% Papers IDs can be used to find printouts in the folders %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % Folder AA % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% @inproceedings{AA:01, author = {Giuseppe Ateniese and Chris Riley and Christian Scheideler}, title = {Survivable Monitoring in Dynamic Networks}, booktitle = {IWIA '04: Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)}, year = {2004}, isbn = {0-7695-2117-7}, pages = {33}, address = {Washington, DC, USA}, } @inproceedings{AA:02, author = {Faruck Morcos and Thidapat Chantem and Philip Little and Tiago Gasiba and Douglas Thain}, title = {i{D}{I}{B}{S}: An Improved Distributed Backup System}, booktitle = {ICPADS '06: Proceedings of the 12th International Conference on Parallel and Distributed Systems}, year = {2006}, isbn = {0-7695-2612-8}, pages = {58--67}, doi = {http://dx.doi.org/10.1109/ICPADS.2006.52}, address = {Washington, DC, USA}, } @inproceedings{AA:03, author = {Amir Javidan and Tony Angerilli and Armin Bahramshahry and Guy Lemieux and Roman Lisagor and, Matei Ripeanu}, title = {van{D}isk: An Exploration in Peer-To-Peer Collaborative Back-up Storage}, booktitle = {20th IEEE Canadian Conference on Electrical and Computer Engineering}, year = {2007}, address = {Vancouver, BC}, } @inproceedings{AA:04, author = {Naveen Gattu and Richard Huang and John Lynn and Huaxia Xia}, title = {Magnus: Peer to Peer Backup System}, } @inproceedings{AA:05, author = {L{\'a}szl{\'o} Toka and Patrick Maill{\'e}}, title = {Managing a Peer-to-Peer Backup System: Does Imposed Fairness Socially Outperform a Revenue-Driven Monopoly?}, booktitle = {GECON}, year = {2007}, pages = {150-163}, ee = {http://dx.doi.org/10.1007/978-3-540-74430-6_12}, crossref = {DBLP:conf/gecon/2007}, } @proceedings{DBLP:conf/gecon/2007, editor = {J{\"o}rn Altmann and Daniel Veit}, title = {Grid Economics and Business Models, 4th International Workshop, GECON 2007, Rennes, France, August 28, 2007, Proceedings}, booktitle = {GECON}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4685}, year = {2007}, isbn = {978-3-540-74428-3}, } @inproceedings{AA:06, author = {Vincent D. Park and M. Scott Corson}, title = {A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks}, booktitle = {INFOCOM}, year = {1997}, pages = {1405-1413}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:07, author = {Aameek Singh and Ling Liu}, title = {Trust{M}e: Anonymous Management of Trust Relationships in Decentralized {P}{2}{P} Systems}, booktitle = {Peer-to-Peer Computing}, year = {2003}, pages = {142-149}, ee = {http://csdl.computer.org/comp/proceedings/p2p/2003/2023/00/20230142abs.htm}, crossref = {DBLP:conf/p2p/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/p2p/2003, editor = {Nahid Shahmehri and Ross Lee Graham and Germano Caronni}, title = {3rd International Conference on Peer-to-Peer Computing (P2P 2003), 1-3 September 2003, Link{\"o}ping, Sweden}, booktitle = {Peer-to-Peer Computing}, year = {2003}, isbn = {0-7695-2023-5}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:08, author = {Tassos Dimitriou and Ghassan Karame and Ioannis T. Christou}, title = {Super{T}rust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks}, booktitle = {ICDCN}, year = {2008}, pages = {350-362}, ee = {http://dx.doi.org/10.1007/978-3-540-77444-0_37}, crossref = {DBLP:conf/icdcn/2008}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/icdcn/2008, editor = {Shrisha Rao and Mainak Chatterjee and Prasad Jayanti and C. Siva Ram Murthy and Sanjoy Kumar Saha}, title = {Distributed Computing and Networking, 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008}, booktitle = {ICDCN}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4904}, year = {2008}, isbn = {978-3-540-77443-3}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:09, author = {Runfang Zhou and Kai Hwang}, title = {Power{T}rust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing}, journal = {IEEE Trans. Parallel Distrib. Syst.}, volume = {18}, number = {4}, year = {2007}, pages = {460-473}, ee = {http://dx.doi.org/10.1109/TPDS.2007.1021}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:10, author = {Stephanos Androutsellis-Theotokis and Diomidis Spinellis}, title = {A survey of peer-to-peer content distribution technologies}, journal = {ACM Comput. Surv.}, volume = {36}, number = {4}, year = {2004}, pages = {335-371}, ee = {http://doi.acm.org/10.1145/1041680.1041681}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:11, author = {Randal C. Burns and Darrell D. E. Long}, title = {Efficient Distributed Backup with Delta Compression}, booktitle = {IOPADS}, year = {1997}, pages = {27-36}, ee = {http://doi.acm.org/10.1145/266220.266223}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:12, author = {David B. Lomet}, title = {High Speed On-line Backup When Using Logical Log Operations}, booktitle = {SIGMOD Conference}, year = {2000}, pages = {34-45}, ee = {http://doi.acm.org/10.1145/342009.335378, db/conf/sigmod/Lomet00.html}, crossref = {DBLP:conf/sigmod/2000}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/sigmod/2000, editor = {Weidong Chen and Jeffrey F. Naughton and Philip A. Bernstein}, title = {Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, May 16-18, 2000, Dallas, Texas, USA}, booktitle = {SIGMOD Conference}, publisher = {ACM}, year = {2000}, isbn = {1-58113-218-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:13, author = {Christos A. Polyzois and Hector Garcia-Molina}, title = {Evaluation of Remote Backup Algorithms for Transaction-Processing Systems}, journal = {ACM Trans. Database Syst.}, volume = {19}, number = {3}, year = {1994}, pages = {423-449}, ee = {http://doi.acm.org/10.1145/185827.185836, db/journals/tods/PolyzoisG94.html}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:14, author = {Marc-Olivier Killijian and David Powell and Michel Ban{\^a}tre and Paul Couderc and Yves Roudier}, title = {Collaborative backup for dependable mobile applications}, booktitle = {Middleware for Pervasive and Ad-hoc Computing}, year = {2004}, pages = {146-149}, ee = {http://doi.acm.org/10.1145/1028509.1028517}, crossref = {DBLP:conf/middleware/2004w4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/middleware/2004w4, editor = {Paddy Nixon and Fabio Kon}, title = {Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, Toronto, Ontario, Canada, October 18-22, 2004}, booktitle = {Middleware for Pervasive and Ad-hoc Computing}, publisher = {ACM}, year = {2004}, isbn = {1-58113-951-9}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:15, author = {Christina Fragouli and Jean-Yves Le Boudec and J{\"o}rg Widmer}, title = {Network coding: an instant primer}, journal = {Computer Communication Review}, volume = {36}, number = {1}, year = {2006}, pages = {63-68}, ee = {http://doi.acm.org/10.1145/1111322.1111337}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:16, author = {Claude Castelluccia and Walid Dabbous and Sean W. O'Malley}, title = {Generating efficient protocol code from an abstract specification}, journal = {IEEE/ACM Trans. Netw.}, volume = {5}, number = {4}, year = {1997}, pages = {514-524}, ee = {http://portal.acm.org/citation.cfm?id=262028.262034}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:17, author = {Steve Bishop and Matthew Fairbairn and Michael Norrish and Peter Sewell and Michael Smith and Keith Wansbrough}, title = {Rigorous specification and conformance testing techniques for network protocols, as applied to {T}{C}{P}, {U}{D}{P}, and sockets}, booktitle = {SIGCOMM}, year = {2005}, pages = {265-276}, ee = {http://doi.acm.org/10.1145/1080091.1080123}, crossref = {DBLP:conf/sigcomm/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/sigcomm/2005, editor = {Roch Gu{\'e}rin and Ramesh Govindan and Greg Minshall}, title = {Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005}, booktitle = {SIGCOMM}, publisher = {ACM}, year = {2005}, isbn = {1-59593-009-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:18, author = {Mark B. Abbott and Larry L. Peterson}, title = {A language-based approach to protocol implementation}, journal = {IEEE/ACM Trans. Netw.}, volume = {1}, number = {1}, year = {1993}, pages = {4-19}, ee = {http://portal.acm.org/citation.cfm?id=168670.168671}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:19, author = {Ludovic Court\`{e}s and Marc-Olivier Killijian and David Powell and Matthieu Roy}, title = {Sauvegarde coop\'{e}rative entre pairs pour dispositifs mobiles}, booktitle = {UbiMob '05: Proceedings of the 2nd French-speaking conference on Mobility and uibquity computing}, year = {2005}, isbn = {1-59593-172-4}, pages = {97--104}, location = {Grenoble, France}, doi = {http://doi.acm.org/10.1145/1102613.1102635}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AA:20, author = {John A. Chandy}, title = {Storage Allocation in Unreliable Peer-to-Peer Systems}, booktitle = {DSN}, year = {2006}, pages = {227-236}, ee = {http://doi.ieeecomputersociety.org/10.1109/DSN.2006.67}, crossref = {DBLP:conf/dsn/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/dsn/2006, title = {2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings}, booktitle = {DSN}, year = {2006}, isbn = {0-7695-2607-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @InProceedings{AA:21, author = {Antoine Vernois}, title = {P{\'e}rennit{\'e} dans les syst{\`e}mes de stockage pair {\`a} pair}, booktitle = {15ieme~Rencontres Francophones en Parall{\'e}lisme, La Colle sur Loup, France}, pages = {153-160}, editor = {M. Auguin and F. Baude and D. Lavenier and M. Riveill}, month = oct, year = {2003} } @inproceedings{AA:22, author = {Cyril Randriamaro and Olivier Soyez and Gil Utard and Francis Wlazinski}, title = {Data distribution for failure correlation management in a Peer to Peer storage system}, booktitle = {ISPDC}, year = {2005}, pages = {242-249}, ee = {http://doi.ieeecomputersociety.org/10.1109/ISPDC.2005.20}, crossref = {DBLP:conf/ispdc/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ispdc/2005, title = {4th International Symposium on Parallel and Distributed Computing (ISPDC 2005), 4-6 July 2006, Lille, France}, booktitle = {ISPDC}, year = {2005}, isbn = {0-7695-2434-6}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:23, author = {Cyril Randriamaro and Olivier Soyez and Gil Utard and Francis Wlazinski}, title = {Data Distribution in a Peer to Peer Storage System}, journal = {J. Grid Comput.}, volume = {4}, number = {3}, year = {2006}, pages = {311-321}, ee = {http://dx.doi.org/10.1007/s10723-006-9038-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:24, author = {Alexandros G. Dimakis and Brighten Godfrey and Martin J. Wainwright and Kannan Ramchandran}, title = {Network Coding for Distributed Storage Systems}, booktitle = {INFOCOM}, year = {2007}, pages = {2000-2008}, ee = {http://dx.doi.org/10.1109/INFCOM.2007.232}, crossref = {DBLP:conf/infocom/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/infocom/2007, title = {INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA}, booktitle = {INFOCOM}, publisher = {IEEE}, year = {2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:25, author = {Sean Quinlan and Sean Dorward}, title = {Venti: A New Approach to Archival Storage}, booktitle = {FAST}, year = {2002}, pages = {89-101}, ee = {http://www.usenix.org/publications/library/proceedings/fast02/quinlan.html}, crossref = {DBLP:conf/fast/2002}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/fast/2002, editor = {Darrell D. E. Long}, title = {Proceedings of the FAST '02 Conference on File and Storage Technologies, January 28-30, 2002, Monterey, California, USA}, booktitle = {FAST}, publisher = {USENIX}, year = {2002}, isbn = {1-880446-03-0}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:26, author = {Adam Sweeney}, title = {Scalability in the {X}{F}{S} File System}, booktitle = {USENIX Annual Technical Conference}, year = {1996}, pages = {1-14}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:27, author = {Joseph Tucek and Paul Stanton and Elizabeth Haubert and Ragib Hasan and Larry Brumbaugh and William Yurcik}, title = {Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions}, booktitle = {MSST}, year = {2005}, pages = {329-340}, ee = {http://doi.ieeecomputersociety.org/10.1109/MSST.2005.39}, crossref = {DBLP:conf/mss/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/mss/2005, title = {22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), Information Retrieval from Very Large Storage Systems, CD-ROM, 11-14 April 2005, Monterey, CA, USA}, booktitle = {MSST}, year = {2005}, isbn = {0-7695-2318-8}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:28, author = {James da Silva and {\'O}lafur Guthmundsson}, title = {The Amanda Network Backup Manager}, booktitle = {LISA}, year = {1993}, ee = {http://www.usenix.org/publications/library/proceedings/lisa93/daSilva.html}, crossref = {DBLP:conf/lisa/1993}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/lisa/1993, title = {Proceedings of the 7th Conference on Systems Administration (LISA 1993), Monterey, California, USA, November 1-5, 1993}, booktitle = {LISA}, publisher = {USENIX}, year = {1993}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:29, author = {Andreas Haeberlen and Alan Mislove and Peter Druschel}, title = {Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures}, booktitle = {NSDI}, year = {2005}, ee = {http://www.usenix.org/events/nsdi05/tech/haeberlen.html}, crossref = {DBLP:conf/nsdi/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/nsdi/2005, title = {2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), May 2-4, 2007, Boston, Massachusetts, USA, Proceedings. USENIX 2005}, booktitle = {NSDI}, publisher = {USENIX}, year = {2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:30, author = {Akshat Aranya and Charles P. Wright and Erez Zadok}, title = {Tracefs: A File System to Trace Them All}, booktitle = {FAST}, year = {2004}, pages = {129-145}, ee = {http://www.usenix.org/events/fast04/tech/aranya.html}, crossref = {DBLP:conf/fast/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/fast/2004, title = {Proceedings of the FAST '04 Conference on File and Storage Technologies, March 31 - April 2, 2004, Grand Hyatt Hotel, San Francisco, California, USA}, booktitle = {FAST}, publisher = {USENIX}, year = {2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:31, author = {Anil Madhavapeddy and Alex Ho and Tim Deegan and David Scott and Ripduman Sohan}, title = {Melange: creating a "functional" internet}, booktitle = {EuroSys '07: Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems 2007}, year = {2007}, isbn = {978-1-59593-636-3}, pages = {101--114}, location = {Lisbon, Portugal}, doi = {http://doi.acm.org/10.1145/1272996.1273009}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AA:32, author = {Drew S. Roselli and Jacob R. Lorch and Thomas E. Anderson}, title = {A Comparison of File System Workloads}, booktitle = {USENIX Annual Technical Conference, General Track}, year = {2000}, pages = {41-54}, ee = {http://www.usenix.org/publications/library/proceedings/usenix2000/general/roselli.html}, crossref = {DBLP:conf/usenix/2000g}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/usenix/2000g, title = {Proceedings of the General Track: 2000 USENIX Annual Technical Conference, June 18-23, 2000, San Diego, CA, USA}, booktitle = {USENIX Annual Technical Conference, General Track}, publisher = {USENIX}, year = {2000}, isbn = {1-880446-22-7}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:33, author = {Steven D. Gribble and Gurmeet Singh Manku and Drew S. Roselli and Eric A. Brewer and Timothy J. Gibson and Ethan L. Miller}, title = {Self-Similarity in File Systems}, booktitle = {SIGMETRICS}, year = {1998}, pages = {141-150}, ee = {http://doi.acm.org/10.1145/277851.277894}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:34, author = {Daniel Ellard and Jonathan Ledlie and Pia Malkani and Margo I. Seltzer}, title = {Passive {N}{F}{S} Tracing of Email and Research Workloads}, booktitle = {FAST}, year = {2003}, ee = {http://www.usenix.org/events/fast03/tech/ellard.html}, crossref = {DBLP:conf/fast/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/fast/2003, title = {Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31 - April 2, 2003, Cathedral Hill Hotel, San Francisco, California, USA}, booktitle = {FAST}, publisher = {USENIX}, year = {2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:35, author = {Zachary N. J. Peterson and Randal C. Burns}, title = {Ext3cow: a time-shifting file system for regulatory compliance}, journal = {TOS}, volume = {1}, number = {2}, year = {2005}, pages = {190-212}, ee = {http://doi.acm.org/10.1145/1063786.1063789}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:36, author = {Craig A. N. Soules and Garth R. Goodson and John D. Strunk and Gregory R. Ganger}, title = {Metadata Efficiency in Versioning File Systems}, booktitle = {FAST}, year = {2003}, ee = {http://www.usenix.org/events/fast03/tech/soules.html}, crossref = {DBLP:conf/fast/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:37, author = {Dan Rubenstein and Sambit Sahu}, title = {Can unstructured {P}{2}{P} protocols survive flash crowds?}, journal = {IEEE/ACM Trans. Netw.}, volume = {13}, number = {3}, year = {2005}, pages = {501-512}, ee = {http://portal.acm.org/citation.cfm?id=1074047.1074052}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:38, author = {Petar Maymounkov and David Mazi{\`e}res}, title = {Kademlia: A Peer-to-Peer Information System Based on the {X}{O}{R} Metric}, booktitle = {IPTPS}, year = {2002}, pages = {53-65}, ee = {http://link.springer.de/link/service/series/0558/bibs/2429/24290053.htm}, crossref = {DBLP:conf/iptps/2002}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/iptps/2002, editor = {Peter Druschel and M. Frans Kaashoek and Antony I. T. Rowstron}, title = {Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers}, booktitle = {IPTPS}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {2429}, year = {2002}, isbn = {3-540-44179-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:39, author = {Sean C. Rhea and Brighten Godfrey and Brad Karp and John Kubiatowicz and Sylvia Ratnasamy and Scott Shenker and Ion Stoica and Harlan Yu}, title = {Open{D}{H}{T}: a public {D}{H}{T} service and its uses}, booktitle = {SIGCOMM}, year = {2005}, pages = {73-84}, ee = {http://doi.acm.org/10.1145/1080091.1080102}, crossref = {DBLP:conf/sigcomm/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:40, author = {P. Brighten Godfrey and Scott Shenker and Ion Stoica}, title = {Minimizing churn in distributed systems}, booktitle = {SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications}, year = {2006}, isbn = {1-59593-308-5}, pages = {147--158}, location = {Pisa, Italy}, doi = {http://doi.acm.org/10.1145/1159913.1159931}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AA:41, author = {Brighten Godfrey and Ion Stoica}, title = {Heterogeneity and load balance in distributed hash tables}, booktitle = {INFOCOM}, year = {2005}, pages = {596-606}, ee = {http://dx.doi.org/10.1109/INFCOM.2005.1497926}, crossref = {DBLP:conf/infocom/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/infocom/2005, title = {INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA}, booktitle = {INFOCOM}, publisher = {IEEE}, year = {2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:42, author = {Alexander L{\"o}ser and Felix Naumann and Wolf Siberski and Wolfgang Nejdl and Uwe Thaden}, title = {Semantic Overlay Clusters within Super-Peer Networks}, booktitle = {DBISP2P}, year = {2003}, pages = {33-47}, ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2944{\&}spage=33}, crossref = {DBLP:conf/dbisp2p/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/dbisp2p/2003, editor = {Karl Aberer and Vana Kalogeraki and Manolis Koubarakis}, title = {Databases, Information Systems, and Peer-to-Peer Computing, First International Workshop, DBISP2P, Berlin Germany, September 7-8, 2003, Revised Papers}, booktitle = {DBISP2P}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {2944}, year = {2004}, isbn = {3-540-20968-9}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:43, author = {Flavio Paiva Junqueira and Ranjita Bhagwan and Keith Marzullo and Stefan Savage and Geoffrey M. Voelker}, title = {The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe}, booktitle = {HotOS}, year = {2003}, pages = {73-78}, crossref = {DBLP:conf/hotos/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/hotos/2003, editor = {Michael B. Jones}, title = {Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, May 18-21, 2003, Lihue (Kauai), Hawaii, USA}, booktitle = {HotOS}, publisher = {USENIX}, year = {2003}, isbn = {1-931971-17-X}, bibsource = {DBLP, http://dblp.uni-trier.de} } % Le papier présente l'utilisation d'une DHT pour implanter une PKI, mais pas % l'utilisation de cryptographie dans le p2p. @inproceedings{AA:44, title = {Public-Key-Infrastructure Based on a Peer-to-Peer Network.}, author = {Thomas W\"{o}lfl}, booktitle = {HICSS}, year = {2005}, } @inproceedings{AA:45, title = {PKI-Based Security for Peer-to-Peer Information Sharing}, author = {K. Berket and A. Essiari and A. Muratas}, booktitle = {Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing}, year = {2004}, } @inproceedings{AA:46, author = {G. Utard and A. Vernois}, title = {Data durability in peer to peer storage systems}, booktitle = {CCGRID}, year = {2004}, pages = {90-97}, ee = {http://doi.ieeecomputersociety.org/10.1109/CCGrid.2004.1336553}, crossref = {DBLP:conf/ccgrid/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ccgrid/2004, title = {4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, USA}, booktitle = {CCGRID}, year = {2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:47, author="J. Sacha and J. Dowling and R. Cunningham and R. Meier", title="Using Aggregation for Adaptive Super-Peer Discovery on the Gradient Topology", booktitle="Proceedings of the 2nd International Workshop on Self-Managed Networks (SelfMan 2006)", series="Lecture Notes in Computer Science", volume="3996", pages="73--86", publisher="Springer", year="2006" } @inproceedings{AA:48, title = {Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology.}, address = {Bologna}, author = {Jan Sacha and Jim Dowling and Raymond Cunningham and Ren{\'e} Meier}, booktitle = {6th IFIP WG 6.1 International Conference Distributed Applications and Interoperable Systems (DAIS)}, editor = {Frank Eliassen and Alberto Montresor}, month = {jun}, pages = {70-83}, volume = {4025}, year = {2006}, } @inproceedings{AA:49, author = {Jing Tian and Yafei Dai and Hao Wang and Mao Yang}, title = {Understanding the Session Durability in Peer-to-Peer Storage System}, booktitle = {International Conference on Computational Science (4)}, year = {2006}, pages = {428-435}, ee = {http://dx.doi.org/10.1007/11758549_61}, crossref = {DBLP:conf/iccS/2006-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/iccS/2006-4, editor = {Vassil N. Alexandrov and G. Dick van Albada and Peter M. A. Sloot and Jack Dongarra}, title = {Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV}, booktitle = {International Conference on Computational Science (4)}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3994}, year = {2006}, isbn = {3-540-34385-7}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:50, author = {Daniel Stutzbach and Reza Rejaie}, title = {Understanding churn in peer-to-peer networks}, booktitle = {Internet Measurement Conference}, year = {2006}, pages = {189-202}, ee = {http://doi.acm.org/10.1145/1177080.1177105}, crossref = {DBLP:conf/imc/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/imc/2006, editor = {Jussara M. Almeida and Virg\'{\i}lio A. F. Almeida and Paul Barford}, title = {Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement 2006, Rio de Janeriro, Brazil, October 25-27, 2006}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2006}, isbn = {1-59593-561-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:51, author = {Bo Yu and Bin Xiao}, title = {Detecting selective forwarding attacks in wireless sensor networks}, booktitle = {IPDPS}, year = {2006}, ee = {http://dx.doi.org/10.1109/IPDPS.2006.1639675}, crossref = {DBLP:conf/ipps/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ipps/2006, title = {20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece}, booktitle = {IPDPS}, publisher = {IEEE}, year = {2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:52, author = {Keno Albrecht and Ruedi Arnold and Michael G{\"a}hwiler and Roger Wattenhofer}, title = {Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave}, booktitle = {Peer-to-Peer Computing}, year = {2004}, pages = {227-234}, ee = {http://csdl.computer.org/comp/proceedings/p2p/2004/2156/00/21560227abs.htm}, crossref = {DBLP:conf/p2p/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/p2p/2004, editor = {Germano Caronni and Nathalie Weiler and Nahid Shahmehri}, title = {4th International Conference on Peer-to-Peer Computing (P2P 2004), 15-17 August 2004, Zurich, Switzerland}, booktitle = {Peer-to-Peer Computing}, year = {2004}, isbn = {0-7695-2156-8}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:53, author = {Kendy Kutzner and Thomas Fuhrmann}, title = {Measuring Large Overlay Networks - The Overnet Example}, booktitle = {KiVS}, year = {2005}, pages = {193-204}, crossref = {DBLP:conf/kivs/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/kivs/2005, editor = {Paul M{\"u}ller and Reinhard Gotzhein and Jens B. Schmitt}, title = {Kommunikation in Verteilten Systemen (KiVS), 14. ITG/GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS 2005) Kaiserslautern, 28. Februar - 3. M{\"a}rz 2005}, booktitle = {KiVS}, publisher = {Springer}, series = {Informatik Aktuell}, year = {2005}, isbn = {3-540-24473-5}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:54, author = {M{\'a}rk Jelasity and {\"O}zalp Babaoglu}, title = {T-Man: Gossip-Based Overlay Topology Management}, booktitle = {Engineering Self-Organising Systems}, year = {2005}, pages = {1-15}, ee = {http://dx.doi.org/10.1007/11734697_1}, crossref = {DBLP:conf/atal/2005esoa}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/atal/2005esoa, editor = {Sven Brueckner and Giovanna Di Marzo Serugendo and David Hales and Franco Zambonelli}, title = {Engineering Self-Organising Systems, Third International Workshop, ESOA 2005, Utrecht, The Netherlands, July 25, 2005, Revised Selected Papers}, booktitle = {Engineering Self-Organising Systems}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3910}, year = {2006}, isbn = {3-540-33342-8}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:55, author = {Waldir Ribeiro Pires J{\'u}nior and Thiago H. de Paula Figueiredo and Hao Chi Wong and Antonio Alfredo Ferreira Loureiro}, title = {Malicious Node Detection in Wireless Sensor Networks}, booktitle = {IPDPS}, year = {2004}, ee = {http://csdl.computer.org/comp/proceedings/ipdps/2004/2132/01/213210024babs.htm}, crossref = {DBLP:conf/ipps/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ipps/2004, title = {18th International Parallel and Distributed Processing Symposium (IPDPS 2004), CD-ROM / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, USA}, booktitle = {IPDPS}, year = {2004}, isbn = {0-7695-2132-0}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:56, author = {Chris Karlof and David Wagner}, title = {Secure routing in wireless sensor networks: attacks and countermeasures}, journal = {Ad Hoc Networks}, volume = {1}, number = {2-3}, year = {2003}, pages = {293-315}, ee = {http://dx.doi.org/10.1016/S1570-8705(03)00008-8}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:57, author = {Partha Mukherjee and Sandip Sen}, title = {Using Learned Data Patterns to Detect Malicious Nodes in Sensor Networks}, booktitle = {ICDCN}, year = {2008}, pages = {339-344}, ee = {http://dx.doi.org/10.1007/978-3-540-77444-0_35}, crossref = {DBLP:conf/icdcn/2008}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:58, author = {Donggang Liu and Peng Ning and Wenliang Du}, title = {Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks}, booktitle = {ICDCS}, year = {2005}, pages = {609-619}, ee = {http://doi.ieeecomputersociety.org/10.1109/ICDCS.2005.21}, crossref = {DBLP:conf/icdcs/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/icdcs/2005, title = {25th International Conference on Distributed Computing Systems (ICDCS 2005), 6-10 June 2005, Columbus, OH, USA}, booktitle = {ICDCS}, year = {2005}, isbn = {0-7695-2331-5}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:59, author = {John Brevik and Daniel Nurmi and Richard Wolski}, title = {Automatic methods for predicting machine availability in desktop Grid and peer-to-peer systems}, booktitle = {CCGRID}, year = {2004}, pages = {190-199}, ee = {http://doi.ieeecomputersociety.org/10.1109/CCGrid.2004.1336566}, crossref = {DBLP:conf/ccgrid/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:60, author = {Byung-Gon Chun and Ben Y. Zhao and John Kubiatowicz}, title = {Impact of Neighbor Selection on Performance and Resilience of Structured {P}{2}{P} Networks}, booktitle = {IPTPS}, year = {2005}, pages = {264-274}, ee = {http://dx.doi.org/10.1007/11558989_24}, crossref = {DBLP:conf/iptps/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/iptps/2005, editor = {Miguel Castro and Robbert van Renesse}, title = {Peer-to-Peer Systems IV, 4th International Workshop, IPTPS 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers}, booktitle = {IPTPS}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3640}, year = {2005}, isbn = {3-540-29068-0}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:61, author = {Ankur Bhargava and Kishore Kothapalli and Chris Riley and Christian Scheideler and Mark Thober}, title = {Pagoda: a dynamic overlay network for routing, data management, and multicasting}, booktitle = {SPAA}, year = {2004}, pages = {170-179}, ee = {http://doi.acm.org/10.1145/1007912.1007938}, crossref = {DBLP:conf/spaa/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/spaa/2004, editor = {Phillip B. Gibbons and Micah Adler}, title = {SPAA 2004: Proceedings of the Sixteenth Annual ACM Symposium on Parallel Algorithms, June 27-30, 2004, Barcelona, Spain}, booktitle = {SPAA}, publisher = {ACM}, year = {2004}, isbn = {1-58113-840-7}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:62, author = {Jean-Michel Busca and Fabio Picconi and Pierre Sens}, title = {Pastis: A Highly-Scalable Multi-user Peer-to-Peer File System}, booktitle = {Euro-Par}, year = {2005}, pages = {1173-1182}, ee = {http://dx.doi.org/10.1007/11549468_128}, crossref = {DBLP:conf/europar/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/europar/2005, editor = {Jos{\'e} C. Cunha and Pedro D. Medeiros}, title = {Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference, Lisbon, Portugal, August 30 - September 2, 2005, Proceedings}, booktitle = {Euro-Par}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3648}, year = {2005}, isbn = {3-540-28700-0}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:63, author = {Sean C. Rhea and Chris Wells and Patrick R. Eaton and Dennis Geels and Ben Y. Zhao and Hakim Weatherspoon and John Kubiatowicz}, title = {Maintenance-Free Global Data Storage}, journal = {IEEE Internet Computing}, volume = {5}, number = {5}, year = {2001}, pages = {40-49}, ee = {http://www.computer.org/internet/ic2001/w5040abs.htm}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:64, author = {Brian F. Cooper and Mayank Bawa and Neil Daswani and Sergio Marti and Hector Garcia-Molina}, title = {Authenticity and availability in {P}{I}{P}{E} networks}, journal = {Future Generation Comp. Syst.}, volume = {21}, number = {3}, year = {2005}, pages = {391-400}, ee = {http://dx.doi.org/10.1016/j.future.2004.04.017}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AA:65, author = {Jan Sacha and Jim Dowling}, title = {A Gradient Topology for Master-Slave Replication in Peer-to-Peer Environments}, booktitle = {DBISP2P}, year = {2005}, pages = {86-97}, ee = {http://dx.doi.org/10.1007/978-3-540-71661-7_8}, crossref = {DBLP:conf/dbisp2p/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/dbisp2p/2006, editor = {Gianluca Moro and Sonia Bergamaschi and Sam Joseph and Jean-Henry Morin and Aris M. Ouksel}, title = {Databases, Information Systems, and Peer-to-Peer Computing, International Workshops, DBISP2P 2005/2006, Trondheim, Norway, August 28-29, 2005, Seoul, Korea, September 11, 2006, Revised Selected Papers}, booktitle = {DBISP2P}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4125}, year = {2007}, isbn = {978-3-540-71660-0}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AA:66, author = {Suk-Bok Lee and Yoon-Hwa Choi}, title = {A secure alternate path routing in sensor networks}, journal = {Comput. Commun.}, volume = {30}, number = {1}, year = {2006}, issn = {0140-3664}, pages = {153--165}, doi = {http://dx.doi.org/10.1016/j.comcom.2006.08.006}, publisher = {Butterworth-Heinemann}, address = {Newton, MA, USA}, } @inproceedings{AA:67, author = {Ramses Morales and Indranil Gupta}, title = {{A}{V}{M}{O}{N}: Optimal and Scalable Discovery of Consistent Availability Monitoring Overlays for Distributed Systems}, booktitle = {ICDCS '07: Proceedings of the 27th International Conference on Distributed Computing Systems}, year = {2007}, isbn = {0-7695-2837-3}, pages = {55}, doi = {http://dx.doi.org/10.1109/ICDCS.2007.87}, address = {Washington, DC, USA}, } @InProceedings{AA:68, author = {Laurent Baduel and Satoshi Matsuoka}, title = {A Peer-to-Peer Infrastructure for Autonomous Grid Monitoring}, booktitle = {Proceedings of the third International Workshop on Hot Topics in Peer-to-Peer Systems, at IPDPS}, OPTpages = {}, year = 2007, address = {Long Beach, California, USA}, month = mar } @InProceedings{AA:69, author = {Laurent Baduel and Satoshi Matsuoka}, title = {{A Decentalized, Scalable, and Autonomous Grid Monitoring System}}, booktitle = {Proceedings of the International Conference On Principles Of Distributed Systems}, OPTpages = {}, year = 2007, address = {Guadeloupe, France}, month = dec } %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % Folder AB % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% @inproceedings{AB:01, author = {Charles Blake and Rodrigo Rodrigues}, title = {High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two}, booktitle = {HotOS}, year = {2003}, pages = {1-6}, crossref = {DBLP:conf/hotos/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:02, author = {Murat Karakaya and Ibrahim Korpeoglu and {\"O}zg{\"u}r Ulusoy}, title = {A Distributed and Measurement-Based Framework against Free Riding in Peer-to-Peer Networks}, booktitle = {Peer-to-Peer Computing}, year = {2004}, pages = {276-277}, ee = {http://csdl.computer.org/comp/proceedings/p2p/2004/2156/00/21560276abs.htm}, crossref = {DBLP:conf/p2p/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:03, title = {{F}2{F}: reliable storage in open networks}, author = {Jinyang Li and Frank Dabek}, booktitle = {Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS'06)}, year = {2006}, month = {February}, } @inproceedings{AB:04, author = {Daniel Nurmi and John Brevik and Richard Wolski}, title = {Modeling Machine Availability in Enterprise and Wide-Area Distributed Computing Environments}, booktitle = {Euro-Par}, year = {2005}, pages = {432-441}, ee = {http://dx.doi.org/10.1007/11549468_50}, crossref = {DBLP:conf/europar/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:05, author = {Beverly Yang and Hector Garcia-Molina}, title = {Designing a Super-Peer Network}, booktitle = {ICDE}, year = {2003}, pages = {49-}, ee = {http://csdl.computer.org/comp/proceedings/icde/2003/2071/00/20710049abs.htm}, crossref = {DBLP:conf/icde/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/icde/2003, editor = {Umeshwar Dayal and Krithi Ramamritham and T. M. Vijayaraman}, title = {Proceedings of the 19th International Conference on Data Engineering, March 5-8, 2003, Bangalore, India}, year = {2003}, isbn = {0-7803-7665-X}, bibsource = {DBLP, http://dblp.uni-trier.de} } @techreport{AB:06, author = "Boon Thau Loo and Anthony LaMarca and Gaetano Borriello", institution = "UC Berkeley; Intel Seattle Research (USA)", title = "Peer-To-Peer Backup for Personal Area Networks", number = "IRS-TR-02-015", year = "2003", month = "May", url = "http://www.intel-research.net/seattle/publications.asp", } @inproceedings{AB:07, author = {Yuan Chen and Jan Edler and Andrew V. Goldberg and Allan Gottlieb and Sumeet Sobti and Peter N. Yianilos}, title = {A Prototype Implementation of Archival Intermemory}, booktitle = {ACM DL}, year = {1999}, pages = {28-37}, ee = {db/conf/dl/ChenEGGSY99.html, http://doi.acm.org/10.1145/313238.313249}, crossref = {DBLP:conf/dl/1999}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/dl/1999, title = {Proceedings of the Fourth ACM conference on Digital Libraries, August 11-14, 1999, Berkeley, CA, USA}, publisher = {ACM}, year = {1999}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:08, author = {Andrew V. Goldberg and Peter N. Yianilos}, title = {Towards an Archival Intermemory}, booktitle = {ADL}, year = {1998}, pages = {147-156}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:09, author = {Brian F. Cooper and Hector Garcia-Molina}, title = {Bidding for Storage Space in a Peer-to-Peer Data Preservation System}, booktitle = {ICDCS}, year = {2002}, pages = {372-}, ee = {http://computer.org/proceedings/icdcs/1585/15850372abs.htm}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:10, author = {Martin Landers and Han Zhang and Kian-Lee Tan}, title = {PeerStore: Better Performance by Relaxing in Peer-to-Peer Backup}, booktitle = {Peer-to-Peer Computing}, year = {2004}, pages = {72-79}, crossref = {DBLP:conf/p2p/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:11, author = {Petros Maniatis and Mary Baker}, title = {Enabling the Archival Storage of Signed Documents}, booktitle = {FAST}, year = {2002}, pages = {31-45}, ee = {http://www.usenix.org/publications/library/proceedings/fast02/maniatis.html}, crossref = {DBLP:conf/fast/2002}, bibsource = {DBLP, http://dblp.uni-trier.de} } @TECHREPORT{AB:12, AUTHOR = {C. Batten and K. Barr and A. Saraf and S. Trepetin}, INSTITUTION = {Massachusetts Institute of Technology Laboratory for Computer Science}, MONTH = {Oct}, NUMBER = {LCS Technical Memo 632}, TITLE = {{pStore}: {A} Secure Peer-to-Peer Backup System}, URL = {http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TM-632.pdf}, YEAR = {2001} } @inproceedings{AB:13, author = {Mahesh Kallahalla and Erik Riedel and Ram Swaminathan and Qian Wang and Kevin Fu}, title = {Plutus: Scalable Secure File Sharing on Untrusted Storage}, booktitle = {FAST}, year = {2003}, ee = {http://www.usenix.org/events/fast03/tech/kallahalla.html}, crossref = {DBLP:conf/fast/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AB:14, author = {Charles E. Perkins and Pravin Bhagwat}, title = {Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers}, journal = {SIGCOMM Comput. Commun. Rev.}, volume = {24}, number = {4}, year = {1994}, issn = {0146-4833}, pages = {234--244}, doi = {http://doi.acm.org/10.1145/190809.190336}, publisher = {ACM}, address = {New York, NY, USA}, } @article{AB:15, author = {Deepak Ganesan and Ramesh Govindan and Scott Shenker and Deborah Estrin}, title = {Highly-resilient, energy-efficient multipath routing in wireless sensor networks}, journal = {SIGMOBILE Mob. Comput. Commun. Rev.}, volume = {5}, number = {4}, year = {2001}, issn = {1559-1662}, pages = {11--25}, doi = {http://doi.acm.org/10.1145/509506.509514}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AB:16, author = {Budhaditya Deb and Sudeept Bhatnagar and Badri Nath}, title = {ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks}, booktitle = {LCN '03: Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks}, year = {2003}, isbn = {0-7695-2037-5}, pages = {406}, address = {Washington, DC, USA}, } @inproceedings{AB:17, author = {Yih-Chun Hu and David B. Johnson and Adrian Perrig}, title = {SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks}, booktitle = {WMCSA '02: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications}, year = {2002}, isbn = {0-7695-1647-5}, pages = {3}, address = {Washington, DC, USA}, } @inproceedings{AB:18, author = {Nidal Nasser and Yunfeng Chen}, title = {Secure Multipath Routing Protocol for Wireless Sensor Networks}, booktitle = {ICDCSW '07: Proceedings of the 27th International Conference on Distributed Computing Systems Workshops}, year = {2007}, isbn = {0-7695-2838-4}, pages = {12}, doi = {http://dx.doi.org/10.1109/ICDCSW.2007.72}, address = {Washington, DC, USA}, } @inproceedings{AB:19, author = {Yih-Chun Hu and Adrian Perrig and David B. Johnson}, title = {Efficient Security Mechanisms for Routing Protocolsa}, booktitle = {NDSS}, year = {2003}, ee = {http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/4.pdf}, crossref = {DBLP:conf/ndss/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ndss/2003, title = {Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA}, booktitle = {NDSS}, publisher = {The Internet Society}, year = {2003}, isbn = {1-891562-16-9, 1-891562-15-0}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:20, author = {Chris Karlof and Naveen Sastry and David Wagner}, title = {TinySec: a link layer security architecture for wireless sensor networks}, booktitle = {SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems}, year = {2004}, isbn = {1-58113-879-2}, pages = {162--175}, location = {Baltimore, MD, USA}, doi = {http://doi.acm.org/10.1145/1031495.1031515}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AB:21, author = {Adrian Perrig and Robert Szewczyk and Victor Wen and David Culler and J. D. Tygar}, title = {SPINS: security protocols for sensor networks}, booktitle = {MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking}, year = {2001}, isbn = {1-58113-422-3}, pages = {189--199}, location = {Rome, Italy}, doi = {http://doi.acm.org/10.1145/381677.381696}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AB:22, author = {Thomas Moscibroda and Stefan Schmid and Roger Wattenhofer}, title = {On the topologies formed by selfish peers}, booktitle = {PODC '06: Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing}, year = {2006}, isbn = {1-59593-384-0}, pages = {133--142}, location = {Denver, Colorado, USA}, doi = {http://doi.acm.org/10.1145/1146381.1146403}, publisher = {ACM}, address = {New York, NY, USA}, } @article{AB:23, author = {Thomas Locher and Stefan Schmid and Roger Wattenhofer}, title = {eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System}, journal = {p2p}, volume = {0}, year = {2006}, isbn = {0-7695-2679-9}, pages = {3-11}, doi = {http://doi.ieeecomputersociety.org/10.1109/P2P.2006.17}, address = {Los Alamitos, CA, USA}, } @article{AB:24, author = {Dominik Grolimund and Luzius Meisser and Stefan Schmid and Roger Wattenhofer}, title = {Cryptree: A Folder Tree Structure for Cryptographic File Systems}, journal = {srds}, volume = {00}, year = {2006}, issn = {1060-9857}, pages = {189-198}, doi = {http://doi.ieeecomputersociety.org/10.1109/SRDS.2006.15}, address = {Los Alamitos, CA, USA}, } @InProceedings{AB:25, author = {Dominik Grolimund and Luzius Meisser and Stefan Schmid and Roger Wattenhofer}, title = {{Havelaar: A Robust and Efficient Reputation System for Active Peer-to-Peer Systems}}, booktitle = {{1st Workshop on the Economics of Networked Systems (NetEcon), University of Michigan, Ann Arbor, Michigan, USA}}, month = {June}, year = {2006} } @InProceedings{AB:26, author = {Fabian Kuhn and Stefan Schmid and Joest Smit and Roger Wattenhofer}, title = {{A Blueprint for Constructing Peer-to-Peer Systems Robust to Dynamic Worst-Case Joins and Leaves}}, booktitle = {{14th IEEE International Workshop on Quality of Service (IWQoS), Yale University, New Haven, Connectitut, USA}}, month = {June}, year = {2006} } @InProceedings{AB:27, author = {Thomas Locher and Stefan Schmid and Roger Wattenhofer}, title = {{Rescuing Tit-for-Tat with Source Coding}}, booktitle = {{7th IEEE International Conference on Peer-to-Peer Computing (P2P), Galway, Ireland}}, month = {September}, year = {2007} } @article{AB:28, author = {Matthew L. Massie and Brent N. Chun and David E. Culler}, title = {The ganglia distributed monitoring system: design, implementation, and experience}, journal = {Parallel Computing}, volume = {30}, number = {5-6}, year = {2004}, pages = {817-840}, ee = {http://dx.doi.org/10.1016/j.parco.2004.04.001}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AB:29, author = {Hung-Chang Hsiao and Chung-Ta King}, title = {Tornado: a capability-aware peer-to-peer storage overlay}, journal = {J. Parallel Distrib. Comput.}, volume = {64}, number = {6}, year = {2004}, pages = {747-758}, ee = {http://dx.doi.org/10.1016/j.jpdc.2003.10.008}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:30, author = {Ramakrishna Kotla and Lorenzo Alvisi and Michael Dahlin}, title = {SafeStore: A Durable and Practical Storage System}, booktitle = {USENIX Annual Technical Conference}, year = {2007}, pages = {129-142}, ee = {http://www.usenix.org/events/usenix07/tech/kotla.html}, crossref = {DBLP:conf/usenix/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/usenix/2007, title = {Proceedings of the 2007 USENIX Annual Technical Conference, June 17-22, 2007, Santa Clara, CA, USA}, booktitle = {USENIX Annual Technical Conference}, publisher = {USENIX}, year = {2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:31, author = {Bugra Gedik and Ling Liu}, title = {Reliable Peer-to-Peer Information Monitoring through Replication}, booktitle = {SRDS}, year = {2003}, pages = {56-65}, ee = {http://csdl.computer.org/comp/proceedings/srds/2003/1955/00/19550056abs.htm}, crossref = {DBLP:conf/srds/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/srds/2003, title = {22nd Symposium on Reliable Distributed Systems (SRDS 2003), 6-8 October 2003, Florence, Italy}, booktitle = {SRDS}, year = {2003}, isbn = {0-7695-1955-5}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:32, author = {Serge Abiteboul and Bogdan Marinoiu}, title = {Distributed monitoring of peer to peer systems}, booktitle = {WIDM}, year = {2007}, pages = {41-48}, ee = {http://doi.acm.org/10.1145/1316902.1316910}, crossref = {DBLP:conf/widm/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/widm/2007, editor = {Irini Fundulaki and Neoklis Polyzotis}, title = {9th ACM International Workshop on Web Information and Data Management (WIDM 2007), Lisbon, Portugal, November 9, 2007}, booktitle = {WIDM}, publisher = {ACM}, year = {2007}, isbn = {978-1-59593-829-9}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:33, author = {Bugra Gedik and Ling Liu}, title = {PeerCQ: A Decentralized and Self-Configuring Peer-to-Peer Information Monitoring System}, booktitle = {ICDCS}, year = {2003}, pages = {490-499}, ee = {http://csdl.computer.org/comp/proceedings/icdcs/2003/1920/00/19200490abs.htm}, crossref = {DBLP:conf/icdcs/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/icdcs/2003, title = {23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA}, booktitle = {ICDCS}, year = {2003}, isbn = {0-7695-1920-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @techreport{AB:34, Author = {Weatherspoon, Hakim and Chun, Byung-Gon and So, Chiu Wah and Kubiatowicz, John}, Title = {Long-Term Data Maintenance in Wide-Area Storage Systems: A Quantitative Approach}, Institution = {EECS Department, University of California, Berkeley}, Year = {2005}, Month = {Jul}, URL = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2005/6512.html}, Number = {UCB/CSD-05-1404} } @string{glo04 = "Proceedings of the GLOBECOM 2004 Conference" } @inproceedings{AB:35, crossref = "glo04", author = "Thomas Karagiannis and Andre Broido and Nevil Brownlee and Kimberly C. Claffy and Michalis Faloutsos", title = "Is P2P dying or just hiding?", topic = "p2p[0.7]", uri = "http://www.caida.org/outreach/papers/2004/p2p-dying/", abstract = {Recent reports in the popular media suggest a significant decrease in peer-to-peer (P2P) file-sharing traffic, attributed to the public's response to legal threats. Have we reached the end of the P2P revolution? In pursuit of legitimate data to verify this hypothesis, we embark on a more accurate measurement effort of P2P traffic at the link level. In contrast to previous efforts we introduce two novel elements in our methodology. First, we measure traffic of all known popular P2P protocols. Second, we go beyond the "known port" limitation by reverse engineering the protocols and identifying characteristic strings in the payload. We find that, if measured accurately, P2P traffic has never declined; indeed we have never seen the proportion of p2p traffic decrease over time (any change is an increase) in any of our data sources} } @proceedings{glo04, title = glo04, booktitle = glo04, month = nov, year = 2004, publisher = ieeecsp, uri = "http://www.globecom2004.org/", index = "GLOBECOM 2004" } @inproceedings{AB:36, author = {Richard J. Dunn and John Zahorjan and Steven D. Gribble and Henry M. Levy}, title = {Presence-Based Availability and {P}2{P} Systems}, booktitle = {P2P '05: Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing}, year = {2005}, isbn = {0-7695-2376-5}, pages = {209--216}, doi = {http://dx.doi.org/10.1109/P2P.2005.27}, address = {Washington, DC, USA}, } @inproceedings{AB:37, author = {Ranjita Bhagwan and Kiran Tati and Yu-Chung Cheng and Stefan Savage and Geoffrey M. Voelker}, title = {Total recall: system support for automated availability management}, booktitle = {NSDI'04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation}, year = {2004}, pages = {25--25}, location = {San Francisco, California}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } % Proactive replication in distributed storage systems using machine availability estimation @inproceedings{AB:38, year = {2007}, title = {{P}roactive replication in distributed storage systems using machine availability estimation}, author = {{D}uminuco, {A}lessandro and {B}iersack, {E}rnst {W} and {E}n-{N}ajjary, {T}aoufik}, booktitle = {{C}o{NEXT}'07, 3rd {I}nternational {C}onference on emerging {N}etworking {EX}periments and {T}echnologies, {D}ecember 10-13, 2007, {N}ew {Y}ork, {USA}}, month = {Dec} } @INPROCEEDINGS{AB:39, address = {Miami, USA}, author = {Caron, Eddy and Desprez, Fr{\'e}d{\'e}ric and Tedeschi, C{\'e}dric}, booktitle = {5th International Workshop on Hot Topics in Peer-to-Peer Systems, Hot-P2P 2008, in conjunction with IPDPS 2008}, month = {April, 14-18}, publisher = {IEEE}, title = {{Efficiency of Tree-Structured Peer-to-Peer Service Discovery Systems}}, year = {2008} } @inproceedings{AB:40, author = {Marc-Olivier Killijian and David Powell and Michel Ban{\^a}tre and Paul Couderc and Yves Roudier}, title = {Collaborative backup for dependable mobile applications}, booktitle = {Middleware for Pervasive and Ad-hoc Computing}, year = {2004}, pages = {146-149}, ee = {http://doi.acm.org/10.1145/1028509.1028517}, crossref = {DBLP:conf/middleware/2004w4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:41, author = {Ludovic Court{\`e}s and Marc-Olivier Killijian and David Powell}, title = {Security Rationale for a Cooperative Backup Service for Mobile Devices}, booktitle = {LADC}, year = {2007}, pages = {212-230}, ee = {http://dx.doi.org/10.1007/978-3-540-75294-3_16}, crossref = {DBLP:conf/ladc/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ladc/2007, editor = {Andrea Bondavalli and Francisco Vilar Brasileiro and Sergio Rajsbaum}, title = {Dependable Computing, Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007, Proceedings}, booktitle = {LADC}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4746}, year = {2007}, isbn = {978-3-540-75293-6}, bibsource = {DBLP, http://dblp.uni-trier.de} } @ARTICLE{AB:42, title={Towards a more accurate availability evaluation in peer-to-peer storage systems}, author={Zhi Yang and Jing Tian and Yafei Dai}, journal={Networking, Architecture, and Storages, 2006. IWNAS '06. International Workshop on}, year={1-3 Aug. 2006}, volume={}, number={}, pages={ 8 pp.-}, keywords={ data handling, peer-to-peer computing, storage management P2P storage system, data availability evaluation, data redundancy, host availability, peer online pattern, peer-to-peer storage systems}, doi={10.1109/IWNAS.2006.45}, ISSN={}, } @inproceedings{AB:43, title={On Object Maintenance in Peer-to-Peer Systems}, author={Kiran Tati and Geoffrey M. Voelker}, booktitle = {Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS'06)}, year = {2006}, month = {February}, } @inproceedings{AB:44, author = {Krishna P. Gummadi and Richard J. Dunn and Stefan Saroiu and Steven D. Gribble and Henry M. Levy and John Zahorjan}, title = {Measurement, modeling, and analysis of a peer-to-peer file-sharing workload}, booktitle = {SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles}, year = {2003}, isbn = {1-58113-757-5}, pages = {314--329}, location = {Bolton Landing, NY, USA}, doi = {http://doi.acm.org/10.1145/945445.945475}, publisher = {ACM}, address = {New York, NY, USA}, } @article{AB:45, author = {Di Wu and Ye Tian and Kam-Wing Ng and Anwitaman Datta}, title = {Stochastic analysis of the interplay between object maintenance and churn}, journal = {Comput. Commun.}, volume = {31}, number = {2}, year = {2008}, issn = {0140-3664}, pages = {220--239}, doi = {http://dx.doi.org/10.1016/j.comcom.2007.08.008}, publisher = {Butterworth-Heinemann}, address = {Newton, MA, USA}, } @inproceedings{AB:46, author = {Bhagwan, Ranjita and Savage, Stefan and Voelker, Geoffrey }, booktitle = {2nd International Workshop on Peer-to-Peer Systems (IPTPS'03)}, priority = {2}, title = {Understanding Availability}, year = {2003} } @inproceedings{AB:47, author = {Mark Lillibridge and Sameh Elnikety and Andrew Birrell and Michael Burrows and Michael Isard}, title = {A Cooperative Internet Backup Scheme}, booktitle = {USENIX Annual Technical Conference, General Track}, year = {2003}, pages = {29-41}, ee = {http://www.usenix.org/events/usenix03/tech/lillibridge.html}, crossref = {DBLP:conf/usenix/2003g}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/usenix/2003g, title = {Proceedings of the General Track: 2003 USENIX Annual Technical Conference, June 9-14, 2003, San Antonio, Texas, USA}, booktitle = {USENIX Annual Technical Conference, General Track}, publisher = {USENIX}, year = {2003}, isbn = {1-931971-10-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AB:48, author = {Spyros Voulgaris and Daniela Gavidia and Maarten van Steen}, title = {C{Y}{C}{L}{O}{N}: Inexpensive Membership Management for Unstructured {P}{2}{P} Overlays}, journal = {J. Network Syst. Manage.}, volume = {13}, number = {2}, year = {2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:49, author = {Arnaud Legout and Guillaume Urvoy-Keller and Pietro Michiardi}, title = {Rarest first and choke algorithms are enough}, booktitle = {Internet Measurement Conference}, year = {2006}, pages = {203-216}, ee = {http://doi.acm.org/10.1145/1177080.1177106}, crossref = {DBLP:conf/imc/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:50, author = {Landon P. Cox and Christopher D. Murray and Brian D. Noble}, title = {Pastiche: Making Backup Cheap and Easy}, booktitle = {OSDI}, year = {2002}, ee = {http://www.usenix.org/events/osdi02/tech/cox.html}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:51, author = {James W. Mickens and Brian D. Noble}, title = {Exploiting Availability Prediction in Distributed Systems}, year = {2006}, crossref = {DBLP:conf/nsdi/2006}, } @proceedings{DBLP:conf/nsdi/2006, booktitle = {3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), May 8-10, 2007, San Jose, California, USA}, publisher = {USENIX}, year = {2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:52, author = {James W. Mickens and Brian D. Noble}, title = {Predicting node availability in peer-to-peer networks}, booktitle = {SIGMETRICS}, year = {2005}, pages = {378-379}, ee = {http://doi.acm.org/10.1145/1064212.1064263}, crossref = {DBLP:conf/sigmetrics/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/sigmetrics/2005, editor = {Derek L. Eager and Carey L. Williamson and Sem C. Borst and John C. S. Lui}, title = {Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, June 6-10, 2005, Banff, Alberta, Canada}, publisher = {ACM}, year = {2005}, isbn = {1-59593-022-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{AB:53, author = {John R. Douceur}, title = {Is remote host availability governed by a universal law?}, journal = {SIGMETRICS Perform. Eval. Rev.}, volume = {31}, number = {3}, year = {2003}, issn = {0163-5999}, pages = {25--29}, doi = {http://doi.acm.org/10.1145/974036.974039}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AB:54, author = {William J. Bolosky and John R. Douceur and David Ely and Marvin Theimer}, title = {Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs}, booktitle = {SIGMETRICS '00: Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems}, year = {2000}, isbn = {1-58113-194-1}, pages = {34--43}, location = {Santa Clara, California, United States}, doi = {http://doi.acm.org/10.1145/339331.339345}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AB:55, title = {Availability in Global Peer-To-Peer Storage Systems}, author = {Qin Xin and Thomas Schwarz and Ethan L. Miller}, booktitle = {6th Workshop on Distributed Data and Structures (WDAS'2004)}, year = {2004} } @inproceedings{AB:56, author = {Landon P. Cox and Brian D. Noble}, title = {Samsara: honor among thieves in peer-to-peer storage}, booktitle = {SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles}, year = {2003}, isbn = {1-58113-757-5}, pages = {120--132}, location = {Bolton Landing, NY, USA}, doi = {http://doi.acm.org/10.1145/945445.945458}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AB:57, author = "Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica", title = "Wide-area cooperative storage with {CFS}", booktitle = "Proceedings of the 18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)", month = oct, address = "Chateau Lake Louise, Banff, Canada", year = "2001", } @inproceedings{AB:58, author = {Anwitaman Datta and Karl Aberer}, title = {Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models}, booktitle = {P2P '06: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing}, year = {2006}, isbn = {0-7695-2679-9}, pages = {133--144}, doi = {http://dx.doi.org/10.1109/P2P.2006.22}, address = {Washington, DC, USA}, } @INPROCEEDINGS(AB:59, TITLE = {Trust Arrays: Allowing P2P nodes to "personally" evaluate trustworthiness of potential partners}, AUTHOR = {Mauro Stocco and Thomas Engel and Uwe Roth}, BOOKTITLE = {Advances in Intelligent Systems - Theory and Applications (AISTA 2004), In cooperation with the IEEE Computer Society, Luxembourg, November 15-18, 2004}, PUBLISHER = {IEEE}, ISBN = {2-9599776-8-8}, MONTH = {November}, YEAR = {2004}) @ARTICLE{AB:60, title={Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks}, author={Zhou, R. and Hwang, K.}, journal={Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International}, year={26-30 March 2007}, volume={}, number={}, pages={1-10}, keywords={Internet, peer-to-peer computing, protocols, telecommunication securityGossipTrust scheme, Internet, decentralized reputation system, gossip protocol, gossip-based reputation aggregation, malicious peer behaviors, peer-to-peer reputation systems, unstructured P2P computing, unstructured peer-to-peer networks}, doi={10.1109/IPDPS.2007.370285}, ISSN={}, } @ARTICLE{AB:61, title={Optimizing File Availability in Peer-to-Peer Content Distribution}, author={Kangasharju, J. and Ross, K.W. and Turner, D.A.}, journal={INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE}, year={6-12 May 2007}, volume={}, number={}, pages={1973-1981}, abstract={A fundamental paradigm in peer-to-peer (P2P) content distribution is that of a large community of intermittently-connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P community must replicate and replace files as a function of their popularity to achieve satisfactory performance. In this paper, we develop an analytical optimization theory for benchmarking the performance of replication/replacement algorithms, including algorithms that employ erasure codes. We also consider a content management algorithm, the Top-K Most Frequently Requested algorithm, and show that in most cases this algorithm converges to an optimal replica profile. Finally, we present two approaches for achieving an evenly balanced load over all the peers in the community.}, keywords={content management, optimisation, peer-to-peer computing, resource allocationP2P community, analytical optimization theory, content management algorithm, load balancing, optimal replica profile, peer-to-peer content distribution, replication-replacement algorithm, top-K most frequently requested algorithm}, doi={10.1109/INFCOM.2007.229}, ISSN={0743-166X}, } @inproceedings{AB:62, author = {Liang, J. and Kumar, R. and Ross, K. }, citeulike-article-id = {201803}, journal = {Proceedings of the 19th IEEE Annual Computer Communications Workshop}, posted-at = {2005-12-29 14:49:24}, priority = {2}, title = {The KaZaA Overlay: A Measurement Study}, year = {2004} } @inproceedings{AB:63, author = {Yi Qiao and Fabi\'{a}n E. Bustamante}, title = {Structured and unstructured overlays under the microscope: a measurement-based view of two P2P systems that people use}, booktitle = {ATEC '06: Proceedings of the annual conference on USENIX '06 Annual Technical Conference}, year = {2006}, pages = {31--31}, location = {Boston, MA}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @techreport{AB:64, year = {2008}, title = {{A} {S}ecurity {P}rotocol for {S}elf-{O}rganizing {D}ata {S}torage}, author = {{O}ualha, {N}ouha and {\"{O}}nen, {M}elek and {R}oudier, {Y}ves}, address = {France}, number = {EURECOM+2399}, month = {Jan}, institution = {Institut Eurecom} } @techreport{AB:65, year = {2007}, title = {{V}erifying self-organized storage with bilinear pairings}, author = {{O}ualha, {N}ouha and {\"{O}}nen, {M}elek and {R}oudier, {Y}ves}, address = {France}, number = {EURECOM+2311}, month = {Jun}, institution = {Institut Eurecom} } @inproceedings{AB:66, author = {Jarret Falkner and Michael Piatek and John P. John and Arvind Krishnamurthy and Thomas E. Anderson}, title = {Profiling a million user dht}, booktitle = {Internet Measurement Comference}, year = {2007}, pages = {129-134}, ee = {http://doi.acm.org/10.1145/1298306.1298325}, crossref = {DBLP:conf/imc/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/imc/2007, editor = {Constantine Dovrolis and Matthew Roughan}, title = {Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement 2007, San Diego, California, USA, October 24-26, 2007}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2007}, isbn = {978-1-59593-908-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:67, author = {Michael Piatek and Tomas Isdal and Thomas E. Anderson and Arvind Krishnamurthy and Arun Venkataramani}, title = {Do Incentives Build Robustness in BitTorrent?}, booktitle = {NSDI}, year = {2007}, ee = {http://www.usenix.org/events/nsdi07/tech/piatek.html}, crossref = {DBLP:conf/nsdi/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/nsdi/2007, title = {4th Symposium on Networked Systems Design and Implementation (NSDI 2007), April 11-13, 2007, Cambridge, Massachusetts, USA, Proceedings. USENIX 2007}, booktitle = {NSDI}, publisher = {USENIX}, year = {2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:68, author = {Michael Piatek and Tomas Isdal and Arvind Krishnamurthy and Thomas E. Anderson}, title = {One Hop Reputations for Peer-to-Peer File Sharing Workloads}, booktitle = {NSDI}, year = {2008}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AB:69, author = {Giuseppe DeCandia and Deniz Hastorun and Madan Jampani and Gunavardhan Kakulapati and Avinash Lakshman and Alex Pilchin and Swaminathan Sivasubramanian and Peter Vosshall and Werner Vogels}, title = {Dynamo: amazon's highly available key-value store}, booktitle = {SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles}, year = {2007}, isbn = {978-1-59593-591-5}, pages = {205--220}, location = {Stevenson, Washington, USA}, doi = {http://doi.acm.org/10.1145/1294261.1294281}, publisher = {ACM}, address = {New York, NY, USA}, } %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % Folder AC % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% @inproceedings{AC:01, author = {Byung-Gon Chun and Frank Dabek and Andreas Haeberlen and Emil Sit and Hakim Weatherspoon and M. Frans Kaashoek and John Kubiatowicz and Robert Morris}, title = {Efficient replica maintenance for distributed storage systems}, booktitle = {NSDI'06: Proceedings of the 3rd conference on 3rd Symposium on Networked Systems Design \& Implementation}, year = {2006}, pages = {4--4}, location = {San Jose, CA}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @inproceedings{AC:02, author = {Sara Alouf and Abdulhalim Dandoush and Philippe Nain}, title = {Performance Analysis of Peer-to-Peer Storage Systems}, booktitle = {International Teletraffic Congress}, year = {2007}, pages = {642-653}, ee = {http://dx.doi.org/10.1007/978-3-540-72990-7_57}, crossref = {DBLP:conf/teletraffic/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/teletraffic/2007, editor = {Lorne Mason and Tadeusz Drwiega and James Yan}, title = {Managing Traffic Performance in Converged Networks, 20th International Teletraffic Congress, ITC20 2007, Ottawa, Canada, June 17-21, 2007, Proceedings}, booktitle = {International Teletraffic Congress}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4516}, year = {2007}, isbn = {978-3-540-72989-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @techreport{AC:03, author = {Abdulhalim Dandoush and Sara Alouf and Philippe Nain}, title = {P2P storage systems modeling, analysis and evaluation}, publisher = {INRIA}, address = {Sophia Antipolis}, year = {2007}, language = {eng}, note = {Technical report n RR-6392} } @inproceedings{AC:04, author = {Mark W. Storer and Kevin M. Greenan and Ethan L. Miller and Kaladhar Voruganti}, title = {POTSHARDS: secure long-term storage without encryption}, booktitle = {ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference}, year = {2007}, isbn = {999-8888-77-6}, pages = {1--14}, location = {Santa Clara, CA}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @inproceedings{AC:05, author = {Sean C. Rhea and Patrick R. Eaton and Dennis Geels and Hakim Weatherspoon and Ben Y. Zhao and John Kubiatowicz}, title = {Pond: The OceanStore Prototype}, booktitle = {FAST}, year = {2003}, ee = {http://www.usenix.org/events/fast03/tech/rhea.html}, crossref = {DBLP:conf/fast/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/fast/2003, title = {Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31 - April 2, 2003, Cathedral Hill Hotel, San Francisco, California, USA}, booktitle = {FAST}, publisher = {USENIX}, year = {2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:06, author = {Atul Adya and William J. Bolosky and Miguel Castro and Gerald Cermak and Ronnie Chaiken and John R. Douceur and Jon Howell and Jacob R. Lorch and Marvin Theimer and Roger Wattenhofer}, title = {{F}{A}{R}{S}{I}{T}{E}: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment}, booktitle = {OSDI}, year = {2002}, ee = {http://www.usenix.org/events/osdi02/tech/adya.html}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:07, author = {Steven Hand and Timothy Roscoe}, title = {Mnemosyne: Peer-to-Peer Steganographic Storage}, booktitle = {IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems}, year = {2002}, isbn = {3-540-44179-4}, pages = {130--140}, publisher = {Springer-Verlag}, address = {London, UK}, } @inproceedings{AC:08, author = {Ethan L. Miller and Darrell D. E. Long and William E. Freeman and Benjamin Reed}, title = {Strong Security for Network-Attached Storage}, booktitle = {FAST}, year = {2002}, pages = {1-13}, ee = {http://www.usenix.org/publications/library/proceedings/fast02/miller.html}, crossref = {DBLP:conf/fast/2002}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/fast/2002, editor = {Darrell D. E. Long}, title = {Proceedings of the FAST '02 Conference on File and Storage Technologies, January 28-30, 2002, Monterey, California, USA}, booktitle = {FAST}, publisher = {USENIX}, year = {2002}, isbn = {1-880446-03-0}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:09, author = {Mahesh Kallahalla and Erik Riedel and Ram Swaminathan and Qian Wang and Kevin Fu}, title = {Plutus: Scalable Secure File Sharing on Untrusted Storage}, booktitle = {FAST}, year = {2003}, ee = {http://www.usenix.org/events/fast03/tech/kallahalla.html}, crossref = {DBLP:conf/fast/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/fast/2003, title = {Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31 - April 2, 2003, Cathedral Hill Hotel, San Francisco, California, USA}, booktitle = {FAST}, publisher = {USENIX}, year = {2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:10, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary N. J. Peterson and Dawn Xiaodong Song}, title = {Provable data possession at untrusted stores}, booktitle = {ACM Conference on Computer and Communications Security}, year = {2007}, pages = {598-609}, ee = {http://doi.acm.org/10.1145/1315245.1315318}, crossref = {DBLP:conf/ccs/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ccs/2007, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007}, booktitle = {ACM Conference on Computer and Communications Security}, publisher = {ACM}, year = {2007}, isbn = {978-1-59593-703-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:11, author = {Ari Juels and Burton S. Kaliski Jr.}, title = {Pors: proofs of retrievability for large files}, booktitle = {ACM Conference on Computer and Communications Security}, year = {2007}, pages = {584-597}, ee = {http://doi.acm.org/10.1145/1315245.1315317}, crossref = {DBLP:conf/ccs/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/ccs/2007, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007}, booktitle = {ACM Conference on Computer and Communications Security}, publisher = {ACM}, year = {2007}, isbn = {978-1-59593-703-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:12, author = {Petar Maymounkov and David Mazi{\`e}res}, title = {Rateless Codes and Big Downloads}, booktitle = {IPTPS}, year = {2003}, pages = {247-255}, ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2735{\&}spage=247}, crossref = {DBLP:conf/iptps/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/iptps/2003, editor = {M. Frans Kaashoek and Ion Stoica}, title = {Peer-to-Peer Systems II, Second International Workshop, IPTPS 2003, Berkeley, CA, USA, February 21-22,2003, Revised Papers}, booktitle = {IPTPS}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {2735}, year = {2003}, isbn = {3-540-40724-3}, bibsource = {DBLP, http://dblp.uni-trier.de} } @InProceedings{AC:13, abstract = {We consider a closed social network with a certain proportion of liars who are trying to influence their peers` reputation about some subject. Each person`s reputation about this subject is based on both own direct experience and second hand information from their peers which cannot be verified. Given certain assumptions on when people believe or do not believe second hand information, we investigate the liars` impact on their peers` reputation about the subject. We present a mathematical model for this situation and show that there is a threshold proportion of liars below which they have no impact. Above it, liars do have an impact. We quantify this impact and give the threshold proportions. We compare our results in two fundamentally dierent scenarios: In the first one, reputation is passed on as second hand information. In the second one, direct experience only is passed on as second hand information. We find that in the latter scenario liars have less impact.}, author = {Mundinger, Jochen and Le Boudec, Jean-Yves}, booktitle = {Social {N}etwork {A}nalysis: {A}dvances and {E}mpirical {A}pplications {F}orum }, details = {http://infoscience.epfl.ch/record/52193}, documenturl = {http://infoscience.epfl.ch/getfile.py?mode=best&recid=52193}, keywords = {Reputation Systems; WLN}, location = {Oxford}, oai-id = {oai:infoscience.epfl.ch:52193}, oai-set = {conf; fulltext}, title = {The {I}mpact of {L}iars on {R}eputation in {S}ocial {N}etworks}, unit = {LCA}, year = 2005 } @inproceedings{AC:14, author = {Olivier Soyez and Cyril Randriamaro and Gil Utard and Francis Wlazinski}, title = {Dynamic Distribution for Data Storage in a P2P Network}, booktitle = {GPC}, year = {2007}, pages = {555-566}, ee = {http://dx.doi.org/10.1007/978-3-540-72360-8_47}, crossref = {DBLP:conf/gpc/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/gpc/2007, editor = {Christophe C{\'e}rin and Kuan-Ching Li}, title = {Advances in Grid and Pervasive Computing, Second International Conference, GPC 2007, Paris, France, May 2-4, 2007, Proceedings}, booktitle = {GPC}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4459}, year = {2007}, isbn = {978-3-540-72359-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:15, author = {Alexander Yip and Benjie Chen and Robert Morris}, title = {Pastwatch: A Distributed Version Control System}, booktitle = {NSDI}, year = {2006}, ee = {http://www.usenix.org/events/nsdi06/tech/yip.html}, crossref = {DBLP:conf/nsdi/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:16, author = {Benjie Chen and Thomer M. Gil and Athicha Muthitacharoen and Robert Morris}, title = {Brief announcement: building data structures on untrusted peer-to-peer storage with per-participant logs}, booktitle = {PODC}, year = {2003}, pages = {253}, ee = {http://doi.acm.org/10.1145/872035.872073}, bibsource = {DBLP, http://dblp.uni-trier.de} } @techreport{AC:16:TR, title = {Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs}, author = {Benjie Chen Thomer M. Gil Athicha Muthitacharoen Robert Morris}, institution = {{MIT} Laboratory for Computer Science}, number = {MIT-LCS-TR-888}, year = {2003}, month = {March}, } @inproceedings{AC:17, author = {Athicha Muthitacharoen and Robert Morris and Thomer M. Gil and Benjie Chen}, title = {Ivy: A Read/Write Peer-to-Peer File System}, booktitle = {OSDI}, year = {2002}, ee = {http://www.usenix.org/events/osdi02/tech/muthitacharoen.html}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:18, author = {Ricardo Marcel\'{\i}n-Jim{\'e}nez}, title = {Improving Reliability of Distributed Storage}, booktitle = {IICS}, year = {2005}, pages = {117-125}, ee = {http://dx.doi.org/10.1007/11749776_10}, crossref = {DBLP:conf/iics/2005}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/iics/2005, editor = {Alain Bui and Marc Bui and Thomas B{\"o}hme and Herwig Unger}, title = {Innovative Internet Community Systems, 5th International Workshop, IICS 2005, Paris, France, June 20-22, 2005, Revised Papers}, booktitle = {IICS}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3908}, year = {2006}, isbn = {3-540-33973-6}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:19, author = {Emil Sit and Robert Morris}, title = {Security Considerations for Peer-to-Peer Distributed Hash Tables}, booktitle = {IPTPS}, year = {2002}, pages = {261-269}, ee = {http://link.springer.de/link/service/series/0558/bibs/2429/24290261.htm}, crossref = {DBLP:conf/iptps/2002}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:20, author = {Hakim Weatherspoon and John Kubiatowicz}, title = {Erasure Coding Vs. Replication: A Quantitative Comparison}, booktitle = {IPTPS}, year = {2002}, pages = {328-338}, ee = {http://link.springer.de/link/service/series/0558/bibs/2429/24290328.htm}, crossref = {DBLP:conf/iptps/2002}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:21, author = {Hakim Weatherspoon and Tal Moscovitz and John Kubiatowicz}, title = {Introspective Failure Analysis: Avoiding Correlated Failures in Peer-to-Peer Systems}, booktitle = {SRDS}, year = {2002}, pages = {362-}, ee = {http://csdl.computer.org/comp/proceedings/srds/2002/1659/00/16590362abs.htm}, crossref = {DBLP:conf/srds/2002}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/srds/2002, title = {21st Symposium on Reliable Distributed Systems (SRDS 2002), 13-16 October 2002, Osaka, Japan}, booktitle = {SRDS}, year = {2002}, isbn = {0-7695-1659-9}, bibsource = {DBLP, http://dblp.uni-trier.de} } @ARTICLE{AC:22, title={Building a reliable mutable file system on peer-to-peer storage}, author={Stein, C.A. and Tucker, M.J. and Seltzer, M.I.}, journal={Reliable Distributed Systems, 2002. Proceedings. 21st IEEE Symposium on}, year={2002}, month={}, volume={}, number={}, pages={ 324-329}, keywords={ data integrity, meta data, replicated databases, software reliability, storage management, wide area networks Eliot File System, P2P systems, address-to-content bindings, consistency semantics, fine-granularity file updates, generalized metadata service, immutable P2P block storage, metadata service, mutability, peer-to-peer storage, reliable mutable file system, replicated database}, doi={10.1109/RELDIS.2002.1180204}, ISSN={1060-9857 }, } @ARTICLE{AC:23, title={Erasure Resilient Codes in Peer-To-Peer Storage Cloud}, author={Jin Li}, journal={Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on}, year={2006}, month={May}, volume={4}, number={}, pages={IV-IV}, keywords={Reed-Solomon codes, computer network reliability, linear codes, matrix algebra, peer-to-peer computing, random codesReed-Solomon code, data reliability, erasure resilient codes, network coding, peer-to-peer storage cloud, random linear code}, doi={10.1109/ICASSP.2006.1660948}, ISSN={1520-6149}, } @ARTICLE{AC:24, title={Estimating device availability in pervasive peer-to-peer environment}, author={Yuhong Xiong and Xiaofan Lin and Rowson, J.A.}, journal={Distributed Computing Systems, 2004. FTDCS 2004. Proceedings. 10th IEEE International Workshop on Future Trends of}, year={2004}, month={May}, volume={}, number={}, pages={ 254-260}, keywords={ client-server systems, ubiquitous computing device availability, distributed tasks, historic availability data, pervasive computing, pervasive peer-to-peer environment, small devices}, doi={10.1109/FTDCS.2004.1316624}, ISSN={ }, } @inproceedings{AC:25, author = {Thadpong Pongthawornkamol and Indranil Gupta}, title = {AVCast: New Approaches For Implementing Availability-Dependent Reliability for Multicast Receivers}, booktitle = {SRDS '06: Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems}, year = {2006}, isbn = {0-7695-2677-2}, pages = {345--354}, doi = {http://dx.doi.org/10.1109/SRDS.2006.11}, address = {Washington, DC, USA}, } @inproceedings{AC:26, year = {2008}, title = {{H}ierarchical codes: how to make erasure codes attractive for peer-to-peer storage systems}, author = {{D}uminuco, {A}lessandro and {B}iersack, {E}rnst {W}}, booktitle = {{P}2{P}'08, 8th {IEEE} {I}nternational {C}onference on {P}eer-to-{P}eer {C}omputing, {S}eptember 8th-11th, 2008, {A}achen, {G}ermany}, month = {Sep} } @article{AC:27, author = {Alexandros G. Dimakis and Brighten Godfrey and Martin J. Wainwright and Kannan Ramchandran}, title = {Network Coding for Distributed Storage Systems}, journal = {CoRR}, volume = {abs/cs/0702015}, year = {2007}, ee = {http://arxiv.org/abs/cs/0702015}, bibsource = {DBLP, http://dblp.uni-trier.de} } % http://ieeexplore.ieee.org/search/wrapper.jsp?arnumber=4215814 @inproceedings{AC:28, author = {Alexandros G. Dimakis and Brighten Godfrey and Martin J. Wainwright and Kannan Ramchandran}, title = {Network Coding for Distributed Storage Systems}, booktitle = {INFOCOM}, year = {2007}, pages = {2000-2008}, ee = {http://dx.doi.org/10.1109/INFCOM.2007.232}, crossref = {DBLP:conf/infocom/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/infocom/2007, title = {INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA}, booktitle = {INFOCOM}, publisher = {IEEE}, year = {2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{AC:29, author = {Alan Mislove and Ansley Post and Peter Druschel and Krishna P. Gummadi}, title = {Ostra: leveraging trust to thwart unwanted communication}, booktitle = {NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation}, year = {2008}, isbn = {111-999-5555-22-1}, pages = {15--30}, location = {San Francisco, California}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @inproceedings{AC:30, author = {Kevin Walsh and Emin G\"{u}n Sirer}, title = {Experience with an object reputation system for peer-to-peer filesharing}, booktitle = {NSDI'06: Proceedings of the 3rd conference on 3rd Symposium on Networked Systems Design \& Implementation}, year = {2006}, pages = {1--1}, location = {San Jose, CA}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @inproceedings{AC:31, author = {Bogdan C. Popescu and Bruno Crispo and Andrew S. Tanenbaum}, title = {Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System}, booktitle = {Security Protocols Workshop}, year = {2004}, pages = {213-220}, ee = {http://dx.doi.org/10.1007/11861386_24}, crossref = {DBLP:conf/spw/2004}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/spw/2004, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, booktitle = {Security Protocols Workshop}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3957}, year = {2006}, isbn = {3-540-40925-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @INPROCEEDINGS{AC:32, author = "J. S. Plank and M. G. Thomason", title = "A Practical Analysis of Low-Density Parity-Check Erasure Codes for Wide-Area Storage Applications", booktitle = "DSN-2004: The International Conference on Dependable Systems and Networks", publisher = "IEEE", month = "June", year = "2004", where = "http://www.cs.utk.edu/~plank/plank/papers/DSN-2004.html" } @INPROCEEDINGS{AC:33, author = "J. S. Plank and L. Xu", title = "Optimizing {C}auchy {R}eed-Solomon {C}odes for Fault-Tolerant Network Storage Applications", booktitle = "NCA-06: 5th IEEE International Symposium on Network Computing Applications", address = "Cambridge, MA", month = "July", year = "2006", where = "http://www.cs.utk.edu/~plank/plank/papers/NCA-2006.html" } @ARTICLE{AC:34, title={Impact of Denial of Service Attacks on Ad Hoc Networks}, author={Aad, I. and Hubaux, J.-P. and Knightly, E. W.}, journal={Networking, IEEE/ACM Transactions on}, year={2008}, month={Aug. }, volume={16}, number={4}, pages={791-802}, doi={10.1109/TNET.2007.904002}, ISSN={1063-6692}, } @techreport{AC:35, author = "Stefansson, Birgir and Thodis, Antonios and Ghodsi, Ali and Haridi, Seif", institution = "Swedish Institute of Computer Science", title = "MyriadStore: Technical Report", number = "ISSN 1100-3154", year = "2006", month = "Sep", } % References for IBE, Identity Based Encryption @inproceedings{AC:36, author = {Dan Boneh and Matthew K. Franklin}, title = {Identity-Based Encryption from the Weil Pairing}, booktitle = {CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology}, year = {2001}, isbn = {3-540-42456-3}, pages = {213--229}, publisher = {Springer-Verlag}, address = {London, UK}, } @inproceedings{AC:37, author = {Clifford Cocks}, title = {An Identity Based Encryption Scheme Based on Quadratic Residues}, booktitle = {Proceedings of the 8th IMA International Conference on Cryptography and Coding}, year = {2001}, isbn = {3-540-43026-1}, pages = {360--363}, publisher = {Springer-Verlag}, address = {London, UK}, } @INPROCEEDINGS{AC:38, author = {Leonardo B. Oliveira and Diego Aranha and Eduardo Morais and Felipe Daguano and Julio López and Ricardo Dahab}, title = {Identity-based encryption for sensor networks}, booktitle = {In 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'07}, year = {2007}, pages = {290--294} } @inproceedings{AC:39, author = {Fabian E. Bustamante and Yi Qiao}, title = {Friendships that last: peer lifespan and its role in P2P protocols}, booktitle = {8th international workshop on Web content caching and distribution}, year = {2004}, isbn = {1-4020-2257-3}, pages = {233--246}, publisher = {Kluwer Academic Publishers}, address = {Norwell, MA, USA}, } @article{AC:40, author = {Mor Harchol-Balter and Allen B. Downey}, title = {Exploiting process lifetime distributions for dynamic load balancing}, journal = {ACM Trans. Comput. Syst.}, volume = {15}, number = {3}, year = {1997}, issn = {0734-2071}, pages = {253--285}, doi = {http://doi.acm.org/10.1145/263326.263344}, publisher = {ACM}, address = {New York, NY, USA}, } @article{AC:41, author = {Mo Zhou and Yafei Dai and Xiaoming Li}, title = {A measurement study of the structured overlay network in P2P file-sharing systems}, journal = {Adv. MultiMedia}, volume = {2007}, number = {1}, year = {2007}, issn = {1687-5680}, pages = {10--10}, doi = {http://dx.doi.org/10.1155/2007/27958}, publisher = {Hindawi Publishing Corp.}, address = {New York, NY, United States}, } % reference for heterogeneity in peer-to-peer networks @InProceedings{AC:42, author = {S. Saroiu and P. Krishna Gummadi, S.D. Gribble}, title = {A Measurement Study of Peer-to-Peer File Sharing Systems}, booktitle = {MMCN'02}, year = {2002} } @article{AC:43, title={Absolute Slicing in Peer-to-peer Systems}, author={Montresor, A. and Zandonati, R.}, journal={Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on}, year={2008}, month={April}, volume={}, number={}, pages={1-8}, keywords={peer-to-peer computingabsolute slicing, application-specific architectures, ordered slicing, peer aggregation, peer sampling, peer-to-peer systems, resource assignment, service-oriented design framework}, doi={10.1109/IPDPS.2008.4536199}, ISSN={1530-2075}, } @inproceedings{AC:44, author = {Qin Lv and Sylvia Ratnasamy and Scott Shenker}, title = {Can Heterogeneity Make Gnutella Scalable?}, booktitle = {IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems}, year = {2002}, isbn = {3-540-44179-4}, pages = {94--103}, publisher = {Springer-Verlag}, address = {London, UK}, } % The following two references are for initial works on distributed slicing @ARTICLE{AC:45, title={Distributed Slicing in Dynamic Systems}, author={Fernandez, Antonio and Gramoli, Vincent and Jimenez, Ernesto and Kermarrec, Anne-Marie and Raynal, Michel}, journal={Distributed Computing Systems, 2007. ICDCS '07. 27th International Conference on}, year={2007}, month={June}, volume={}, number={}, pages={66-66}, doi={10.1109/ICDCS.2007.102}, ISSN={1063-6927}, } @article{AC:46, author = {Mark Jelasity and Anne-Marie Kermarrec}, title = {Ordered Slicing of Very Large-Scale Overlay Networks}, journal = {p2p}, volume = {0}, year = {2006}, isbn = {0-7695-2679-9}, pages = {117-124}, doi = {http://doi.ieeecomputersociety.org/10.1109/P2P.2006.25}, address = {Los Alamitos, CA, USA}, } @inproceedings{AC:47, author = {Spyros Voulgaris and Maarten van Steen}, title = {An Epidemic Protocol for Managing Routing Tables in Very Large Peer-to-Peer Networks}, booktitle = {DSOM}, year = {2003}, pages = {41-54}, ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2867{\&}spage=41}, crossref = {DBLP:conf/dsom/2003}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/dsom/2003, editor = {Marcus Brunner and Alexander Keller}, title = {Self-Managing Distributed Systems, 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2003, Heidelberg, Germany, October 20-22, 2003, Proceedings}, booktitle = {DSOM}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {2867}, year = {2003}, isbn = {3-540-20314-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @INPROCEEDINGS{AC:48, author = {Szymon Acedanski and Supratim Deb and Muriel Médard and Ralf Koetter}, title = {How good is random linear coding based distributed networked storage}, booktitle = {In NetCod}, year = {2005} } @inproceedings{AC:49, author = {Andreas Haeberlen and Petr Kouznetsov and Peter Druschel}, title = {PeerReview: practical accountability for distributed systems}, booktitle = {SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles}, year = {2007}, isbn = {978-1-59593-591-5}, pages = {175--188}, location = {Stevenson, Washington, USA}, doi = {http://doi.acm.org/10.1145/1294261.1294279}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AC:50, year = {2008}, title = {{H}ierarchical codes: how to make erasure codes attractive for peer-to-peer storage systems}, author = {{D}uminuco, {A}lessandro and {B}iersack, {E}rnst {W}}, booktitle = {{P}2{P}'08, 8th {IEEE} {I}nternational {C}onference on {P}eer-to-{P}eer {C}omputing, {S}eptember 8th-11th, 2008, {A}achen, {G}ermany}, month = {Sep} } @INPROCEEDINGS{AC:51, author = {Praveen Yalag and Suman Nath and Haifeng Yu and Phillip B. Gibbons and Srinivasan Seshan}, title = {Beyond Availability: Towards a Deeper Understanding of Machine Failure Characteristics in Large Distributed Systems}, booktitle = {In Proc. of USENIX Workshop on Real, Large Distributed Systems (WORLDS}, year = {2004} } @inproceedings{AC:52, author = {Arjen K. Lenstra and Eric R. Verheul}, title = {Selecting Cryptographic Key Sizes}, booktitle = {PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography}, year = {2000}, isbn = {3-540-66967-1}, pages = {446--465}, publisher = {Springer-Verlag}, address = {London, UK}, } @inproceedings{AC:53, author = {Michael J. Freedman and Robert Morris}, title = {Tarzan: a peer-to-peer anonymizing network layer}, booktitle = {CCS '02: Proceedings of the 9th ACM conference on Computer and communications security}, year = {2002}, isbn = {1-58113-612-9}, pages = {193--206}, location = {Washington, DC, USA}, doi = {http://doi.acm.org/10.1145/586110.586137}, publisher = {ACM}, address = {New York, NY, USA}, } @inproceedings{AC:54, author = "Jing Tian and Yafei Dai", title = "Understanding the Dynamic of Peer-to-Peer Systems", crossref = {DBLP:conf/iptps/2007}, } @proceedings{DBLP:conf/iptps/2007, booktitle = {IPTPS'2007: International Workshop on Peer-to-Peer Systems}, location = {Bellevue, WA, USA}, month = feb, booktitle = {IPTPS}, year = {2007}, } @inproceedings{AC:55, title = {Hierarchical Peer-to-peer Systems}, author = {L. Garcés-Erice and E.W. Biersack and P.A. Felber and K.W. Ross and G. Urvoy-Keller}, booktitle = {Proc. of ACM/IFIP Intl. Conf. on Parallel and Distributed Computing (Euro-Par 2003)}, year = {2003}, } @article{AC:56, author = {M\'{a}rk Jelasity and Spyros Voulgaris and Rachid Guerraoui and Anne-Marie Kermarrec and Maarten van Steen}, title = {Gossip-based peer sampling}, journal = {ACM Trans. Comput. Syst.}, volume = {25}, number = {3}, year = {2007}, issn = {0734-2071}, pages = {8}, doi = {http://doi.acm.org/10.1145/1275517.1275520}, publisher = {ACM}, address = {New York, NY, USA}, } %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % Software % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% @Misc{soft:Jolt, key = {Peercache}, title = {Peercache}, howpublished = {http://www.joltid.com/index.php/peercache/}, } @Misc{soft:ubistorage, key = {Ubistorage}, year = {2007}, howpublished = {http://www.ubistorage.com/}, } @Misc{soft:wuala, key = {Wuala}, year = {2008}, howpublished = {http://wua.la/}, } @Misc{soft:allmydata, key = {Allmydata}, year = {2007}, howpublished = {http://www.allmydata.com/}, } @Misc{soft:mldonkey, key = {MLdonkey}, author = {Fabrice {Le Fessant}}, year = {2002}, howpublished = {http://mldonkey.sourceforge.net/}, } @Misc{soft:peerple, key = {Peerple}, author = {Anh-Tuan Gai and Fabrice {Le Fessant} and Laurent Viennot}, year = {2007}, howpublished = {http://www.peerple.net/}, } @Misc{soft:palabre, key = {Palabre}, author = {Fabrice {Le Fessant}}, year = {2008}, howpublished = {http://www.palabre.net/}, } @Misc{soft:dibs, key = {DIBS}, title = {Distributed Internet Backup System}, year = {2003}, howpublished = {http://www.mit.edu/~emin/source\_code/dibs/index.html}, } @unpublished {RFC4346, author = "Dierks, T. and E. Rescorla", title = "{RFC} 4346: The {T}ransport {L}ayer {S}ecurity ({T}{L}{S}) Protocol Version 1.1", year = 2006, month = apr, note = {IETF}, }