institute of Technology, Kharagpur, India
Sujoy Ghose , Indian Institute of Technology, Kharagpur, India
Bivas Mitra , Indian Institute of Technology, Kharagpur, India
pp. 239-242
Demonstration Papers

A P2PSIP Demonstrator Powered by OverSim (Abstract)

Stephan Krause , Universitat Karlsruhe (TH)
Ingmar Baumgart , Universitat Karlsruhe (TH)
Bernhard Heep , Universitat Karlsruhe (TH)
pp. 243-244

Running the Windows P2P Infrastructure on Mobile Phones (Abstract)

Ulrich Mueller , European Microsoft Innovation Center, Aachen, Germany
Matt Young , European Microsoft Innovation Center, Aachen, Germany
Alain Gefflaut , European Microsoft Innovation Center, Aachen, Germany
pp. 245-246

PEPINO: PEer-to-Peer network INspectOr (Abstract)

Donatien Grolaux , Universite catholique de Louvain, Belgium
Boris Mejias , Universite catholique de Louvain, Belgium
Peter Van Roy , Universite catholique de Louvain, Belgium
pp. 247-248

The Effect of Viral Media on Business Usage of P2P (Abstract)

Danny Hughes , Isis Forensics, UK
Kevin Lee , Isis Forensics, UK
James Walkerdine , Isis Forensics, UK
pp. 249-250

PISA: P2P Wi-Fi Internet Sharing Architecture (Abstract)

Shaohui Li , RWTH Aachen University
Tobias Heer , RWTH Aachen University
Klaus Wehrle , RWTH Aachen University
pp. 251-252
Author Index

Author Index (PDF)

pp. 253
96 ms
(Ver )