Page MenuHomec4science

r-1.xml
No OneTemporary

File Metadata

Created
Thu, Jan 23, 04:06
This file is larger than 256 KB, so syntax highlighting was skipped.
<?xml version="1.0" encoding="UTF-8" ?>
<response>
<sessionID>A5p25dJEkmEFeg7PMPm</sessionID>
<searchResults>
<queryID>1</queryID>
<occurancesFound>5670</occurancesFound>
<recordsFound>1641</recordsFound>
<recordsSearched>36250344</recordsSearched>
</searchResults>
<records>
<REC inst_id="1" recid="151312862" hot="yes" sortkey="3118529064" timescited="0" sharedrefs="0" inpi="false">
<item issue="151312797" recid="151312862" coverdate="200600" sortkey="3118529064" refkey="289891" dbyear="2006">
<ut>000238570400009</ut>
<i_ckey>ATHA0130063989LE</i_ckey>
<i_cid>0111353930</i_cid>
<source_title>APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets</item_title>
<sq>B6930B0</sq>
<bib_id>3989: 130-145 2006</bib_id>
<bib_pages begin="130" end="145" pages="16">130-145</bib_pages>
<bib_issue year="2006" vol="3989"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Athanasopoulos, E</primaryauthor>
<fullauthorname>
<AuRole>Author</AuRole>
<AuLastName>Athanasopoulos</AuLastName>
<AuFirstName>Elias</AuFirstName>
<AuCollectiveName>Athanasopoulos, Elias</AuCollectiveName>
</fullauthorname>
<author key="169471">Anagnostakis, KG</author>
<fullauthorname>
<AuRole>Author</AuRole>
<AuLastName>Anagnostakis</AuLastName>
<AuFirstName>Kostas G.</AuFirstName>
<AuCollectiveName>Anagnostakis, Kostas G.</AuCollectiveName>
</fullauthorname>
<author key="4468025">Markatos, EP</author>
<fullauthorname>
<AuRole>Author</AuRole>
<AuLastName>Markatos</AuLastName>
<AuFirstName>Evangelos P.</AuFirstName>
<AuCollectiveName>Markatos, Evangelos P.</AuCollectiveName>
</fullauthorname>
</authors>
<emails count="3">
<email>
<name>Athanasopoulos, E</name>
<email_addr>elathan@ics.forth.gr</email_addr>
</email>
<email>
<name>Anagnostakis, KG</name>
<email_addr>kostas@i2r.a-star.edu.sg</email_addr>
</email>
<email>
<name>Markatos, EP</name>
<email_addr>markatos@ics.forth.gr</email_addr>
</email>
</emails>
<research_addrs count="1">
<research>
<rs_address>Inst Infocomm Res, Singapore, Singapore</rs_address>
<rs_organization>Inst Infocomm Res</rs_organization>
<rs_city>Singapore</rs_city>
<rs_country>Singapore</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structure, which allows decentralized operation and makes it easy for new users to join and participate in the system. However, the lack of structure can also be abused by malicious users. We explore one such attack, that enables malicious users to use unstructured P2P systems to perform Denial of Service (DoS) attacks to third parties. Specifically, we show that a malicious node can coerce a large number of peers to perform requests to a target host that may not even be part of the P2P network, including downloading unwanted files from a target Web Server. This is a classic form of denial-of-service which also has two interesting characteristics: (a) it is hard to identify the originator of the attack, (b) it is even harder to stop the attack. The second property comes from the fact that certain unstructured P2P systems seem to have a kind of "memory", retaining knowledge about (potentially false) queries for many days. In this paper we present real-world experiments of Gnutella-based DoS attacks to Web Servers. We explore the magnitude of the problem and present a solution to protect innocent victims against this attack.</p>
</abstract>
<refs count="6">
<ref>131693322</ref>
<ref>151312863</ref>
<ref>121566332</ref>
<ref>151312864</ref>
<ref>151312865</ref>
<ref>151312866</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149337585" hot="yes" sortkey="3119749141" timescited="0" sharedrefs="0" inpi="false">
<item issue="149337363" recid="149337585" coverdate="200500" sortkey="3119749141" refkey="1431118" dbyear="2006">
<ut>000235835600026</ut>
<i_ckey>COUR0224053782LS</i_ckey>
<i_cid>0109934312</i_cid>
<source_title>PROFESSIONAL KNOWLEDGE MANAGEMENT</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>Automatic hyperlink creation using P2P and publish/subscribe</item_title>
<sq>B5029B0</sq>
<bib_id>3782: 224-233 2005</bib_id>
<bib_pages begin="224" end="233" pages="10">224-233</bib_pages>
<bib_issue year="2005" vol="3782"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Courtenage, S</primaryauthor>
<author key="7558602">Williams, S</author>
</authors>
<emails count="2">
<email>
<name>Courtenage, S</name>
<email_addr>courtes@wmin.ac.uk</email_addr>
</email>
<email>
<name>Williams, S</name>
<email_addr>williast@wmin.ac.uk</email_addr>
</email>
</emails>
<reprint>
<rp_author>Courtenage, S</rp_author>
<rp_address>Univ Westminster, Cavendish Sch Comp Sci, 115 New Cavendish St, London W1R 8AL, England</rp_address>
<rp_organization>Univ Westminster</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cavendish Sch Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>115 New Cavendish St</rp_street>
<rp_city>London</rp_city>
<rp_country>England</rp_country>
<rp_zips count="1">
<rp_zip location="AC">W1R 8AL</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Westminster, Cavendish Sch Comp Sci, London W1R 8AL, England</rs_address>
<rs_organization>Univ Westminster</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cavendish Sch Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>London</rs_city>
<rs_country>England</rs_country>
<rs_zips count="1">
<rs_zip location="AC">W1R 8AL</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="3">
<p>The World-Wide Web allows users to quickly and easily publish information in the form of web pages. Pages are linked to other pages already on the web using a hyperlink inserted into a web page by the page's author that contains the URL address of another existing web page. This model of web publishing, although simple and efficient, also has the effect that links between pages must be created manually and only to pages that are known to the author of the links. This can be a disadvantage if, for example, information in a particular field is incomplete and expanding rapidly over time, and where a page author cannot be expected to know which pages are the most appropriate to link to and when they become available.</p>
<p>In this paper, we look at a radically different model of web publishing in which the author of a web page does not specify links using URLs. Instead, the page author expresses an interest about the kind of content the page should link to and as new content comes online that matches that interest, links are inserted automatically into the original page to point to the new content. This leads to the possibility that a hyperlink from a particular location in a web page can lead to multiple destinations, something we call a multi-valued hyperlink.</p>
<p>We also describe a prototype implementation of our web architecture, based on the CHORD-based peer-to-peer overlay network, which uses publish/subscribe to communicate page author interests to other peers in order to create links between pages.</p>
</abstract>
<refs count="15">
<ref>134911723</ref>
<ref>120901131</ref>
<ref>147907083</ref>
<ref>147907084</ref>
<ref>147907086</ref>
<ref>147907088</ref>
<ref>147907089</ref>
<ref>149337586</ref>
<ref>147907092</ref>
<ref>130950557</ref>
<ref>147907094</ref>
<ref>123110037</ref>
<ref>149337587</ref>
<ref>147907096</ref>
<ref>147907097</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149337588" hot="yes" sortkey="3119749142" timescited="0" sharedrefs="0" inpi="false">
<item issue="149337363" recid="149337588" coverdate="200500" sortkey="3119749142" refkey="6179985" dbyear="2006">
<ut>000235835600027</ut>
<i_ckey>SCHE0234053782LS</i_ckey>
<i_cid>0109934326</i_cid>
<source_title>PROFESSIONAL KNOWLEDGE MANAGEMENT</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>Introducing social aspects to search in peer-to-peer networks</item_title>
<sq>B5029B0</sq>
<bib_id>3782: 234-242 2005</bib_id>
<bib_pages begin="234" end="242" pages="9">234-242</bib_pages>
<bib_issue year="2005" vol="3782"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Schenk, S</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Schenk, S</name>
<email_addr>simon.schenk@whitepla.net</email_addr>
</email>
</emails>
<reprint>
<rp_author>Schenk, S</rp_author>
<rp_address>FH NORDAKADMIE, Kollner Chaussee 11, D-25337 Elmshorn, Germany</rp_address>
<rp_organization>FH NORDAKADMIE</rp_organization>
<rp_street>Kollner Chaussee 11</rp_street>
<rp_city>Elmshorn</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-25337</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>FH NORDAKADMIE, D-25337 Elmshorn, Germany</rs_address>
<rs_organization>FH NORDAKADMIE</rs_organization>
<rs_city>Elmshorn</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-25337</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Searching social networks is determined by two factors: reputation and relevance. Reputation is the memory and summary of behavior from past transactions. Relevance is the probability that useful information can be obtained from a person. Search in social networks is performed by asking persons of high relevance and a good reputation or persons who are supposed to know somebody like that. We describe how these social aspects can be used in peer-to-peer networks in order to increase efficiency and scalability. Based on a social peer-to-peer network a knowledge management application with advantages over centralized approaches can be implemented.</p>
</abstract>
<refs count="25">
<ref>149337589</ref>
<ref>149337590</ref>
<ref>18404182</ref>
<ref>149337591</ref>
<ref>149337592</ref>
<ref>130246228</ref>
<ref>142351342</ref>
<ref>136088587</ref>
<ref>149337593</ref>
<ref>136467998</ref>
<ref>149337594</ref>
<ref>149337595</ref>
<ref>149337596</ref>
<ref>129695736</ref>
<ref>149337597</ref>
<ref>149337598</ref>
<ref>105427774</ref>
<ref>149337599</ref>
<ref>149337600</ref>
<ref>149337601</ref>
<ref>149337602</ref>
<ref>137391429</ref>
<ref>16172046</ref>
<ref>124754941</ref>
<ref>92398658</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149290588" hot="yes" sortkey="3119763083" timescited="0" sharedrefs="0" inpi="false">
<item issue="149290578" recid="149290588" coverdate="200605" sortkey="3119763083" refkey="1255711" dbyear="2006">
<ut>000236161700003</ut>
<i_ckey>CHOU0419060017IJ</i_ckey>
<i_cid>0109991568</i_cid>
<source_title>IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS</source_title>
<source_abbrev>IEEE T PARALL DISTR</source_abbrev>
<item_title>SCALLOP: A scalable and load-balanced peer-to-peer lookup protocol</item_title>
<sq>09422J0</sq>
<bib_id>17 (5): 419-433 MAY 2006</bib_id>
<bib_pages begin="419" end="433" pages="15">419-433</bib_pages>
<bib_issue year="2006" vol="17"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Chou, JCY</primaryauthor>
<author key="3156869">Huang, TY</author>
<author key="3154551">Huang, KL</author>
<author key="1209402">Chen, TY</author>
</authors>
<emails count="3">
<email>
<name>Chou, JCY</name>
<email_addr>jchou@csag.ucsd.edu</email_addr>
</email>
<email>
<name>Huang, TY</name>
<email_addr>tyhuang@cs.nthu.edu.tw</email_addr>
</email>
<email>
<name>Huang, KL</name>
<email_addr>yen@eos.cs.nthu.edu.tw</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer distributed systems</keyword>
<keyword>lookup protocols</keyword>
<keyword>routing bottlenecks</keyword>
<keyword>balanced routing</keyword>
</keywords>
<reprint>
<rp_author>Chou, JCY</rp_author>
<rp_address>Univ Calif San Diego, San Diego, CA 92103 USA</rp_address>
<rp_organization>Univ Calif San Diego</rp_organization>
<rp_city>San Diego</rp_city>
<rp_state>CA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">92103</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Calif San Diego, San Diego, CA 92103 USA</rs_address>
<rs_organization>Univ Calif San Diego</rs_organization>
<rs_city>San Diego</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">92103</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan</rs_address>
<rs_organization>Natl Tsing Hua Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Hsinchu</rs_city>
<rs_country>Taiwan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">300</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A number of structured peer-to-peer (P2P) lookup protocols have been proposed recently. A P2P lookup protocol routes a lookup request to its target node in a P2P distributed system. Existing protocols achieve balanced routing traffic among nodes by assuming that lookup requests are evenly targeted at every node. However, when lookup requests concentrate on a few nodes simultaneously, these nodes become hot spots. Due to uneven routing patterns in existing protocols, hot spots cause unbalanced routing traffic which leads to routing bottlenecks. In this paper, we present a novel structured P2P lookup protocol called SCALLOP that delivers balanced routing and avoids routing bottlenecks at occurrences of hot spots. Among existing protocols, SCALLOP is the first one to accomplish this goal at the fundamental nature of a routing protocol. SCALLOP achieves balanced routing by uniquely constructing a balanced lookup tree for each node. The balanced tree evenly distributes routing traffic among sibling nodes and, therefore, avoids or reduces routing bottlenecks. In addition, as a load-balanced protocol, SCALLOP delivers asymptotically optimal lookup performance at the tradeoff between routing path and routing table size. We conducted a set of simulations to demonstrate the effectiveness of SCALLOP. The results show that, compared with a most-referenced and representative structured P2P lookup protocol and a graph-based extension of this protocol, SCALLOP significantly reduces routing bottlenecks while all three protocols deliver comparable lookup performance.</p>
</abstract>
<refs count="34">
<ref>149290589</ref>
<ref>149290590</ref>
<ref>149290591</ref>
<ref>121684233</ref>
<ref>137494718</ref>
<ref>149290592</ref>
<ref>149290593</ref>
<ref>123110013</ref>
<ref>149290594</ref>
<ref>135614294</ref>
<ref>149290595</ref>
<ref>149290596</ref>
<ref>148591040</ref>
<ref>143848821</ref>
<ref>149290597</ref>
<ref>137015234</ref>
<ref>109420759</ref>
<ref>122611831</ref>
<ref>147349528</ref>
<ref>149290598</ref>
<ref>137280668</ref>
<ref>130352959</ref>
<ref>149290599</ref>
<ref>134865390</ref>
<ref>111651653</ref>
<ref>134538952</ref>
<ref>123110024</ref>
<ref>128882241</ref>
<ref>131684148</ref>
<ref>122611834</ref>
<ref>122611823</ref>
<ref>149290600</ref>
<ref>121684257</ref>
<ref>137128813</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149289708" hot="yes" sortkey="3119763249" timescited="0" sharedrefs="0" inpi="false">
<item issue="149289705" recid="149289708" coverdate="200603" sortkey="3119763249" refkey="5233516" dbyear="2006">
<ut>000236055100002</ut>
<i_ckey>OLFA0401060051IR</i_ckey>
<i_cid>0109925773</i_cid>
<source_title>IEEE TRANSACTIONS ON AUTOMATIC CONTROL</source_title>
<source_abbrev>IEEE T AUTOMAT CONTR</source_abbrev>
<item_title>Flocking for multi-agent dynamic systems: Algorithms and theory</item_title>
<sq>42592J0</sq>
<bib_id>51 (3): 401-420 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1109/TAC.2005.864190</article_no>
</article_nos>
<bib_pages begin="401" end="420" pages="20">401-420</bib_pages>
<bib_issue year="2006" vol="51"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Olfati-Saber, R</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Olfati-Saber, R</name>
<email_addr>olfati@dartmouth.edu</email_addr>
</email>
</emails>
<keywords count="8">
<keyword>consensus theory</keyword>
<keyword>distributed control</keyword>
<keyword>dynamic graphs</keyword>
<keyword>mobile sensor networks</keyword>
<keyword>networked autonomous vehicles</keyword>
<keyword>self-assembly of networks</keyword>
<keyword>self-organizing systems</keyword>
<keyword>swarms</keyword>
</keywords>
<keywords_plus count="8">
<keyword>STABILITY ANALYSIS</keyword>
<keyword>FISH SCHOOLS</keyword>
<keyword>NETWORKS</keyword>
<keyword>CONSENSUS</keyword>
<keyword>TOPOLOGY</keyword>
<keyword>GRAPHS</keyword>
<keyword>SWARMS</keyword>
<keyword>AGENTS</keyword>
</keywords_plus>
<reprint>
<rp_author>Olfati-Saber, R</rp_author>
<rp_address>Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA</rp_address>
<rp_organization>Dartmouth Coll</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Thayer Sch Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Hanover</rp_city>
<rp_state>NH</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">03755</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA</rs_address>
<rs_organization>Dartmouth Coll</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Thayer Sch Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Hanover</rs_city>
<rs_state>NH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">03755</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we present a theoretical framework for design and analysis of distributed flocking algorithms. Two cases of flocking in free-space and presence of multiple obstacles are considered. We present three flocking algorithms: two for free-flocking and one for constrained flocking. A comprehensive analysis of the first two algorithms is provided. We demonstrate the first algorithm embodies all three rules of Reynolds. This is a formal approach to extraction of interaction rules that lead to the emergence of collective behavior. We show that the first algorithm generically leads to regular fragmentation, whereas the second and third algorithms both lead to flocking. A systematic method is provided for construction of cost functions (or collective potentials) for flocking. These collective potentials penalize deviation from a class of lattice-shape objects called alpha-lattices. We use a multi-species framework for construction of collective potentials that consist of flock-members, or alpha-agents, and virtual agents associated with alpha-agents called beta- and gamma-agents. We show that migration of flocks can be performed using a peer-to-peer network of agents, i.e., "flocks need no leaders." A "universal" definition of flocking for particle systems with similarities to Lyapunov stability is given. Several simulation results are provided that demonstrate performing 2-D and 3-D flocking, split/rejoin maneuver, and squeezing maneuver for hundreds of agents using the proposed algorithms.</p>
</abstract>
<refs count="53">
<ref>130816440</ref>
<ref>116232900</ref>
<ref>149289709</ref>
<ref>134102184</ref>
<ref>149289710</ref>
<ref>119858537</ref>
<ref>149289711</ref>
<ref>118454247</ref>
<ref>136376189</ref>
<ref>23666626</ref>
<ref>129115441</ref>
<ref>130484781</ref>
<ref>116840195</ref>
<ref>73622006</ref>
<ref>130023070</ref>
<ref>149289712</ref>
<ref>59144087</ref>
<ref>149289713</ref>
<ref>129115447</ref>
<ref>122671850</ref>
<ref>127975864</ref>
<ref>143366738</ref>
<ref>149289714</ref>
<ref>94217007</ref>
<ref>110819087</ref>
<ref>142797430</ref>
<ref>149289715</ref>
<ref>66197085</ref>
<ref>136376185</ref>
<ref>149289716</ref>
<ref>149289717</ref>
<ref>149289718</ref>
<ref>149289719</ref>
<ref>149289720</ref>
<ref>149289721</ref>
<ref>125361079</ref>
<ref>45883945</ref>
<ref>149289722</ref>
<ref>149289723</ref>
<ref>144241486</ref>
<ref>66742944</ref>
<ref>149289724</ref>
<ref>81308983</ref>
<ref>145796834</ref>
<ref>149289725</ref>
<ref>27792039</ref>
<ref>95732836</ref>
<ref>118870439</ref>
<ref>142420422</ref>
<ref>107446574</ref>
<ref>149289726</ref>
<ref>119913893</ref>
<ref>92315696</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149281330" hot="yes" sortkey="3119764822" timescited="0" sharedrefs="0" inpi="false">
<item issue="149281280" recid="149281330" coverdate="200600" sortkey="3119764822" refkey="2611033" dbyear="2006">
<ut>000235837300008</ut>
<i_ckey>GREC0116063861LG</i_ckey>
<i_cid>0109935450</i_cid>
<source_title>FOUNDATIONS OF INFORMATION AND KNOWLEDGE SYSTEMS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Solving abduction by computing joint explanations: Logic programming formalization, applications to P2P data integration, and cmplexity results</item_title>
<sq>B5032B0</sq>
<bib_id>3861: 116-136 2006</bib_id>
<bib_pages begin="116" end="136" pages="21">116-136</bib_pages>
<bib_issue year="2006" vol="3861"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Greco, G</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Greco, G</name>
<email_addr>ggreco@mat.unical.it</email_addr>
</email>
</emails>
<keywords_plus count="4">
<keyword>COST-BASED ABDUCTION</keyword>
<keyword>COMPLEXITY</keyword>
<keyword>AGENTS</keyword>
<keyword>HARD</keyword>
</keywords_plus>
<reprint>
<rp_author>Greco, G</rp_author>
<rp_address>Univ Calabria, Dipartimento Matemat, I-87030 Commenda Di Rende, Italy</rp_address>
<rp_organization>Univ Calabria</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dipartimento Matemat</rp_suborganization>
</rp_suborganizations>
<rp_city>Commenda Di Rende</rp_city>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-87030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Calabria, Dipartimento Matemat, I-87030 Commenda Di Rende, Italy</rs_address>
<rs_organization>Univ Calabria</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Matemat</rs_suborganization>
</rs_suborganizations>
<rs_city>Commenda Di Rende</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-87030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>An extension of abduction is investigated where explanations for bunches of observations may be jointly computed by sets of interacting agents. At one hand, agents are allowed to partially contribute to the reasoning task, so that joint explanations can be singled out even if each agent does not have enough knowledge for carrying out abduction on its own. At the other hand, agents maintain their autonomy in choosing explanations, each one being equipped with a weighting function reflecting its perception about the reliability of set of hypotheses. Given that different agents may have different and possibly contrasting preferences, some reasonable notions of agents' agreement are introduced, and their computational properties are thoroughly studied. As an example application of the framework discussed in the paper, it is shown how to handle data management issues in Peer-to-Peer systems and, specifically, how to provide a repair-based semantics to inconsistent ones.</p>
</abstract>
<refs count="45">
<ref>136824026</ref>
<ref>149281331</ref>
<ref>136296269</ref>
<ref>149159130</ref>
<ref>149281332</ref>
<ref>133034704</ref>
<ref>133360183</ref>
<ref>149281333</ref>
<ref>133034706</ref>
<ref>133034705</ref>
<ref>143536670</ref>
<ref>86727293</ref>
<ref>123563782</ref>
<ref>126345846</ref>
<ref>80707827</ref>
<ref>146247080</ref>
<ref>142507055</ref>
<ref>149281334</ref>
<ref>87663912</ref>
<ref>91502511</ref>
<ref>149281335</ref>
<ref>132136899</ref>
<ref>149281336</ref>
<ref>149281337</ref>
<ref>146461662</ref>
<ref>127878804</ref>
<ref>149281338</ref>
<ref>149281339</ref>
<ref>136256424</ref>
<ref>128826978</ref>
<ref>82901241</ref>
<ref>66778088</ref>
<ref>149281340</ref>
<ref>147302158</ref>
<ref>128670527</ref>
<ref>149281341</ref>
<ref>149281342</ref>
<ref>35560165</ref>
<ref>143322039</ref>
<ref>149281343</ref>
<ref>132753839</ref>
<ref>149281344</ref>
<ref>149281345</ref>
<ref>149281346</ref>
<ref>149281347</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149251640" hot="yes" sortkey="3119772648" timescited="0" sharedrefs="0" inpi="false">
<item issue="149251621" recid="149251640" coverdate="200603" sortkey="3119772648" refkey="648574" dbyear="2006">
<ut>000236095400005</ut>
<i_ckey>BIND0219060012AW</i_ckey>
<i_cid>0109962668</i_cid>
<source_title>AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS</source_title>
<source_abbrev>AUTON AGENT MULTI-AG</source_abbrev>
<item_title>A multiagent system for the reliable execution of automatically composed ad-hoc processes</item_title>
<sq>13516J0</sq>
<bib_id>12 (2): 219-237 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1007/s10458-006-5836-0</article_no>
</article_nos>
<bib_pages begin="219" end="237" pages="19">219-237</bib_pages>
<bib_issue year="2006" vol="12"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Binder, W</primaryauthor>
<author key="1382075">Constantinescu, I</author>
<author key="2047709">Faltings, B</author>
<author key="2767125">Haller, K</author>
<author key="7085469">Turker, C</author>
</authors>
<emails count="4">
<email>
<name>Binder, W</name>
<email_addr>walter.binder@epfl.ch</email_addr>
</email>
<email>
<name>Constantinescu, I</name>
<email_addr>ion.constantinescu@epfl.ch</email_addr>
</email>
<email>
<name>Faltings, B</name>
<email_addr>boi.faltings@epfl.ch</email_addr>
</email>
<email>
<name>Haller, K</name>
<email_addr>tuerker@fgcz.ethz.ch</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>service composition</keyword>
<keyword>ad-hoc processes</keyword>
<keyword>process execution</keyword>
<keyword>process expansion</keyword>
<keyword>failure handling</keyword>
</keywords>
<reprint>
<rp_author>Binder, W</rp_author>
<rp_address>Ecole Polytech Fed Lausanne, Artificial Intelligence Lab, CH-1015 Lausanne, Switzerland</rp_address>
<rp_organization>Ecole Polytech Fed Lausanne</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Artificial Intelligence Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Lausanne</rp_city>
<rp_country>Switzerland</rp_country>
<rp_zips count="1">
<rp_zip location="BC">CH-1015</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Ecole Polytech Fed Lausanne, Artificial Intelligence Lab, CH-1015 Lausanne, Switzerland</rs_address>
<rs_organization>Ecole Polytech Fed Lausanne</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Artificial Intelligence Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Lausanne</rs_city>
<rs_country>Switzerland</rs_country>
<rs_zips count="1">
<rs_zip location="BC">CH-1015</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Zurich, ETH, CH-8057 Zurich, Switzerland</rs_address>
<rs_organization>Univ Zurich</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>ETH</rs_suborganization>
</rs_suborganizations>
<rs_city>Zurich</rs_city>
<rs_country>Switzerland</rs_country>
<rs_zips count="1">
<rs_zip location="BC">CH-8057</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This article presents an architecture to automatically create ad-hoc processes for complex value-added services and to execute them in a reliable way. The uniqueness of ad-hoc processes is to support users not only in standardized situations like traditional workflows do, but also in unique non-recurring situations. Based on user requirements, a service composition engine generates such ad-hoc processes, which integrate individual services in order to provide the desired functionality. Our infrastructure executes ad-hoc processes by transactional agents in a peer-to-peer style. The process execution is thereby performed under transactional guarantees. Moreover, the service composition engine is used to re-plan in the case of execution failures.</p>
</abstract>
<refs count="27">
<ref>62291353</ref>
<ref>99856685</ref>
<ref>149251641</ref>
<ref>128882389</ref>
<ref>130986493</ref>
<ref>149251642</ref>
<ref>147420709</ref>
<ref>147420710</ref>
<ref>149251643</ref>
<ref>149251644</ref>
<ref>85691757</ref>
<ref>130986494</ref>
<ref>149251645</ref>
<ref>149251646</ref>
<ref>149251647</ref>
<ref>149251648</ref>
<ref>112768928</ref>
<ref>134865665</ref>
<ref>127062673</ref>
<ref>131030223</ref>
<ref>122129540</ref>
<ref>128882394</ref>
<ref>128882395</ref>
<ref>134820862</ref>
<ref>142351536</ref>
<ref>84492485</ref>
<ref>134820863</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149243452" hot="yes" sortkey="3119774849" timescited="0" sharedrefs="0" inpi="false">
<item issue="149243261" recid="149243452" coverdate="200500" sortkey="3119774849" refkey="4185679" dbyear="2006">
<ut>000235836100043</ut>
<i_ckey>LIN 0405053809LA</i_ckey>
<i_cid>0109935038</i_cid>
<source_title>AI 2005: ADVANCES IN ARTIFICIAL INTELLIGENCE</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>Agent-based middleware for web service dynamic integration on peer-to-peer networks</item_title>
<sq>B5030B0</sq>
<bib_id>3809: 405-414 2005</bib_id>
<bib_pages begin="405" end="414" pages="10">405-414</bib_pages>
<bib_issue year="2005" vol="3809"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Lin, AZ</primaryauthor>
<author key="4389562">Maheshwari, P</author>
</authors>
<emails count="2">
<email>
<name>Lin, AZ</name>
<email_addr>alin@cse.unsw.edu.au</email_addr>
</email>
<email>
<name>Maheshwari, P</name>
<email_addr>piyush@cse.unsw.edu.au</email_addr>
</email>
</emails>
<reprint>
<rp_author>Lin, AZ</rp_author>
<rp_address>Univ New S Wales, Sch Comp Sci &amp; Engn, Sydney, NSW 2052, Australia</rp_address>
<rp_organization>Univ New S Wales</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Sydney</rp_city>
<rp_state>NSW</rp_state>
<rp_country>Australia</rp_country>
<rp_zips count="1">
<rp_zip location="AP">2052</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ New S Wales, Sch Comp Sci &amp; Engn, Sydney, NSW 2052, Australia</rs_address>
<rs_organization>Univ New S Wales</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Sydney</rs_city>
<rs_state>NSW</rs_state>
<rs_country>Australia</rs_country>
<rs_zips count="1">
<rs_zip location="AP">2052</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Performing business processes normally requires dynamic and casual collaborations among enterprises that are not centrally controlled. Enterprise application integration and Peer-to-Peer computing provide a solution to the business processes. Web service integration and agent-based middleware constitute the paradigms to implement enterprise application integration on Peer-to-Peer networks because of the loosely-coupled property of Web services and the autonomous, adaptive, and interactive properties of agents. Previous Web service integration researches focused on Web service integration based on client/server network architecture. However, along with the highly demands of Web service quality, Web services are not always provided on client/server networks. This research aims to construct an agent-based middleware for Web service dynamic integration on Peer-to-Peer networks to pursue the integration of optimal quality of Web services for enterprise application integration. The paper introduces the agent-based middleware including the formalization, Web service dynamic integration model, agent reasoning model, and the application.</p>
</abstract>
<refs count="16">
<ref>83407816</ref>
<ref>80818608</ref>
<ref>127062668</ref>
<ref>149243453</ref>
<ref>109449962</ref>
<ref>147519596</ref>
<ref>147695979</ref>
<ref>142629132</ref>
<ref>149243454</ref>
<ref>149243455</ref>
<ref>149243456</ref>
<ref>132786876</ref>
<ref>128801355</ref>
<ref>135505083</ref>
<ref>128939454</ref>
<ref>149243457</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149237733" hot="yes" sortkey="3119814362" timescited="0" sharedrefs="0" inpi="false">
<item issue="149237731" recid="149237733" coverdate="200600" sortkey="3119814362" refkey="5929860" dbyear="2006">
<ut>000235934600002</ut>
<i_ckey>ROLL0007060048WD</i_ckey>
<i_cid>0109906807</i_cid>
<source_title>WIRTSCHAFTSINFORMATIK</source_title>
<source_abbrev>WIRTSCHAFTSINF</source_abbrev>
<item_title>Distributed ascending proxy auction - A cryptographic approach</item_title>
<sq>09222J0</sq>
<bib_id>48 (1): 7-15 2006</bib_id>
<bib_pages begin="7" end="15" pages="9">7-15</bib_pages>
<bib_issue year="2006" vol="48"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Rolli, D</primaryauthor>
<author key="1379507">Conrad, M</author>
<author key="5065105">Neumann, D</author>
<author key="6584077">Sorge, C</author>
</authors>
<emails count="4">
<email>
<name>Rolli, D</name>
<email_addr>rolli@iw.uka.de</email_addr>
</email>
<email>
<name>Conrad, M</name>
<email_addr>conrad@tm.uka.de</email_addr>
</email>
<email>
<name>Neumann, D</name>
<email_addr>neumann@iw.uka.de</email_addr>
</email>
<email>
<name>Sorge, C</name>
<email_addr>sorge@tm.uka.de</email_addr>
</email>
</emails>
<keywords count="6">
<keyword>Internet economics</keyword>
<keyword>distributed auctions</keyword>
<keyword>privacy</keyword>
<keyword>trust</keyword>
<keyword>security Protocols</keyword>
<keyword>peer-to-peer systems</keyword>
</keywords>
<reprint>
<rp_author>Rolli, D</rp_author>
<rp_address>Univ Karlsruhe, Inst Informat Wirtschaft &amp; Management, TH, Englerstr 14, D-76131 Karlsruhe, Germany</rp_address>
<rp_organization>Univ Karlsruhe</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>Inst Informat Wirtschaft &amp; Management</rp_suborganization>
<rp_suborganization>TH</rp_suborganization>
</rp_suborganizations>
<rp_street>Englerstr 14</rp_street>
<rp_city>Karlsruhe</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-76131</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Karlsruhe, Inst Informat Wirtschaft &amp; Management, TH, D-76131 Karlsruhe, Germany</rs_address>
<rs_organization>Univ Karlsruhe</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Inst Informat Wirtschaft &amp; Management</rs_suborganization>
<rs_suborganization>TH</rs_suborganization>
</rs_suborganizations>
<rs_city>Karlsruhe</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-76131</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Karlsruhe, Inst Telemat, D-76131 Karlsruhe, Germany</rs_address>
<rs_organization>Univ Karlsruhe</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Inst Telemat</rs_suborganization>
</rs_suborganizations>
<rs_city>Karlsruhe</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-76131</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>Distributed Ascending Proxy Auction - A Cryptographic Approach. In recent years, auctions have become a very popular price discovery mechanism in the Internet. The common auction formats are typically centralized in nature. The peer-to-peer paradigm demands gearing up auctions for decentralized infrastructures. In this context, this paper proposes a distributed mechanism for ascending second-price auctions that relies on standard cryptographic algorithms. in essence, the auction protocol has the capability of preserving the privacy of the winning bidder's true valuation.</p>
<p>The auction protocol makes use of a high number of auctioneers divided into several groups. A bidder creates an encrypted chain of monotonously increasing bidding steps, where each bidding step can be decrypted by a different auctioneer group. This considerably reduces the attack and manipulation possibilities of malicious auctioneers. In addition, this secure approach does not require bidders to be online unless they are submitting their bid chain to the auctioneers.</p>
</abstract>
<refs count="17">
<ref>149237734</ref>
<ref>149237735</ref>
<ref>149237736</ref>
<ref>149237737</ref>
<ref>149237738</ref>
<ref>145798795</ref>
<ref>149237739</ref>
<ref>96003131</ref>
<ref>148149013</ref>
<ref>149237740</ref>
<ref>149237741</ref>
<ref>149237742</ref>
<ref>149237743</ref>
<ref>117265005</ref>
<ref>130986616</ref>
<ref>133635964</ref>
<ref>127960587</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149228597" hot="yes" sortkey="3119816180" timescited="0" sharedrefs="0" inpi="false">
<item issue="149228549" recid="149228597" coverdate="200600" sortkey="3119816180" refkey="5984981" dbyear="2006">
<ut>000235805500008</ut>
<i_ckey>ROUS0084063831LM</i_ckey>
<i_cid>0109884602</i_cid>
<source_title>SOFSEM 2006: THEORY AND PRACTICE OF COMPUTER SCIENCE, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>SomeWhere in the Semantic Web</item_title>
<sq>B5016B0</sq>
<bib_id>3831: 84-99 2006</bib_id>
<bib_pages begin="84" end="99" pages="16">84-99</bib_pages>
<bib_issue year="2006" vol="3831"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Rousset, MC</primaryauthor>
<author key="46010">Adjiman, P</author>
<author key="1184345">Chatalic, P</author>
<author key="2499771">Goasdoue, F</author>
<author key="6456668">Simon, L</author>
</authors>
<emails count="1">
<email>
<name>Rousset, MC</name>
<email_addr>Marie-Christine.Rousset@imag.fr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Rousset, MC</rp_author>
<rp_address>IMAG, LSR, BP 72, F-38402 St Martin Dheres, France</rp_address>
<rp_organization>IMAG</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>LSR</rp_suborganization>
</rp_suborganizations>
<rp_street>BP 72</rp_street>
<rp_city>St Martin Dheres</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-38402</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>IMAG, LSR, F-38402 St Martin Dheres, France</rs_address>
<rs_organization>IMAG</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>LSR</rs_suborganization>
</rs_suborganizations>
<rs_city>St Martin Dheres</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-38402</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Paris 11, CNRS, LRI, INRIA,UR Futurs, F-91405 Orsay, France</rs_address>
<rs_organization>Univ Paris 11</rs_organization>
<rs_suborganizations count="3">
<rs_suborganization>CNRS</rs_suborganization>
<rs_suborganization>LRI</rs_suborganization>
<rs_suborganization>INRIA,UR Futurs</rs_suborganization>
</rs_suborganizations>
<rs_city>Orsay</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91405</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we describe the SomeWhere semantic peer-to-peer data management system that promotes a "small is beautiful" vision of the Semantic Web based on simple personalized ontologies (e.g., taxonomies of classes) but which are distributed at a large scale. In this vision of the Semantic Web, no user imposes to others his own ontology. Logical mappings between ontologies make possible the creation of a web of people in which personalized semantic marking up of data cohabits nicely with a collaborative exchange of data. In this view, the Web is a huge peer-to-peer data management system based on simple distributed ontologies and mappings.</p>
</abstract>
<refs count="22">
<ref>149228598</ref>
<ref>149228599</ref>
<ref>147679519</ref>
<ref>147679520</ref>
<ref>142351236</ref>
<ref>131693403</ref>
<ref>122330998</ref>
<ref>147679521</ref>
<ref>147679522</ref>
<ref>147679523</ref>
<ref>147679524</ref>
<ref>142351240</ref>
<ref>142351241</ref>
<ref>147679525</ref>
<ref>142351242</ref>
<ref>142351243</ref>
<ref>142351244</ref>
<ref>142351246</ref>
<ref>147679526</ref>
<ref>149228600</ref>
<ref>149228601</ref>
<ref>142351248</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149187532" hot="yes" sortkey="3119828313" timescited="0" sharedrefs="0" inpi="false">
<item issue="149187429" recid="149187532" coverdate="200500" sortkey="3119828313" refkey="7823397" dbyear="2006">
<ut>000235803700010</ut>
<i_ckey>ZHOU0194053834LD</i_ckey>
<i_cid>0109902025</i_cid>
<source_title>JOB SCHEDULING STRATEGIES FOR PARALLEL PROCESSING</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Wave scheduler: Scheduling for faster turnaround time in peer-based desktop grid systems</item_title>
<sq>B5013B0</sq>
<bib_id>3834: 194-218 2005</bib_id>
<bib_pages begin="194" end="218" pages="25">194-218</bib_pages>
<bib_issue year="2005" vol="3834"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Zhou, DY</primaryauthor>
<author key="4243785">Lo, V</author>
</authors>
<reprint>
<rp_author>Zhou, DY</rp_author>
<rp_address>Univ Oregon, Eugene, OR 97402 USA</rp_address>
<rp_organization>Univ Oregon</rp_organization>
<rp_city>Eugene</rp_city>
<rp_state>OR</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">97402</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Oregon, Eugene, OR 97402 USA</rs_address>
<rs_organization>Univ Oregon</rs_organization>
<rs_city>Eugene</rs_city>
<rs_state>OR</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">97402</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>The recent success of Internet-based computing projects, coupled with rapid developments in peer-to-peer systems, has stimulated interest in the notion of harvesting idle cycles under a peer-to-peer model. The problem we address in this paper is the development of scheduling strategies to achieve faster turnaround time in an open peer-based desktop grid system. The challenges for this problem are two-fold: How does the scheduler quickly discover idle cycles in the absence of global information about host availability? And how can faster turnaround time be achieved within the opportunistic scheduling environment offered by volunteer hosts? We propose a novel peer-based scheduling method, Wave Scheduler, which allows peers to self organize into a timezone-aware overlay network using structured overlay network, The Wave Scheduler then exploits large blocks of idle night-time cycles by migrating jobs to hosts located in night-time zones around the globe, which are discovered by scalable resource discovery methods.</p>
<p>Simulation results show that the slowdown factors of all migration schemes are consistently lower than the slowdown factors of the nonmigration schemes. Compared to traditional migration strategies we tested, the Wave Scheduler performs best. However under heavy load conditions, there is contention for those night-time hosts. Therefore, we propose an adaptive migration strategy for Wave Scheduler to further improve performance.</p>
</abstract>
<refs count="13">
<ref>149187533</ref>
<ref>149187534</ref>
<ref>143848936</ref>
<ref>149187443</ref>
<ref>149187535</ref>
<ref>114612426</ref>
<ref>111468705</ref>
<ref>149187536</ref>
<ref>148749920</ref>
<ref>102635741</ref>
<ref>149187537</ref>
<ref>143107332</ref>
<ref>121782164</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149181541" hot="yes" sortkey="3119829592" timescited="0" sharedrefs="0" inpi="false">
<item issue="149181483" recid="149181541" coverdate="200605" sortkey="3119829592" refkey="2702609" dbyear="2006">
<ut>000235987900008</ut>
<i_ckey>GUO 0669060018IL</i_ckey>
<i_cid>0109914447</i_cid>
<source_title>IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING</source_title>
<source_abbrev>IEEE T KNOWL DATA EN</source_abbrev>
<item_title>Design and evaluation of a scalable and reliable P2P assisted proxy for on-demand streaming media delivery</item_title>
<sq>09405J0</sq>
<bib_id>18 (5): 669-682 MAY 2006</bib_id>
<bib_pages begin="669" end="682" pages="14">669-682</bib_pages>
<bib_issue year="2006" vol="18"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Guo, L</primaryauthor>
<author key="1208467">Chen, SQ</author>
<author key="7811061">Zhang, XD</author>
</authors>
<emails count="3">
<email>
<name>Guo, L</name>
<email_addr>lguo@cse.ohio-state.edu</email_addr>
</email>
<email>
<name>Chen, SQ</name>
<email_addr>sqchen@cs.gmu.edu</email_addr>
</email>
<email>
<name>Zhang, XD</name>
<email_addr>zhang@cse.ohio-state.edu</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>Internet media streaming</keyword>
<keyword>peer-to-peer systems</keyword>
<keyword>proxy caching</keyword>
<keyword>distributed hash table</keyword>
</keywords>
<reprint>
<rp_author>Guo, L</rp_author>
<rp_address>Ohio State Univ, Dept Comp Sci &amp; Engn, Columbus, OH 43210 USA</rp_address>
<rp_organization>Ohio State Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Columbus</rp_city>
<rp_state>OH</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">43210</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Ohio State Univ, Dept Comp Sci &amp; Engn, Columbus, OH 43210 USA</rs_address>
<rs_organization>Ohio State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Columbus</rs_city>
<rs_state>OH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">43210</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA</rs_address>
<rs_organization>George Mason Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Fairfax</rs_city>
<rs_state>VA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">22030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>To efficiently deliver streaming media, researchers have developed technical solutions that fall into three categories, each of which has its merits and limitations. Infrastructure-based CDNs with dedicated network bandwidths and hardware supports can provide high-quality streaming services, but at a high cost. Server-based proxies are cost-effective but not scalable due to the limited proxy capacity in storage and bandwidth, and its centralized control also brings a single point of failure. Client-based P2P networks are scalable, but do not guarantee high-quality streaming service due to the transient nature of peers. To address these limitations, we present a novel and efficient design of a scalable and reliable media proxy system assisted by P2P networks, called PROP. In the PROP system, the clients' machines in an intranet are self-organized into a structured P2P system to provide a large media storage and to actively participate in the streaming media delivery, where the proxy is also embedded as an important member to ensure the quality of streaming service. The coordination and collaboration in the system are efficiently conducted by our P2P management structure and replacement policies. Our system has the following merits: 1) It addresses both the scalability problem in centralized proxy systems and the unreliable service concern by only relying on the P2P sharing of clients. 2) The proposed content locating scheme can timely serve the demanded media data and fairly dispatch media streaming tasks in appropriate granularity across the system. 3) Based on the modeling and analysis, we propose global replacement policies for proxy and clients, which well balance the demand and supply of streaming data in the system, achieving a high utilization of peers' cache. We have comparatively evaluated our system through trace-driven simulations with synthetic workloads and with a real-life workload extracted from the media server logs in an enterprise network, which shows our design significantly improves the quality of media streaming and the system scalability.</p>
</abstract>
<refs count="32">
<ref>149181542</ref>
<ref>132361390</ref>
<ref>126448886</ref>
<ref>119320044</ref>
<ref>134003910</ref>
<ref>149181543</ref>
<ref>149181544</ref>
<ref>127805490</ref>
<ref>142116598</ref>
<ref>136066988</ref>
<ref>115438504</ref>
<ref>147834611</ref>
<ref>149181545</ref>
<ref>149181546</ref>
<ref>142602381</ref>
<ref>149181547</ref>
<ref>131196496</ref>
<ref>134083543</ref>
<ref>149181548</ref>
<ref>126448874</ref>
<ref>149181549</ref>
<ref>132793847</ref>
<ref>123110024</ref>
<ref>149181550</ref>
<ref>143686350</ref>
<ref>124434650</ref>
<ref>115438517</ref>
<ref>149181551</ref>
<ref>149181552</ref>
<ref>121307406</ref>
<ref>149181553</ref>
<ref>119120045</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149178157" hot="yes" sortkey="3119830315" timescited="0" sharedrefs="0" inpi="false">
<item issue="149178101" recid="149178157" coverdate="200500" sortkey="3119830315" refkey="5612452" dbyear="2006">
<ut>000235801700010</ut>
<i_ckey>POWE0051053769LK</i_ckey>
<i_cid>0109901525</i_cid>
<source_title>HIGH PERFORMANCE COMPUTING - HIPC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A fault recovery scheme for P2P metacomputers</item_title>
<sq>B5010B0</sq>
<bib_id>3769: 51-61 2005</bib_id>
<bib_pages begin="51" end="61" pages="11">51-61</bib_pages>
<bib_issue year="2005" vol="3769"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Power, K</primaryauthor>
<author key="4884047">Morrison, JP</author>
</authors>
<emails count="2">
<email>
<name>Power, K</name>
<email_addr>k.power@cs.ucc.ie</email_addr>
</email>
<email>
<name>Morrison, JP</name>
<email_addr>j.morrison@cs.ucc.ie</email_addr>
</email>
</emails>
<keywords count="7">
<keyword>peer-to-peer</keyword>
<keyword>fault</keyword>
<keyword>tolerance</keyword>
<keyword>recovery</keyword>
<keyword>decentralized</keyword>
<keyword>distributed computing</keyword>
<keyword>condensed graphs</keyword>
</keywords>
<reprint>
<rp_author>Power, K</rp_author>
<rp_address>Natl Univ Ireland Univ Coll Cork, Cork, Ireland</rp_address>
<rp_organization>Natl Univ Ireland Univ Coll Cork</rp_organization>
<rp_city>Cork</rp_city>
<rp_country>Ireland</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Natl Univ Ireland Univ Coll Cork, Cork, Ireland</rs_address>
<rs_organization>Natl Univ Ireland Univ Coll Cork</rs_organization>
<rs_city>Cork</rs_city>
<rs_country>Ireland</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="3">
<p>Despite the leaps and bounds made by the P2P research field in the last few years, the benefit of this innovation has been constrained to a few areas; search and file-sharing and storage to name a few. In particular, this innovation has had little significant impact in the field of distributed computing.</p>
<p>There are several obstacles to be overcome in the development of any distributed computer, most notably: scalability, fault tolerance, security and load balancing. The difficulty of these is compounded in the dynamic, decentralized environment which characterizes the P2P arena. This paper presents a method of recovering from faults which exploits the distributed hash table functionality provided by modem overlay networks. Its effectiveness is evaluated experimentally using a proof of concept P2P distributed computer.</p>
<p>It is hoped that by providing a solution to one of the obstacles, global, decentralized, dependable distributed computers will be one step closer to reality.</p>
</abstract>
<refs count="15">
<ref>149178158</ref>
<ref>149178159</ref>
<ref>149178160</ref>
<ref>132637148</ref>
<ref>137494721</ref>
<ref>149178161</ref>
<ref>149178162</ref>
<ref>149178163</ref>
<ref>149178164</ref>
<ref>149178165</ref>
<ref>130906373</ref>
<ref>128882241</ref>
<ref>123110037</ref>
<ref>124889712</ref>
<ref>149178166</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149172666" hot="yes" sortkey="3119831494" timescited="0" sharedrefs="0" inpi="false">
<item issue="149172103" recid="149172666" coverdate="200600" sortkey="3119831494" refkey="4154861" dbyear="2006">
<ut>000235658000077</ut>
<i_ckey>LI M0806063841LM</i_ckey>
<i_cid>0109882736</i_cid>
<source_title>FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A chord-based novel mobile peer-to-peer file sharing protocol</item_title>
<sq>B4949B0</sq>
<bib_id>3841: 806-811 2006</bib_id>
<bib_pages begin="806" end="811" pages="6">806-811</bib_pages>
<bib_issue year="2006" vol="3841"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Li, M</primaryauthor>
<author key="1199184">Chen, EH</author>
<author key="6380267">Sheu, PC</author>
</authors>
<emails count="3">
<email>
<name>Li, M</name>
<email_addr>minli@mail.ustc.edu.cn</email_addr>
</email>
<email>
<name>Chen, EH</name>
<email_addr>cheneh@ustc.edu.cn</email_addr>
</email>
<email>
<name>Sheu, PC</name>
<email_addr>psheu@uci.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Li, M</rp_author>
<rp_address>Univ Sci &amp; Technol China, Dept Comp Sci &amp; Technol, Hefei 230027, Anhui, Peoples R China</rp_address>
<rp_organization>Univ Sci &amp; Technol China</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Hefei</rp_city>
<rp_state>Anhui</rp_state>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">230027</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Sci &amp; Technol China, Dept Comp Sci &amp; Technol, Hefei 230027, Anhui, Peoples R China</rs_address>
<rs_organization>Univ Sci &amp; Technol China</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Hefei</rs_city>
<rs_state>Anhui</rs_state>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">230027</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Calif Irvine, Dept EECS, Irvine, CA 92697 USA</rs_address>
<rs_organization>Univ Calif Irvine</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept EECS</rs_suborganization>
</rs_suborganizations>
<rs_city>Irvine</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">92697</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>With the increasingly developed technology of mobile devices and wireless networks, more and more users share resources by mobile devices via wireless networks. Compared to traditional C/S architecture, P2P network is more appropriate for mobile computing environment. However, all existing P2P protocols have not well considered the characteristics and constraints of mobile devices and wireless networks. In this paper, we will present a novel mobile P2P protocol, M-Chord, by adopting hierarchical structure and registering mechanism on the basis of Chord. The experimental results show that M-Chord system has high-efficiency and good robustness in mobile P2P network.</p>
</abstract>
<refs count="5">
<ref>149172667</ref>
<ref>123110024</ref>
<ref>127960302</ref>
<ref>122611834</ref>
<ref>121684257</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149172769" hot="yes" sortkey="3119831515" timescited="0" sharedrefs="0" inpi="false">
<item issue="149172103" recid="149172769" coverdate="200600" sortkey="3119831515" refkey="7759903" dbyear="2006">
<ut>000235658000098</ut>
<i_ckey>YU Y0937063841LY</i_ckey>
<i_cid>0109882775</i_cid>
<source_title>FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Building a semantic P2P scientific references sharing system with JXTA</item_title>
<sq>B4949B0</sq>
<bib_id>3841: 937-942 2006</bib_id>
<bib_pages begin="937" end="942" pages="6">937-942</bib_pages>
<bib_issue year="2006" vol="3841"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Yu, YJ</primaryauthor>
<author key="3393638">Jin, H</author>
</authors>
<emails count="2">
<email>
<name>Yu, YJ</name>
<email_addr>yjyu@mail.ccnu.edu.cn</email_addr>
</email>
<email>
<name>Jin, H</name>
<email_addr>hjin@mail.hust.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Yu, YJ</rp_author>
<rp_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rp_address>
<rp_organization>Huazhong Univ Sci &amp; Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cluster &amp; Grid Comp Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Wuhan</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">430074</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rs_address>
<rs_organization>Huazhong Univ Sci &amp; Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cluster &amp; Grid Comp Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A semantic Peer-to-Peer (P2P) scientific references sharing system, SemreX, is introduced in this paper. As a P2P application system based on JXTA, the implementation technologies of the P2P communication layer of SemreX are illustrated, including the software architecture and the classes in P2P communication layer. Some lessons about JXTA, from the system development practices and software testing, are also concluded, such as peer automatic discovery, program robustness and bug report.</p>
</abstract>
<refs count="6">
<ref>149172770</ref>
<ref>120072057</ref>
<ref>149172771</ref>
<ref>137544542</ref>
<ref>149172772</ref>
<ref>149172773</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164392" hot="yes" sortkey="3119833090" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164392" coverdate="200500" sortkey="3119833090" refkey="5056630" dbyear="2006">
<ut>000235802200063</ut>
<i_ckey>NEOV0602053823LM</i_ckey>
<i_cid>0109901826</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An abstract model for incentive-enhanced trust in P2P networks</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 602-611 2005</bib_id>
<bib_pages begin="602" end="611" pages="10">602-611</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Neovius, M</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Neovius, M</name>
<email_addr>mats@neovius.com</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>Peer-to-Peer networks</keyword>
<keyword>incentive</keyword>
<keyword>trustworthiness</keyword>
<keyword>anticipation</keyword>
</keywords>
<reprint>
<rp_author>Neovius, M</rp_author>
<rp_address>Abo Akad Univ, Dept Comp Sci, Lemminkaisenkatu 14, FIN-20520 Turku, Finland</rp_address>
<rp_organization>Abo Akad Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Lemminkaisenkatu 14</rp_street>
<rp_city>Turku</rp_city>
<rp_country>Finland</rp_country>
<rp_zips count="1">
<rp_zip location="BC">FIN-20520</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Abo Akad Univ, Dept Comp Sci, FIN-20520 Turku, Finland</rs_address>
<rs_organization>Abo Akad Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Turku</rs_city>
<rs_country>Finland</rs_country>
<rs_zips count="1">
<rs_zip location="BC">FIN-20520</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-Peer (P2P) networks have emerged as a prime research topic, partly due to the vast unexploited possibilities unrestricted distribution of the workload provides. The main hindrance for unrestricted exploitation of the P2P topology is, due to lack of security-related issues, the gullible attitude taken towards unknown agents. Therefore, the severity of the vulnerabilities caused by gullibility must be mended by other means, for example, by an effective incentive scheme encouraging agents to trustworthy behaviour. This paper presents an abstract model for incentive enhanced trust, to progressively assign the participating agents rights for accessing distributed resources, emphasising consistent behaviour. The model consists of a degrading formula, an illustrative incentive triangle and a best-effort distributed supervision model. Moreover, the same incentive model facilitates anticipation of future behaviour concerning any given agent founded on several distinct agents' opinion, suggesting that any knowledge concerning the counterpart is better than none.</p>
</abstract>
<refs count="14">
<ref>144782401</ref>
<ref>149164393</ref>
<ref>126921054</ref>
<ref>149164394</ref>
<ref>108991382</ref>
<ref>120647754</ref>
<ref>112572232</ref>
<ref>130246179</ref>
<ref>149164395</ref>
<ref>134865327</ref>
<ref>149164396</ref>
<ref>149164397</ref>
<ref>149164398</ref>
<ref>146775527</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164431" hot="yes" sortkey="3119833096" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164431" coverdate="200500" sortkey="3119833096" refkey="1734491" dbyear="2006">
<ut>000235802200069</ut>
<i_ckey>DING0663053823LY</i_ckey>
<i_cid>0109901834</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Design of integrated routing system for mobile ad hoc networks overlaying peer-to-peer applications</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 663-672 2005</bib_id>
<bib_pages begin="663" end="672" pages="10">663-672</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Ding, YA</primaryauthor>
<author key="2024113">Everitt, D</author>
</authors>
<emails count="2">
<email>
<name>Ding, YA</name>
<email_addr>annie@it.usyd.edu.au</email_addr>
</email>
<email>
<name>Everitt, D</name>
<email_addr>deveritt@it.usyd.edu.au</email_addr>
</email>
</emails>
<reprint>
<rp_author>Ding, YA</rp_author>
<rp_address>Univ Sydney, Sch Informat Technol, Sydney, NSW 2006, Australia</rp_address>
<rp_organization>Univ Sydney</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Informat Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Sydney</rp_city>
<rp_state>NSW</rp_state>
<rp_country>Australia</rp_country>
<rp_zips count="1">
<rp_zip location="AP">2006</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Sydney, Sch Informat Technol, Sydney, NSW 2006, Australia</rs_address>
<rs_organization>Univ Sydney</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Informat Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Sydney</rs_city>
<rs_state>NSW</rs_state>
<rs_country>Australia</rs_country>
<rs_zips count="1">
<rs_zip location="AP">2006</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper proposes a novel distributed routing system for integration between peer-to-peer (P2P) applications and mobile ad hoc networks (MANETs). This system takes advantage of the "zone" concept to reduce the multicast flooding. Significantly, the system investigates a mechanism to integrate key lookup in the application layer with routing in the link layer. The routing method provides a general-purpose technique that is not limited to any specific P2P applications. This paper presents the design of the routing system and sketches the layered architecture built according to the system functions.</p>
</abstract>
<refs count="16">
<ref>136365893</ref>
<ref>149164432</ref>
<ref>149164433</ref>
<ref>129677755</ref>
<ref>149164434</ref>
<ref>149164435</ref>
<ref>149164436</ref>
<ref>142265198</ref>
<ref>120146863</ref>
<ref>133202438</ref>
<ref>134282442</ref>
<ref>123110024</ref>
<ref>127960302</ref>
<ref>123110037</ref>
<ref>137495075</ref>
<ref>132793729</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164469" hot="yes" sortkey="3119833102" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164469" coverdate="200500" sortkey="3119833102" refkey="3157603" dbyear="2006">
<ut>000235802200075</ut>
<i_ckey>HUAN0724053823LX</i_ckey>
<i_cid>0109901848</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Exploring small-world-like topologies via SplitProber: Turning power laws into an advantage in unstructured overlays</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 724-733 2005</bib_id>
<bib_pages begin="724" end="733" pages="10">724-733</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Huang, XL</primaryauthor>
<author key="7810348">Zhang, WJ</author>
<author key="4342664">Ma, FY</author>
<author key="4160351">Li, Y</author>
</authors>
<emails count="4">
<email>
<name>Huang, XL</name>
<email_addr>huang-xl@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Zhang, WJ</name>
<email_addr>zwj03@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Ma, FY</name>
<email_addr>fyma@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Li, Y</name>
<email_addr>li-yin@sjtu.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Huang, XL</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Recent unstructured Peer-to-Peer systems, represented by Gnutella and Freenet, offer an administration-free and fault-tolerant application-level overlay network. While elegant from a theoretical perspective, these systems have some serious disadvantages. First, due to knowing very little about the nature of the network topology, the search algorithms operating on these networks result in fatal scaling problems. Second, these systems rely on application-level routing, which may be inefficient with respect to network delays and bandwidth consumption. In this paper, we propose a novel search algorithm, called Split-Prober, to explore the small-world-like topologies of these networks efficiently and scalablely, by turning the power-law degree distributions in these networks to an advantage, and by making discriminative use of nodes according to their different roles in the network. As a result, we are able to reconcile the conflict of remedying the mismatch between the overlay topology and its projection on the underlying physical network, while at the same time navigating these networks with a guaranteed high efficiency and using only local knowledge as cues. Our simulation results indicate that the proposed algorithm outperforms several other well-known methods with significant performance gains.</p>
</abstract>
<refs count="19">
<ref>123110394</ref>
<ref>148591167</ref>
<ref>149164470</ref>
<ref>122012127</ref>
<ref>148582148</ref>
<ref>124204869</ref>
<ref>124204868</ref>
<ref>149164471</ref>
<ref>149164472</ref>
<ref>137495147</ref>
<ref>132500081</ref>
<ref>134864260</ref>
<ref>129515870</ref>
<ref>132562451</ref>
<ref>105378900</ref>
<ref>111893017</ref>
<ref>149164473</ref>
<ref>130986486</ref>
<ref>149164474</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164482" hot="yes" sortkey="3119833104" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164482" coverdate="200500" sortkey="3119833104" refkey="1255168" dbyear="2006">
<ut>000235802200077</ut>
<i_ckey>CHOT0744053823LT</i_ckey>
<i_cid>0109901852</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Survey of anonymous peer-to-peer file-sharing</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 744-755 2005</bib_id>
<bib_pages begin="744" end="755" pages="12">744-755</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Chothia, T</primaryauthor>
<author key="1187016">Chatzikokolakis, K</author>
</authors>
<emails count="2">
<email>
<name>Chothia, T</name>
<email_addr>tomc@lix.polytechnique.fr</email_addr>
</email>
<email>
<name>Chatzikokolakis, K</name>
<email_addr>kostas@lix.polytechnique.fr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Chothia, T</rp_author>
<rp_address>Ecole Polytech, Lab Informat, F-91128 Palaiseau, France</rp_address>
<rp_organization>Ecole Polytech</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Lab Informat</rp_suborganization>
</rp_suborganizations>
<rp_city>Palaiseau</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-91128</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Ecole Polytech, Lab Informat, F-91128 Palaiseau, France</rs_address>
<rs_organization>Ecole Polytech</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Lab Informat</rs_suborganization>
</rs_suborganizations>
<rs_city>Palaiseau</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91128</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting, MIXes and UDP address spoofing. We then describe a number of implemented systems based on one, or a combination of, these methods. Finally, we discuss possible attacks on the anonymity of these systems and give examples of particular attacks and defences used by the systems we describe.</p>
</abstract>
<refs count="28">
<ref>131102683</ref>
<ref>149164483</ref>
<ref>149164484</ref>
<ref>149164485</ref>
<ref>123110013</ref>
<ref>96626021</ref>
<ref>144649419</ref>
<ref>121684235</ref>
<ref>127880981</ref>
<ref>148345532</ref>
<ref>149164486</ref>
<ref>106622611</ref>
<ref>149164487</ref>
<ref>149164488</ref>
<ref>149164489</ref>
<ref>149164490</ref>
<ref>149164491</ref>
<ref>149164492</ref>
<ref>149164493</ref>
<ref>131526539</ref>
<ref>120743221</ref>
<ref>128642665</ref>
<ref>133780112</ref>
<ref>149164494</ref>
<ref>149164495</ref>
<ref>149164496</ref>
<ref>149164497</ref>
<ref>149164498</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164504" hot="yes" sortkey="3119833106" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164504" coverdate="200500" sortkey="3119833106" refkey="7375036" dbyear="2006">
<ut>000235802200079</ut>
<i_ckey>WANG0766053823LH</i_ckey>
<i_cid>0109901859</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Building a peer-to-peer overlay for efficient routing and low maintenance</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 766-775 2005</bib_id>
<bib_pages begin="766" end="775" pages="10">766-775</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Wang, HH</primaryauthor>
<author key="3150527">Hu, YM</author>
</authors>
<reprint>
<rp_author>Wang, HH</rp_author>
<rp_address>Univ Cincinnati, Cincinnati, OH 45219 USA</rp_address>
<rp_organization>Univ Cincinnati</rp_organization>
<rp_city>Cincinnati</rp_city>
<rp_state>OH</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">45219</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Cincinnati, Cincinnati, OH 45219 USA</rs_address>
<rs_organization>Univ Cincinnati</rs_organization>
<rs_city>Cincinnati</rs_city>
<rs_state>OH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">45219</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Most of current structured P2P systems exploit Distributed Hash Table (DHT) to archive an administration-free, fault tolerant overlay network and guarantee to deliver a message to its destination within O(logN) hops. While elegant from a theoretical perspective, those systems face difficulties in a realistic environment. Instead of building P2P overlays from a theoretical perspective, this design tries to construct an overlay from the physical network. By combining different network topology aware techniques, a distinctive overlay structure closely matching the Internet topology is created. The P2P overlay based on this structure is not only highly efficient for routing, but also keeps maintenance overhead very low even under highly dynamic environment.</p>
</abstract>
<refs count="16">
<ref>149164505</ref>
<ref>136331515</ref>
<ref>149164506</ref>
<ref>149164507</ref>
<ref>149164508</ref>
<ref>144732593</ref>
<ref>148291310</ref>
<ref>149164509</ref>
<ref>149164510</ref>
<ref>149164511</ref>
<ref>148291346</ref>
<ref>128138422</ref>
<ref>124204884</ref>
<ref>131684115</ref>
<ref>123110037</ref>
<ref>143848876</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149160509" hot="yes" sortkey="3119833938" timescited="0" sharedrefs="0" inpi="false">
<item issue="149160351" recid="149160509" coverdate="200500" sortkey="3119833938" refkey="1514669" dbyear="2006">
<ut>000235804200034</ut>
<i_ckey>DAI 0297053816LX</i_ckey>
<i_cid>0109884463</i_cid>
<source_title>DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Off-line micro-payment system for content sharing in P2P networks</item_title>
<sq>B5014B0</sq>
<bib_id>3816: 297-307 2005</bib_id>
<bib_pages begin="297" end="307" pages="11">297-307</bib_pages>
<bib_issue year="2005" vol="3816"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Dai, XL</primaryauthor>
<author key="2670949">Grundy, J</author>
</authors>
<emails count="2">
<email>
<name>Dai, XL</name>
<email_addr>dai_s@usp.ac.fj</email_addr>
</email>
<email>
<name>Grundy, J</name>
<email_addr>john-g@cs.auckland.ac.nz</email_addr>
</email>
</emails>
<reprint>
<rp_author>Dai, XL</rp_author>
<rp_address>Univ S Pacific, Dept Math &amp; Comp Sci, Laucala Campus, Suva, Fiji</rp_address>
<rp_organization>Univ S Pacific</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Math &amp; Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Laucala Campus</rp_street>
<rp_city>Suva</rp_city>
<rp_country>Fiji</rp_country>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Univ S Pacific, Dept Math &amp; Comp Sci, Suva, Fiji</rs_address>
<rs_organization>Univ S Pacific</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Math &amp; Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Suva</rs_city>
<rs_country>Fiji</rs_country>
</research>
<research>
<rs_address>Univ Auckland, Dept Elect &amp; Comp Engn, Auckland 1, New Zealand</rs_address>
<rs_organization>Univ Auckland</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Auckland</rs_city>
<rs_country>New Zealand</rs_country>
<rs_zips count="1">
<rs_zip location="AC">1</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand</rs_address>
<rs_organization>Univ Auckland</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Auckland</rs_city>
<rs_country>New Zealand</rs_country>
<rs_zips count="1">
<rs_zip location="AC">1</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer network services sharing. Our approach provides high performance and security using one-way hashing functions for e-coin encryption. In our P2P-NetPay protocol, each peer's transaction does not involve any broker and double spending is detected during the redeeming transaction. We describe the motivation for P2P-NetPay and describe three transactions of the P2P-NetPay protocol in detail to illustrate the approach. We then discuss future research on this protocol.</p>
</abstract>
<refs count="16">
<ref>129797574</ref>
<ref>142629215</ref>
<ref>130884766</ref>
<ref>142629217</ref>
<ref>130884770</ref>
<ref>130884772</ref>
<ref>142629220</ref>
<ref>142629219</ref>
<ref>149160510</ref>
<ref>149160511</ref>
<ref>130884780</ref>
<ref>100339852</ref>
<ref>113298296</ref>
<ref>96572364</ref>
<ref>135839459</ref>
<ref>137439739</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149159127" hot="yes" sortkey="3119834289" timescited="0" sharedrefs="0" inpi="false">
<item issue="149159055" recid="149159127" coverdate="200500" sortkey="3119834289" refkey="1030504" dbyear="2006">
<ut>000235803000006</ut>
<i_ckey>CALV0090053774LD</i_ckey>
<i_cid>0109884293</i_cid>
<source_title>DATABASE PROGRAMMING LANGUAGES</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Inconsistency tolerance in P2P data integration: An epistemic logic approach</item_title>
<sq>B5012B0</sq>
<bib_id>3774: 90-105 2005</bib_id>
<bib_pages begin="90" end="105" pages="16">90-105</bib_pages>
<bib_issue year="2005" vol="3774"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Calvanese, D</primaryauthor>
<author key="1583096">De Giacomo, G</author>
<author key="4093007">Lembo, D</author>
<author key="4101254">Lenzerini, M</author>
<author key="5945202">Rosati, R</author>
</authors>
<emails count="5">
<email>
<name>Calvanese, D</name>
<email_addr>calvanese@inf.unibz.it</email_addr>
</email>
<email>
<name>De Giacomo, G</name>
<email_addr>degiacomo@dis.uniroma1.it</email_addr>
</email>
<email>
<name>Lembo, D</name>
<email_addr>lembo@dis.uniroma1.it</email_addr>
</email>
<email>
<name>Lenzerini, M</name>
<email_addr>lenzerini@dis.uniroma1.it</email_addr>
</email>
<email>
<name>Rosati, R</name>
<email_addr>rosati@dis.uniroma1.it</email_addr>
</email>
</emails>
<keywords_plus count="3">
<keyword>MINIMAL BELIEF</keyword>
<keyword>NEGATION</keyword>
<keyword>FAILURE</keyword>
</keywords_plus>
<reprint>
<rp_author>Calvanese, D</rp_author>
<rp_address>Free Univ Bolzano Bozen, Fac Comp Sci, Piazza Domenicani 3, I-39100 Bolzano, Italy</rp_address>
<rp_organization>Free Univ Bolzano Bozen</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Fac Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Piazza Domenicani 3</rp_street>
<rp_city>Bolzano</rp_city>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-39100</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Free Univ Bolzano Bozen, Fac Comp Sci, I-39100 Bolzano, Italy</rs_address>
<rs_organization>Free Univ Bolzano Bozen</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Fac Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Bolzano</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-39100</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Roma La Sapienza, Dipartimento Informat &amp; Sistemist, I-00198 Rome, Italy</rs_address>
<rs_organization>Univ Roma La Sapienza</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Informat &amp; Sistemist</rs_suborganization>
</rs_suborganizations>
<rs_city>Rome</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-00198</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>We study peer-to-peer data integration, where each peer models an autonomous system that exports data in terms of its own schema, and data interoperation is achieved by means of mappings among the peer schemas, rather than through a global schema. We propose a multi-modal epistemic semantics based on the idea that each peer is conceived as a rational agent that exchanges knowledge/belief with other peers, thus nicely modeling the modular structure of the system. We then address the issue of dealing with possible inconsistencies, and distinguish between two types of inconsistencies, called local and P2P, respectively. We define a nonmonotonic extension of our logic that is able to reason on the beliefs of peers under inconsistency tolerance. Tolerance to local inconsistency essentially means that the presence of inconsistency within one peer does not affect the consistency of the whole system. Tolerance to P2P inconsistency means being able to resolve inconsistencies arising from the interaction between peers. We study query answering and its data complexity in this setting, and we present an algorithm that is sound and complete with respect to the proposed semantics, and optimal with respect to worst-case complexity.</p>
</abstract>
<refs count="28">
<ref>55907453</ref>
<ref>149159128</ref>
<ref>117648579</ref>
<ref>149159129</ref>
<ref>149159130</ref>
<ref>133034704</ref>
<ref>133333737</ref>
<ref>133034706</ref>
<ref>133034705</ref>
<ref>143536670</ref>
<ref>42718386</ref>
<ref>113414372</ref>
<ref>81189801</ref>
<ref>94083106</ref>
<ref>133716603</ref>
<ref>149159131</ref>
<ref>75180516</ref>
<ref>149159132</ref>
<ref>142533876</ref>
<ref>123177631</ref>
<ref>143446450</ref>
<ref>130986337</ref>
<ref>135008480</ref>
<ref>89238358</ref>
<ref>131883793</ref>
<ref>112130916</ref>
<ref>149159133</ref>
<ref>69869901</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149155550" hot="yes" sortkey="3119835099" timescited="0" sharedrefs="0" inpi="false">
<item issue="149155465" recid="149155550" coverdate="200604" sortkey="3119835099" refkey="4233855" dbyear="2006">
<ut>000235857500008</ut>
<i_ckey>LIU 0859060050CX</i_ckey>
<i_cid>0109860020</i_cid>
<source_title>COMPUTER NETWORKS</source_title>
<source_abbrev>COMPUT NETW</source_abbrev>
<item_title>Consistency maintenance in dynamic peer-to-peer overlay networks</item_title>
<sq>12854J0</sq>
<bib_id>50 (6): 859-876 APR 13 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.comnet.2005.07.010</article_no>
</article_nos>
<bib_pages begin="859" end="876" pages="18">859-876</bib_pages>
<bib_issue year="2006" vol="50"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Liu, XT</primaryauthor>
<author key="3968628">Lan, J</author>
<author key="6371658">Shenoy, P</author>
<author key="5718046">Ramaritham, K</author>
</authors>
<emails count="1">
<email>
<name>Liu, XT</name>
<email_addr>xiaotaol@cs.umass.edu</email_addr>
</email>
</emails>
<keywords count="3">
<keyword>P2P</keyword>
<keyword>consistency</keyword>
<keyword>overlay network</keyword>
</keywords>
<keywords_plus count="3">
<keyword>FILE SYSTEM</keyword>
<keyword>SCALE</keyword>
<keyword>CODA</keyword>
</keywords_plus>
<reprint>
<rp_author>Liu, XT</rp_author>
<rp_address>Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA</rp_address>
<rp_organization>Univ Massachusetts</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Amherst</rp_city>
<rp_state>MA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">01003</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA</rs_address>
<rs_organization>Univ Massachusetts</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Amherst</rs_city>
<rs_state>MA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">01003</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Verizon Corp, GTE Labs, Verizon Data Serv, Waltham, MA 02451 USA</rs_address>
<rs_organization>Verizon Corp</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>GTE Labs</rs_suborganization>
<rs_suborganization>Verizon Data Serv</rs_suborganization>
</rs_suborganizations>
<rs_city>Waltham</rs_city>
<rs_state>MA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">02451</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Indian Inst Technol, Dept Comp Sci &amp; Engn, Bombay 400076, Maharashtra, India</rs_address>
<rs_organization>Indian Inst Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Bombay</rs_city>
<rs_state>Maharashtra</rs_state>
<rs_country>India</rs_country>
<rs_zips count="1">
<rs_zip location="AC">400076</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we present techniques to maintain temporal consistency of replicated objects in data-centric peer-to-peer overlay applications. We consider both structured and unstructured overlay networks, represented by Chord and Gnutella, respectively, and present techniques for maintaining consistency of replicated data objects in the presence of dynamic joins and leaves. We present extensions to the Chord and Gnutella protocol to incorporate our consistency techniques and implement our extensions to Gnutella into a Gtk-Gnutella prototype. Ail experimental evaluation of our techniques shows that: (i) a push-based approach achieves near-perfect fidelity in a stable overlay network, (ii) a hybrid approach based on push and pull achieves high fidelity in highly dynamic overlay networks and (iii) the run-time overheads of our techniques are small, making them it practical choice for overlay networks. (c) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="34">
<ref>111648105</ref>
<ref>126921051</ref>
<ref>104676859</ref>
<ref>149155551</ref>
<ref>130809159</ref>
<ref>136365666</ref>
<ref>132500244</ref>
<ref>127960294</ref>
<ref>149155552</ref>
<ref>149155553</ref>
<ref>121862304</ref>
<ref>100121457</ref>
<ref>132793763</ref>
<ref>78735613</ref>
<ref>122611831</ref>
<ref>109425037</ref>
<ref>149155554</ref>
<ref>132793765</ref>
<ref>111651653</ref>
<ref>123110024</ref>
<ref>123110019</ref>
<ref>130355044</ref>
<ref>127960302</ref>
<ref>130832200</ref>
<ref>71946304</ref>
<ref>149155555</ref>
<ref>124689499</ref>
<ref>123110036</ref>
<ref>123110037</ref>
<ref>99748675</ref>
<ref>130246209</ref>
<ref>133439275</ref>
<ref>132793758</ref>
<ref>129914622</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149146000" hot="yes" sortkey="3119838103" timescited="0" sharedrefs="0" inpi="false">
<item issue="149145862" recid="149146000" coverdate="200600" sortkey="3119838103" refkey="5228584" dbyear="2006">
<ut>000235807500024</ut>
<i_ckey>OKUY0294063853LT</i_ckey>
<i_cid>0109902163</i_cid>
<source_title>BIOLOGICALLY INSPIRED APPROACHES TO ADVANCED INFORMATION TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Improving the robustness of epidemic communication in scale-free networks</item_title>
<sq>B5024B0</sq>
<bib_id>3853: 294-305 2006</bib_id>
<bib_pages begin="294" end="305" pages="12">294-305</bib_pages>
<bib_issue year="2006" vol="3853"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Okuyama, T</primaryauthor>
<author key="7067273">Tsuchiya, T</author>
<author key="3653676">Kikuno, T</author>
</authors>
<emails count="3">
<email>
<name>Okuyama, T</name>
<email_addr>t-okuyama@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Tsuchiya, T</name>
<email_addr>t-tutiya@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Kikuno, T</name>
<email_addr>kikuno@ist.osaka-u.ac.jp</email_addr>
</email>
</emails>
<keywords_plus count="1">
<keyword>BROADCAST</keyword>
</keywords_plus>
<reprint>
<rp_author>Okuyama, T</rp_author>
<rp_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Osaka 5670851, Japan</rp_address>
<rp_organization>Osaka Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Grad Sch Informat Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Osaka</rp_city>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">5670851</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Osaka 5670851, Japan</rs_address>
<rs_organization>Osaka Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Grad Sch Informat Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Osaka</rs_city>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">5670851</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>As the name suggests, epidemic protocols mimic spread of virus to implement broadcasting with high reliability and low communication cost in peer-to-peer (P2P) overlay networks. In this paper, we study the reliability of epidemic protocols in scale-free networks, an important class of P2P overlay network topologies. In order to improve the robustness of epidemic protocols, we optimize the basic epidemic protocol in the following two ways. One optimization is to introduce an adaptive mechanism that allows each node to retransmit a broadcast message adaptively to the environment. The other optimization is to modify the protocol such that nodes will forward broadcast messages preferentially to neighbor nodes of small degree. The usefulness of these optimizations is demonstrated through simulation results.</p>
</abstract>
<refs count="23">
<ref>129896391</ref>
<ref>112080970</ref>
<ref>111440046</ref>
<ref>149146001</ref>
<ref>149146002</ref>
<ref>131595486</ref>
<ref>137280663</ref>
<ref>130832153</ref>
<ref>135883700</ref>
<ref>116944973</ref>
<ref>149146003</ref>
<ref>123748238</ref>
<ref>146213848</ref>
<ref>120146863</ref>
<ref>149146004</ref>
<ref>129896390</ref>
<ref>131693412</ref>
<ref>137573445</ref>
<ref>128138422</ref>
<ref>123110037</ref>
<ref>131214760</ref>
<ref>149146005</ref>
<ref>149146006</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149146010" hot="yes" sortkey="3119838105" timescited="0" sharedrefs="0" inpi="false">
<item issue="149145862" recid="149146010" coverdate="200600" sortkey="3119838105" refkey="4083602" dbyear="2006">
<ut>000235807500026</ut>
<i_ckey>LEIB0322063853LK</i_ckey>
<i_cid>0109902169</i_cid>
<source_title>BIOLOGICALLY INSPIRED APPROACHES TO ADVANCED INFORMATION TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Modeling of epidemic diffusion in peer-to-peer file-sharing networks</item_title>
<sq>B5024B0</sq>
<bib_id>3853: 322-329 2006</bib_id>
<bib_pages begin="322" end="329" pages="8">322-329</bib_pages>
<bib_issue year="2006" vol="3853"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Leibnitz, K</primaryauthor>
<author key="3122918">Hossfeld, T</author>
<author key="7340591">Wakamiya, N</author>
<author key="4947029">Murata, M</author>
</authors>
<emails count="4">
<email>
<name>Leibnitz, K</name>
<email_addr>leibnitz@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Hossfeld, T</name>
<email_addr>hossfeld@informatik.uni-wuerzburg.de</email_addr>
</email>
<email>
<name>Wakamiya, N</name>
<email_addr>wakamiya@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Murata, M</name>
<email_addr>murata@ist.osaka-u.ac.jp</email_addr>
</email>
</emails>
<reprint>
<rp_author>Leibnitz, K</rp_author>
<rp_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, 1-5 Yamadaoka, Suita, Osaka 5650871, Japan</rp_address>
<rp_organization>Osaka Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Grad Sch Informat Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_street>1-5 Yamadaoka</rp_street>
<rp_city>Suita</rp_city>
<rp_state>Osaka</rp_state>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AP">5650871</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Suita, Osaka 5650871, Japan</rs_address>
<rs_organization>Osaka Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Grad Sch Informat Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Suita</rs_city>
<rs_state>Osaka</rs_state>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AP">5650871</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Wurzburg, Dept Distributed Syst, D-97074 Wurzburg, Germany</rs_address>
<rs_organization>Univ Wurzburg</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Distributed Syst</rs_suborganization>
</rs_suborganizations>
<rs_city>Wurzburg</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-97074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper we propose an analytical model for file diffusion in a peer-to-peer (P2P) file-sharing network based on biological epidemics. During the downloading process, the peer shares the downloaded parts of the file and, thus, contributes to distributing it in the network. This behavior is similar to the spreading of epidemic diseases which is a well researched subject in mathematical biology. Unlike other P2P models based on epidemics, we show that steady state assumptions are not sufficient and that the granularity of the diffusion model may be appropriately selected.</p>
</abstract>
<refs count="9">
<ref>149146011</ref>
<ref>149146012</ref>
<ref>149146013</ref>
<ref>149146014</ref>
<ref>131575353</ref>
<ref>149146015</ref>
<ref>149146016</ref>
<ref>149146017</ref>
<ref>149146018</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149146037" hot="yes" sortkey="3119838112" timescited="0" sharedrefs="0" inpi="false">
<item issue="149145862" recid="149146037" coverdate="200600" sortkey="3119838112" refkey="3307151" dbyear="2006">
<ut>000235807500033</ut>
<i_ckey>IZUM0379063853LT</i_ckey>
<i_cid>0109902187</i_cid>
<source_title>BIOLOGICALLY INSPIRED APPROACHES TO ADVANCED INFORMATION TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An interest-based peer clustering algorithm using ant paradigm</item_title>
<sq>B5024B0</sq>
<bib_id>3853: 379-386 2006</bib_id>
<bib_pages begin="379" end="386" pages="8">379-386</bib_pages>
<bib_issue year="2006" vol="3853"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Izumi, T</primaryauthor>
<author key="4526002">Masuzawa, T</author>
</authors>
<emails count="2">
<email>
<name>Izumi, T</name>
<email_addr>t-izumi@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Masuzawa, T</name>
<email_addr>masuzawa@ist.osaka-u.ac.jp</email_addr>
</email>
</emails>
<reprint>
<rp_author>Izumi, T</rp_author>
<rp_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, 1-3 Machikaneyama, Toyonaka, Osaka 5608531, Japan</rp_address>
<rp_organization>Osaka Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Grad Sch Informat Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_street>1-3 Machikaneyama</rp_street>
<rp_city>Toyonaka</rp_city>
<rp_state>Osaka</rp_state>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AP">5608531</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Toyonaka, Osaka 5608531, Japan</rs_address>
<rs_organization>Osaka Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Grad Sch Informat Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Toyonaka</rs_city>
<rs_state>Osaka</rs_state>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AP">5608531</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The interest-based clustering is one of promising approaches to achieve low-cost search in peer-to-peer file sharing. It organizes the logical overlay network where peers having similar interests are closely located. In this paper, we propose an interest-based peer clustering algorithm using ant paradigm. Our algorithm is inspired by the ant-based clustering algorithm, which is one of heuristic methods to categorize many data items. We also evaluate this algorithm by simulations.</p>
</abstract>
<refs count="6">
<ref>59788686</ref>
<ref>111443100</ref>
<ref>107591590</ref>
<ref>149146038</ref>
<ref>142329190</ref>
<ref>130494565</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149134283" hot="yes" sortkey="3119840801" timescited="0" sharedrefs="0" inpi="false">
<item issue="149133854" recid="149134283" coverdate="200600" sortkey="3119840801" refkey="1201014" dbyear="2006">
<ut>000235659100071</ut>
<i_ckey>CHEN0545063842LH</i_ckey>
<i_cid>0109883077</i_cid>
<source_title>ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Semantic peer-to-peer overlay for efficient content locating</item_title>
<sq>B4952B0</sq>
<bib_id>3842: 545-554 2006</bib_id>
<bib_pages begin="545" end="554" pages="10">545-554</bib_pages>
<bib_issue year="2006" vol="3842"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Chen, HH</primaryauthor>
<author key="3393638">Jin, H</author>
<author key="5111594">Ning, XM</author>
</authors>
<emails count="1">
<email>
<name>Chen, HH</name>
<email_addr>hjin@hust.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Chen, HH</rp_author>
<rp_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rp_address>
<rp_organization>Huazhong Univ Sci &amp; Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cluster &amp; Grid Comp Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Wuhan</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">430074</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rs_address>
<rs_organization>Huazhong Univ Sci &amp; Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cluster &amp; Grid Comp Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The decentralized structure together with the features of self-organization and fault-tolerance makes peer-to-peer network a promising information-sharing model. However, the efficient content-based location remains a challenge of large scale peer-to-peer network. In this paper we present SemreX, a semantic overlay for desktop literature documents sharing in peer-to-peer networks. We present a semantic overlay algorithm by which peers are locally clustered together according to their semantic similarity and long-range connections are rewired for short-cut in the peer-to-peer networks. Experiment results show that routing in the semantic overlay greatly improves the recall of search as well as reduces routing hops and messages.</p>
</abstract>
<refs count="10">
<ref>123110012</ref>
<ref>149134284</ref>
<ref>148499595</ref>
<ref>149134285</ref>
<ref>149134286</ref>
<ref>149134287</ref>
<ref>134550484</ref>
<ref>149134288</ref>
<ref>105378900</ref>
<ref>149134289</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149134408" hot="yes" sortkey="3119840827" timescited="0" sharedrefs="0" inpi="false">
<item issue="149133854" recid="149134408" coverdate="200600" sortkey="3119840827" refkey="4235870" dbyear="2006">
<ut>000235659100097</ut>
<i_ckey>LIU 0717063842LZ</i_ckey>
<i_cid>0109883178</i_cid>
<source_title>ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Modeling fetch-at-most-once behavior in peer-to-peer file-sharing systems</item_title>
<sq>B4952B0</sq>
<bib_id>3842: 717-724 2006</bib_id>
<bib_pages begin="717" end="724" pages="8">717-724</bib_pages>
<bib_issue year="2006" vol="3842"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Liu, ZQ</primaryauthor>
<author key="1197586">Chen, CJ</author>
</authors>
<emails count="2">
<email>
<name>Liu, ZQ</name>
<email_addr>liu_ziqian@yahoo.com.cn</email_addr>
</email>
<email>
<name>Chen, CJ</name>
<email_addr>changjiachen@sina.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>Liu, ZQ</rp_author>
<rp_address>Beijing Jiaotong Univ, Sch Elect &amp; Informat Engn, Beijing 100044, Peoples R China</rp_address>
<rp_organization>Beijing Jiaotong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Elect &amp; Informat Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">100044</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Beijing Jiaotong Univ, Sch Elect &amp; Informat Engn, Beijing 100044, Peoples R China</rs_address>
<rs_organization>Beijing Jiaotong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Elect &amp; Informat Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100044</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Recent measurement studies show that the object popularity distribution in Kazaa file sharing systems deviates significantly from the Zipf distribution which is commonly seen for the World Wide Web, We measure a real BitTorrent network and we figure its object popularity distribution, which also shows, on a log-log scale, a non-Zipf curve with flattened head. The fetch-at-most-once behavior of peer-to-peer (P2P) client is responsible for such a non-Zipf distribution and we propose two mathematical models to describe this. The models are based on different probability assumptions, though both indicate flatter heads in object popularity distribution curves than Zipf would predict. Our models provide theoretic tools to analyze differences between P2P File-sharing system and Web systems.</p>
</abstract>
<refs count="10">
<ref>115767479</ref>
<ref>137191146</ref>
<ref>149134409</ref>
<ref>130246203</ref>
<ref>143848928</ref>
<ref>149134410</ref>
<ref>43083238</ref>
<ref>130950568</ref>
<ref>144662546</ref>
<ref>149134411</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149134457" hot="yes" sortkey="3119840836" timescited="0" sharedrefs="0" inpi="false">
<item issue="149133854" recid="149134457" coverdate="200600" sortkey="3119840836" refkey="4228069" dbyear="2006">
<ut>000235659100106</ut>
<i_ckey>LIU 0779063842LJ</i_ckey>
<i_cid>0109883214</i_cid>
<source_title>ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Deployment of Web services for Enterprise Application Integration (EAI) system</item_title>
<sq>B4952B0</sq>
<bib_id>3842: 779-782 2006</bib_id>
<bib_pages begin="779" end="782" pages="4">779-782</bib_pages>
<bib_issue year="2006" vol="3842"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Liu, J</primaryauthor>
<author key="7803404">Zhang, EP</author>
<author key="7669397">Xiong, JF</author>
<author key="4332574">Lv, ZY</author>
</authors>
<emails count="1">
<email>
<name>Liu, J</name>
<email_addr>zhangep@163.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>Liu, J</rp_author>
<rp_address>Harbin Engn Univ, Sch Comp Sci &amp; Technol, Harbin, Peoples R China</rp_address>
<rp_organization>Harbin Engn Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Harbin</rp_city>
<rp_country>Peoples R China</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Harbin Engn Univ, Sch Comp Sci &amp; Technol, Harbin, Peoples R China</rs_address>
<rs_organization>Harbin Engn Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Harbin</rs_city>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The process to explore application integration for enterprise information system is called Enterprise Application Integration (EAI). Generally, EAI that based on the peer-to-peer has many limitations, such as poor extensibility, difficulty of management, and high-cost etc. These disadvantages can be overcome by Web services technology which helps to integrate large-scale, distributed enterprise applications together. This paper presents a framework of EAI which based on Web services, and gives discussions on its major functional modules.</p>
</abstract>
<refs count="7">
<ref>129280287</ref>
<ref>149134458</ref>
<ref>129280292</ref>
<ref>149134459</ref>
<ref>149134460</ref>
<ref>149134461</ref>
<ref>149134462</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149067053" hot="yes" sortkey="3119892703" timescited="0" sharedrefs="0" inpi="false">
<item issue="149067052" recid="149067053" coverdate="200600" sortkey="3119892703" refkey="46010" dbyear="2006">
<ut>000235720800001</ut>
<i_ckey>ADJI0269060025JP</i_ckey>
<i_cid>0109793753</i_cid>
<source_title>JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH</source_title>
<source_abbrev>J ARTIF INTELL RES</source_abbrev>
<item_title>Distributed reasoning in a peer-to-peer setting: Application to the Semantic Web</item_title>
<sq>11648J0</sq>
<bib_id>25: 269-314 2006</bib_id>
<bib_pages begin="269" end="314" pages="46">269-314</bib_pages>
<bib_issue year="2006" vol="25"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Adjiman, P</primaryauthor>
<author key="1184345">Chatalic, P</author>
<author key="2499771">Goasdoue, F</author>
<author key="5984981">Rousset, MC</author>
<author key="6456653">Simon, L</author>
</authors>
<emails count="5">
<email>
<name>Adjiman, P</name>
<email_addr>ADJIMAN@LRI.FR</email_addr>
</email>
<email>
<name>Chatalic, P</name>
<email_addr>CHATALIC@LRI.FR</email_addr>
</email>
<email>
<name>Goasdoue, F</name>
<email_addr>FG@LRI.FR</email_addr>
</email>
<email>
<name>Rousset, MC</name>
<email_addr>MCR@LRI.FR</email_addr>
</email>
<email>
<name>Simon, L</name>
<email_addr>SIMON@LRI.FR</email_addr>
</email>
</emails>
<reprint>
<rp_author>Adjiman, P</rp_author>
<rp_address>CNRS, LRI, PCRI, Batiment 490, F-91405 Orsay, France</rp_address>
<rp_organization>CNRS</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>LRI</rp_suborganization>
<rp_suborganization>PCRI</rp_suborganization>
</rp_suborganizations>
<rp_street>Batiment 490</rp_street>
<rp_city>Orsay</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-91405</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>CNRS, LRI, PCRI, F-91405 Orsay, France</rs_address>
<rs_organization>CNRS</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>LRI</rs_suborganization>
<rs_suborganization>PCRI</rs_suborganization>
</rs_suborganizations>
<rs_city>Orsay</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91405</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Paris 11, INRIA Futurs, F-91405 Orsay, France</rs_address>
<rs_organization>Univ Paris 11</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>INRIA Futurs</rs_suborganization>
</rs_suborganizations>
<rs_city>Orsay</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91405</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In a peer-to-peer inferencesystem, each peer can reason locally but can also lso solicit licit some of its acquatances, which are peers sharing part of its vocabulary. In this paper, we consider peer-to-peer inference systems in which the local theory of each peer is a set et of propositional clauses defined upon a local vocabulary. An important characteristic of peer-to peer infererence systems is that the global theory (the union of all peer theories) is not known (as opposed to partition-based reasoning systems). The main contribution of this paper is to provide the first consequence finding algorithm in a peer-to-peer setting: DeCA. It is anytime and computes consequences gradually from the solicited peer to peers that are more and more distant. We exhibit a sufficient condition on the acquaintance graph of the peer-to-peer inference system for guaranteeing the completeness of this algorithm. Another important contribution is to apply this general distributed reasoning setting to the setting etting of the Semantic Web through the Somewhere semantic peer-to-peer data management system. The last contribution of this paper is to provide an experimental analysis of the scalability of the peer-to-peer infrastructure that we propose, on large networks of 1000 peers.</p>
</abstract>
<refs count="46">
<ref>149067054</ref>
<ref>149067055</ref>
<ref>149067056</ref>
<ref>126710858</ref>
<ref>137287367</ref>
<ref>131693401</ref>
<ref>122330998</ref>
<ref>149067057</ref>
<ref>142351713</ref>
<ref>143536670</ref>
<ref>103305687</ref>
<ref>104529245</ref>
<ref>131881906</ref>
<ref>149067058</ref>
<ref>78096319</ref>
<ref>149067059</ref>
<ref>149067060</ref>
<ref>149067061</ref>
<ref>146677078</ref>
<ref>147679525</ref>
<ref>131194754</ref>
<ref>142533876</ref>
<ref>80707883</ref>
<ref>18611210</ref>
<ref>133716617</ref>
<ref>128827338</ref>
<ref>72579175</ref>
<ref>112346051</ref>
<ref>129695036</ref>
<ref>117506116</ref>
<ref>149067062</ref>
<ref>68612884</ref>
<ref>149067063</ref>
<ref>149067064</ref>
<ref>149067065</ref>
<ref>142351230</ref>
<ref>95267557</ref>
<ref>149067066</ref>
<ref>149067067</ref>
<ref>63097790</ref>
<ref>128387184</ref>
<ref>126654497</ref>
<ref>143446458</ref>
<ref>148898840</ref>
<ref>107408181</ref>
<ref>103866001</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149055974" hot="yes" sortkey="3119895153" timescited="0" sharedrefs="0" inpi="false">
<item issue="149055788" recid="149055974" coverdate="200500" sortkey="3119895153" refkey="3035228" dbyear="2006">
<ut>000235474700026</ut>
<i_ckey>HLAV0235053814LH</i_ckey>
<i_cid>0109798893</i_cid>
<source_title>INTELLIGENT TECHNOLOGIES FOR INTERACTIVE ENTERTAINMENT, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A ubiquitous and interactive zoo guide system</item_title>
<sq>B4849B0</sq>
<bib_id>3814: 235-239 2005</bib_id>
<bib_pages begin="235" end="239" pages="5">235-239</bib_pages>
<bib_issue year="2005" vol="3814"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Hlavacs, H</primaryauthor>
<author key="2404490">Gelies, R</author>
<author key="701840">Blossey, D</author>
<author key="3714132">Klein, B</author>
</authors>
<emails count="2">
<email>
<name>Hlavacs, H</name>
<email_addr>helmut.hlavacs@univie.ac.at</email_addr>
</email>
<email>
<name>Gelies, R</name>
<email_addr>bernhard.klein@univie.ac.at</email_addr>
</email>
</emails>
<reprint>
<rp_author>Hlavacs, H</rp_author>
<rp_address>Univ Vienna, Inst Distributed &amp; Multimedia Syst, Lenaug 2-8, A-1080 Vienna, Austria</rp_address>
<rp_organization>Univ Vienna</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Inst Distributed &amp; Multimedia Syst</rp_suborganization>
</rp_suborganizations>
<rp_street>Lenaug 2-8</rp_street>
<rp_city>Vienna</rp_city>
<rp_country>Austria</rp_country>
<rp_zips count="1">
<rp_zip location="BC">A-1080</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Vienna, Inst Distributed &amp; Multimedia Syst, A-1080 Vienna, Austria</rs_address>
<rs_organization>Univ Vienna</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Inst Distributed &amp; Multimedia Syst</rs_suborganization>
</rs_suborganizations>
<rs_city>Vienna</rs_city>
<rs_country>Austria</rs_country>
<rs_zips count="1">
<rs_zip location="BC">A-1080</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Otto Von Guericke Univ, Fak Informat, IWS, D-39112 Magdeburg, Germany</rs_address>
<rs_organization>Otto Von Guericke Univ</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Fak Informat</rs_suborganization>
<rs_suborganization>IWS</rs_suborganization>
</rs_suborganizations>
<rs_city>Magdeburg</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-39112</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>We describe a new prototype for a zoo information system. The system is based on RFID and allows to retrieve information about the zoo animals in a quick and easy way. RFID tags identifying the respective animals are placed near the animal habitats. Zoo visitors are equipped with PDAs containing RFID readers and WLAN cards. The PDAs may then read the RFID tag IDs and retrieve respective HTML-documents from a zoo Web server showing information about the animals at various levels of detail and languages. Additionally, the system contains a JXTA and XML based peer-to-peer subsystem, enabling zoos to share their content with other zoos in an easy way. This way, the effort for creating multimedia content can be reduced drastically.</p>
</abstract>
<refs count="5">
<ref>149055975</ref>
<ref>146909052</ref>
<ref>149055976</ref>
<ref>149055977</ref>
<ref>135636881</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149055464" hot="yes" sortkey="3119895277" timescited="0" sharedrefs="0" inpi="false">
<item issue="149055373" recid="149055464" coverdate="200605" sortkey="3119895277" refkey="4481557" dbyear="2006">
<ut>000235828800012</ut>
<i_ckey>MARS0405060012IJ</i_ckey>
<i_cid>0109844565</i_cid>
<source_title>IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS</source_title>
<source_abbrev>IEEE T VIS COMPUT GR</source_abbrev>
<item_title>A network architecture supporting consistent rich behavior in collaborative interactive applications</item_title>
<sq>11534J0</sq>
<bib_id>12 (3): 405-416 MAY-JUN 2006</bib_id>
<bib_pages begin="405" end="416" pages="12">405-416</bib_pages>
<bib_issue year="2006" vol="12"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Marsh, J</primaryauthor>
<author key="2490833">Glencross, M</author>
<author key="5490529">Pettifer, S</author>
<author key="3160460">Hubbold, R</author>
</authors>
<emails count="4">
<email>
<name>Marsh, J</name>
<email_addr>james.marsh@manchester.ac.uk</email_addr>
</email>
<email>
<name>Glencross, M</name>
<email_addr>mashhuda.glencross@manchester.ac.uk</email_addr>
</email>
<email>
<name>Pettifer, S</name>
<email_addr>steve.pettifer@manchester.ac.uk</email_addr>
</email>
<email>
<name>Hubbold, R</name>
<email_addr>roger.hubbold@manchester.ac.uk</email_addr>
</email>
</emails>
<keywords count="11">
<keyword>virtual reality</keyword>
<keyword>network architecture and design</keyword>
<keyword>haptic I/O</keyword>
<keyword>computer supported collaborative work</keyword>
<keyword>computer-supported cooperative work</keyword>
<keyword>simulation</keyword>
<keyword>modeling</keyword>
<keyword>and visualization</keyword>
<keyword>client/server</keyword>
<keyword>distributed applications</keyword>
<keyword>computer aided design</keyword>
</keywords>
<keywords_plus count="6">
<keyword>GEOMETRICALLY NONLINEAR RODS</keyword>
<keyword>DYNAMICS</keyword>
<keyword>SYSTEM</keyword>
<keyword>MOTION</keyword>
<keyword>REAL</keyword>
<keyword>TIME</keyword>
</keywords_plus>
<reprint>
<rp_author>Marsh, J</rp_author>
<rp_address>Univ Manchester, Sch Comp Sci, Oxford Rd, Manchester M13 9PL, Lancs, England</rp_address>
<rp_organization>Univ Manchester</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Oxford Rd</rp_street>
<rp_city>Manchester</rp_city>
<rp_state>Lancs</rp_state>
<rp_country>England</rp_country>
<rp_zips count="1">
<rp_zip location="AC">M13 9PL</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Manchester, Sch Comp Sci, Manchester M13 9PL, Lancs, England</rs_address>
<rs_organization>Univ Manchester</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Manchester</rs_city>
<rs_state>Lancs</rs_state>
<rs_country>England</rs_country>
<rs_zips count="1">
<rs_zip location="AC">M13 9PL</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Network architectures for collaborative virtual reality have traditionally been dominated by client-server and peer-to-peer approaches, with peer-to-peer strategies typically being favored where minimizing latency is a priority, and client-server where consistency is key. With increasingly sophisticated behavior models and the demand for better support for haptics, we argue that neither approach provides sufficient support for these scenarios and, thus, a hybrid architecture is required. We discuss the relative performance of different distribution strategies in the face of real network conditions and illustrate the problems they face. Finally, we present an architecture that successfully meets many of these challenges and demonstrate its use in a distributed virtual prototyping application which supports simultaneous collaboration for assembly, maintenance, and training applications utilizing haptics.</p>
</abstract>
<refs count="50">
<ref>144915102</ref>
<ref>126248998</ref>
<ref>105686318</ref>
<ref>149055465</ref>
<ref>112228412</ref>
<ref>101958017</ref>
<ref>149055466</ref>
<ref>149055467</ref>
<ref>149055468</ref>
<ref>104596465</ref>
<ref>149055469</ref>
<ref>80709369</ref>
<ref>123148962</ref>
<ref>149055470</ref>
<ref>99690697</ref>
<ref>136375168</ref>
<ref>95085170</ref>
<ref>135635710</ref>
<ref>149055471</ref>
<ref>149055472</ref>
<ref>149055473</ref>
<ref>146452499</ref>
<ref>127674897</ref>
<ref>111105875</ref>
<ref>149055474</ref>
<ref>130497423</ref>
<ref>34820797</ref>
<ref>147660352</ref>
<ref>95085173</ref>
<ref>149055475</ref>
<ref>149055476</ref>
<ref>133010812</ref>
<ref>129943758</ref>
<ref>122979711</ref>
<ref>126562138</ref>
<ref>149055477</ref>
<ref>149055478</ref>
<ref>130496862</ref>
<ref>149055479</ref>
<ref>145242580</ref>
<ref>135417599</ref>
<ref>122382576</ref>
<ref>132952619</ref>
<ref>98934185</ref>
<ref>149055480</ref>
<ref>122156734</ref>
<ref>133733686</ref>
<ref>127471407</ref>
<ref>127471418</ref>
<ref>128439222</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149011455" hot="yes" sortkey="3119906041" timescited="0" sharedrefs="0" inpi="false">
<item issue="149011438" recid="149011455" coverdate="200603" sortkey="3119906041" refkey="2217694" dbyear="2006">
<ut>000235817900003</ut>
<i_ckey>FOX 0110060032AC</i_ckey>
<i_cid>0109842042</i_cid>
<source_title>AGGRESSIVE BEHAVIOR</source_title>
<source_abbrev>AGGRESSIVE BEHAV</source_abbrev>
<item_title>Friendship as a moderator of the relationship between social skills problems and peer victimisation</item_title>
<sq>05520J0</sq>
<bib_id>32 (2): 110-121 MAR-APR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1002/ab.20114</article_no>
</article_nos>
<bib_pages begin="110" end="121" pages="12">110-121</bib_pages>
<bib_issue year="2006" vol="32"/>
<doctype code="@">Article</doctype>
<editions full="SCI SSCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Fox, CL</primaryauthor>
<author key="792055">Boulton, MJ</author>
</authors>
<emails count="1">
<email>
<name>Fox, CL</name>
<email_addr>c.fox@psy.keele.ac.uk</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer victimisation</keyword>
<keyword>social skills</keyword>
<keyword>friendship</keyword>
<keyword>peer acceptance</keyword>
<keyword>bullying</keyword>
</keywords>
<keywords_plus count="10">
<keyword>MIDDLE-SCHOOL-CHILDREN</keyword>
<keyword>BULLY VICTIM PROBLEMS</keyword>
<keyword>EARLY ADOLESCENCE</keyword>
<keyword>PSYCHOLOGICAL ADJUSTMENT</keyword>
<keyword>AGGRESSION</keyword>
<keyword>PERCEPTIONS</keyword>
<keyword>BOYS</keyword>
<keyword>MALADJUSTMENT</keyword>
<keyword>ANTECEDENTS</keyword>
<keyword>PERSPECTIVE</keyword>
</keywords_plus>
<reprint>
<rp_author>Fox, CL</rp_author>
<rp_address>Univ Keele, Sch Psychol, Keele ST5 5BG, Staffs, England</rp_address>
<rp_organization>Univ Keele</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Psychol</rp_suborganization>
</rp_suborganizations>
<rp_city>Keele</rp_city>
<rp_state>Staffs</rp_state>
<rp_country>England</rp_country>
<rp_zips count="1">
<rp_zip location="AC">ST5 5BG</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Keele, Sch Psychol, Keele ST5 5BG, Staffs, England</rs_address>
<rs_organization>Univ Keele</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Psychol</rs_suborganization>
</rs_suborganizations>
<rs_city>Keele</rs_city>
<rs_state>Staffs</rs_state>
<rs_country>England</rs_country>
<rs_zips count="1">
<rs_zip location="AC">ST5 5BG</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Coll Chester, Chester, Cheshire, England</rs_address>
<rs_organization>Univ Coll Chester</rs_organization>
<rs_city>Chester</rs_city>
<rs_state>Cheshire</rs_state>
<rs_country>England</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Previous research, primarily in North America, has found that individual factors (e.g., 'internalising problems') and social factors (e.g., friendship) interact to influence children's levels of peer victimisation. Some research has found that the identity of children's friends and friendship quality (as 'protective factors') are more important than the sheer number of friends. However, studies have produced conflicting findings. A peer nomination inventory was used to assess social skills problems, peer victimisation, peer acceptance, and several different aspects of friendship. Four hundred and forty-nine children aged 9 to 11 years completed the inventory at two time points over the course of an academic year. Social skills problems were found to predict an increase in peer victimisation over time. Two friendship variables were found to moderate this relationship: a) number of friends, and b) the peer acceptance of the very best-friend. The relationship was found to be weaker for those children with lots of friends and for those children with a 'popular' best-friend. The findings advance understanding of the factors that promote peer victimisation.</p>
</abstract>
<refs count="62">
<ref>103651245</ref>
<ref>80878442</ref>
<ref>75075447</ref>
<ref>61103680</ref>
<ref>78963809</ref>
<ref>149011456</ref>
<ref>111670183</ref>
<ref>88611184</ref>
<ref>78768481</ref>
<ref>87613992</ref>
<ref>82636066</ref>
<ref>46511259</ref>
<ref>91511669</ref>
<ref>104880443</ref>
<ref>104375713</ref>
<ref>57138679</ref>
<ref>149011457</ref>
<ref>99076923</ref>
<ref>99076934</ref>
<ref>63802012</ref>
<ref>73774425</ref>
<ref>117516519</ref>
<ref>87443043</ref>
<ref>115109348</ref>
<ref>102763404</ref>
<ref>109879709</ref>
<ref>149011458</ref>
<ref>108353457</ref>
<ref>99458031</ref>
<ref>97935217</ref>
<ref>17825665</ref>
<ref>81480707</ref>
<ref>98324323</ref>
<ref>44778074</ref>
<ref>116447726</ref>
<ref>109592328</ref>
<ref>85678721</ref>
<ref>35120243</ref>
<ref>78699417</ref>
<ref>83989118</ref>
<ref>110919100</ref>
<ref>131895704</ref>
<ref>122584675</ref>
<ref>49697368</ref>
<ref>88732362</ref>
<ref>13083889</ref>
<ref>95907289</ref>
<ref>85819804</ref>
<ref>116432242</ref>
<ref>110811094</ref>
<ref>90192828</ref>
<ref>111271358</ref>
<ref>89663505</ref>
<ref>100563170</ref>
<ref>109608245</ref>
<ref>110334648</ref>
<ref>72393011</ref>
<ref>83645538</ref>
<ref>6670927</ref>
<ref>96555032</ref>
<ref>63119246</ref>
<ref>55057735</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148961416" hot="yes" sortkey="3119950290" timescited="0" sharedrefs="0" inpi="false">
<item issue="148961346" recid="148961416" coverdate="200602" sortkey="3119950290" refkey="243165" dbyear="2006">
<ut>000235459500009</ut>
<i_ckey>ARIN0528060057JR</i_ckey>
<i_cid>0109673890</i_cid>
<source_title>JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY</source_title>
<source_abbrev>J AM SOC INF SCI TEC</source_abbrev>
<item_title>Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems</item_title>
<sq>13507J0</sq>
<bib_id>57 (4): 528-537 FEB 15 2006</bib_id>
<bib_pages begin="528" end="537" pages="10">528-537</bib_pages>
<bib_issue year="2006" vol="57"/>
<doctype code="@">Article</doctype>
<editions full="SCI SSCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Aringhieri, R</primaryauthor>
<author key="1525711">Damiani, E</author>
<author key="1704252">Di Vimercati, SD</author>
<author key="5355893">Paraboschi, S</author>
<author key="6089636">Samarati, P</author>
</authors>
<emails count="5">
<email>
<name>Aringhieri, R</name>
<email_addr>Aringhieri@dti.unimi.it</email_addr>
</email>
<email>
<name>Damiani, E</name>
<email_addr>Damiani@dti.unimi.it</email_addr>
</email>
<email>
<name>Di Vimercati, SD</name>
<email_addr>Decapita@dti.unimi.it</email_addr>
</email>
<email>
<name>Paraboschi, S</name>
<email_addr>parabosc@unibg.it</email_addr>
</email>
<email>
<name>Samarati, P</name>
<email_addr>samarati@dti.unimi.it</email_addr>
</email>
</emails>
<reprint>
<rp_author>Aringhieri, R</rp_author>
<rp_address>Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, CR, Italy</rp_address>
<rp_organization>Univ Milan</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dipartimento Tecnol Informaz</rp_suborganization>
</rp_suborganizations>
<rp_city>Crema</rp_city>
<rp_state>CR</rp_state>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-26013</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, CR, Italy</rs_address>
<rs_organization>Univ Milan</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Tecnol Informaz</rs_suborganization>
</rs_suborganizations>
<rs_city>Crema</rs_city>
<rs_state>CR</rs_state>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-26013</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Bergamo, Dipartimento Gest &amp; Informaz, Bergamo, Italy</rs_address>
<rs_organization>Univ Bergamo</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Gest &amp; Informaz</rs_suborganization>
</rs_suborganizations>
<rs_city>Bergamo</rs_city>
<rs_country>Italy</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-peer (P2P) applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymity of both requesters and providers. However, concerns have been raised about the possibility that malicious users can exploit the network to spread tampered-with resources (e.g., malicious programs and viruses). A considerable amount of research has thus focused on the development of trust and reputation models in P2P networks. In this article, we propose to use fuzzy techniques in the design of reputation systems based on collecting and aggregating peers' opinions. Fuzzy techniques are used in the evaluation and synthesis of all the opinions expressed by peers. The behavior of the proposed system is described by comparison with probabilistic approaches.</p>
</abstract>
<refs count="18">
<ref>130246224</ref>
<ref>61211522</ref>
<ref>127268662</ref>
<ref>142239600</ref>
<ref>148961417</ref>
<ref>130494484</ref>
<ref>130246221</ref>
<ref>130882436</ref>
<ref>128940249</ref>
<ref>148961418</ref>
<ref>119985819</ref>
<ref>98921005</ref>
<ref>148961419</ref>
<ref>148961420</ref>
<ref>65315693</ref>
<ref>123846127</ref>
<ref>130246239</ref>
<ref>118429792</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148939254" hot="yes" sortkey="3119955270" timescited="0" sharedrefs="0" inpi="false">
<item issue="148939193" recid="148939254" coverdate="200604" sortkey="3119955270" refkey="1148078" dbyear="2006">
<ut>000235685200010</ut>
<i_ckey>CHAK0115060020IA</i_ckey>
<i_cid>0109753337</i_cid>
<source_title>INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS</source_title>
<source_abbrev>INT J HIGH PERFORM C</source_abbrev>
<item_title>Self-organizing scheduling on the organic grid</item_title>
<sq>12409J0</sq>
<bib_id>20 (1): 115-130 SPR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1177/1094342006061892</article_no>
</article_nos>
<bib_pages begin="115" end="130" pages="16">115-130</bib_pages>
<bib_issue year="2006" vol="20"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Chakravarti, AJ</primaryauthor>
<author key="476437">Baumgartner, G</author>
<author key="4017147">Lauria, M</author>
</authors>
<emails count="1">
<email>
<name>Chakravarti, AJ</name>
<email_addr>LAURIA@CSE.OHIO-STATE.EDU</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>self-organizing computation</keyword>
<keyword>mobile agents</keyword>
<keyword>grid scheduling</keyword>
<keyword>BLAST</keyword>
<keyword>emergence</keyword>
</keywords>
<reprint>
<rp_author>Chakravarti, AJ</rp_author>
<rp_address>Mathworks Inc, Natick, MA 01760 USA</rp_address>
<rp_organization>Mathworks Inc</rp_organization>
<rp_city>Natick</rp_city>
<rp_state>MA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">01760</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Mathworks Inc, Natick, MA 01760 USA</rs_address>
<rs_organization>Mathworks Inc</rs_organization>
<rs_city>Natick</rs_city>
<rs_state>MA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">01760</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Louisiana State Univ, Dept Comp Sci, Baton Rouge, LA 70803 USA</rs_address>
<rs_organization>Louisiana State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Baton Rouge</rs_city>
<rs_state>LA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">70803</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Ohio State Univ, Dept Comp Sci &amp; Engn, Columbus, OH 43210 USA</rs_address>
<rs_organization>Ohio State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Columbus</rs_city>
<rs_state>OH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">43210</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>The Organic Grid is a biologically inspired and fully decentralized approach to the organization of computation that is based on the autonomous scheduling of strongly mobile agents on a peer-to-peer network. Through the careful design of agent behavior, the emerging organization of the computation can be customized for different classes of applications. In this paper, we report on our experience in adapting the general framework to run two representative applications on our Organic Grid prototype: the National Center for Biotechnology Information (NCBI) basic local alignment search tool (BLAST) code for sequence alignment, and the Cannon's algorithm for matrix multiplication. The first is an example of independent task application, a type of application commonly used for grid scheduling research because of its easily decomposable nature and absence of intra-node communication. The second is a popular block algorithm for parallel matrix multiplication, and represents a challenging application for grid platforms because of its highly structured and synchronous communication pattern.</p>
<p>Agent behavior completely determines the way computation is organized on the Organic Grid. We intentionally chose two applications at opposite ends of the distributed computing spectrum having very different requirements in terms of communication topology, resource use, and response to faults. We detail the design of the agent behavior and show how the different requirements can be satisfied. By encapsulating application code and scheduling functionality into mobile agents, we decouple both computation and scheduling from the underlying grid infrastructure. In the resulting system, every node can inject a computation onto the grid; the computation naturally organizes itself around available resources.</p>
</abstract>
<refs count="30">
<ref>129116106</ref>
<ref>129116096</ref>
<ref>111443100</ref>
<ref>144012122</ref>
<ref>42859036</ref>
<ref>144012124</ref>
<ref>148939255</ref>
<ref>148939256</ref>
<ref>148939257</ref>
<ref>130162185</ref>
<ref>148939258</ref>
<ref>22460537</ref>
<ref>98744566</ref>
<ref>133912096</ref>
<ref>144012130</ref>
<ref>130162152</ref>
<ref>144012131</ref>
<ref>144012132</ref>
<ref>144012133</ref>
<ref>103750600</ref>
<ref>119240775</ref>
<ref>130987116</ref>
<ref>123110024</ref>
<ref>144012137</ref>
<ref>45549147</ref>
<ref>123110037</ref>
<ref>144012138</ref>
<ref>125814117</ref>
<ref>49304</ref>
<ref>121586666</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935626" hot="yes" sortkey="3119956058" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935626" coverdate="200602" sortkey="3119956058" refkey="3092951" dbyear="2006">
<ut>000235508800019</ut>
<i_ckey>HONG0546060089IF</i_ckey>
<i_cid>0109686606</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>PChord: Improvement on Chord to achieve better routing efficiency by exploiting proximity</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 546-554 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.546</article_no>
</article_nos>
<bib_pages begin="546" end="554" pages="9">546-554</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Hong, F</primaryauthor>
<author key="4155068">Li, ML</author>
<author key="7651278">Wu, MY</author>
<author key="7757150">Yu, JD</author>
</authors>
<emails count="1">
<email>
<name>Hong, F</name>
<email_addr>hongfeng@cs.sjtu.edu.cn</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>routing</keyword>
<keyword>Chord</keyword>
<keyword>proximity routing</keyword>
<keyword>RDP</keyword>
</keywords>
<reprint>
<rp_author>Hong, F</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200240, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200240</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200240, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200240</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Routing efficiency is the critical issue when constructing peer-to-peer overlay. However, Chord has often been criticized on its careless of routing locality. A routing efficiency enhancement protocol on top of Chord is illustrated in this paper, which is called PChord. PChord aims to achieve better routing efficiency than Chord by exploiting proximity of the underlying network topology. The simulation shows that PChord has achieved lower RDP per message routing.</p>
</abstract>
<refs count="12">
<ref>126921054</ref>
<ref>134350857</ref>
<ref>132793739</ref>
<ref>123110024</ref>
<ref>148935627</ref>
<ref>148935628</ref>
<ref>127960302</ref>
<ref>128939454</ref>
<ref>134350866</ref>
<ref>148935629</ref>
<ref>99948758</ref>
<ref>132793758</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935631" hot="yes" sortkey="3119956060" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935631" coverdate="200602" sortkey="3119956060" refkey="1205264" dbyear="2006">
<ut>000235508800021</ut>
<i_ckey>CHEN0563060089IM</i_ckey>
<i_cid>0109686610</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>Reciprocity: Enforcing contribution in P2P perpendicular downloading</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 563-569 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.563</article_no>
</article_nos>
<bib_pages begin="563" end="569" pages="7">563-569</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Chen, M</primaryauthor>
<author key="7701605">Yang, GW</author>
</authors>
<emails count="1">
<email>
<name>Chen, M</name>
<email_addr>cm01@mails.tsinghua.edu.cn</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>bulk file dissemination</keyword>
<keyword>perpendicular downloading</keyword>
<keyword>incentive</keyword>
<keyword>game theory</keyword>
</keywords>
<reprint>
<rp_author>Chen, M</rp_author>
<rp_address>Tsing Hua Univ, Dept Comp Sci &amp; Technol, Beijing 100084, Peoples R China</rp_address>
<rp_organization>Tsing Hua Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">100084</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Tsing Hua Univ, Dept Comp Sci &amp; Technol, Beijing 100084, Peoples R China</rs_address>
<rs_organization>Tsing Hua Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100084</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Flash bulk files downloading in style of P2P through perpendicular pattern becomes more popular recently. Many peers download different pieces of shared files from the source in parallel. They try to reconstruct complete files by exchanging needed pieces with other downloading peers. The throughput of entire downloading community, as well as the perceived downloading rate of each peer, greatly depends on uploading bandwidth contributed by every individual peer. Unfortunately, without proper built-in incentive mechanism, peers inherently tend to relentlessly download while intentionally limiting their uploading bandwidth. In this paper, we propose a both effective and efficient incentive approach-Reciprocity, which is only based on end-to-end measurement and reaction: a peer caps uploading rate to each of its peers at the rate that is proportional to its downloading rate from that one. It requires no centralized control, or electronic monetary payment, or certification. Preliminary experiments' results reveal that this approach offers favorable performance for cooperative peers, while effectively punishing defective ones.</p>
</abstract>
<refs count="15">
<ref>121371192</ref>
<ref>51848375</ref>
<ref>148935632</ref>
<ref>148935633</ref>
<ref>148935634</ref>
<ref>137439732</ref>
<ref>148935635</ref>
<ref>148935636</ref>
<ref>142796956</ref>
<ref>148935637</ref>
<ref>148935638</ref>
<ref>148935639</ref>
<ref>148935640</ref>
<ref>132892953</ref>
<ref>148935641</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935642" hot="yes" sortkey="3119956061" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935642" coverdate="200602" sortkey="3119956061" refkey="7477138" dbyear="2006">
<ut>000235508800022</ut>
<i_ckey>WEPI0570060089IG</i_ckey>
<i_cid>0109686611</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>HiPeer: A highly reliable P2P system</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 570-580 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.570</article_no>
</article_nos>
<bib_pages begin="570" end="580" pages="11">570-580</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Wepiwte, G</primaryauthor>
<author key="6451251">Simeonov, PL</author>
</authors>
<emails count="1">
<email>
<name>Wepiwte, G</name>
<email_addr>giscard.wepiwe@dai-labor.de</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer networks</keyword>
<keyword>overlay networking</keyword>
<keyword>fault-tolerant routing</keyword>
<keyword>resource distribution and discovery</keyword>
</keywords>
<keywords_plus count="4">
<keyword>MOORE GRAPHS</keyword>
<keyword>NETWORKS</keyword>
<keyword>DIAMETER</keyword>
<keyword>SERVICE</keyword>
</keywords_plus>
<reprint>
<rp_author>Wepiwte, G</rp_author>
<rp_address>Tech Univ Berlin, Fac Elect Engn &amp; Comp Sci, Franklinstr 28-29, D-10587 Berlin, Germany</rp_address>
<rp_organization>Tech Univ Berlin</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Fac Elect Engn &amp; Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Franklinstr 28-29</rp_street>
<rp_city>Berlin</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-10587</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Tech Univ Berlin, Fac Elect Engn &amp; Comp Sci, D-10587 Berlin, Germany</rs_address>
<rs_organization>Tech Univ Berlin</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Fac Elect Engn &amp; Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Berlin</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-10587</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The paper presents HiPeer, a robust resource distribution and discovery algorithm that can be used for fast and fault-tolerant location of resources in P2P network environments. HiPeer defines a concentric multi-ring overlay networking topology, whereon dynamic network management methods are deployed. In terms of performance, HiPeer delivers of number of lowest bounds. We demonstrate that for any De Bruijn digraph of degree* d &gt;= 2 and diameter** D-DB HiPeer constructs a highly reliable network, where each node maintains a routing table with at most 2d+2 entries independent of the number N of nodes in the system. Further, we show that any existing resource in the network with at most d nodes can be found within at most D-HiPeer = log(d)(N(d - 1) + d) - 1 overlay hops. This result is as close to the Moore bound[1] as the query path length in other outstanding P2P proposals based on the De Bruijn digraphs. Thus, we argue that HiPeer defines a highly connected network with connectivity d and the lowest yet known lookup bound D-HiPeer. Moreover, we show that any node's "join or leave" operation in HiPeer implies a constant expected reorganization cost of the, magnitude order of O(d) control messages.</p>
</abstract>
<refs count="33">
<ref>24845719</ref>
<ref>148935643</ref>
<ref>92522742</ref>
<ref>85998380</ref>
<ref>101912881</ref>
<ref>148935644</ref>
<ref>126824946</ref>
<ref>80609135</ref>
<ref>134150460</ref>
<ref>148935645</ref>
<ref>147349527</ref>
<ref>148935646</ref>
<ref>85557990</ref>
<ref>6149387</ref>
<ref>67290191</ref>
<ref>50605430</ref>
<ref>148935647</ref>
<ref>117789749</ref>
<ref>128939461</ref>
<ref>148935648</ref>
<ref>130352959</ref>
<ref>148935649</ref>
<ref>148935650</ref>
<ref>109420756</ref>
<ref>93255466</ref>
<ref>131693412</ref>
<ref>128642665</ref>
<ref>143848837</ref>
<ref>68670575</ref>
<ref>148935651</ref>
<ref>122611823</ref>
<ref>148935652</ref>
<ref>132793758</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935653" hot="yes" sortkey="3119956062" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935653" coverdate="200602" sortkey="3119956062" refkey="7718631" dbyear="2006">
<ut>000235508800023</ut>
<i_ckey>YE B0581060089IB</i_ckey>
<i_cid>0109686618</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>A multicast based anonymous information sharing protocol for peer-to-peer systems</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 581-588 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.581</article_no>
</article_nos>
<bib_pages begin="581" end="588" pages="8">581-588</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Ye, BL</primaryauthor>
<author key="2702784">Guo, MY</author>
<author key="7824345">Zhou, JY</author>
<author key="1199047">Chen, DX</author>
</authors>
<emails count="1">
<email>
<name>Ye, BL</name>
<email_addr>yebl@u-aizu.ac.jp</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>mutual anonymity</keyword>
<keyword>IP multicast</keyword>
<keyword>multi-proxy</keyword>
<keyword>file retrieval</keyword>
</keywords>
<reprint>
<rp_author>Ye, BL</rp_author>
<rp_address>Univ Aizu, Sch Engn &amp; Comp Sci, Aizu Wakamatsu 9658580, Japan</rp_address>
<rp_organization>Univ Aizu</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Engn &amp; Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Aizu Wakamatsu</rp_city>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">9658580</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Aizu, Sch Engn &amp; Comp Sci, Aizu Wakamatsu 9658580, Japan</rs_address>
<rs_organization>Univ Aizu</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Engn &amp; Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Aizu Wakamatsu</rs_city>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">9658580</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China</rs_address>
<rs_organization>Nanjing Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>State Key Lab Novel Software Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Nanjing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">210008</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A fundamental problem in a pure Peer-to-Peer (P2P) file sharing system is how to protect the anonymity of peer nodes when providing efficient data access services. Most of existing work mainly focus on how to provide the initiator anonymity, but neglect the anonymity of the responder. In this paper, we propose a multicast-based protocol, called Mapper, for efficient file sharing with mutual anonymity. By seamlessly combining the technologies of multi-proxy and IP multicast together, the proposed protocol guarantees mutual anonymity during the entire session of file retrieval. Furthermore, Mapper replicates requested files inside the multicast group, so file distribution can be adjusted adaptively and the cost for multicast can be further reduced. Results of both simulations and theoretical analyses demonstrate that Mapper possesses the merits of scalability, reliability, and high adaptability.</p>
</abstract>
<refs count="16">
<ref>137495156</ref>
<ref>148935654</ref>
<ref>42233798</ref>
<ref>122611837</ref>
<ref>137495158</ref>
<ref>130986614</ref>
<ref>108639759</ref>
<ref>130987062</ref>
<ref>126921048</ref>
<ref>133780110</ref>
<ref>120743221</ref>
<ref>133780112</ref>
<ref>148935655</ref>
<ref>128138416</ref>
<ref>130885001</ref>
<ref>148935656</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148931963" hot="yes" sortkey="3119956803" timescited="0" sharedrefs="0" inpi="false">
<item issue="148931902" recid="148931963" coverdate="200600" sortkey="3119956803" refkey="1505284" dbyear="2006">
<ut>000235594700007</ut>
<i_ckey>DAMO0103060045IB</i_ckey>
<i_cid>0109738516</i_cid>
<source_title>IBM SYSTEMS JOURNAL</source_title>
<source_abbrev>IBM SYST J</source_abbrev>
<item_title>High-performance systems of online server and the next generation games</item_title>
<sq>42020J0</sq>
<bib_id>45 (1): 103-118 2006</bib_id>
<bib_pages begin="103" end="118" pages="16">103-118</bib_pages>
<bib_issue year="2006" vol="45"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>D'Amora, B</primaryauthor>
<author key="4381901">Magerlein, K</author>
<author key="651469">Binstock, A</author>
<author key="5008595">Nanda, A</author>
<author key="7720728">Yee, B</author>
</authors>
<emails count="5">
<email>
<name>D'Amora, B</name>
<email_addr>damora@us.ibm.com</email_addr>
</email>
<email>
<name>Magerlein, K</name>
<email_addr>kmager@us.ibm.com</email_addr>
</email>
<email>
<name>Binstock, A</name>
<email_addr>atman.binstock@gmail.com</email_addr>
</email>
<email>
<name>Nanda, A</name>
<email_addr>ashwini@us.ibm.com</email_addr>
</email>
<email>
<name>Yee, B</name>
<email_addr>bernie@episodetech.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>D'Amora, B</rp_author>
<rp_address>Thomas J Watson Res Ctr, IBM Res Div, 19 Skyline Dr, Hawthorne, NY 10532 USA</rp_address>
<rp_organization>Thomas J Watson Res Ctr</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>IBM Res Div</rp_suborganization>
</rp_suborganizations>
<rp_street>19 Skyline Dr</rp_street>
<rp_city>Hawthorne</rp_city>
<rp_state>NY</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">10532</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Thomas J Watson Res Ctr, IBM Res Div, Hawthorne, NY 10532 USA</rs_address>
<rs_organization>Thomas J Watson Res Ctr</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>IBM Res Div</rs_suborganization>
</rs_suborganizations>
<rs_city>Hawthorne</rs_city>
<rs_state>NY</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">10532</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Episode Technol, S Nyack, NY 10960 USA</rs_address>
<rs_organization>Episode Technol</rs_organization>
<rs_city>S Nyack</rs_city>
<rs_state>NY</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">10960</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Developing a massively multiplayer online game which utilizes physically based simulation to provide realistic behaviors requires numerical integration functions with inherently high computational costs. This simulation, performed on the individual clients of a peer-to-peer networked game or for a client/server online game, presents challenges due to many factors, including limited computing resources at the client level and network latency in the propagation of a client's state to other clients. Computationally intensive simulation may adversely affect performance and result in a situation in which little processing capacity is left for other aspects of the game. in this paper, we explore how a game developer who is aware of these issues might create a game for IBM's recently announced Cell Broadband Engine (TM) processor; we also present an example of the development of a game in which multiple human and robotic characters interact with static and dynamic objects in a virtual environment. Although our experience suggests that porting code to the Cell Broadband Engine core with minimal use of its synergistic processing elements (SPEs) should not be expected to produce significant performance gains at this time, the potential of the Cell SPEs to improve performance is considerable. We discuss performance and design and implementation decisions, with programmability issues being especially noted.</p>
</abstract>
<refs count="10">
<ref>148931964</ref>
<ref>148931965</ref>
<ref>117649337</ref>
<ref>136580180</ref>
<ref>148931966</ref>
<ref>148931967</ref>
<ref>146261320</ref>
<ref>99409738</ref>
<ref>111847490</ref>
<ref>148931968</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148923566" hot="yes" sortkey="3119958736" timescited="0" sharedrefs="0" inpi="false">
<item issue="148923562" recid="148923566" coverdate="200601" sortkey="3119958736" refkey="1447964" dbyear="2006">
<ut>000235580900002</ut>
<i_ckey>CRAM0011060017EC</i_ckey>
<i_cid>0109718200</i_cid>
<source_title>EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS</source_title>
<source_abbrev>EUR T TELECOMMUN</source_abbrev>
<item_title>On the fundamental communication abstraction supplied by P2P overlay networks</item_title>
<sq>09164J0</sq>
<bib_id>17 (1): 11-19 JAN-FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1002/ett.1024</article_no>
</article_nos>
<bib_pages begin="11" end="19" pages="9">11-19</bib_pages>
<bib_issue year="2006" vol="17"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Cramer, C</primaryauthor>
<author key="2289551">Fuhrmann, T</author>
</authors>
<emails count="1">
<email>
<name>Cramer, C</name>
<email_addr>thomas.fuhrmann@ira.uka.de</email_addr>
</email>
</emails>
<reprint>
<rp_author>Fuhrmann, T</rp_author>
<rp_address>Univ Karlsruhe, Syst Architecture Grp, Kaiserstr 12, D-76128 Karlsruhe, Germany</rp_address>
<rp_organization>Univ Karlsruhe</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Syst Architecture Grp</rp_suborganization>
</rp_suborganizations>
<rp_street>Kaiserstr 12</rp_street>
<rp_city>Karlsruhe</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-76128</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Karlsruhe, Syst Architecture Grp, D-76128 Karlsruhe, Germany</rs_address>
<rs_organization>Univ Karlsruhe</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Syst Architecture Grp</rs_suborganization>
</rs_suborganizations>
<rs_city>Karlsruhe</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-76128</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="3">
<p>The disruptive advent of peer-to-peer (P2P) file sharing in 2000 attracted significant interest. P2P networks have matured from their initial form, unstructured overlays, to structured overlays like distributed hash tables (DHTs), which are considered state-of-the-art. There are huge efforts to improve their performance. Various P2P applications like distributed storage and application-layer multicast were proposed.</p>
<p>However, little effort was spent to understand the communication abstraction P2P overlays supply. Only when it is understood, the reach of P2P ideas will significantly broaden. Furthermore, this clarification reveals novel approaches and highlights future directions.</p>
<p>In this paper, we reconsider well-known P2P overlays, linking them to insights from distributed systems research. We conclude that the main communication abstraction is that of a virtual address space or application-specific naming. On this basis, P2P systems build a functional layer implementing, for example lookup, indirection and distributed processing. Our insights led us to identify interesting and unexplored points in the design space. Copyright (c) 2004 AEI.</p>
</abstract>
<refs count="29">
<ref>72297657</ref>
<ref>107214828</ref>
<ref>114066033</ref>
<ref>148923567</ref>
<ref>148923568</ref>
<ref>132500244</ref>
<ref>130911751</ref>
<ref>123110014</ref>
<ref>105482246</ref>
<ref>130408411</ref>
<ref>148923569</ref>
<ref>148923570</ref>
<ref>54771019</ref>
<ref>148923571</ref>
<ref>116318864</ref>
<ref>142602114</ref>
<ref>134864282</ref>
<ref>148923572</ref>
<ref>123110024</ref>
<ref>148923573</ref>
<ref>147349542</ref>
<ref>123110018</ref>
<ref>128138409</ref>
<ref>130352960</ref>
<ref>135158107</ref>
<ref>98886469</ref>
<ref>115410921</ref>
<ref>148923574</ref>
<ref>148923575</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148885555" hot="yes" sortkey="3119968538" timescited="0" sharedrefs="0" inpi="false">
<item issue="148885540" recid="148885555" coverdate="200511" sortkey="3119968538" refkey="4342716" dbyear="2006">
<ut>000235689900003</ut>
<i_ckey>MA H0720050036AH</i_ckey>
<i_cid>0109753772</i_cid>
<source_title>ADVANCES IN ENGINEERING SOFTWARE</source_title>
<source_abbrev>ADV ENG SOFTW</source_abbrev>
<item_title>Distribution and synchronisation of engineering information using active database technology</item_title>
<sq>10035J0</sq>
<bib_id>36 (11-12): 720-728 NOV-DEC 2005</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.advengsoft.2005.03.018</article_no>
</article_nos>
<bib_pages begin="720" end="728" pages="9">720-728</bib_pages>
<bib_issue year="2005" vol="36"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Ma, H</primaryauthor>
<author key="3402043">Johansson, H</author>
<author key="5273625">Orsborn, K</author>
</authors>
<emails count="1">
<email>
<name>Ma, H</name>
<email_addr>kjell.orsborn@it.uu.se</email_addr>
</email>
</emails>
<keywords count="7">
<keyword>engineering information</keyword>
<keyword>engineering collaborative work</keyword>
<keyword>active database management system</keyword>
<keyword>ECA database rule</keyword>
<keyword>synchronisation</keyword>
<keyword>distribution</keyword>
<keyword>peer-to-peer</keyword>
</keywords>
<keywords_plus count="4">
<keyword>PRODUCT DEVELOPMENT</keyword>
<keyword>ENVIRONMENT</keyword>
<keyword>DESIGN</keyword>
<keyword>SYSTEM</keyword>
</keywords_plus>
<reprint>
<rp_author>Orsborn, K</rp_author>
<rp_address>Uppsala Univ, Dept Informat Technol, Box 337, SE-75105 Uppsala, Sweden</rp_address>
<rp_organization>Uppsala Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Informat Technol</rp_suborganization>
</rp_suborganizations>
<rp_street>Box 337</rp_street>
<rp_city>Uppsala</rp_city>
<rp_country>Sweden</rp_country>
<rp_zips count="1">
<rp_zip location="BC">SE-75105</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Uppsala Univ, Dept Informat Technol, SE-75105 Uppsala, Sweden</rs_address>
<rs_organization>Uppsala Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Informat Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Uppsala</rs_city>
<rs_country>Sweden</rs_country>
<rs_zips count="1">
<rs_zip location="BC">SE-75105</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Lulea Univ Technol, Polhem Lab, Div Comp Aided Design, SE-87187 Lulea, Sweden</rs_address>
<rs_organization>Lulea Univ Technol</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Polhem Lab</rs_suborganization>
<rs_suborganization>Div Comp Aided Design</rs_suborganization>
</rs_suborganizations>
<rs_city>Lulea</rs_city>
<rs_country>Sweden</rs_country>
<rs_zips count="1">
<rs_zip location="BC">SE-87187</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Today, work collaboration is normal practice in developing modern products. Engineering collaborative work involves a number of team members that need to share and exchange design ideas while working with engineering analysis tools such as mechanical computer aided engineering systems. This work presents the M-Sync prototype system that uses an active database approach to enable exchange of engineering information among distributed team members in a timely manner. The distributed data is fully accessible by the local member and is automatically synchronised between different places using a database management system that support event-condition-action (ECA) database rules. Only updates introduced at one location are distributed to other locations, thereby minimizing information transfer and enhancing performance. Members working at different locations can therefore work in a peer-to-peer (P2P) manner and interactively manipulate the same set of information at the same time. (C) 2005 Civil-Comp Ltd and Elsevier Ltd. All rights reserved.</p>
</abstract>
<refs count="34">
<ref>148885556</ref>
<ref>115272296</ref>
<ref>114305840</ref>
<ref>103226372</ref>
<ref>115198382</ref>
<ref>117080563</ref>
<ref>120844155</ref>
<ref>148885557</ref>
<ref>105499796</ref>
<ref>148885558</ref>
<ref>105541080</ref>
<ref>148885559</ref>
<ref>148885560</ref>
<ref>121387673</ref>
<ref>148885561</ref>
<ref>148885562</ref>
<ref>130924935</ref>
<ref>148885563</ref>
<ref>120541747</ref>
<ref>119430881</ref>
<ref>131693382</ref>
<ref>148885564</ref>
<ref>125145897</ref>
<ref>124035211</ref>
<ref>103631041</ref>
<ref>74681903</ref>
<ref>148885565</ref>
<ref>106565188</ref>
<ref>148885566</ref>
<ref>111601434</ref>
<ref>125036992</ref>
<ref>95825382</ref>
<ref>81364102</ref>
<ref>148885567</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148877164" hot="yes" sortkey="3120011186" timescited="0" sharedrefs="0" inpi="false">
<item issue="148877160" recid="148877164" coverdate="200602" sortkey="3120011186" refkey="1205535" dbyear="2006">
<ut>000235383800002</ut>
<i_ckey>CHEN0017060006WM</i_ckey>
<i_cid>0109625790</i_cid>
<source_title>WIRELESS COMMUNICATIONS &amp; MOBILE COMPUTING</source_title>
<source_abbrev>WIREL COMMUN MOB COM</source_abbrev>
<item_title>A mobile service platform using proxy technology</item_title>
<sq>13804J0</sq>
<bib_id>6 (1): 17-34 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1002/wcm.240</article_no>
</article_nos>
<bib_pages begin="17" end="34" pages="18">17-34</bib_pages>
<bib_issue year="2006" vol="6"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Chen, MF</primaryauthor>
<author key="4192776">Lin, YB</author>
<author key="5734535">Rao, HCH</author>
<author key="7651701">Wu, Q</author>
</authors>
<emails count="1">
<email>
<name>Chen, MF</name>
<email_addr>liny@csie.nctu.edu.tw</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>mobile computing</keyword>
<keyword>peer-to-peer computing</keyword>
<keyword>proxy server</keyword>
<keyword>wireless network</keyword>
</keywords>
<reprint>
<rp_author>Lin, YB</rp_author>
<rp_address>Natl Chiao Tung Univ, Dept Comp Sci &amp; Informat Engn, Hsinchu 300, Taiwan</rp_address>
<rp_organization>Natl Chiao Tung Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Informat Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Hsinchu</rp_city>
<rp_country>Taiwan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">300</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Natl Chiao Tung Univ, Dept Comp Sci &amp; Informat Engn, Hsinchu 300, Taiwan</rs_address>
<rs_organization>Natl Chiao Tung Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Informat Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Hsinchu</rs_city>
<rs_country>Taiwan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">300</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Far EasTone Telecommun, Taipei 114, Taiwan</rs_address>
<rs_organization>Far EasTone Telecommun</rs_organization>
<rs_city>Taipei</rs_city>
<rs_country>Taiwan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">114</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper proposes iMobile, a proxy-based platform for developing mobile services for various mobile devices and wireless access technologies. iMobile acts as a message gateway that allows mobile devices to relay messages to each other through various protocols on different access networks. It allows mobile devices to access internet services, corporate databases and to control various network devices. iMobile implements three key abstractions: dev-let, info-let and app-let. An info-let provides abstract view of information space. An app-let implements service or application logic by processing information from various info-lets. A dev-let receives and sends messages through any particular protocols for mobile devices. The let engine supports user and device profiles for personalization and transcoding, and invokes proper app-lets and info-lets to answer requests from a dev-let. The Mobile modular architecture allows developers to write device drivers, information access methods and application logic independently from each other. Copyright (c) 2005 John Wiley &amp; Sons, Ltd.</p>
</abstract>
<refs count="37">
<ref>148877165</ref>
<ref>148877166</ref>
<ref>129346246</ref>
<ref>148877167</ref>
<ref>148877168</ref>
<ref>148877169</ref>
<ref>148877170</ref>
<ref>148877171</ref>
<ref>148877172</ref>
<ref>148877173</ref>
<ref>148877174</ref>
<ref>148877175</ref>
<ref>117942220</ref>
<ref>148877176</ref>
<ref>148877177</ref>
<ref>137391331</ref>
<ref>148877178</ref>
<ref>148877179</ref>
<ref>148877180</ref>
<ref>121443323</ref>
<ref>116320288</ref>
<ref>106829205</ref>
<ref>148877181</ref>
<ref>129292123</ref>
<ref>148877182</ref>
<ref>127195953</ref>
<ref>148877183</ref>
<ref>148877184</ref>
<ref>148877185</ref>
<ref>119119448</ref>
<ref>129346267</ref>
<ref>148877186</ref>
<ref>94864794</ref>
<ref>115349954</ref>
<ref>126816665</ref>
<ref>148877187</ref>
<ref>136445972</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148869962" hot="yes" sortkey="3120012731" timescited="0" sharedrefs="0" inpi="false">
<item issue="148869905" recid="148869962" coverdate="200602" sortkey="3120012731" refkey="5696092" dbyear="2006">
<ut>000235469000006</ut>
<i_ckey>RADI0591060062SP</i_ckey>
<i_cid>0109668238</i_cid>
<source_title>SOCIAL SCIENCE &amp; MEDICINE</source_title>
<source_abbrev>SOC SCI MED</source_abbrev>
<item_title>"To me, it's my life": Medical communication, trust, and activism in cyberspace</item_title>
<sq>88274J0</sq>
<bib_id>62 (3): 591-601 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.socscimed.2005.06.022</article_no>
</article_nos>
<bib_pages begin="591" end="601" pages="11">591-601</bib_pages>
<bib_issue year="2006" vol="62"/>
<doctype code="@">Article</doctype>
<editions full="SSCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Radin, P</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Radin, P</name>
<email_addr>kyra_landzelius@yahoo.com</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>breast cancer</keyword>
<keyword>virtual community</keyword>
<keyword>trust</keyword>
<keyword>self-help groups</keyword>
<keyword>Canada</keyword>
</keywords>
<keywords_plus count="3">
<keyword>BREAST-CANCER</keyword>
<keyword>INFORMATION NEEDS</keyword>
<keyword>WOMEN</keyword>
</keywords_plus>
<reprint>
<rp_author>Radin, P</rp_author>
<rp_address>Gothenburg Univ, Dept Sci &amp; Technol Studies, Box 510, S-40530 Gothenburg, Sweden</rp_address>
<rp_organization>Gothenburg Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Sci &amp; Technol Studies</rp_suborganization>
</rp_suborganizations>
<rp_street>Box 510</rp_street>
<rp_city>Gothenburg</rp_city>
<rp_country>Sweden</rp_country>
<rp_zips count="1">
<rp_zip location="BC">S-40530</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Calif State Univ, Hayward, CA USA</rs_address>
<rs_organization>Calif State Univ</rs_organization>
<rs_city>Hayward</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper studies the conversations and activities of an online support group for breast cancer Sufferers and survivors and their supporters. Using communications medium theory and social capital theory, it examines the mundane and profound exchanges, the poignant self-disclosures, the creative expressions of solidarity, and the minor but not-insignificant political actions of people-initially strangers-who come together as a 'virtuous circle,' not only to assist with medical issues but also to meet emotional and even material needs. Sponsored by the Canadian nonprofit organization Breast Cancer Action Nova Scotia (BCANS), this virtual community has logged over a half million messages since 1996. Not every BCANS participant is an activist-many are just trying to grapple with their disease but some find ways to shatter the professional "information monopoly," and to press for healthcare improvements. The study illustrates the scope, passion, and complexity of peer-to-peer medical communication in a virtual environment that promotes "thick trust". BCANS participants discuss with candor, warmth and even humor Such painful topics as death and dying and the crises in intimate relationships brought about by a terminal illness. The sharing of confidences and fears enables participants to pool their 'collective intelligence' about many things, from how to cope with swelling, to how to think about end-of-life issues, to how to improve social policy. (c) 2005 Elsevier Ltd. All rights reserved.</p>
</abstract>
<refs count="51">
<ref>130447596</ref>
<ref>105992988</ref>
<ref>148869963</ref>
<ref>96087380</ref>
<ref>95386292</ref>
<ref>103787592</ref>
<ref>117360831</ref>
<ref>148869964</ref>
<ref>148869965</ref>
<ref>103095825</ref>
<ref>119611536</ref>
<ref>100111282</ref>
<ref>121030387</ref>
<ref>106464970</ref>
<ref>105164011</ref>
<ref>148869966</ref>
<ref>148869967</ref>
<ref>101264452</ref>
<ref>4171150</ref>
<ref>102304633</ref>
<ref>148372550</ref>
<ref>101291360</ref>
<ref>104261442</ref>
<ref>116006553</ref>
<ref>94761059</ref>
<ref>91956973</ref>
<ref>94761047</ref>
<ref>108665373</ref>
<ref>9094063</ref>
<ref>116394564</ref>
<ref>103694125</ref>
<ref>106464977</ref>
<ref>95408985</ref>
<ref>148869968</ref>
<ref>148869969</ref>
<ref>148869970</ref>
<ref>58437097</ref>
<ref>114717183</ref>
<ref>148869971</ref>
<ref>86770823</ref>
<ref>114613845</ref>
<ref>98134269</ref>
<ref>102304636</ref>
<ref>112658737</ref>
<ref>70409758</ref>
<ref>73895062</ref>
<ref>95112639</ref>
<ref>109675524</ref>
<ref>134711398</ref>
<ref>148869972</ref>
<ref>89624526</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858194" hot="yes" sortkey="3120015168" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858194" coverdate="200603" sortkey="3120015168" refkey="2322786" dbyear="2006">
<ut>000235488900002</ut>
<i_ckey>GAET0149060063PR</i_ckey>
<i_cid>0109661397</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Analysis of resource transfers in peer-to-peer file sharing applications using fluid models</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 149-174 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.001</article_no>
</article_nos>
<bib_pages begin="149" end="174" pages="26">149-174</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Gaeta, R</primaryauthor>
<author key="2635214">Gribaudo, M</author>
<author key="4432915">Manini, D</author>
<author key="6316394">Sereno, M</author>
</authors>
<emails count="4">
<email>
<name>Gaeta, R</name>
<email_addr>rossano@di.unito.it</email_addr>
</email>
<email>
<name>Gribaudo, M</name>
<email_addr>marcog@di.unito.it</email_addr>
</email>
<email>
<name>Manini, D</name>
<email_addr>manini@di.unito.it</email_addr>
</email>
<email>
<name>Sereno, M</name>
<email_addr>matteo@di.unito.it</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>file sharing</keyword>
<keyword>stochastic fluid models</keyword>
<keyword>analytical model</keyword>
<keyword>transfer time distribution</keyword>
</keywords>
<keywords_plus count="2">
<keyword>TRANSIENT ANALYSIS</keyword>
<keyword>STOCHASTIC-THEORY</keyword>
</keywords_plus>
<reprint>
<rp_author>Gaeta, R</rp_author>
<rp_address>Univ Turin, Dipartimento Informat, Corso Svizzera 185, I-1049 Turin, Italy</rp_address>
<rp_organization>Univ Turin</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dipartimento Informat</rp_suborganization>
</rp_suborganizations>
<rp_street>Corso Svizzera 185</rp_street>
<rp_city>Turin</rp_city>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-1049</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Turin, Dipartimento Informat, I-1049 Turin, Italy</rs_address>
<rs_organization>Univ Turin</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Informat</rs_suborganization>
</rs_suborganizations>
<rs_city>Turin</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-1049</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred among peers is represented by a continuous quantity (the fluid level) whose flow rate is modulated by a set of discrete states representing the Concurrent. upload and download operations on the peers participating to the transfer. A transient solution of the model is then performed to compute the probability that a peer can download a given resource in less than t units of time as a function of several system parameters. In particular, the impact of file popularity, bandwidth characteristics, concurrent downloads and uploads, cooperation level among peers, and user behavior are included in our model specification.</p>
<p>We also provide numerical results timing at proving the potentialities of the approach we adopted as well as to investigate interesting issues related to the effect of incentive mechanisms on the user cooperation. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="35">
<ref>148858195</ref>
<ref>129797574</ref>
<ref>52916972</ref>
<ref>148858196</ref>
<ref>130911751</ref>
<ref>89232206</ref>
<ref>146305088</ref>
<ref>148858197</ref>
<ref>146305090</ref>
<ref>148858198</ref>
<ref>148858199</ref>
<ref>103907965</ref>
<ref>130987119</ref>
<ref>148858200</ref>
<ref>146305093</ref>
<ref>148858201</ref>
<ref>148858202</ref>
<ref>148858203</ref>
<ref>122611813</ref>
<ref>67168849</ref>
<ref>148858204</ref>
<ref>133716559</ref>
<ref>146305097</ref>
<ref>123110019</ref>
<ref>121836328</ref>
<ref>148858205</ref>
<ref>129515870</ref>
<ref>130494463</ref>
<ref>147843718</ref>
<ref>105593137</ref>
<ref>92649761</ref>
<ref>126581587</ref>
<ref>146305099</ref>
<ref>146305100</ref>
<ref>142504708</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858206" hot="yes" sortkey="3120015169" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858206" coverdate="200603" sortkey="3120015169" refkey="7706698" dbyear="2006">
<ut>000235488900003</ut>
<i_ckey>YANG0175060063PX</i_ckey>
<i_cid>0109661399</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Performance of peer-to-peer networks: Service capacity and role of resource sharing policies</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 175-194 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.005</article_no>
</article_nos>
<bib_pages begin="175" end="194" pages="20">175-194</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Yang, XY</primaryauthor>
<author key="1583273">de Veciana, G</author>
</authors>
<emails count="2">
<email>
<name>Yang, XY</name>
<email_addr>yangxy@ece.utexas.edu</email_addr>
</email>
<email>
<name>de Veciana, G</name>
<email_addr>gustavo@ece.utexas.edu</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>file sharing</keyword>
<keyword>service capacity</keyword>
<keyword>incentive</keyword>
<keyword>fairness</keyword>
</keywords>
<reprint>
<rp_author>Yang, XY</rp_author>
<rp_address>Univ Texas, ECE Dept, Austin, TX 78712 USA</rp_address>
<rp_organization>Univ Texas</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>ECE Dept</rp_suborganization>
</rp_suborganizations>
<rp_city>Austin</rp_city>
<rp_state>TX</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">78712</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Texas, ECE Dept, Austin, TX 78712 USA</rs_address>
<rs_organization>Univ Texas</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>ECE Dept</rs_suborganization>
</rs_suborganizations>
<rs_city>Austin</rs_city>
<rs_state>TX</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">78712</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper we model and Study the performance of peer-to-peer (P2P) file sharing systems in terms of their service capacity'. We identify two regimes of interest: the transient and stationary regimes. We show that in both regimes, the performance of P2P systems exhibits a favorable scaling with the offered load. P2P systems achieve this by efficiently leveraging the service capacity of other peers, who possibly are concurrently downloading the same file. Therefore to improve the performance, it is important to design mechanisms to give peers incentives for sharing/cooperation. One approach is to introduce mechanisms for resource allocation that are 'fair', such that a peer's performance improves with his contributions. We find that some intuitive 'fairness' notions may unexpectedly lead to 'unfair' allocations, which do not provide the right incentives for peers. Thus, implementation of P2P systems may want to compromise the degree of 'fairness' in favor of maintaining system robustness and reducing overheads. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="18">
<ref>148858207</ref>
<ref>23759122</ref>
<ref>127841796</ref>
<ref>136011815</ref>
<ref>148858208</ref>
<ref>148858209</ref>
<ref>148858210</ref>
<ref>104493661</ref>
<ref>136011818</ref>
<ref>148858211</ref>
<ref>148858212</ref>
<ref>148858213</ref>
<ref>148858214</ref>
<ref>130832146</ref>
<ref>123110019</ref>
<ref>121836328</ref>
<ref>132558295</ref>
<ref>148858215</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858216" hot="yes" sortkey="3120015170" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858216" coverdate="200603" sortkey="3120015170" refkey="6368448" dbyear="2006">
<ut>000235488900004</ut>
<i_ckey>SHEN0195060063PH</i_ckey>
<i_cid>0109661401</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Cycloid: A constant-degree and lookup-efficient P2P overlay network</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 195-216 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.004</article_no>
</article_nos>
<bib_pages begin="195" end="216" pages="22">195-216</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Shen, HY</primaryauthor>
<author key="7670418">Xu, CZ</author>
<author key="1200039">Chen, GH</author>
</authors>
<emails count="3">
<email>
<name>Shen, HY</name>
<email_addr>shy@ece.eng.wayne.edu</email_addr>
</email>
<email>
<name>Xu, CZ</name>
<email_addr>czxu@ece.eng.wayne.edu</email_addr>
</email>
<email>
<name>Chen, GH</name>
<email_addr>gchen@nju.edu.cn</email_addr>
</email>
</emails>
<keywords count="6">
<keyword>Cycloid</keyword>
<keyword>peer-to-peer</keyword>
<keyword>Viceroy</keyword>
<keyword>Koorde</keyword>
<keyword>distributed hash table</keyword>
<keyword>constant-degree DHT</keyword>
</keywords>
<reprint>
<rp_author>Xu, CZ</rp_author>
<rp_address>Wayne State Univ, Dept Elect &amp; Comp Engn, Detroit, MI 48202 USA</rp_address>
<rp_organization>Wayne State Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Detroit</rp_city>
<rp_state>MI</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">48202</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Wayne State Univ, Dept Elect &amp; Comp Engn, Detroit, MI 48202 USA</rs_address>
<rs_organization>Wayne State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Detroit</rs_city>
<rs_state>MI</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">48202</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China</rs_address>
<rs_organization>Nanjing Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>State Key Lab Novel Software Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Nanjing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">210008</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>There are many structured P2P systems that use DHT technologies to map data items onto the nodes in various ways for scalable routing and location. Most of the systems require 0(log it) hops per lookup request with 0(log it) neighbors per node, where n is the network size. In this paper, we present a constant-degree P2P architecture, namely Cycloid, which emulates a cube-connected cycles (CCC) graph in the routing of lookup requests. It achieves a time complexity of O(d) per lookup request by using O(l) neighbors per node, where n = d x 2(d). We compare Cycloid with other two constant-degree systems, Viceroy and Koorde in various architectural aspects via simulation. Simulation results show that Cycloid has more advantages for large scale and dynamic systems that have frequent node arrivals and departures. In particular, Cycloid delivers a higher location efficiency in the average case and exhibits a more balanced distribution of keys and query loads between the node.,,. (D (C) 2005 Elsevier B.V. All Rights Reserved.</p>
</abstract>
<refs count="20">
<ref>128705970</ref>
<ref>72536169</ref>
<ref>148858217</ref>
<ref>121103580</ref>
<ref>126332097</ref>
<ref>85131525</ref>
<ref>148858218</ref>
<ref>148858219</ref>
<ref>148858220</ref>
<ref>131684154</ref>
<ref>128138421</ref>
<ref>111651653</ref>
<ref>42999528</ref>
<ref>148858221</ref>
<ref>128138422</ref>
<ref>148858222</ref>
<ref>128939454</ref>
<ref>148858223</ref>
<ref>130987067</ref>
<ref>128939464</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858224" hot="yes" sortkey="3120015171" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858224" coverdate="200603" sortkey="3120015171" refkey="6780127" dbyear="2006">
<ut>000235488900005</ut>
<i_ckey>SURA0217060063PS</i_ckey>
<i_cid>0109661403</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Load balancing in dynamic structured peer-to-peer systems</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 217-240 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.003</article_no>
</article_nos>
<bib_pages begin="217" end="240" pages="24">217-240</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Surana, S</primaryauthor>
<author key="2502960">Godfrey, B</author>
<author key="3955989">Lakshminarayanan, K</author>
<author key="3538823">Karp, R</author>
<author key="6706233">Stoica, I</author>
</authors>
<emails count="5">
<email>
<name>Surana, S</name>
<email_addr>sonesh@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Godfrey, B</name>
<email_addr>pbg@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Lakshminarayanan, K</name>
<email_addr>karthik@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Karp, R</name>
<email_addr>karp@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Stoica, I</name>
<email_addr>istoica@cs.berkeley.edu</email_addr>
</email>
</emails>
<keywords count="3">
<keyword>dynamic load balancing</keyword>
<keyword>structured peer-to-peer</keyword>
<keyword>distributed hash table</keyword>
</keywords>
<reprint>
<rp_author>Surana, S</rp_author>
<rp_address>Univ Calif Berkeley, Div Comp Sci, Berkeley, CA 94720 USA</rp_address>
<rp_organization>Univ Calif Berkeley</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Div Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Berkeley</rp_city>
<rp_state>CA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">94720</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Calif Berkeley, Div Comp Sci, Berkeley, CA 94720 USA</rs_address>
<rs_organization>Univ Calif Berkeley</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Div Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Berkeley</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">94720</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>Most P2P systems that provide a DHT abstraction distribute objects randomly among "peer nodes" in a way that results in some nodes having Theta(log N) times as many objects as the average node. Further imbalance may result due to nonuniform distribution of objects in the identifier space and a high degree of heterogeneity in object loads and node capacities. Additionally, a node's load may vary greatly over time since the system can experience continuous insertions and deletions of objects, skewed object arrival patterns, and continuous arrival and departure of nodes.</p>
<p>In this paper, we propose an algorithm for load balancing in such heterogeneous, dynamic P2P systems. Our simulation results show that in the face of rapid arrivals and departures of objects of widely varying load, our algorithm improves load balance by more than an order of magnitude for system utilizations as high as 80% while incurring an overhead of only about 6%. We also show that our distributed algorithm performs only negligibly worse than a similar centralized algorithm, and that node heterogeneity helps, not hurts, the scalability of our algorithm. Although many of these results are dependent on the workload, we believe the efficiency and performance improvement demonstrated over the case of no load balancing shows that our technique holds promise for deployed systems. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="27">
<ref>143035403</ref>
<ref>148858225</ref>
<ref>148858226</ref>
<ref>112864889</ref>
<ref>148858227</ref>
<ref>148858228</ref>
<ref>148858229</ref>
<ref>135344107</ref>
<ref>148858230</ref>
<ref>148858231</ref>
<ref>137280622</ref>
<ref>148858232</ref>
<ref>148858233</ref>
<ref>148858234</ref>
<ref>148858235</ref>
<ref>148858236</ref>
<ref>143035409</ref>
<ref>148858237</ref>
<ref>122611833</ref>
<ref>148858238</ref>
<ref>130950544</ref>
<ref>148858239</ref>
<ref>123110037</ref>
<ref>148858240</ref>
<ref>131684136</ref>
<ref>108536709</ref>
<ref>148858241</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858242" hot="yes" sortkey="3120015172" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858242" coverdate="200603" sortkey="3120015172" refkey="2482069" dbyear="2006">
<ut>000235488900006</ut>
<i_ckey>GKAN0241060063PC</i_ckey>
<i_cid>0109661405</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Random walks in peer-to-peer networks: Algorithms and evaluation</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 241-263 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.002</article_no>
</article_nos>
<bib_pages begin="241" end="263" pages="23">241-263</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Gkantsidis, C</primaryauthor>
<author key="4726705">Mihail, M</author>
<author key="6044435">Saberi, A</author>
</authors>
<emails count="3">
<email>
<name>Gkantsidis, C</name>
<email_addr>gantsich@cc.gatech.edu</email_addr>
</email>
<email>
<name>Mihail, M</name>
<email_addr>mihail@cc.gatech.edu</email_addr>
</email>
<email>
<name>Saberi, A</name>
<email_addr>saberi@cc.gatech.edu</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer networks</keyword>
<keyword>statistics</keyword>
<keyword>random walks</keyword>
<keyword>graph theory</keyword>
</keywords>
<keywords_plus count="1">
<keyword>WEB</keyword>
</keywords_plus>
<reprint>
<rp_author>Gkantsidis, C</rp_author>
<rp_address>Georgia Inst Technol, Coll Comp, 801 Atlantic Dr, Atlanta, GA 30332 USA</rp_address>
<rp_organization>Georgia Inst Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Coll Comp</rp_suborganization>
</rp_suborganizations>
<rp_street>801 Atlantic Dr</rp_street>
<rp_city>Atlanta</rp_city>
<rp_state>GA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">30332</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA</rs_address>
<rs_organization>Georgia Inst Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp</rs_suborganization>
</rs_suborganizations>
<rs_city>Atlanta</rs_city>
<rs_state>GA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">30332</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>We quantify the effectiveness of random walks for searching and construction of unstructured peer-to-peer (P2P) networks. We have identified two cases where the use of random walks for searching achieves better results than flooding: (a) when the overlay topology is clustered, and (b) when a client re-issues the same query while its horizon does not change much. Related to the Simulation of random walks is also the distributed computation of aggregates, such as averaging. For construction, we argue that an expander can be maintained dynamically with constant operations per addition. The key technical ingredient Of Our approach is a deep result of stochastic processes indicating that samples taken from consecutive steps of a random walk on an expander graph can achieve statistical properties similar to independent sampling. This property has been previously used in complexity theory for construction of pseudorandom number generators. We reveal another facet of this theory and translate savings in random bits to savings in processing overhead. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="41">
<ref>122012124</ref>
<ref>105294190</ref>
<ref>68394201</ref>
<ref>148858243</ref>
<ref>119623286</ref>
<ref>112080970</ref>
<ref>131693314</ref>
<ref>131693315</ref>
<ref>148858244</ref>
<ref>69881161</ref>
<ref>115438124</ref>
<ref>148858245</ref>
<ref>148858246</ref>
<ref>129783386</ref>
<ref>125248731</ref>
<ref>148858247</ref>
<ref>14607244</ref>
<ref>43959186</ref>
<ref>148858248</ref>
<ref>148858249</ref>
<ref>148858250</ref>
<ref>148858251</ref>
<ref>148858252</ref>
<ref>72062339</ref>
<ref>103462193</ref>
<ref>148858253</ref>
<ref>137280666</ref>
<ref>110303407</ref>
<ref>148858254</ref>
<ref>148858255</ref>
<ref>148858256</ref>
<ref>148858257</ref>
<ref>148858258</ref>
<ref>148858259</ref>
<ref>92289346</ref>
<ref>121684237</ref>
<ref>134865390</ref>
<ref>148858260</ref>
<ref>148858261</ref>
<ref>148858262</ref>
<ref>11491870</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148839096" hot="yes" sortkey="3120021567" timescited="0" sharedrefs="0" inpi="false">
<item issue="148839032" recid="148839096" coverdate="200602" sortkey="3120021567" refkey="7803997" dbyear="2006">
<ut>000235394700007</ut>
<i_ckey>ZHAN0069060038JG</i_ckey>
<i_cid>0109627984</i_cid>
<source_title>JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY</source_title>
<source_abbrev>J RES PRACT INF TECH</source_abbrev>
<item_title>Cooperative defence against DDoS attacks</item_title>
<sq>13338J0</sq>
<bib_id>38 (1): 69-84 FEB 2006</bib_id>
<bib_pages begin="69" end="84" pages="16">69-84</bib_pages>
<bib_issue year="2006" vol="38"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Zhang, GS</primaryauthor>
<author key="5357224">Parashar, M</author>
</authors>
<emails count="2">
<email>
<name>Zhang, GS</name>
<email_addr>gszhang@caip.rutgers.edu</email_addr>
</email>
<email>
<name>Parashar, M</name>
<email_addr>parashar@caip.rutgers.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Zhang, GS</rp_author>
<rp_address>Rutgers State Univ, Dept Elect &amp; Comp Engn, 628 CORE,94 Brett Rd, Piscataway, NJ 08854 USA</rp_address>
<rp_organization>Rutgers State Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>628 CORE,94 Brett Rd</rp_street>
<rp_city>Piscataway</rp_city>
<rp_state>NJ</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">08854</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Rutgers State Univ, Dept Elect &amp; Comp Engn, Piscataway, NJ 08854 USA</rs_address>
<rs_organization>Rutgers State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Piscataway</rs_city>
<rs_state>NJ</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">08854</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defend against distributed denial of service attacks by coordinating across the Internet. Unlike traditional IDS, we detect and stop DDoS attacks within the intermediate network. In the proposed approach, DDoS defence systems are deployed in the network to detect DDoS attacks independently. A gossip based communication mechanism is used to exchange information about network attacks between these independent detection nodes to aggregate information about the overall network attacks observed. Using the aggregated information, the individual defence nodes have approximate information about global network attacks and can stop them more effectively and accurately. To provide reliable, rapid and widespread dissemination of attack information, the system is built as a peer to peer overlay network on top of the internet.</p>
</abstract>
<refs count="21">
<ref>148839097</ref>
<ref>126920862</ref>
<ref>148839098</ref>
<ref>148839099</ref>
<ref>134532710</ref>
<ref>131537327</ref>
<ref>148839100</ref>
<ref>131095002</ref>
<ref>148839101</ref>
<ref>148839102</ref>
<ref>148839103</ref>
<ref>143571897</ref>
<ref>133618487</ref>
<ref>148770828</ref>
<ref>148839104</ref>
<ref>125585353</ref>
<ref>147203366</ref>
<ref>145846470</ref>
<ref>148839105</ref>
<ref>120443918</ref>
<ref>148839106</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148749916" hot="yes" sortkey="3120075879" timescited="0" sharedrefs="0" inpi="false">
<item issue="148749914" recid="148749916" coverdate="200602" sortkey="3120075879" refkey="315871" dbyear="2006">
<ut>000235260700002</ut>
<i_ckey>AWAN0115060032PA</i_ckey>
<i_cid>0109567474</i_cid>
<source_title>PARALLEL COMPUTING</source_title>
<source_abbrev>PARALLEL COMPUT</source_abbrev>
<item_title>Unstructured peer-to-peer networks for sharing processor cycles</item_title>
<sq>06294J0</sq>
<bib_id>32 (2): 115-135 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.parco.2005.09.002</article_no>
</article_nos>
<bib_pages begin="115" end="135" pages="21">115-135</bib_pages>
<bib_issue year="2006" vol="32"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Awan, A</primaryauthor>
<author key="2110809">Ferreira, RA</author>
<author key="3328086">Jagannathan, S</author>
<author key="2592350">Grama, A</author>
</authors>
<emails count="4">
<email>
<name>Awan, A</name>
<email_addr>awan@cs.purdue.edu</email_addr>
</email>
<email>
<name>Ferreira, RA</name>
<email_addr>rf@cs.purdue.edu</email_addr>
</email>
<email>
<name>Jagannathan, S</name>
<email_addr>suresh@cs.purdue.edu</email_addr>
</email>
<email>
<name>Grama, A</name>
<email_addr>ayg@cs.purdue.edu</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>unstructured peer-to-peer networks</keyword>
<keyword>distributed randomized algorithms</keyword>
<keyword>distributed cycle sharing</keyword>
<keyword>load balancing</keyword>
</keywords>
<reprint>
<rp_author>Awan, A</rp_author>
<rp_address>Purdue Univ, Dept Comp Sci, 250 N Univ St, W Lafayette, IN 47907 USA</rp_address>
<rp_organization>Purdue Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>250 N Univ St</rp_street>
<rp_city>W Lafayette</rp_city>
<rp_state>IN</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">47907</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA</rs_address>
<rs_organization>Purdue Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>W Lafayette</rs_city>
<rs_state>IN</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">47907</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Motivated by the needs and success of projects such as SETI@home and genome@home, we propose an architecture for a sustainable large-scale peer-to-peer environment for distributed cycle sharing among Internet hosts. Such networks are characterized by highly dynamic state due to high arrival and departure rates. This makes it difficult to build and maintain structured networks and to use state-based resource allocation techniques. We build our system to work in an environment similar to Current file-sharing networks such as Gnutella and Freenet. In doing so, we are able to leverage vast network resources while providing resilience to random failures, low network overhead, and an open architecture for resource brokering. This paper describes the underlying analytical and algorithmic substrates based on randomization for job distribution, replication, monitoring, aggregation and oblivious resource sharing and communication between participating hosts. We support our claims of robustness and scalability analytically with high probabilistic guarantees. Our algorithms do not introduce any state dependencies, and hence Lire resilient to dynamic node arrivals, departures, and failures. We Support all analytical claims with a detailed simulation-based evaluation of our distributed framework. (c) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="20">
<ref>148749917</ref>
<ref>148749918</ref>
<ref>148749919</ref>
<ref>143848864</ref>
<ref>100673729</ref>
<ref>148749920</ref>
<ref>18098686</ref>
<ref>121046262</ref>
<ref>57032611</ref>
<ref>131223710</ref>
<ref>148749921</ref>
<ref>107649319</ref>
<ref>148749922</ref>
<ref>851180</ref>
<ref>92289346</ref>
<ref>148613613</ref>
<ref>137283592</ref>
<ref>131232377</ref>
<ref>123110037</ref>
<ref>148749923</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148707735" hot="yes" sortkey="3120087777" timescited="0" sharedrefs="0" inpi="false">
<item issue="148707518" recid="148707735" coverdate="200500" sortkey="3120087777" refkey="4779642" dbyear="2006">
<ut>000234880300025</ut>
<i_ckey>MISR0322053803LJ</i_ckey>
<i_cid>0109527609</i_cid>
<source_title>INFORMATION SYSTEMS SECURITY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>SPEAR: Design of a secured peer-to-peer architecture</item_title>
<sq>B4415B0</sq>
<bib_id>3803: 322-327 2005</bib_id>
<bib_pages begin="322" end="327" pages="6">322-327</bib_pages>
<bib_issue year="2005" vol="3803"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Misra, J</primaryauthor>
<author key="5327386">Pal, P</author>
<author key="344510">Bagchi, A</author>
</authors>
<emails count="3">
<email>
<name>Misra, J</name>
<email_addr>jsm02@rediffmail.com</email_addr>
</email>
<email>
<name>Pal, P</name>
<email_addr>pinak@isical.ac.in</email_addr>
</email>
<email>
<name>Bagchi, A</name>
<email_addr>aditya@isical.ac.in</email_addr>
</email>
</emails>
<reprint>
<rp_author>Misra, J</rp_author>
<rp_address>W Bengal Univ Technol, Kolaghat Engn Coll, Calcutta, W Bengal, India</rp_address>
<rp_organization>W Bengal Univ Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Kolaghat Engn Coll</rp_suborganization>
</rp_suborganizations>
<rp_city>Calcutta</rp_city>
<rp_state>W Bengal</rp_state>
<rp_country>India</rp_country>
</reprint>
<research_addrs count="2">
<research>
<rs_address>W Bengal Univ Technol, Kolaghat Engn Coll, Calcutta, W Bengal, India</rs_address>
<rs_organization>W Bengal Univ Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Kolaghat Engn Coll</rs_suborganization>
</rs_suborganizations>
<rs_city>Calcutta</rs_city>
<rs_state>W Bengal</rs_state>
<rs_country>India</rs_country>
</research>
<research>
<rs_address>Indian Stat Inst, Calcutta 700108, W Bengal, India</rs_address>
<rs_organization>Indian Stat Inst</rs_organization>
<rs_city>Calcutta</rs_city>
<rs_state>W Bengal</rs_state>
<rs_country>India</rs_country>
<rs_zips count="1">
<rs_zip location="AC">700108</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="N"/>
<refs count="10">
<ref>148707736</ref>
<ref>148707737</ref>
<ref>145914589</ref>
<ref>148707738</ref>
<ref>148707739</ref>
<ref>148707740</ref>
<ref>148707741</ref>
<ref>142001191</ref>
<ref>148707742</ref>
<ref>132480098</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148700439" hot="yes" sortkey="3120089150" timescited="0" sharedrefs="0" inpi="false">
<item issue="148700386" recid="148700439" coverdate="200603" sortkey="3120089150" refkey="6870288" dbyear="2006">
<ut>000235219400005</ut>
<i_ckey>TANI0091060010GE</i_ckey>
<i_cid>0109532886</i_cid>
<source_title>GEOINFORMATICA</source_title>
<source_abbrev>GEOINFORMATICA</source_abbrev>
<item_title>Building and querying a P2P virtual world</item_title>
<sq>13718J0</sq>
<bib_id>10 (1): 91-116 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1007/s10707-005-4887-8</article_no>
</article_nos>
<bib_pages begin="91" end="116" pages="26">91-116</bib_pages>
<bib_issue year="2006" vol="10"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Tanin, E</primaryauthor>
<author key="2857219">Harwood, A</author>
<author key="6090819">Samet, H</author>
<author key="5034364">Nayar, D</author>
<author key="5165039">Nutanong, S</author>
</authors>
<emails count="2">
<email>
<name>Tanin, E</name>
<email_addr>egemen@cs.mu.OZ.AU</email_addr>
</email>
<email>
<name>Harwood, A</name>
<email_addr>hjs@cs.umd.edu</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer</keyword>
<keyword>octree</keyword>
<keyword>virtual-worlds</keyword>
<keyword>spatial data</keyword>
</keywords>
<reprint>
<rp_author>Tanin, E</rp_author>
<rp_address>Univ Melbourne, NICTA Victoria Lab, Dept Comp Sci &amp; Software Engn, Parkville, Vic 3052, Australia</rp_address>
<rp_organization>Univ Melbourne</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>NICTA Victoria Lab</rp_suborganization>
<rp_suborganization>Dept Comp Sci &amp; Software Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Parkville</rp_city>
<rp_state>Vic</rp_state>
<rp_country>Australia</rp_country>
<rp_zips count="1">
<rp_zip location="AP">3052</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Melbourne, NICTA Victoria Lab, Dept Comp Sci &amp; Software Engn, Parkville, Vic 3052, Australia</rs_address>
<rs_organization>Univ Melbourne</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>NICTA Victoria Lab</rs_suborganization>
<rs_suborganization>Dept Comp Sci &amp; Software Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Parkville</rs_city>
<rs_state>Vic</rs_state>
<rs_country>Australia</rs_country>
<rs_zips count="1">
<rs_zip location="AP">3052</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Maryland, Inst Adv Comp Studies, Ctr Automat Res, Dept Comp Sci, College Pk, MD 20742 USA</rs_address>
<rs_organization>Univ Maryland</rs_organization>
<rs_suborganizations count="3">
<rs_suborganization>Inst Adv Comp Studies</rs_suborganization>
<rs_suborganization>Ctr Automat Res</rs_suborganization>
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>College Pk</rs_city>
<rs_state>MD</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">20742</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-Peer (P2P) systems are known to provide excellent scalability in a networked environment. One peer is introduced to the system by each participant. However current P2P applications can only provide file sharing and other forms of relatively simple data communications, and, in this paper, we demonstrate how this limitation can be bridged by indexing and querying a 3D virtual-world on a dynamic distributed network. We present an algorithm for 3D range queries as well as an algorithm for nearest neighbor queries. We also show how to build such a complex application from the ground level of a P2P routing algorithm.</p>
</abstract>
<refs count="31">
<ref>148700440</ref>
<ref>120630683</ref>
<ref>137128806</ref>
<ref>144571475</ref>
<ref>148700441</ref>
<ref>143992786</ref>
<ref>73398212</ref>
<ref>148700442</ref>
<ref>148700443</ref>
<ref>122611830</ref>
<ref>148700444</ref>
<ref>146832769</ref>
<ref>65692799</ref>
<ref>148700445</ref>
<ref>132361522</ref>
<ref>109420759</ref>
<ref>148700446</ref>
<ref>125486573</ref>
<ref>148052932</ref>
<ref>109420756</ref>
<ref>123110024</ref>
<ref>99692045</ref>
<ref>127960302</ref>
<ref>71515506</ref>
<ref>148700447</ref>
<ref>95087561</ref>
<ref>106599678</ref>
<ref>123110037</ref>
<ref>148700448</ref>
<ref>148700449</ref>
<ref>148700450</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148699015" hot="yes" sortkey="3120089546" timescited="0" sharedrefs="0" inpi="false">
<item issue="148698800" recid="148699015" coverdate="200500" sortkey="3120089546" refkey="5455669" dbyear="2006" dbweek="08">
<ut>000234885800034</ut>
<i_ckey>PERI0420053821LS</i_ckey>
<i_cid>0109541050</i_cid>
<source_title>FSTTCS 2005: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Monitoring stable properties in dynamic. Peer-to-peer distributed systems</item_title>
<sq>B4423B0</sq>
<bib_id>3821: 420-431 2005</bib_id>
<bib_pages begin="420" end="431" pages="12">420-431</bib_pages>
<bib_issue year="2005" vol="3821"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Peri, S</primaryauthor>
<author key="4789644">Mittal, N</author>
</authors>
<emails count="2">
<email>
<name>Peri, S</name>
<email_addr>sathya.p@student.utdallas.edu</email_addr>
</email>
<email>
<name>Mittal, N</name>
<email_addr>neerajm@utdallas.edu</email_addr>
</email>
</emails>
<keywords_plus count="4">
<keyword>TERMINATION DETECTION</keyword>
<keyword>DEADLOCK DETECTION</keyword>
<keyword>OPTIMAL ALGORITHM</keyword>
<keyword>SNAPSHOTS</keyword>
</keywords_plus>
<reprint>
<rp_author>Peri, S</rp_author>
<rp_address>Univ Texas, Dept Comp Sci, Richardson, TX 75083 USA</rp_address>
<rp_organization>Univ Texas</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Richardson</rp_city>
<rp_state>TX</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">75083</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Texas, Dept Comp Sci, Richardson, TX 75083 USA</rs_address>
<rs_organization>Univ Texas</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Richardson</rs_city>
<rs_state>TX</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">75083</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>Monitoring a distributed system to detect a stable property is an important problem with many applications. The problem is especially challenging for a dynamic distributed system because the set of processes in the system may change with time. In this paper, we present an efficient algorithm to determine whether a stable property has become true in a system in which processes can join and depart the system at any time. Our algorithm is based on maintaining a spanning tree of processes that are currently part of the system. The spanning tree, which is dynamically changing, is used to periodically collect local states of processes such that: (1) all local states in the collection axe consistent with each other, and (2) the collection is complete, that is, it contains all local states that are necessary to evaluate the property and derive meaningful inferences about the system state.</p>
<p>Unlike existing algorithms for stable property detection in a dynamic environment, our algorithm is general in the sense that it can be used to evaluate any stable property. Further, it does not assume the existence of any permanent process. Processes can join and leave the system while the snapshot algorithm is in progress.</p>
</abstract>
<refs count="18">
<ref>87875043</ref>
<ref>148699016</ref>
<ref>50804807</ref>
<ref>55225197</ref>
<ref>53838884</ref>
<ref>148699017</ref>
<ref>99779994</ref>
<ref>41054233</ref>
<ref>44283087</ref>
<ref>47475302</ref>
<ref>62905026</ref>
<ref>61476837</ref>
<ref>34820797</ref>
<ref>88974853</ref>
<ref>148699018</ref>
<ref>42165135</ref>
<ref>88974856</ref>
<ref>137128798</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148689789" hot="yes" sortkey="3120092166" timescited="0" sharedrefs="0" inpi="false">
<item issue="148689737" recid="148689789" coverdate="200512" sortkey="3120092166" refkey="1476949" dbyear="2006">
<ut>000235236600007</ut>
<i_ckey>CRUZ0245050013EI</i_ckey>
<i_cid>0109554040</i_cid>
<source_title>ENGINEERING INTELLIGENT SYSTEMS FOR ELECTRICAL ENGINEERING AND COMMUNICATIONS</source_title>
<source_abbrev>ENG INTELL SYST ELEC</source_abbrev>
<item_title>The role of ontologies in data integration</item_title>
<sq>11379J0</sq>
<bib_id>13 (4): 245-252 DEC 2005</bib_id>
<bib_pages begin="245" end="252" pages="8">245-252</bib_pages>
<bib_issue year="2005" vol="13"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Cruz, IF</primaryauthor>
<author key="7665890">Xiao, HY</author>
</authors>
<emails count="2">
<email>
<name>Cruz, IF</name>
<email_addr>ifc@cs.uic.edu</email_addr>
</email>
<email>
<name>Xiao, HY</name>
<email_addr>hxiao@cs.uic.edu</email_addr>
</email>
</emails>
<keywords count="3">
<keyword>ontologies</keyword>
<keyword>data integration</keyword>
<keyword>central and peer to peer integration</keyword>
</keywords>
<reprint>
<rp_author>Cruz, IF</rp_author>
<rp_address>Univ Illinois, Dept Comp Sci, ADVIS Lab, Chicago, IL 60607 USA</rp_address>
<rp_organization>Univ Illinois</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
<rp_suborganization>ADVIS Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Chicago</rp_city>
<rp_state>IL</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">60607</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Illinois, Dept Comp Sci, ADVIS Lab, Chicago, IL 60607 USA</rs_address>
<rs_organization>Univ Illinois</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
<rs_suborganization>ADVIS Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Chicago</rs_city>
<rs_state>IL</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">60607</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we discuss the use of ontologies for data integration. We consider two different settings depending on the system architecture: central and peer-to-peer data integration. Within those settings, we discuss five different cases studies that illustrate the use of ontologies in metadata representation, in global conceptualization, in high-level querying, in declarative mediation, and in mapping support. Each case study is described in detail and accompanied by examples.</p>
</abstract>
<refs count="25">
<ref>132482519</ref>
<ref>131693401</ref>
<ref>148689790</ref>
<ref>148185635</ref>
<ref>148689791</ref>
<ref>148689792</ref>
<ref>148185636</ref>
<ref>148689793</ref>
<ref>148689794</ref>
<ref>148689795</ref>
<ref>134471010</ref>
<ref>116809326</ref>
<ref>85373841</ref>
<ref>97357399</ref>
<ref>121586430</ref>
<ref>131194754</ref>
<ref>130986337</ref>
<ref>102218901</ref>
<ref>130832179</ref>
<ref>119119338</ref>
<ref>123177688</ref>
<ref>109191805</ref>
<ref>134950577</ref>
<ref>148689796</ref>
<ref>148689797</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148688641" hot="yes" sortkey="3120092321" timescited="0" sharedrefs="0" inpi="false">
<item issue="148688543" recid="148688641" coverdate="200500" sortkey="3120092321" refkey="2859304" dbyear="2006">
<ut>000234793700019</ut>
<i_ckey>HASE0172053820LM</i_ckey>
<i_cid>0109527064</i_cid>
<source_title>EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Elimination of non-deterministic delays in a real-time database system</item_title>
<sq>B4350B0</sq>
<bib_id>3820: 172-185 2005</bib_id>
<bib_pages begin="172" end="185" pages="14">172-185</bib_pages>
<bib_issue year="2005" vol="3820"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Hasegawa, M</primaryauthor>
<author key="622224">Bhalla, S</author>
<author key="7703731">Yang, LT</author>
</authors>
<keywords_plus count="3">
<keyword>DEADLOCK DETECTION</keyword>
<keyword>PERFORMANCE</keyword>
<keyword>ALGORITHM</keyword>
</keywords_plus>
<reprint>
<rp_author>Hasegawa, M</rp_author>
<rp_address>Univ Aizu, Grad Sch Comp Sci &amp; Engn, Fukushima 9658580, Japan</rp_address>
<rp_organization>Univ Aizu</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Grad Sch Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Fukushima</rp_city>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">9658580</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Aizu, Grad Sch Comp Sci &amp; Engn, Fukushima 9658580, Japan</rs_address>
<rs_organization>Univ Aizu</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Grad Sch Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Fukushima</rs_city>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">9658580</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada</rs_address>
<rs_organization>St Francis Xavier Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Antigonish</rs_city>
<rs_state>NS</rs_state>
<rs_country>Canada</rs_country>
<rs_zips count="1">
<rs_zip location="AP">B2G 2W5</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In a real-time database system, the conventional method of transaction method can not be used. In these methods, the deadlock detection is based on (a) use of delay to cause and watch deadlocks, (b) high overheads of periodic checking (c) Non-deterministic nature of the delays, and lastly, (d) difficulties to scale up the existing solutions (centralized). The proposal is based on enhanced local processing and peer-to-peer (P2P) communication for distributed transaction process. The earlier procedures incorporate additional steps for handling wait-for states and deadlocks. This activity is carried out by methods based on wait-for-graphs or probes. These methods introduce a centralized computation at source (for each occurrence of a delay). The proposal introduces asynchronous operations in transaction processing. As a result the detection processes do not wait for occurrences of delays (time-out). These start the delay elimination process instantaneously. The technique incurs low overheads and eliminates the possibility of occurrence of waiting.</p>
</abstract>
<refs count="17">
<ref>148688642</ref>
<ref>75413817</ref>
<ref>119994528</ref>
<ref>148688643</ref>
<ref>148688644</ref>
<ref>129454569</ref>
<ref>71946205</ref>
<ref>99748693</ref>
<ref>112768928</ref>
<ref>87772668</ref>
<ref>93350720</ref>
<ref>130355016</ref>
<ref>93266078</ref>
<ref>129454571</ref>
<ref>119994534</ref>
<ref>148688645</ref>
<ref>129962881</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148687548" hot="yes" sortkey="3120092623" timescited="0" sharedrefs="0" inpi="false">
<item issue="148687339" recid="148687548" coverdate="200600" sortkey="3120092623" refkey="7705075" dbyear="2006">
<ut>000235179100016</ut>
<i_ckey>YANG0188060009ES</i_ckey>
<i_cid>0109526134</i_cid>
<source_title>EDUCATIONAL TECHNOLOGY &amp; SOCIETY</source_title>
<source_abbrev>EDUC TECHNOL SOC</source_abbrev>
<item_title>Context aware ubiquitous learning environments for peer-to-peer collaborative learning</item_title>
<sq>14228J0</sq>
<bib_id>9 (1): 188-201 2006</bib_id>
<bib_pages begin="188" end="201" pages="14">188-201</bib_pages>
<bib_issue year="2006" vol="9"/>
<doctype code="@">Article</doctype>
<editions full="SSCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Yang, SJH</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Yang, SJH</name>
<email_addr>jhyang@csie.ncu.edu.tw</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>ubiquitous learning</keyword>
<keyword>context aware</keyword>
<keyword>peer-to-peer</keyword>
<keyword>collaborative learning</keyword>
</keywords>
<keywords_plus count="1">
<keyword>SYSTEMS</keyword>
</keywords_plus>
<reprint>
<rp_author>Yang, SJH</rp_author>
<rp_address>Natl Cent Univ, Dept Comp Sci &amp; Informat Engn, 300 Jung Da Rd, Jhongli 320, Taiwan</rp_address>
<rp_organization>Natl Cent Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Informat Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>300 Jung Da Rd</rp_street>
<rp_city>Jhongli</rp_city>
<rp_country>Taiwan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">320</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Natl Cent Univ, Dept Comp Sci &amp; Informat Engn, Jhongli 320, Taiwan</rs_address>
<rs_organization>Natl Cent Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Informat Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Jhongli</rs_city>
<rs_country>Taiwan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">320</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A ubiquitous learning environment provides an interoperable, pervasive, and seamless learning architecture to connect, integrate, and share three major dimensions of learning resources: learning collaborators, learning contents, and learning services. Ubiquitous learning is characterized by providing intuitive ways for identifying right learning collaborators, right learning contents and right learning services in the right place at the right time. Our context aware ubiquitous learning environment consists of three systems, namely peer-to-peer content access and adaptation system, personalized annotation management system, and multimedia real-time group discussion system. Since the effectiveness and efficiency of ubiquitous learning heavily relies on learners' surrounding context, in this paper, we will address a context model and context acquisition mechanism for collecting contextual information at run time. We have built a context aware ubiquitous learning environment and in this paper we will address how this newly designed environment can fully support the needs of peer-to-peer collaborative learning.</p>
</abstract>
<refs count="22">
<ref>123110027</ref>
<ref>126298748</ref>
<ref>148687549</ref>
<ref>134537966</ref>
<ref>148687550</ref>
<ref>148687551</ref>
<ref>148687552</ref>
<ref>148687553</ref>
<ref>148687554</ref>
<ref>148687555</ref>
<ref>137500279</ref>
<ref>148687556</ref>
<ref>118044631</ref>
<ref>148687557</ref>
<ref>148687558</ref>
<ref>148687559</ref>
<ref>148687560</ref>
<ref>137020426</ref>
<ref>148687561</ref>
<ref>148687562</ref>
<ref>128544186</ref>
<ref>148687563</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148679192" hot="yes" sortkey="3120095125" timescited="0" sharedrefs="0" inpi="false">
<item issue="148678501" recid="148679192" coverdate="200500" sortkey="3120095125" refkey="4153550" dbyear="2006">
<ut>000234874900151</ut>
<i_ckey>LI J1017053802LJ</i_ckey>
<i_cid>0109540911</i_cid>
<source_title>COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>A similarity-based recommendation filtering algorithm for establishing reputation-based trust in peer-to-peer electronic communities</item_title>
<sq>B4409B0</sq>
<bib_id>3802: 1017-1024 2005</bib_id>
<bib_pages begin="1017" end="1024" pages="8">1017-1024</bib_pages>
<bib_issue year="2005" vol="3802"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Li, JT</primaryauthor>
<author key="3395357">Jing, YN</author>
<author key="2284767">Fu, P</author>
<author key="7803815">Zhang, GD</author>
<author key="1212922">Chen, YQ</author>
</authors>
<emails count="2">
<email>
<name>Li, JT</name>
<email_addr>lijt@Fudan.edu.cn</email_addr>
</email>
<email>
<name>Jing, YN</name>
<email_addr>Jingyn@Fudan.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Li, JT</rp_author>
<rp_address>Fudan Univ, Dept Comp &amp; Informat Technol, Shanghai 200433, Peoples R China</rp_address>
<rp_organization>Fudan Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp &amp; Informat Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200433</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Fudan Univ, Dept Comp &amp; Informat Technol, Shanghai 200433, Peoples R China</rs_address>
<rs_organization>Fudan Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp &amp; Informat Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200433</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Xian Jiaotong Univ, Network Inst, Sch Elect &amp; Informat Engn, Xian 710049, Peoples R China</rs_address>
<rs_organization>Xian Jiaotong Univ</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Network Inst</rs_suborganization>
<rs_suborganization>Sch Elect &amp; Informat Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Xian</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">710049</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Lanzhou Univ, Sch Informat Sci &amp; Engn, Lanzhou, Peoples R China</rs_address>
<rs_organization>Lanzhou Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Informat Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Lanzhou</rs_city>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The issues of trust are especially of great importance in peer-to-peer electronic online communities [5]. One way to address these issues is to use community-based reputations to help estimate the trustworthiness of peers. This paper presents a reputation-based trust supporting framework which includes a mathematical trust model, a decentralized trust data dissemination scheme and a distributed implementation algorithm of the model over a structured P2P network. In our approach, each peer is assigned a unique trust value, computed by aggregating the similarity-filtered recommendations of the peers who have interacted with it. The similarity between peers is computed by a novel simplified method. We also elaborate on decentralized trust data management scheme ignored in existing solutions for reputation systems. Finally, simulation-based experiments show that the system based on our algorithm is robust even against attacks from groups of malicious peers deliberately cooperating to subvert it.</p>
</abstract>
<refs count="8">
<ref>148679193</ref>
<ref>148679194</ref>
<ref>148679195</ref>
<ref>119702645</ref>
<ref>142001189</ref>
<ref>148679196</ref>
<ref>148679197</ref>
<ref>148679198</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148678184" hot="yes" sortkey="3120095219" timescited="0" sharedrefs="0" inpi="false">
<item issue="148677844" recid="148678184" coverdate="200500" sortkey="3120095219" refkey="4189432" dbyear="2006">
<ut>000234873700072</ut>
<i_ckey>LIN 0489053801LL</i_ckey>
<i_cid>0109540373</i_cid>
<source_title>COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>A method for automating the extraction of specialized information from the Web</item_title>
<sq>B4408B0</sq>
<bib_id>3801: 489-494 2005</bib_id>
<bib_pages begin="489" end="494" pages="6">489-494</bib_pages>
<bib_issue year="2005" vol="3801"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Lin, L</primaryauthor>
<author key="4211240">Liotta, A</author>
<author key="3020082">Hippisley, A</author>
</authors>
<emails count="3">
<email>
<name>Lin, L</name>
<email_addr>llini@essex.ac.uk</email_addr>
</email>
<email>
<name>Liotta, A</name>
<email_addr>aliotta@essex.ac.uk</email_addr>
</email>
<email>
<name>Hippisley, A</name>
<email_addr>a.hippisley@surrey.ac.uk</email_addr>
</email>
</emails>
<reprint>
<rp_author>Lin, L</rp_author>
<rp_address>Univ Essex, Dept Elect Syst Engn, Colchester CO4 3SQ, Essex, England</rp_address>
<rp_organization>Univ Essex</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect Syst Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Colchester</rp_city>
<rp_state>Essex</rp_state>
<rp_country>England</rp_country>
<rp_zips count="1">
<rp_zip location="AC">CO4 3SQ</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Essex, Dept Elect Syst Engn, Colchester CO4 3SQ, Essex, England</rs_address>
<rs_organization>Univ Essex</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect Syst Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Colchester</rs_city>
<rs_state>Essex</rs_state>
<rs_country>England</rs_country>
<rs_zips count="1">
<rs_zip location="AC">CO4 3SQ</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Surrey, Dept Comp, Surrey, England</rs_address>
<rs_organization>Univ Surrey</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp</rs_suborganization>
</rs_suborganizations>
<rs_city>Surrey</rs_city>
<rs_country>England</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The World Wide Web can be viewed as a gigantic distributed database including millions of interconnected hosts some of which publish information via web servers or peer-to-peer systems. We present here a novel method for the extraction of semantically rich information from the web in a fully automated fashion. We illustrate our approach via a proof-of-concept application which scrutinizes millions of web pages looking for clues as to the trend of the Chinese stock market. We present the outcomes of a 210-day long study which indicates a strong correlation between the information retrieved by our prototype and the actual market behavior.</p>
</abstract>
<refs count="3">
<ref>108834805</ref>
<ref>123994896</ref>
<ref>148678185</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148653807" hot="yes" sortkey="3120103031" timescited="0" sharedrefs="0" inpi="false">
<item issue="148653792" recid="148653807" coverdate="200500" sortkey="3120103031" refkey="4757503" dbyear="2006" dbweek="08">
<ut>000234791200002</ut>
<i_ckey>MILO0011053818LT</i_ckey>
<i_cid>0109526907</i_cid>
<source_title>ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Peer-to-peer data integration with active XML</item_title>
<sq>B4348B0</sq>
<bib_id>3818: 11-18 2005</bib_id>
<bib_pages begin="11" end="18" pages="8">11-18</bib_pages>
<bib_issue year="2005" vol="3818"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Milo, T</primaryauthor>
</authors>
<reprint>
<rp_author>Milo, T</rp_author>
<rp_address>Tel Aviv Univ, Sch Comp Sci, IL-69978 Tel Aviv, Israel</rp_address>
<rp_organization>Tel Aviv Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Tel Aviv</rp_city>
<rp_country>Israel</rp_country>
<rp_zips count="1">
<rp_zip location="BC">IL-69978</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Tel Aviv Univ, Sch Comp Sci, IL-69978 Tel Aviv, Israel</rs_address>
<rs_organization>Tel Aviv Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Tel Aviv</rs_city>
<rs_country>Israel</rs_country>
<rs_zips count="1">
<rs_zip location="BC">IL-69978</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The advent of XML as a universal exchange format and of Web services as a basis for distributed computing, has fostered the emergence of a new class of documents that we call Active XML documents (AXML in short). These are XML documents where some of the data is given explicitly while other parts are given only intentionally by means of embedded calls to web services, that can be called to generate the required information. We argue that AXML provides powerful means for the modeling and integration of distributed dynamic Web data. AXML can capture various integration scenarios including peer-to-peer data mediation and warehousing, while providing support for new features of Web services such as subscription, service directories, and controlling data changes. Moreover, by allowing service call parameters and responses to contain calls to other services, AXML enables distributed computation over the web. We overview here the AXML project, considering the new possibilities that Active XML brings to Web data management and the fundamental challenges it raises.</p>
</abstract>
<refs count="17">
<ref>144441928</ref>
<ref>148653808</ref>
<ref>148653809</ref>
<ref>70897788</ref>
<ref>143641399</ref>
<ref>111996665</ref>
<ref>143641400</ref>
<ref>123177696</ref>
<ref>129214023</ref>
<ref>112126528</ref>
<ref>148653810</ref>
<ref>143641402</ref>
<ref>102390992</ref>
<ref>148653811</ref>
<ref>148653812</ref>
<ref>131597838</ref>
<ref>104526808</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148653920" hot="yes" sortkey="3120103039" timescited="0" sharedrefs="0" inpi="false">
<item issue="148653792" recid="148653920" coverdate="200500" sortkey="3120103039" refkey="7654487" dbyear="2006" dbweek="08">
<ut>000234791200010</ut>
<i_ckey>WU Y0104053818LY</i_ckey>
<i_cid>0109526945</i_cid>
<source_title>ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Dynamic hybrid DVE architecture</item_title>
<sq>B4348B0</sq>
<bib_id>3818: 104-112 2005</bib_id>
<bib_pages begin="104" end="112" pages="9">104-112</bib_pages>
<bib_issue year="2005" vol="3818"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Wu, YH</primaryauthor>
<author key="1017939">Cai, YZ</author>
<author key="7673937">Xu, XM</author>
</authors>
<emails count="3">
<email>
<name>Wu, YH</name>
<email_addr>wyhross@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Cai, YZ</name>
<email_addr>yzcai@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Xu, XM</name>
<email_addr>xmx@sjtu.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Wu, YH</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A dynamic hybrid DVE architecture is presented in this paper. It's an extension of client-server architecture. It combines the advantages of client-server architecture and peer-to-peer architecture. By utilizing users' hardware resources system can support more users. Compaired with the traditional multi-server architecture it holds lower system cost. Theory analysis and simulation results prove its correctness and validity. The flaws of this architecture are also checked and the settlement is discussed.</p>
</abstract>
<refs count="13">
<ref>122919939</ref>
<ref>148653921</ref>
<ref>148653922</ref>
<ref>148653923</ref>
<ref>148653924</ref>
<ref>148653925</ref>
<ref>148653926</ref>
<ref>92429691</ref>
<ref>148653927</ref>
<ref>148653928</ref>
<ref>105448316</ref>
<ref>148653929</ref>
<ref>148653930</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148653939" hot="yes" sortkey="3120103041" timescited="0" sharedrefs="0" inpi="false">
<item issue="148653792" recid="148653939" coverdate="200500" sortkey="3120103041" refkey="7808238" dbyear="2006" dbweek="08">
<ut>000234791200012</ut>
<i_ckey>ZHAN0127053818LQ</i_ckey>
<i_cid>0109526952</i_cid>
<source_title>ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>TOP-k query calculation in peer-to-peer networks</item_title>
<sq>B4348B0</sq>
<bib_id>3818: 127-135 2005</bib_id>
<bib_pages begin="127" end="135" pages="9">127-135</bib_pages>
<bib_issue year="2005" vol="3818"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Zhang, Q</primaryauthor>
<author key="6773683">Sun, Y</author>
<author key="7810829">Zhang, X</author>
<author key="7472431">Wen, XZ</author>
<author key="4235440">Liu, Z</author>
</authors>
<emails count="1">
<email>
<name>Zhang, Q</name>
<email_addr>zhangqian@neusoft.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>Zhang, Q</rp_author>
<rp_address>NE Univ, Natl Engn Res Ctr Comp Software, Shenyang 110004, Peoples R China</rp_address>
<rp_organization>NE Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Natl Engn Res Ctr Comp Software</rp_suborganization>
</rp_suborganizations>
<rp_city>Shenyang</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">110004</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>NE Univ, Natl Engn Res Ctr Comp Software, Shenyang 110004, Peoples R China</rs_address>
<rs_organization>NE Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Natl Engn Res Ctr Comp Software</rs_suborganization>
</rs_suborganizations>
<rs_city>Shenyang</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">110004</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper addresses the efficient top-k queries in pure peer-to-peer (P2P) networks. Top-k receives much attention in the search engine and gains Or great success. However, processing top-k query in pure P2P network is very challenging due to unique characteristics of P2P environments, for example, skewed collection statistics, and higher communication costs. Inspired by the success of ranking algorithms in Web search engine, we propose a decentralized algorithm to answer top-k queries in pure peer-to-peer networks which makes use of local rankings, rank merging, and minimizes both answer set size and network traffic among peers.</p>
</abstract>
<refs count="19">
<ref>148653940</ref>
<ref>95096829</ref>
<ref>146676679</ref>
<ref>148653941</ref>
<ref>148653942</ref>
<ref>101652146</ref>
<ref>148653943</ref>
<ref>113787392</ref>
<ref>148653944</ref>
<ref>148653945</ref>
<ref>148653946</ref>
<ref>148653947</ref>
<ref>136445499</ref>
<ref>129916387</ref>
<ref>148653948</ref>
<ref>148653949</ref>
<ref>119388276</ref>
<ref>148653950</ref>
<ref>109321328</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148654027" hot="yes" sortkey="3120103055" timescited="0" sharedrefs="0" inpi="false">
<item issue="148653792" recid="148654027" coverdate="200500" sortkey="3120103055" refkey="4344342" dbyear="2006" dbweek="08">
<ut>000234791200026</ut>
<i_ckey>MA X0257053818LX</i_ckey>
<i_cid>0109526993</i_cid>
<source_title>ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Dynamic geospatial web services composition in peer-to-peer networks</item_title>
<sq>B4348B0</sq>
<bib_id>3818: 257-258 2005</bib_id>
<bib_pages begin="257" end="258" pages="2">257-258</bib_pages>
<bib_issue year="2005" vol="3818"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Ma, XJ</primaryauthor>
<author key="7667414">Xie, KQ</author>
<author key="4224904">Liu, C</author>
<author key="4149774">Li, CY</author>
</authors>
<emails count="4">
<email>
<name>Ma, XJ</name>
<email_addr>maxj@cis.pku.edu.cn</email_addr>
</email>
<email>
<name>Xie, KQ</name>
<email_addr>kunqing@cis.pku.edu.cn</email_addr>
</email>
<email>
<name>Liu, C</name>
<email_addr>liuchen@cis.pku.edu.cn</email_addr>
</email>
<email>
<name>Li, CY</name>
<email_addr>licy@cis.pku.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Ma, XJ</rp_author>
<rp_address>Peking Univ, Dept Intelligence Sci, Natl Lab Machine Percept, Beijing 100871, Peoples R China</rp_address>
<rp_organization>Peking Univ</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>Dept Intelligence Sci</rp_suborganization>
<rp_suborganization>Natl Lab Machine Percept</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">100871</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Peking Univ, Dept Intelligence Sci, Natl Lab Machine Percept, Beijing 100871, Peoples R China</rs_address>
<rs_organization>Peking Univ</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Dept Intelligence Sci</rs_suborganization>
<rs_suborganization>Natl Lab Machine Percept</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100871</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper presents a peer-to-peer based execution model to improve the availability and reliability of Geospatial Web Services (GWS) composition. A service community concept and a QoS model of GWS are proposed to discover the best quality GWS engines in the peer-to-peer network. The engines coordinate other participants in charge of initiating, controlling, monitoring the associated GWS execution, and adopt an alternative approach for failure recovery. The paper also presents the implementation of a peer-to-peer GWS composition system prototype based on JXTA platform.</p>
</abstract>
<refs count="11">
<ref>131194743</ref>
<ref>142629490</ref>
<ref>148654028</ref>
<ref>143159739</ref>
<ref>147907235</ref>
<ref>148654029</ref>
<ref>130986610</ref>
<ref>133558503</ref>
<ref>131693444</ref>
<ref>148654030</ref>
<ref>131597851</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148654031" hot="yes" sortkey="3120103056" timescited="0" sharedrefs="0" inpi="false">
<item issue="148653792" recid="148654031" coverdate="200500" sortkey="3120103056" refkey="7648911" dbyear="2006" dbweek="08">
<ut>000234791200027</ut>
<i_ckey>WU H0259053818LH</i_ckey>
<i_cid>0109526995</i_cid>
<source_title>ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An approach for service discovery based on semantic peer-to-peer</item_title>
<sq>B4348B0</sq>
<bib_id>3818: 259-260 2005</bib_id>
<bib_pages begin="259" end="260" pages="2">259-260</bib_pages>
<bib_issue year="2005" vol="3818"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Wu, H</primaryauthor>
<author key="3393638">Jin, H</author>
<author key="4160736">Li, YF</author>
<author key="1201014">Chen, HH</author>
</authors>
<emails count="1">
<email>
<name>Wu, H</name>
<email_addr>hjin@hust.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Wu, H</rp_author>
<rp_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rp_address>
<rp_organization>Huazhong Univ Sci &amp; Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cluster &amp; Grid Comp Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Wuhan</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">430074</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rs_address>
<rs_organization>Huazhong Univ Sci &amp; Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cluster &amp; Grid Comp Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Service discovery is a key step during Peer-to-Peer (P2P) converging with Web Service. In this paper, a semantic-P2P based approach is presented for web service discovery. To enable the semantic web service, service profile is used to describe web service and as the service data source. The service-expertise based model is proposed for service node selection.</p>
</abstract>
<refs count="3">
<ref>148654032</ref>
<ref>147915230</ref>
<ref>147738050</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148651611" hot="yes" sortkey="3120140586" timescited="0" sharedrefs="0" inpi="false">
<item issue="148651517" recid="148651611" coverdate="200500" sortkey="3120140586" refkey="7610793" dbyear="2006">
<ut>000234886500012</ut>
<i_ckey>WOLF0129053833LO</i_ckey>
<i_cid>0109486818</i_cid>
<source_title>WEB AND WIRELESS GEOGRAPHICAL INFORMATION SYSTEMS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Resource discovery using spatio-temporal information in mobile ad-hoc networks</item_title>
<sq>B4425B0</sq>
<bib_id>3833: 129-142 2005</bib_id>
<bib_pages begin="129" end="142" pages="14">129-142</bib_pages>
<bib_issue year="2005" vol="3833"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Wolfson, O</primaryauthor>
<author key="7670056">Xu, B</author>
<author key="7728539">Yin, HB</author>
<author key="5869322">Rishe, N</author>
</authors>
<emails count="4">
<email>
<name>Wolfson, O</name>
<email_addr>wolfson@cs.uic.edu</email_addr>
</email>
<email>
<name>Xu, B</name>
<email_addr>boxu@cs.uic.edu</email_addr>
</email>
<email>
<name>Yin, HB</name>
<email_addr>hyin@cs.uic.edu</email_addr>
</email>
<email>
<name>Rishe, N</name>
<email_addr>rishe@fiu.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Wolfson, O</rp_author>
<rp_address>Univ Illinois, Dept Comp Sci, Chicago, IL 60680 USA</rp_address>
<rp_organization>Univ Illinois</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Chicago</rp_city>
<rp_state>IL</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">60680</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Illinois, Dept Comp Sci, Chicago, IL 60680 USA</rs_address>
<rs_organization>Univ Illinois</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Chicago</rs_city>
<rs_state>IL</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">60680</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Florida Int Univ, High Performance Database Res Ctr, Miami, FL 33199 USA</rs_address>
<rs_organization>Florida Int Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>High Performance Database Res Ctr</rs_suborganization>
</rs_suborganizations>
<rs_city>Miami</rs_city>
<rs_state>FL</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">33199</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper we examine the benefit of reports about resources in mobile ad-hoc networks. Each disseminated report represents information about a spatio-temporal event, such as the availability of a parking slot or a cab request. Reports are disseminated by a peer-to-peer broadcast paradigm, in which an object periodically broadcasts the reports it carries to encountered objects. We evaluate the value of resource information in terms of how much time is saved when using the information to discover resources, compared to the case when the information is not used.</p>
</abstract>
<refs count="14">
<ref>148651612</ref>
<ref>148651613</ref>
<ref>148651614</ref>
<ref>146328164</ref>
<ref>146328165</ref>
<ref>148651615</ref>
<ref>137283899</ref>
<ref>148651616</ref>
<ref>143992754</ref>
<ref>148651617</ref>
<ref>143992756</ref>
<ref>148651618</ref>
<ref>148651619</ref>
<ref>148651620</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148624138" hot="yes" sortkey="3120148070" timescited="0" sharedrefs="0" inpi="false">
<item issue="148624070" recid="148624138" coverdate="200500" sortkey="3120148070" refkey="4226510" dbyear="2006">
<ut>000234857500013</ut>
<i_ckey>LIU 0088053779LF</i_ckey>
<i_cid>0109478958</i_cid>
<source_title>NETWORK AND PARALLEL COMPUTING, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A secure P2P video conference system for enterprise environments</item_title>
<sq>B4404B0</sq>
<bib_id>3779: 88-96 2005</bib_id>
<bib_pages begin="88" end="96" pages="9">88-96</bib_pages>
<bib_issue year="2005" vol="3779"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Liu, FW</primaryauthor>
<author key="3759143">Koenig, H</author>
</authors>
<emails count="2">
<email>
<name>Liu, FW</name>
<email_addr>lfw@informatik.tu-cottbus.de</email_addr>
</email>
<email>
<name>Koenig, H</name>
<email_addr>koenig@informatik.tu-cottbus.de</email_addr>
</email>
</emails>
<reprint>
<rp_author>Liu, FW</rp_author>
<rp_address>Brandenburg Univ Technol Cottbus, Dept Comp Sci, PF 10 33 44, D-03013 Cottbus, Germany</rp_address>
<rp_organization>Brandenburg Univ Technol Cottbus</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>PF 10 33 44</rp_street>
<rp_city>Cottbus</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-03013</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Brandenburg Univ Technol Cottbus, Dept Comp Sci, D-03013 Cottbus, Germany</rs_address>
<rs_organization>Brandenburg Univ Technol Cottbus</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Cottbus</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-03013</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Many emerging group oriented and collaborative applications such as audio/video conferences use the peer-to-peer (P2P) paradigm. Confidentiality is an often demanded feature for such applications, e.g. in business meetings, to provide group privacy. How to build a secure P2P video conference system is still an open issue. In this paper several possible solutions are discussed. We present a security architecture used for P2P video conferences that ensures confidential talks in an enterprise environment whose branches might be geographically dispersed.</p>
</abstract>
<refs count="19">
<ref>148624139</ref>
<ref>148624140</ref>
<ref>148624141</ref>
<ref>114898902</ref>
<ref>148624142</ref>
<ref>148624143</ref>
<ref>148624144</ref>
<ref>148624145</ref>
<ref>148624146</ref>
<ref>148624147</ref>
<ref>148624148</ref>
<ref>148624149</ref>
<ref>148624150</ref>
<ref>148624151</ref>
<ref>132265617</ref>
<ref>142670040</ref>
<ref>118020324</ref>
<ref>148624152</ref>
<ref>135540559</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148624153" hot="yes" sortkey="3120148071" timescited="0" sharedrefs="0" inpi="false">
<item issue="148624070" recid="148624153" coverdate="200500" sortkey="3120148071" refkey="7729332" dbyear="2006">
<ut>000234857500014</ut>
<i_ckey>YIN 0097053779LZ</i_ckey>
<i_cid>0109478963</i_cid>
<source_title>NETWORK AND PARALLEL COMPUTING, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Adaptive query-caching in Peer-to-Peer systems</item_title>
<sq>B4404B0</sq>
<bib_id>3779: 97-104 2005</bib_id>
<bib_pages begin="97" end="104" pages="8">97-104</bib_pages>
<bib_issue year="2005" vol="3779"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Yin, ZN</primaryauthor>
<author key="3393638">Jin, H</author>
<author key="7802623">Zhang, C</author>
<author key="7761078">Yuan, Q</author>
<author key="7814508">Zhao, CC</author>
</authors>
<emails count="1">
<email>
<name>Yin, ZN</name>
<email_addr>znyin@hust.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Yin, ZN</rp_author>
<rp_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rp_address>
<rp_organization>Huazhong Univ Sci &amp; Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cluster &amp; Grid Comp Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Wuhan</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">430074</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rs_address>
<rs_organization>Huazhong Univ Sci &amp; Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cluster &amp; Grid Comp Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-Peer (P2P) architectures are very prevalent in today's Internet. Lots of P2P file sharing systems using Gnutella protocol emerge out and draw attractions of millions of people. The "flooding" search mechanism of Gnutella makes it easy to be deployed, but also spawns numerous messages which leads to serious scalability problems. However, the locality discovered in both user's share files and queries, enables us to use query-caching to shorten the search length and reduce the messages traffic. This paper makes an extensive study of query-caching in P2P systems and proposes an adaptive query-caching mechanism to manage the cached query reply messages according to the heterogeneity of the uptime of different peers. Along with several other techniques we proposed, our approach achieves a 30% reduction of average search length and a 61% reduction of query message traffic comparing with the previous query-caching mechanisms in the simulation, which indicates that our approach makes Gnutella more scalable.</p>
</abstract>
<refs count="11">
<ref>137439880</ref>
<ref>134003860</ref>
<ref>130006312</ref>
<ref>148624154</ref>
<ref>130494565</ref>
<ref>131726918</ref>
<ref>130832146</ref>
<ref>127960302</ref>
<ref>132793784</ref>
<ref>123805644</ref>
<ref>130006317</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148624405" hot="yes" sortkey="3120148122" timescited="0" sharedrefs="0" inpi="false">
<item issue="148624070" recid="148624405" coverdate="200500" sortkey="3120148122" refkey="4119371" dbyear="2006">
<ut>000234857500065</ut>
<i_ckey>LEUN0453053779LA</i_ckey>
<i_cid>0109479061</i_cid>
<source_title>NETWORK AND PARALLEL COMPUTING, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Energy conservation by peer-to-peer relaying in quasi-ad hoc networks</item_title>
<sq>B4404B0</sq>
<bib_id>3779: 453-460 2005</bib_id>
<bib_pages begin="453" end="460" pages="8">453-460</bib_pages>
<bib_issue year="2005" vol="3779"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Leung, AKH</primaryauthor>
<author key="3929201">Kwok, YK</author>
</authors>
<emails count="1">
<email>
<name>Leung, AKH</name>
<email_addr>ykwok@hku.hk</email_addr>
</email>
</emails>
<reprint>
<rp_author>Leung, AKH</rp_author>
<rp_address>Univ Hong Kong, Dept Elect &amp; Elect Engn, Pokfulam Rd, Hong Kong, Hong Kong, Peoples R China</rp_address>
<rp_organization>Univ Hong Kong</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Elect Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>Pokfulam Rd</rp_street>
<rp_city>Hong Kong</rp_city>
<rp_state>Hong Kong</rp_state>
<rp_country>Peoples R China</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Hong Kong, Dept Elect &amp; Elect Engn, Hong Kong, Hong Kong, Peoples R China</rs_address>
<rs_organization>Univ Hong Kong</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Elect Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Hong Kong</rs_city>
<rs_state>Hong Kong</rs_state>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Thanks to the highly popular dual channel capabilities (e.g., GSM plus Bluetooth) in modern handheld personal communication devices, an integrated cellular and ad hoc peer-to-peer network (i.e., a quasi-ad hoc wireless network) has already been widely reckoned as a readily practicable and attractive mobile computing environment. In this paper, we propose a co-operative relaying scheme, called ceRelay, for such a quasi-ad hoc network, to extend the life-time of low energy level users significantly. More importantly, the energy efficiency of the whole network is also remarkably increased.</p>
</abstract>
<refs count="7">
<ref>148624406</ref>
<ref>134550759</ref>
<ref>131232396</ref>
<ref>148624407</ref>
<ref>137031352</ref>
<ref>148624408</ref>
<ref>121977664</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148613604" hot="yes" sortkey="3120150943" timescited="0" sharedrefs="0" inpi="false">
<item issue="148613551" recid="148613604" coverdate="200602" sortkey="3120150943" refkey="2110809" dbyear="2006">
<ut>000235105300007</ut>
<i_ckey>FERR0257060066JR</i_ckey>
<i_cid>0109506222</i_cid>
<source_title>JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING</source_title>
<source_abbrev>J PARALLEL DISTR COM</source_abbrev>
<item_title>Locality in structured peer-to-peer networks</item_title>
<sq>06258J0</sq>
<bib_id>66 (2): 257-273 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.jpdc.2005.09.002</article_no>
</article_nos>
<bib_pages begin="257" end="273" pages="17">257-273</bib_pages>
<bib_issue year="2006" vol="66"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Ferreira, RA</primaryauthor>
<author key="3328079">Jagannathan, S</author>
<author key="2592348">Grama, A</author>
</authors>
<emails count="3">
<email>
<name>Ferreira, RA</name>
<email_addr>rf@cs.purdue.edu</email_addr>
</email>
<email>
<name>Jagannathan, S</name>
<email_addr>suresh@cs.purdue.edu</email_addr>
</email>
<email>
<name>Grama, A</name>
<email_addr>aya@cs.purdue.edu</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer networks</keyword>
<keyword>DHT</keyword>
<keyword>query resolutions locality</keyword>
<keyword>caching Internet</keyword>
</keywords>
<reprint>
<rp_author>Ferreira, RA</rp_author>
<rp_address>Purdue Univ, Dept Comp Sci, 250 N Univ St, W Lafayette, IN 47907 USA</rp_address>
<rp_organization>Purdue Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>250 N Univ St</rp_street>
<rp_city>W Lafayette</rp_city>
<rp_state>IN</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">47907</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA</rs_address>
<rs_organization>Purdue Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>W Lafayette</rs_city>
<rs_state>IN</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">47907</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems, provide efficient mechanisms for resource placement and location. A key distinguishing feature of current DHT systems, such as Chord, Pastry, CAN and Tapestry, is the way they handle locality in the underlying network. Topology-based node identifier assignment, proximity routing, and proximity neighbor selection are examples of heuristics used to minimize message delays in the underlying network. While these heuristics are sometimes effective, they all rely on a single global overlay that may install the key of a popular object at a node far from most of the nodes accessing it. Furthermore, a response to a lookup message does not contain any locality information about the nodes holding a copy of the object. We address these issues in Plethora, a novel two-level overlay P2P network. A local overlay in Plethora acts as a locality-aware cache for the global overlay, grouping nodes close together in the underlying network. Local overlays are constructed by exploiting the organization of the Internet into autonomous systems (ASs). We present a detailed experimental study that demonstrates performance gains in response time of up to 60% compared to a single global Pastry overlay. We also present efficient distributed algorithms for maintaining local overlays in the presence of node arrivals and departures. (c) 2005 Elsevier Inc. All rights reserved.</p>
</abstract>
<refs count="32">
<ref>148613605</ref>
<ref>132500242</ref>
<ref>111648105</ref>
<ref>126921054</ref>
<ref>123480979</ref>
<ref>148613606</ref>
<ref>127960294</ref>
<ref>148613607</ref>
<ref>148613608</ref>
<ref>120725671</ref>
<ref>38472827</ref>
<ref>142001185</ref>
<ref>148613609</ref>
<ref>122611831</ref>
<ref>148613610</ref>
<ref>130352959</ref>
<ref>148613611</ref>
<ref>148613612</ref>
<ref>109420756</ref>
<ref>143266711</ref>
<ref>134702986</ref>
<ref>135505095</ref>
<ref>148613613</ref>
<ref>129815307</ref>
<ref>131232377</ref>
<ref>124204884</ref>
<ref>134282261</ref>
<ref>148613614</ref>
<ref>142670040</ref>
<ref>148613615</ref>
<ref>148613616</ref>
<ref>132793774</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148596948" hot="yes" sortkey="3120157305" timescited="0" sharedrefs="0" inpi="false">
<item issue="148596581" recid="148596948" coverdate="200500" sortkey="3120157305" refkey="6771852" dbyear="2006">
<ut>000234851600065</ut>
<i_ckey>SUN 0651053828LL</i_ckey>
<i_cid>0109478046</i_cid>
<source_title>INTERNET AND NETWORK ECONOMICS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An adaptive group-based reputation system in peer-to-peer networks</item_title>
<sq>B4384B0</sq>
<bib_id>3828: 651-659 2005</bib_id>
<bib_pages begin="651" end="659" pages="9">651-659</bib_pages>
<bib_issue year="2005" vol="3828"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Sun, L</primaryauthor>
<author key="3391210">Jiao, L</author>
<author key="7386727">Wang, YF</author>
<author key="1217566">Cheng, SD</author>
<author key="7383857">Wang, WD</author>
</authors>
<emails count="5">
<email>
<name>Sun, L</name>
<email_addr>xiaodan@bupt.edu.cn</email_addr>
</email>
<email>
<name>Jiao, L</name>
<email_addr>jiaoli@bupt.edu.cn</email_addr>
</email>
<email>
<name>Wang, YF</name>
<email_addr>wfwang@njupt.edu.cn</email_addr>
</email>
<email>
<name>Cheng, SD</name>
<email_addr>chsd@bupt.edu.cn</email_addr>
</email>
<email>
<name>Wang, WD</name>
<email_addr>wdwang@bupt.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Sun, L</rp_author>
<rp_address>Beijing Univ Posts &amp; Telecommun, State Key Lab Networking &amp; Switching, Beijing 100088, Peoples R China</rp_address>
<rp_organization>Beijing Univ Posts &amp; Telecommun</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>State Key Lab Networking &amp; Switching</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">100088</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Beijing Univ Posts &amp; Telecommun, State Key Lab Networking &amp; Switching, Beijing 100088, Peoples R China</rs_address>
<rs_organization>Beijing Univ Posts &amp; Telecommun</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>State Key Lab Networking &amp; Switching</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100088</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Nanjing Univ Posts &amp; Telecommun, Dept Commun Engn, Nanjing, Peoples R China</rs_address>
<rs_organization>Nanjing Univ Posts &amp; Telecommun</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Commun Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Nanjing</rs_city>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>As more and more P2P applications being popular in Internet, one of important problem to be solved is inspiring users to cooperate each other actively and honestly, the reputation mechanism which is a hot spot for P2P research has been proposed to conquer it. Because of the characters of virtuality and anonymous in the network, it is very easy for users with bad reputations to reenter the system with new identities to regain new reputations in the reputation systems. In order to get rid of the impact of whitewashers and improve the system performance and efficiency, we propose a new probability-based adaptive initial reputation mechanism. In this new mechanism, newcomers will be trusted based on system's trust-probability which can be adjusted according to the actions of the newcomers. To avoid the system fluctuating for actions of a few whitewashers, we realize the new reputation mechanism in system with group-based architecture, which can localize the impact of whitewashers in their own groups. Both performance analysis and simulation show that this new adaptive reputation mechanism is more effective.</p>
</abstract>
<refs count="13">
<ref>126978392</ref>
<ref>148596949</ref>
<ref>148596950</ref>
<ref>148596951</ref>
<ref>148596952</ref>
<ref>137439732</ref>
<ref>148596953</ref>
<ref>148596954</ref>
<ref>148596955</ref>
<ref>148596956</ref>
<ref>148596957</ref>
<ref>148596958</ref>
<ref>148596959</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148597075" hot="yes" sortkey="3120157325" timescited="0" sharedrefs="0" inpi="false">
<item issue="148596581" recid="148597075" coverdate="200500" sortkey="3120157325" refkey="3657298" dbyear="2006">
<ut>000234851600085</ut>
<i_ckey>KIM 0836053828LB</i_ckey>
<i_cid>0109478095</i_cid>
<source_title>INTERNET AND NETWORK ECONOMICS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>On the efficacy of detecting and punishing selfish peers</item_title>
<sq>B4384B0</sq>
<bib_id>3828: 836-847 2005</bib_id>
<bib_pages begin="836" end="847" pages="12">836-847</bib_pages>
<bib_issue year="2005" vol="3828"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Kim, BC</primaryauthor>
<author key="6345340">Shapiro, JK</author>
</authors>
<emails count="2">
<email>
<name>Kim, BC</name>
<email_addr>kimbyun4@msu.edu</email_addr>
</email>
<email>
<name>Shapiro, JK</name>
<email_addr>jshapiro@cse.msu.edu</email_addr>
</email>
</emails>
<keywords_plus count="4">
<keyword>DISCRETE PUBLIC GOOD</keyword>
<keyword>PROVISION</keyword>
<keyword>INCENTIVES</keyword>
<keyword>NETWORKS</keyword>
</keywords_plus>
<reprint>
<rp_author>Kim, BC</rp_author>
<rp_address>Michigan State Univ, Dept Econ, 110 Marshall Adams Hall, E Lansing, MI 48824 USA</rp_address>
<rp_organization>Michigan State Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Econ</rp_suborganization>
</rp_suborganizations>
<rp_street>110 Marshall Adams Hall</rp_street>
<rp_city>E Lansing</rp_city>
<rp_state>MI</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">48824</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Michigan State Univ, Dept Econ, E Lansing, MI 48824 USA</rs_address>
<rs_organization>Michigan State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Econ</rs_suborganization>
</rs_suborganizations>
<rs_city>E Lansing</rs_city>
<rs_state>MI</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">48824</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Michigan State Univ, Dept Comp Sci &amp; Engn, E Lansing, MI 48824 USA</rs_address>
<rs_organization>Michigan State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>E Lansing</rs_city>
<rs_state>MI</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">48824</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>We study the phenomenon of free-riding in peer-to-peer (P2P) systems via an abstract model of a public good provision game with incomplete information. Each user in the model has an intrinsic contribution cost and decides whether to contribute or free-ride based on the expected benefit derived from the system. We first consider the impact of positive network externalities-common in P2P settings-on the equilibrium level of free riding and show that such network effects reduce free riding slightly but are insufficient to prevent it. We then consider the use of an incentive mechanism based on the detection and punishment of selfish peers, explicitly modelling key design tradeoffs inherent in any realistic detection mechanism. We show that detection and punishment can reduce free riding, but that the risk of falsely accusing cooperative peers can diminish their effectiveness. Finally, we consider what level of detection would maximize the social welfare of the network. We find that a surprisingly low level of detection can be optimal and that the residual level of free riding at optimum depends critically on the overhead of detecting selfishness and the probability of falsely identifying cooperative peers.</p>
</abstract>
<refs count="15">
<ref>121371192</ref>
<ref>136011812</ref>
<ref>135762693</ref>
<ref>54142286</ref>
<ref>148148974</ref>
<ref>148597076</ref>
<ref>130494457</ref>
<ref>89295809</ref>
<ref>148597077</ref>
<ref>135762706</ref>
<ref>73562638</ref>
<ref>67581335</ref>
<ref>53284462</ref>
<ref>132558274</ref>
<ref>148597078</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148594676" hot="yes" sortkey="3120157628" timescited="0" sharedrefs="0" inpi="false">
<item issue="148594636" recid="148594676" coverdate="200410" sortkey="3120157628" refkey="5375909" dbyear="2006">
<ut>000235083000002</ut>
<i_ckey>PARN0209040001IB</i_ckey>
<i_cid>0109485146</i_cid>
<source_title>IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING</source_title>
<source_abbrev>IEEE T DEPEND SECURE</source_abbrev>
<item_title>Defending a P2P digital preservation system</item_title>
<sq>C6258J0</sq>
<bib_id>1 (4): 209-222 OCT-DEC 2004</bib_id>
<bib_pages begin="209" end="222" pages="14">209-222</bib_pages>
<bib_issue year="2004" vol="1"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Parno, B</primaryauthor>
<author key="5985130">Roussopoulos, M</author>
</authors>
<emails count="2">
<email>
<name>Parno, B</name>
<email_addr>parno@cmu.edu</email_addr>
</email>
<email>
<name>Roussopoulos, M</name>
<email_addr>mema@eecs.harvard.edu</email_addr>
</email>
</emails>
<keywords count="6">
<keyword>distributed applications</keyword>
<keyword>protection mechanisms</keyword>
<keyword>backup/recovery</keyword>
<keyword>model development</keyword>
<keyword>libraries/information repositories/publishing</keyword>
<keyword>peer-to-peer digital preservation</keyword>
</keywords>
<reprint>
<rp_author>Parno, B</rp_author>
<rp_address>Carnegie Mellon Univ, Dept Elect &amp; Comp Engn, 5000 Forbes Ave, Pittsburgh, PA 15213 USA</rp_address>
<rp_organization>Carnegie Mellon Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>5000 Forbes Ave</rp_street>
<rp_city>Pittsburgh</rp_city>
<rp_state>PA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">15213</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Carnegie Mellon Univ, Dept Elect &amp; Comp Engn, Pittsburgh, PA 15213 USA</rs_address>
<rs_organization>Carnegie Mellon Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Pittsburgh</rs_city>
<rs_state>PA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">15213</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Harvard Univ, Cambridge, MA 02138 USA</rs_address>
<rs_organization>Harvard Univ</rs_organization>
<rs_city>Cambridge</rs_city>
<rs_state>MA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">02138</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The LOCKSS (Lots Of Copies Keep Stuff Safe) system allows users to store and preserve electronic content through a system of inexpensive computers arranged in an ad hoc peer-to-peer network. These peers cooperate to detect and repair damage by voting in "opinion polls." We develop a more accurate view of how the network will perform over time by simulating the system's behavior using dynamic models in which peers can be subverted and repaired. These models take into account a variety of parameters, including the rate of peer subversion, the rate of repair, the extent of subversion, and the responsiveness of each peer's system administrator. These models reveal certain systemic vulnerabilities not apparent in our static simulations: A typical adversary that begins with a small foothold within the system (e.g., 20 percent of the population) will completely dominate the voting process within 10 years, even if he only exploits one vulnerability each year. In light of these results, we propose and evaluate countermeasures. One technique, Ripple Healing, performs remarkably well. For models in which all system administrators are equally likely to repair their systems, it eliminates nearly systemic levels of corruption within days. For models in which some administrators are more likely to repair their systems, Ripple Healing limits corruption, but proves less effective, since these models already demonstrate superior performance.</p>
</abstract>
<refs count="30">
<ref>148594677</ref>
<ref>148594678</ref>
<ref>148594679</ref>
<ref>148594680</ref>
<ref>148594681</ref>
<ref>148594682</ref>
<ref>131597336</ref>
<ref>117648892</ref>
<ref>148594683</ref>
<ref>148594684</ref>
<ref>124494822</ref>
<ref>148594685</ref>
<ref>148594686</ref>
<ref>148594687</ref>
<ref>116230447</ref>
<ref>148594688</ref>
<ref>148594689</ref>
<ref>148594690</ref>
<ref>107649310</ref>
<ref>136619336</ref>
<ref>148594691</ref>
<ref>148594692</ref>
<ref>83460298</ref>
<ref>134935975</ref>
<ref>148594693</ref>
<ref>148594694</ref>
<ref>123110018</ref>
<ref>148594695</ref>
<ref>148594696</ref>
<ref>148594697</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148590451" hot="yes" sortkey="3120158467" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148590451" coverdate="200500" sortkey="3120158467" refkey="4229686" dbyear="2006">
<ut>000234857700001</ut>
<i_ckey>LIU 0001053795LL</i_ckey>
<i_cid>0109479069</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Towards global collaborative computing: Opportunities and challenges of peer to peer networks and applications</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 1-2 2005</bib_id>
<bib_pages begin="1" end="2" pages="2">1-2</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Liu, L</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Liu, L</name>
<email_addr>lingliu@cc.gatech.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Liu, L</rp_author>
<rp_address>Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA</rp_address>
<rp_organization>Georgia Inst Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Coll Comp</rp_suborganization>
</rp_suborganizations>
<rp_city>Atlanta</rp_city>
<rp_state>GA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">30332</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA</rs_address>
<rs_organization>Georgia Inst Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp</rs_suborganization>
</rs_suborganizations>
<rs_city>Atlanta</rs_city>
<rs_state>GA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">30332</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="N"/>
<refs count="14">
<ref>148590452</ref>
<ref>143793266</ref>
<ref>148590453</ref>
<ref>148590454</ref>
<ref>148590455</ref>
<ref>148590456</ref>
<ref>148590457</ref>
<ref>148590458</ref>
<ref>148590459</ref>
<ref>148590460</ref>
<ref>134550498</ref>
<ref>148590461</ref>
<ref>146016246</ref>
<ref>146016250</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148590498" hot="yes" sortkey="3120158471" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148590498" coverdate="200500" sortkey="3120158471" refkey="5672989" dbyear="2006">
<ut>000234857700005</ut>
<i_ckey>QIAN0035053795LZ</i_ckey>
<i_cid>0109479075</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Mobile-agent-based web service composition</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 35-46 2005</bib_id>
<bib_pages begin="35" end="46" pages="12">35-46</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Qian, ZZ</primaryauthor>
<author key="4298298">Lu, SL</author>
<author key="7667440">Xie, L</author>
</authors>
<emails count="3">
<email>
<name>Qian, ZZ</name>
<email_addr>qianzhuzhcng@dislab.nju.edu.cn</email_addr>
</email>
<email>
<name>Lu, SL</name>
<email_addr>sanglu@dislab.nju.edu.cn</email_addr>
</email>
<email>
<name>Xie, L</name>
<email_addr>xieli@dislab.nju.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Qian, ZZ</rp_author>
<rp_address>Nanjing Univ, Dept Comp Sci &amp; Technol, State Key Lab Novel Software Technol, Nanjing, Peoples R China</rp_address>
<rp_organization>Nanjing Univ</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>Dept Comp Sci &amp; Technol</rp_suborganization>
<rp_suborganization>State Key Lab Novel Software Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Nanjing</rp_city>
<rp_country>Peoples R China</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Nanjing Univ, Dept Comp Sci &amp; Technol, State Key Lab Novel Software Technol, Nanjing, Peoples R China</rs_address>
<rs_organization>Nanjing Univ</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Dept Comp Sci &amp; Technol</rs_suborganization>
<rs_suborganization>State Key Lab Novel Software Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Nanjing</rs_city>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper we propose a mobile-agent-based web service composition (MAWSC) model for the dynamic web service composition (WSC). As compared with the traditional WSC models, our model avoids bottleneck of data transfer by peer-to-peer approach. As it achieves the composition without a centralized control, there is no center needed and every WSC portal can offer services for a large quantity of clients. In MAWSC model, WSC client inputs the specification and the initial parameters through WSC portal; then, system creates mobile agents to achieve the task and return the final results back to the client. In this paper, we define "planning" to specify the logic actions of mobile agent so as to execute the WSC automatically. And we also give the process mapping rules to convert the specification of WSC to the planning, and the behavior matching algorithms to map the planning to the physical behaviors of agents.</p>
</abstract>
<refs count="19">
<ref>133152276</ref>
<ref>148590499</ref>
<ref>130886100</ref>
<ref>133055782</ref>
<ref>142351298</ref>
<ref>148590500</ref>
<ref>148590501</ref>
<ref>148590502</ref>
<ref>131194761</ref>
<ref>133055879</ref>
<ref>148590503</ref>
<ref>129558185</ref>
<ref>128261045</ref>
<ref>148590504</ref>
<ref>148590505</ref>
<ref>148590506</ref>
<ref>124150494</ref>
<ref>135026849</ref>
<ref>148590507</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591000" hot="yes" sortkey="3120158558" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591000" coverdate="200500" sortkey="3120158558" refkey="5675314" dbyear="2006">
<ut>000234857700092</ut>
<i_ckey>QU Y0738053795LY</i_ckey>
<i_cid>0109479275</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Survivability analysis of Grid resource management system topology</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 738-743 2005</bib_id>
<bib_pages begin="738" end="743" pages="6">738-743</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Qu, Y</primaryauthor>
<author key="4185918">Lin, C</author>
<author key="4160935">Li, YJ</author>
<author key="6339710">Shan, ZG</author>
</authors>
<emails count="4">
<email>
<name>Qu, Y</name>
<email_addr>quyang@csnet1.cs.tsinghua.edu.cn</email_addr>
</email>
<email>
<name>Lin, C</name>
<email_addr>clin@csnet1.cs.tsinghua.edu.cn</email_addr>
</email>
<email>
<name>Li, YJ</name>
<email_addr>yjli@csnet1.cs.tsinghua.edu.cn</email_addr>
</email>
<email>
<name>Shan, ZG</name>
<email_addr>shanzg@mx.cei.gov.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Qu, Y</rp_author>
<rp_address>Tsing Hua Univ, Dept Comp Sci &amp; Technol, Beijing 100084, Peoples R China</rp_address>
<rp_organization>Tsing Hua Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">100084</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Tsing Hua Univ, Dept Comp Sci &amp; Technol, Beijing 100084, Peoples R China</rs_address>
<rs_organization>Tsing Hua Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100084</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>State Informat Ctr, Dept Informat Res, Beijing 100045, Peoples R China</rs_address>
<rs_organization>State Informat Ctr</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Informat Res</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100045</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The resource management system is one of the essential components of Grids. A resource management system may be made up of one or many resource management nodes. The organization manner of the resource management nodes, i.e. the topology of a resource management system, is a key factor that should be considered carefully during the architecture design of resource management systems with respect to some specified requirements (e.g., performance, survivability). In this paper, a new survivability definition is proposed and the survivability of three typical Grid resource management system topologies (centralized, hierarchical, and peer-to-peer) is analyzed.</p>
</abstract>
<refs count="7">
<ref>148591001</ref>
<ref>118480234</ref>
<ref>137439946</ref>
<ref>148591002</ref>
<ref>123450987</ref>
<ref>86374669</ref>
<ref>147485337</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591037" hot="yes" sortkey="3120158566" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591037" coverdate="200500" sortkey="3120158566" refkey="5674608" dbyear="2006">
<ut>000234857700100</ut>
<i_ckey>QIU 0799053795LT</i_ckey>
<i_cid>0109479285</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Exploiting the heterogeneity in structured peer-to-peer systems</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 799-810 2005</bib_id>
<bib_pages begin="799" end="810" pages="12">799-810</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Qiu, TQ</primaryauthor>
<author key="1200025">Chen, GH</author>
</authors>
<emails count="2">
<email>
<name>Qiu, TQ</name>
<email_addr>qtq@dislab.nju.edu.cn</email_addr>
</email>
<email>
<name>Chen, GH</name>
<email_addr>gchen@nju.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Qiu, TQ</rp_author>
<rp_address>Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China</rp_address>
<rp_organization>Nanjing Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>State Key Lab Novel Software Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Nanjing</rp_city>
<rp_country>Peoples R China</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China</rs_address>
<rs_organization>Nanjing Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>State Key Lab Novel Software Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Nanjing</rs_city>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The structured peer-to-peer system, which is based on the distributed hash table, offers an administration-free and fault-tolerant application-level overlay network. However, a randomly structured overlay can not reflect the heterogeneity of a peer-to-peer system. In this paper, we propose a two-phase approach to exploit the heterogeneity in structured peer-to-peer systems. First, by exploiting the effects of both connections and nodes, we adjust the structure of overlay to reduce the lookup latency. And then a novel load balancing scheme based on lottery scheduling is proposed to balance not only the load but also the movement cost of the load. Our simulation results show that the performance, including query quality from the users' view and load balance from the system's view, can be greatly improved in a heterogeneous environment.</p>
</abstract>
<refs count="13">
<ref>148591038</ref>
<ref>148591039</ref>
<ref>148591040</ref>
<ref>148591041</ref>
<ref>148591042</ref>
<ref>148591043</ref>
<ref>128725171</ref>
<ref>127960439</ref>
<ref>127960285</ref>
<ref>103363705</ref>
<ref>148591044</ref>
<ref>147843491</ref>
<ref>142935504</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591045" hot="yes" sortkey="3120158567" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591045" coverdate="200500" sortkey="3120158567" refkey="1250713" dbyear="2006">
<ut>000234857700101</ut>
<i_ckey>CHOI0811053795LS</i_ckey>
<i_cid>0109479286</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Dynamic scheduling mechanism for result certification in peer to peer grid computing</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 811-824 2005</bib_id>
<bib_pages begin="811" end="824" pages="14">811-824</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="6">
<primaryauthor>Choi, S</primaryauthor>
<author key="350739">Baik, M</author>
<author key="2453950">Gil, J</author>
<author key="5363181">Park, C</author>
<author key="3464064">Jung, S</author>
<author key="3207625">Hwang, C</author>
</authors>
<emails count="6">
<email>
<name>Choi, S</name>
<email_addr>lotieye@disys.korea.ac.kr</email_addr>
</email>
<email>
<name>Baik, M</name>
<email_addr>msbak@disys.korea.ac.kr</email_addr>
</email>
<email>
<name>Gil, J</name>
<email_addr>jmgil@kisti.re.kr</email_addr>
</email>
<email>
<name>Park, C</name>
<email_addr>chan@kisti.re.kr</email_addr>
</email>
<email>
<name>Jung, S</name>
<email_addr>jsy@comedu.korea.ac.kr</email_addr>
</email>
<email>
<name>Hwang, C</name>
<email_addr>hwang@disys.korea.ac.kr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Choi, S</rp_author>
<rp_address>Korea Univ, Dept Comp Sci &amp; Engn, Seoul, South Korea</rp_address>
<rp_organization>Korea Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Seoul</rp_city>
<rp_country>South Korea</rp_country>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Korea Univ, Dept Comp Sci &amp; Engn, Seoul, South Korea</rs_address>
<rs_organization>Korea Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Seoul</rs_city>
<rs_country>South Korea</rs_country>
</research>
<research>
<rs_address>Korea Univ, Dept Comp Sci Educ, Seoul, South Korea</rs_address>
<rs_organization>Korea Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci Educ</rs_suborganization>
</rs_suborganizations>
<rs_city>Seoul</rs_city>
<rs_country>South Korea</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>In a peer to peer grid computing environment, volunteers have heterogeneous properties and dynamically join and leave during execution. Therefore, it is essential to adapt to an unstable and widely distributed environment. However, existing scheduling and result certification mechanisms do not adapt to such a dynamic environment. As a result, they undergo high overhead, performance degradation, and scalability problems.</p>
<p>To solve the problems, we propose a new scheduling mechanism for result certification. The proposed mechanism applies different scheduling and result certification algorithms to different volunteer groups that are classified on the basis of their properties such as volunteering service time, availability, and credibility. It also exploits mobile agents in a distributed way in order to adapt to a dynamic peer to peer grid computing environment.</p>
</abstract>
<refs count="22">
<ref>148591046</ref>
<ref>148591047</ref>
<ref>148591048</ref>
<ref>148591049</ref>
<ref>127746429</ref>
<ref>148591050</ref>
<ref>148591051</ref>
<ref>144886665</ref>
<ref>148591052</ref>
<ref>148591053</ref>
<ref>148591054</ref>
<ref>148591055</ref>
<ref>137476571</ref>
<ref>134864243</ref>
<ref>144323376</ref>
<ref>148591056</ref>
<ref>148591057</ref>
<ref>148591058</ref>
<ref>148591059</ref>
<ref>124889712</ref>
<ref>143156182</ref>
<ref>105507939</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591060" hot="yes" sortkey="3120158568" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591060" coverdate="200500" sortkey="3120158568" refkey="6574675" dbyear="2006">
<ut>000234857700102</ut>
<i_ckey>SON 0825053795LS</i_ckey>
<i_cid>0109479293</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A hybrid peer-to-peer media streaming</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 825-835 2005</bib_id>
<bib_pages begin="825" end="835" pages="11">825-835</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Son, S</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Son, S</name>
<email_addr>shson@smu.ac.kr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Son, S</rp_author>
<rp_address>Sangmyung Univ, Div Comp Sci, Seoul 110743, South Korea</rp_address>
<rp_organization>Sangmyung Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Div Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Seoul</rp_city>
<rp_country>South Korea</rp_country>
<rp_zips count="1">
<rp_zip location="AC">110743</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Sangmyung Univ, Div Comp Sci, Seoul 110743, South Korea</rs_address>
<rs_organization>Sangmyung Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Div Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Seoul</rs_city>
<rs_country>South Korea</rs_country>
<rs_zips count="1">
<rs_zip location="AC">110743</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we present a media streaming service architecture over peer-to-peer network for large scale media streaming service. The proposed architecture is hybrid in that it combines both pure peer-to-peer streaming model and centralized server model in order to take advantages of them. We first describe overall streaming operation based on the hybrid architecture. Then, we deal with streaming load allocation problem under the proposed scheme. Extensive performance study based on simulation is carried out. The results show that the performance of the proposed system is much better than that of existing streaming system in numerous streaming performance metrics.</p>
</abstract>
<refs count="11">
<ref>114240124</ref>
<ref>142367401</ref>
<ref>142367402</ref>
<ref>142367403</ref>
<ref>132991491</ref>
<ref>148591061</ref>
<ref>142367405</ref>
<ref>120503706</ref>
<ref>148591062</ref>
<ref>142367408</ref>
<ref>132991501</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591103" hot="yes" sortkey="3120158573" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591103" coverdate="200500" sortkey="3120158573" refkey="3150203" dbyear="2006">
<ut>000234857700107</ut>
<i_ckey>HU X0884053795LX</i_ckey>
<i_cid>0109479304</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An efficient content-based notification service routed over P2P network</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 884-893 2005</bib_id>
<bib_pages begin="884" end="893" pages="10">884-893</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Hu, XX</primaryauthor>
<author key="7387609">Wang, YX</author>
<author key="5339873">Pan, YH</author>
</authors>
<emails count="3">
<email>
<name>Hu, XX</name>
<email_addr>huxx@zjip.com</email_addr>
</email>
<email>
<name>Wang, YX</name>
<email_addr>wangyuexuan@tsinghua.edu.cn</email_addr>
</email>
<email>
<name>Pan, YH</name>
<email_addr>huxx@hziee.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Hu, XX</rp_author>
<rp_address>Zhejiang Univ, Coll Comp Sci &amp; Technol, Hangzhou 310027, Peoples R China</rp_address>
<rp_organization>Zhejiang Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Coll Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Hangzhou</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">310027</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Zhejiang Univ, Coll Comp Sci &amp; Technol, Hangzhou 310027, Peoples R China</rs_address>
<rs_organization>Zhejiang Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Hangzhou</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">310027</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Tsing Hua Univ, Natl CIMS Engn Res Ctr, Dept Automat, Beijing 100084, Peoples R China</rs_address>
<rs_organization>Tsing Hua Univ</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Natl CIMS Engn Res Ctr</rs_suborganization>
<rs_suborganization>Dept Automat</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100084</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Hangzhou Dianzi Univ, Coll Comp &amp; Software, Hangzhou 310018, Peoples R China</rs_address>
<rs_organization>Hangzhou Dianzi Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp &amp; Software</rs_suborganization>
</rs_suborganizations>
<rs_city>Hangzhou</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">310018</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Event-based, Publish/Subscribe, systems are receiving increasingly greater attention as a prevalent approach to decouple various large-scale distributed applications such as Internet wide systems. However, their efficiency is closely tied to the architecture of the underlying notification service, which conveys the event notifications from publishers to subscribers. Peer-to-Peer network topology can offer inherently bounded delivery depth, load sharing and self-organization. In this paper, we present a content-based notification service system over peer-to-peer network topology, and couple it with an efficient filter model and routing algorithms. We also study the performance of our approaches, comparing them with corresponding works. The result shows that our approaches greatly reduce network bandwidth for subscription or filter update propagation, and storage requirement for keeping filter routing information.</p>
</abstract>
<refs count="12">
<ref>128594371</ref>
<ref>117345229</ref>
<ref>120901131</ref>
<ref>131684251</ref>
<ref>130950577</ref>
<ref>98689210</ref>
<ref>148591104</ref>
<ref>148591105</ref>
<ref>128882241</ref>
<ref>123110037</ref>
<ref>148591106</ref>
<ref>148591107</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591110" hot="yes" sortkey="3120158575" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591110" coverdate="200500" sortkey="3120158575" refkey="5971820" dbyear="2006">
<ut>000234857700109</ut>
<i_ckey>ROST0906053795LH</i_ckey>
<i_cid>0109479308</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A mathematical foundation for topology awareness of P2P overlay networks</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 906-918 2005</bib_id>
<bib_pages begin="906" end="918" pages="13">906-918</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Rostami, H</primaryauthor>
<author key="2731384">Habibi, J</author>
</authors>
<emails count="2">
<email>
<name>Rostami, H</name>
<email_addr>Habib@sharif.ir</email_addr>
</email>
<email>
<name>Habibi, J</name>
<email_addr>Habibi@sharif.ir</email_addr>
</email>
</emails>
<keywords_plus count="1">
<keyword>NUMBERS</keyword>
</keywords_plus>
<reprint>
<rp_author>Rostami, H</rp_author>
<rp_address>Sharif Univ Technol, Dept Comp Engn, Tehran, Iran</rp_address>
<rp_organization>Sharif Univ Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Tehran</rp_city>
<rp_country>Iran</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Sharif Univ Technol, Dept Comp Engn, Tehran, Iran</rs_address>
<rs_organization>Sharif Univ Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Tehran</rs_city>
<rs_country>Iran</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In peer-to-peer (P2P) overlay networks, the mechanism of a peer randomly joining and leaving a network, causes a topology mismatch between the overlay and the underlying physical topology. This causes a large volume of redundant traffic in the underlying physical network as well as an extra delay in message delivery in the overlay network. Topology mismatch occurs because overlay networks are not aware of their underlying physical networks. In this paper we present a mathematical model for topology awareness of overlay networks (degree of matching between an overlay and its underlying physical network) and the efficiency of message delivery on them. We also after determining the computational complexity of the model, propose an optimization heuristic algorithm to increase topology awareness of P2P overlay networks. Then we present the results of running the algorithm on different kinds of random graphs and show, how we can implement the algorithm over P2P networks.</p>
</abstract>
<refs count="27">
<ref>148591111</ref>
<ref>143567340</ref>
<ref>148591112</ref>
<ref>137283611</ref>
<ref>137296446</ref>
<ref>148591113</ref>
<ref>148591114</ref>
<ref>8990322</ref>
<ref>131684267</ref>
<ref>148591115</ref>
<ref>124754942</ref>
<ref>142144979</ref>
<ref>148591116</ref>
<ref>102310221</ref>
<ref>147571032</ref>
<ref>148591117</ref>
<ref>128642665</ref>
<ref>148591118</ref>
<ref>142351223</ref>
<ref>131684115</ref>
<ref>123110036</ref>
<ref>10713124</ref>
<ref>148591119</ref>
<ref>127750684</ref>
<ref>123897923</ref>
<ref>148591120</ref>
<ref>143446447</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591121" hot="yes" sortkey="3120158576" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591121" coverdate="200500" sortkey="3120158576" refkey="3092956" dbyear="2006">
<ut>000234857700110</ut>
<i_ckey>HONG0919053795LF</i_ckey>
<i_cid>0109479309</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>SChord: Handling churn in chord by exploiting node session time</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 919-929 2005</bib_id>
<bib_pages begin="919" end="929" pages="11">919-929</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Hong, F</primaryauthor>
<author key="4155070">Li, ML</author>
<author key="7757150">Yu, JD</author>
</authors>
<emails count="3">
<email>
<name>Hong, F</name>
<email_addr>hongfeng@cs.sjtu.edu.cn</email_addr>
</email>
<email>
<name>Li, ML</name>
<email_addr>li-ml@cs.sjtu.edu.cn</email_addr>
</email>
<email>
<name>Yu, JD</name>
<email_addr>jdyu@cs.sjtu.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Hong, F</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-peer systems are distinguished from traditional distributed systems in that nodes join and leave the p2p system at high rates, called churn problem. SChord, a p2p system, is illustrated in this paper, which is constructed on Chord system and aims to handle churn. We analyze the past experimental studies on churn of p2p systems and do some theoretical analysis on the probability distribution of node session time. SChord is based on such analysis which can distinguish nodes of long session time from other p2p nodes and exploit these long session nodes with its special routing algorithm. The simulation shows that SChord has achieved better performance of churn handling than Chord.</p>
</abstract>
<refs count="10">
<ref>142783140</ref>
<ref>131684201</ref>
<ref>148591122</ref>
<ref>148591123</ref>
<ref>136187272</ref>
<ref>132500029</ref>
<ref>128138422</ref>
<ref>133716734</ref>
<ref>128939454</ref>
<ref>121684257</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591124" hot="yes" sortkey="3120158577" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591124" coverdate="200500" sortkey="3120158577" refkey="7824354" dbyear="2006">
<ut>000234857700111</ut>
<i_ckey>ZHOU0930053795LJ</i_ckey>
<i_cid>0109479310</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Towards reputation-aware resource discovery in peer-to-peer networks</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 930-940 2005</bib_id>
<bib_pages begin="930" end="940" pages="11">930-940</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Zhou, JY</primaryauthor>
<author key="7704912">Yang, SB</author>
<author key="2702701">Guo, LT</author>
<author key="7376057">Wang, J</author>
<author key="1211803">Chen, Y</author>
</authors>
<emails count="5">
<email>
<name>Zhou, JY</name>
<email_addr>jjyyzhou@mail.ustc.edu.cn</email_addr>
</email>
<email>
<name>Yang, SB</name>
<email_addr>syang@ustc.edu.cn</email_addr>
</email>
<email>
<name>Guo, LT</name>
<email_addr>ltguo@mail.ustc.edu.cn</email_addr>
</email>
<email>
<name>Wang, J</name>
<email_addr>joycew@mail.ustc.edu.cn</email_addr>
</email>
<email>
<name>Chen, Y</name>
<email_addr>ychen34@mail.ustc.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Zhou, JY</rp_author>
<rp_address>Univ Sci &amp; Technol China, Dept Comp Sci, Hefei 230026, Peoples R China</rp_address>
<rp_organization>Univ Sci &amp; Technol China</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Hefei</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">230026</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Sci &amp; Technol China, Dept Comp Sci, Hefei 230026, Peoples R China</rs_address>
<rs_organization>Univ Sci &amp; Technol China</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Hefei</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">230026</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The resource discovery algorithms in Peer-to-Peer networks are based on the assumption that reliable resources are provided by each peer. The feather that significantly contributes to the success of many P2P applications is dynamic, anonymity and self-organization. However, they also bring about some malicious nodes to provide untrustworthy and pseudo services. To address this problem, this paper introduces a robust and flexible reputation mechanism in unstructured P2P and presents the heuristic resource discovery algorithm based on reputation-aware to ensure that resource requester can obtain reliable resources and services. This new resource discovery algorithm can effectively suppress the deceptive and fake services of P2P network, improve the reliability and security and decrease network load.</p>
</abstract>
<refs count="8">
<ref>148591125</ref>
<ref>121129698</ref>
<ref>130882402</ref>
<ref>148591126</ref>
<ref>133716584</ref>
<ref>123110024</ref>
<ref>148591127</ref>
<ref>148591128</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591133" hot="yes" sortkey="3120158579" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591133" coverdate="200500" sortkey="3120158579" refkey="7383043" dbyear="2006">
<ut>000234857700113</ut>
<i_ckey>WANG0947053795LT</i_ckey>
<i_cid>0109479313</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A novel behavior-based peer-to-peer trust model</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 947-952 2005</bib_id>
<bib_pages begin="947" end="952" pages="6">947-952</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Wang, T</primaryauthor>
<author key="4299050">Lu, XL</author>
<author key="1821445">Duan, HC</author>
</authors>
<emails count="1">
<email>
<name>Wang, T</name>
<email_addr>twang@uestc.edu.cn</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>P2P</keyword>
<keyword>trust</keyword>
<keyword>decay function</keyword>
<keyword>QoS</keyword>
</keywords>
<reprint>
<rp_author>Wang, T</rp_author>
<rp_address>Univ Elect Sci &amp; Technol China, Coll Comp Sci &amp; Engn, Chengdu 610054, Peoples R China</rp_address>
<rp_organization>Univ Elect Sci &amp; Technol China</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Coll Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Chengdu</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">610054</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Elect Sci &amp; Technol China, Coll Comp Sci &amp; Engn, Chengdu 610054, Peoples R China</rs_address>
<rs_organization>Univ Elect Sci &amp; Technol China</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Chengdu</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">610054</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In P2P systems, every user can release files freely, which makes the large-scale file-sharing feasible. However, with malicious nodes increasing, lots of faked files and deceptive behaviors restrict the development of P2P application. Current P2P trust models can't guarantee the Quality of Service(QoS), and take no consideration for trust decay and cooperative cheat. To address these problems, this paper presents a novel behavior-based P2P trust model. The direct trust and reputation trust are considered, and the time decay function and reputation adjustment factor are provided in the model. Results of simulations show that compared to the current trust models, the proposed model is more efficient and scalable.</p>
</abstract>
<refs count="8">
<ref>130246224</ref>
<ref>143369332</ref>
<ref>132197970</ref>
<ref>132500064</ref>
<ref>130494484</ref>
<ref>145485613</ref>
<ref>130246179</ref>
<ref>117717465</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591134" hot="yes" sortkey="3120158580" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591134" coverdate="200500" sortkey="3120158580" refkey="5121902" dbyear="2006">
<ut>000234857700114</ut>
<i_ckey>NIU 0953053795LC</i_ckey>
<i_cid>0109479314</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A topology adaptation protocol for structured superpeer overlay construction</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 953-958 2005</bib_id>
<bib_pages begin="953" end="958" pages="6">953-958</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Niu, CY</primaryauthor>
<author key="7376057">Wang, J</author>
<author key="6369210">Shen, RM</author>
</authors>
<emails count="3">
<email>
<name>Niu, CY</name>
<email_addr>cyniu@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Wang, J</name>
<email_addr>jwang@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Shen, RM</name>
<email_addr>rmshen@sjtu.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Niu, CY</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Technol, Shanghai 200030, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Technol, Shanghai 200030, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-peer networks can be divided into structured and unstructured based on their overlay topologies. In reality, unstructured p2p networks with superpeers have proved their capacities to support millions of users simultaneously. However, applications deployed on this kind of overlay networks, such as file-sharing, require flooding or gossip-based message routing, which puts more overhead on underlying networks and provides no guarantee on resource discovery. In this paper we propose an overlay adaptation protocol which allows structured superpeer overlay construction from unstructured p2p overlay networks with the potential to leverage the advantages of structured p2p overlay networks such as efficiency, scalability and guaranteed look-up services. The simulation result shows that our protocol can build the structured superpeer overlay with efficiency and scalability.</p>
</abstract>
<refs count="9">
<ref>148591135</ref>
<ref>148591136</ref>
<ref>148591137</ref>
<ref>148591138</ref>
<ref>127960285</ref>
<ref>148591139</ref>
<ref>137495015</ref>
<ref>131684184</ref>
<ref>148591140</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591141" hot="yes" sortkey="3120158581" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591141" coverdate="200500" sortkey="3120158581" refkey="7372035" dbyear="2006">
<ut>000234857700115</ut>
<i_ckey>WANG0959053795LC</i_ckey>
<i_cid>0109479315</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A routing protocol based on trust for MANETs</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 959-964 2005</bib_id>
<bib_pages begin="959" end="964" pages="6">959-964</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Wang, CR</primaryauthor>
<author key="7706710">Yang, XZ</author>
<author key="2353459">Gao, Y</author>
</authors>
<emails count="1">
<email>
<name>Wang, CR</name>
<email_addr>wangcr@mail.neuq.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Wang, CR</rp_author>
<rp_address>Harbin Inst Technol, Sch Comp Sci &amp; Technol, Harbin 150001, Peoples R China</rp_address>
<rp_organization>Harbin Inst Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Harbin</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">150001</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Harbin Inst Technol, Sch Comp Sci &amp; Technol, Harbin 150001, Peoples R China</rs_address>
<rs_organization>Harbin Inst Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Harbin</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">150001</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Northeastern Univ, Qinhuangdao Sch, Qinhuangdao 066000, Peoples R China</rs_address>
<rs_organization>Northeastern Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Qinhuangdao Sch</rs_suborganization>
</rs_suborganizations>
<rs_city>Qinhuangdao</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">066000</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment. In the existed researches about ad hoc routing protocols, knowledge with trusted requirements is not supported. In this paper, the trust level is used as knowledge for routing. The security rather than shortest path is the primary concern of the method. The performance evaluation via simulations shows that the method is a promising trust routing algorithm for MANETs. The effects of this trust model on DSR route discovery mechanism are analyzed. Results show that our model can improve the performance of DSR route discovery.</p>
</abstract>
<refs count="9">
<ref>148526371</ref>
<ref>148591142</ref>
<ref>148591143</ref>
<ref>148591144</ref>
<ref>129550611</ref>
<ref>148591145</ref>
<ref>146183366</ref>
<ref>148591146</ref>
<ref>132869704</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591147" hot="yes" sortkey="3120158582" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591147" coverdate="200500" sortkey="3120158582" refkey="7648590" dbyear="2006">
<ut>000234857700116</ut>
<i_ckey>WU G0965053795LG</i_ckey>
<i_cid>0109479320</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Dynamic zone-balancing of topology-aware peer-to-peer networks</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 965-970 2005</bib_id>
<bib_pages begin="965" end="970" pages="6">965-970</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Wu, G</primaryauthor>
<author key="4228628">Liu, JL</author>
</authors>
<emails count="2">
<email>
<name>Wu, G</name>
<email_addr>wugang@email.bjut.edu.cn</email_addr>
</email>
<email>
<name>Liu, JL</name>
<email_addr>liujianl@bjut.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Wu, G</rp_author>
<rp_address>Beijing Univ Technol, Coll Comp Sci, Beijing, Peoples R China</rp_address>
<rp_organization>Beijing Univ Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Coll Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Beijing Univ Technol, Coll Comp Sci, Beijing, Peoples R China</rs_address>
<rs_organization>Beijing Univ Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>Building a topology-aware peer-to-peer overlay network can bring many advantages, such as providing locality-aware connectivity and reducing routing path length. While its benefits on performance have been recognized, an uneven overlay zone distribution has emerged. Recent work has shown that topology-aware neighbor selection during construction can aggravate the unbalance of zone distribution while it reduces routing path length. The imbalance in zone sizes may lead to performance decrease and an unfair load distribution.</p>
<p>In this paper, we present an even topology-aware peer-to-peer network based on De Bruijn Graph by developing a dynamic zone-balancing approach.</p>
</abstract>
<refs count="11">
<ref>148591148</ref>
<ref>148591149</ref>
<ref>137128788</ref>
<ref>137280668</ref>
<ref>147571032</ref>
<ref>130173830</ref>
<ref>148591150</ref>
<ref>147349535</ref>
<ref>148591151</ref>
<ref>148591152</ref>
<ref>143446447</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591160" hot="yes" sortkey="3120158585" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591160" coverdate="200500" sortkey="3120158585" refkey="3157653" dbyear="2006">
<ut>000234857700119</ut>
<i_ckey>HUAN0984053795LX</i_ckey>
<i_cid>0109479323</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Routing algorithm using SkipNet and small-world for peer-to-peer system</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 984-989 2005</bib_id>
<bib_pages begin="984" end="989" pages="6">984-989</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Huang, XQ</primaryauthor>
<author key="1204432">Chen, L</author>
<author key="3154891">Huang, LP</author>
<author key="4155070">Li, ML</author>
</authors>
<emails count="2">
<email>
<name>Huang, XQ</name>
<email_addr>huangxq@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Chen, L</name>
<email_addr>chenlin@sjtu.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Huang, XQ</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, 1954,HuaShan Rd, Shanghai 200030, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>1954,HuaShan Rd</rp_street>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we design a new routing algorithm using SkipNet and Small-World for peer-to-peer system. The algorithm divides the routing space into two layers, SkipNet layer and Small-World layer. In the SkipNet layer, the routing method using numeric ID is discussed. In the Small-World layer, the routing method using small-world theoretical results is discussed. We also consider the dynamic circumstance-the node's join and departure. The comparison of our algorithm with other algorithms is presented. Our algorithm supports content and path locality, it is very important for security consideration. In our algorithm, a few shortcuts to distant peers are inserted with some probabilities and the average path length is reduced. The preliminary simulation results show that our algorithm is efficient.</p>
</abstract>
<refs count="12">
<ref>134284694</ref>
<ref>124204868</ref>
<ref>148591161</ref>
<ref>148591162</ref>
<ref>148591163</ref>
<ref>128725171</ref>
<ref>128642665</ref>
<ref>127960285</ref>
<ref>105378900</ref>
<ref>130006317</ref>
<ref>121684257</ref>
<ref>148591164</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591165" hot="yes" sortkey="3120158586" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591165" coverdate="200500" sortkey="3120158586" refkey="3157603" dbyear="2006">
<ut>000234857700120</ut>
<i_ckey>HUAN0990053795LX</i_ckey>
<i_cid>0109479324</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Smart search over desirable topologies: Towards scalable and efficient P2P file sharing</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 990-995 2005</bib_id>
<bib_pages begin="990" end="995" pages="6">990-995</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Huang, XL</primaryauthor>
<author key="4160351">Li, Y</author>
<author key="7810348">Zhang, WJ</author>
<author key="4342664">Ma, FY</author>
</authors>
<emails count="4">
<email>
<name>Huang, XL</name>
<email_addr>huang-xl@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Li, Y</name>
<email_addr>liyin@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Zhang, WJ</name>
<email_addr>zwj03@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Ma, FY</name>
<email_addr>fyma@sjtu.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Huang, XL</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Gnutella-like peer-to-peer networks exhibit strong small-world properties and power-law node degree distributions. However, the existing flooding-based query algorithms used in such overlay networks, knowing very little about these inherent natures, scale poorly with inefficient search and heavy traffic load, which is always a challenging problem to solve. In this paper, we eye our viewpoints upon the role of overlay topology in the search performance and propose a novel solution towards scalable and efficient peer-to-peer distributed file sharing, by making better use of such emergent topological properties of these networks. We first, by examining what inspirations can be taken from these properties, provide several helpful guidelines as the design rationale of our solution, and we then propose a new technique for constructing Desirable Topologies and a novel Smart Search algorithm operating on them, as two key components of our solution. To justify the performance gains of our techniques, we also conduct extensive experiments under realistic network conditions and make an all-around comparison with currently well-known systems.</p>
</abstract>
<refs count="13">
<ref>148591166</ref>
<ref>148591167</ref>
<ref>123110033</ref>
<ref>148582148</ref>
<ref>123110075</ref>
<ref>148591168</ref>
<ref>148591169</ref>
<ref>120729734</ref>
<ref>148591170</ref>
<ref>123752256</ref>
<ref>132500081</ref>
<ref>145739964</ref>
<ref>148591171</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148591172" hot="yes" sortkey="3120158587" timescited="0" sharedrefs="0" inpi="false">
<item issue="148590450" recid="148591172" coverdate="200500" sortkey="3120158587" refkey="4192364" dbyear="2006">
<ut>000234857700121</ut>
<i_ckey>LIN 0996053795LX</i_ckey>
<i_cid>0109479325</i_cid>
<source_title>GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A scalable version control layer in P2P file system</item_title>
<sq>B4406B0</sq>
<bib_id>3795: 996-1001 2005</bib_id>
<bib_pages begin="996" end="1001" pages="6">996-1001</bib_pages>
<bib_issue year="2005" vol="3795"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Lin, X</primaryauthor>
<author key="4157189">Li, SP</author>
<author key="6382611">Shi, W</author>
<author key="6911108">Teng, J</author>
</authors>
<emails count="4">
<email>
<name>Lin, X</name>
<email_addr>alexlinxin@hotmail.com</email_addr>
</email>
<email>
<name>Li, SP</name>
<email_addr>shan@cs.zju.edu.cn</email_addr>
</email>
<email>
<name>Shi, W</name>
<email_addr>shiwei@zj139.com</email_addr>
</email>
<email>
<name>Teng, J</name>
<email_addr>starsear@hotmail.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>Lin, X</rp_author>
<rp_address>Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Peoples R China</rp_address>
<rp_organization>Zhejiang Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Coll Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Hangzhou</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">310027</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Peoples R China</rs_address>
<rs_organization>Zhejiang Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Hangzhou</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">310027</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Challenges revealed in constructing a peer-to-peer (P2P) file system are due to the difficulties of version control. There have appeared no P2P systems, which can solve these problems smoothly. In this paper we show our efforts towards solving the problems by developing a new application, SVCL (a Scalable Version Control Layer in P2P file system), in which version control servers are woven into a peer-to-peer network so that the system will not crash under single node failure. As a result, users can carry out both file updating and reading operations. Experiments have demonstrated the high performance of the proposed system.</p>
</abstract>
<refs count="8">
<ref>106257733</ref>
<ref>136462526</ref>
<ref>148591173</ref>
<ref>148591174</ref>
<ref>136791028</ref>
<ref>123110024</ref>
<ref>128138422</ref>
<ref>148591175</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148582139" hot="yes" sortkey="3120162334" timescited="0" sharedrefs="0" inpi="false">
<item issue="148582045" recid="148582139" coverdate="200500" sortkey="3120162334" refkey="2434370" dbyear="2006">
<ut>000234856100024</ut>
<i_ckey>GHAN0201053741LP</i_ckey>
<i_cid>0109478389</i_cid>
<source_title>DISTRIBUTED COMPUTING - IWDC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Oasis: A hierarchical EMST based P2P network</item_title>
<sq>B4395B0</sq>
<bib_id>3741: 201-212 2005</bib_id>
<bib_pages begin="201" end="212" pages="12">201-212</bib_pages>
<bib_issue year="2005" vol="3741"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Ghanshani, P</primaryauthor>
<author key="397043">Bansal, T</author>
</authors>
<emails count="2">
<email>
<name>Ghanshani, P</name>
<email_addr>yomanuec@iitr.ernet.in</email_addr>
</email>
<email>
<name>Bansal, T</name>
<email_addr>yahoouec@iitr.ernet.in</email_addr>
</email>
</emails>
<reprint>
<rp_author>Ghanshani, P</rp_author>
<rp_address>Indian Inst Technol, Dept Elect &amp; Comp Engn, Roorkee 247667, Uttar Pradesh, India</rp_address>
<rp_organization>Indian Inst Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Roorkee</rp_city>
<rp_state>Uttar Pradesh</rp_state>
<rp_country>India</rp_country>
<rp_zips count="1">
<rp_zip location="AC">247667</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Indian Inst Technol, Dept Elect &amp; Comp Engn, Roorkee 247667, Uttar Pradesh, India</rs_address>
<rs_organization>Indian Inst Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Roorkee</rs_city>
<rs_state>Uttar Pradesh</rs_state>
<rs_country>India</rs_country>
<rs_zips count="1">
<rs_zip location="AC">247667</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and event notification services. P2P systems based on Distributed Hash Table (DHT) such as CAN, Chord, Pastry and Tapestry, use uniform hash functions to ensure load balance in the participant nodes. But their evenly distributed behaviour in the virtual space destroys the locality between participant nodes. The topology-based hierarchical overlay networks like Grapes and Jelly, exploit the physical distance information among the nodes to construct a two-layered hierarchy. This highly improves the locality property, but disturbs the concept of decentralization as the leaders in the top layer get accessed very frequently, becoming a performance bottleneck and resulting in a single point of failure. In this paper, we propose an enhanced m-way search tree (EMST) based P2P overlay infrastructure, called Oasis. It is shown through simulation that Oasis can achieve both the decentralization and locality properties along with high fault tolerance and a logarithmic data lookup time.</p>
</abstract>
<refs count="6">
<ref>148582140</ref>
<ref>129815388</ref>
<ref>131684248</ref>
<ref>148582141</ref>
<ref>126372413</ref>
<ref>148582142</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148582155" hot="yes" sortkey="3120162336" timescited="0" sharedrefs="0" inpi="false">
<item issue="148582045" recid="148582155" coverdate="200500" sortkey="3120162336" refkey="373184" dbyear="2006">
<ut>000234856100026</ut>
<i_ckey>BALD0226053741LR</i_ckey>
<i_cid>0109478391</i_cid>
<source_title>DISTRIBUTED COMPUTING - IWDC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Churn resilience of peer-to-peer group membership: A performance analysis</item_title>
<sq>B4395B0</sq>
<bib_id>3741: 226-237 2005</bib_id>
<bib_pages begin="226" end="237" pages="12">226-237</bib_pages>
<bib_issue year="2005" vol="3741"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Baldoni, R</primaryauthor>
<author key="4712004">Mian, AN</author>
<author key="6265582">Scipioni, S</author>
<author key="7075104">Tucci-Piergiovanni, S</author>
</authors>
<reprint>
<rp_author>Baldoni, R</rp_author>
<rp_address>Univ Roma La Sapienza, DIS, Via Salaria 113, Rome, Italy</rp_address>
<rp_organization>Univ Roma La Sapienza</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>DIS</rp_suborganization>
</rp_suborganizations>
<rp_street>Via Salaria 113</rp_street>
<rp_city>Rome</rp_city>
<rp_country>Italy</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Roma La Sapienza, DIS, Rome, Italy</rs_address>
<rs_organization>Univ Roma La Sapienza</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>DIS</rs_suborganization>
</rs_suborganizations>
<rs_city>Rome</rs_city>
<rs_country>Italy</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Partitioning is one of the main problems in p2p group membership. This problem rises when failures and dynamics of peer participation, or chum, occur in the overlay topology created by a group membership protocol connecting the group of peers. Solutions based on Gossip-based Group Membership (GGM) cope well with the failures while suffer from network dynamics. This paper shows a performance evaluation of SCAMP, one of the most interesting GGM protocol. The analysis points out that the probability of partitioning of the overlay topology created by SCAMP increases with the chum rate. We also compare SCAMP with DET - another membership protocol that deterministically avoids partitions of the overlay. The comparison points out an interesting trade-off between (i) reliability, in terms of guaranteeing overlay connectivity at any chum rate, and (ii) scalability in terms of creating scalable overlay topologies where latencies experienced by a peer during join and leave operations do not increase linearly with the number of peers in the group.</p>
</abstract>
<refs count="13">
<ref>148582156</ref>
<ref>148582157</ref>
<ref>148582158</ref>
<ref>148582159</ref>
<ref>111356165</ref>
<ref>148582160</ref>
<ref>131684377</ref>
<ref>123272865</ref>
<ref>75605828</ref>
<ref>131595486</ref>
<ref>122611721</ref>
<ref>148582161</ref>
<ref>130950518</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148582162" hot="yes" sortkey="3120162337" timescited="0" sharedrefs="0" inpi="false">
<item issue="148582045" recid="148582162" coverdate="200500" sortkey="3120162337" refkey="3393638" dbyear="2006">
<ut>000234856100027</ut>
<i_ckey>JIN 0238053741LH</i_ckey>
<i_cid>0109478394</i_cid>
<source_title>DISTRIBUTED COMPUTING - IWDC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Uinta: A P2P routing algorithm based on the user's interest and the network topology</item_title>
<sq>B4395B0</sq>
<bib_id>3741: 238-249 2005</bib_id>
<bib_pages begin="238" end="249" pages="12">238-249</bib_pages>
<bib_issue year="2005" vol="3741"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Jin, H</primaryauthor>
<author key="7671460">Xu, J</author>
<author key="7851517">Zou, B</author>
<author key="7804319">Zhang, H</author>
</authors>
<emails count="4">
<email>
<name>Jin, H</name>
<email_addr>hjin@hust.edu.cn</email_addr>
</email>
<email>
<name>Xu, J</name>
<email_addr>jiexu@hust.edu.cn</email_addr>
</email>
<email>
<name>Zou, B</name>
<email_addr>zoubin0502@hubu.edu.cn</email_addr>
</email>
<email>
<name>Zhang, H</name>
<email_addr>haozhang@hust.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Jin, H</rp_author>
<rp_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Sch Comp Sci &amp; Technol, Wuhan 430074, Peoples R China</rp_address>
<rp_organization>Huazhong Univ Sci &amp; Technol</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>Cluster &amp; Grid Comp Lab</rp_suborganization>
<rp_suborganization>Sch Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Wuhan</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">430074</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Sch Comp Sci &amp; Technol, Wuhan 430074, Peoples R China</rs_address>
<rs_organization>Huazhong Univ Sci &amp; Technol</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Cluster &amp; Grid Comp Lab</rs_suborganization>
<rs_suborganization>Sch Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430074</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Hubei Univ, Sch Math &amp; Comp Sci, Wuhan 430062, Peoples R China</rs_address>
<rs_organization>Hubei Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Math &amp; Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430062</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-peer (P2P) overlay networks, such as CAN, Chord, Pastry and Tapestry, lead to high latency and low efficiency because they are independent of underlying physical networks. A well-routed lookup path in an overlay network with a small number of logical hops can result in a long delay and excessive traffic due to undesirably long distances in some physical links. In these DHT-based P2P systems, each data item is associated with a key and the key/value pair is stored in the node to which the key maps, not considering the data semantic. In this paper, we propose an effective P2P routing algorithm, called Uinta, to adaptively construct a structured P2P overlay network. Uinta not only takes advantages of physical characteristics of the network, but also places data belonging to the same semantic into a cluster and employs a class cache scheme to reduce the lookup routing latency. Simulations make some comparisons between Chord and our Uinta algorithm all running on the GT-ITM transit stub topology. The results show Uinta routing algorithm significantly improves P2P system lookup performance.</p>
</abstract>
<refs count="13">
<ref>127960294</ref>
<ref>134550530</ref>
<ref>109420759</ref>
<ref>122611831</ref>
<ref>114987452</ref>
<ref>148582163</ref>
<ref>148582164</ref>
<ref>128138409</ref>
<ref>136365875</ref>
<ref>131693421</ref>
<ref>148582165</ref>
<ref>121094066</ref>
<ref>132793758</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148579372" hot="yes" sortkey="3120162896" timescited="0" sharedrefs="0" inpi="false">
<item issue="148579252" recid="148579372" coverdate="200601" sortkey="3120162896" refkey="3625237" dbyear="2006">
<ut>000235070100009</ut>
<i_ckey>KESH0069060036CS</i_ckey>
<i_cid>0109487191</i_cid>
<source_title>COMPUTER COMMUNICATION REVIEW</source_title>
<source_abbrev>COMPUT COMMUN REV</source_abbrev>
<item_title>Efficient and decentralized computation of approximate global state</item_title>
<sq>13273J0</sq>
<bib_id>36 (1): 69-73 JAN 2006</bib_id>
<bib_pages begin="69" end="73" pages="5">69-73</bib_pages>
<bib_issue year="2006" vol="36"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Keshav, S</primaryauthor>
</authors>
<reprint>
<rp_author>Keshav, S</rp_author>
<rp_address>Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada</rp_address>
<rp_organization>Univ Waterloo</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Waterloo</rp_city>
<rp_state>ON</rp_state>
<rp_country>Canada</rp_country>
<rp_zips count="1">
<rp_zip location="AP">N2L 3G1</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada</rs_address>
<rs_organization>Univ Waterloo</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Waterloo</rs_city>
<rs_state>ON</rs_state>
<rs_country>Canada</rs_country>
<rs_zips count="1">
<rs_zip location="AP">N2L 3G1</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The need for efficient computation of approximate global state lies at the heart of a wide range of problems in distributed systems. Examples include routing in the Internet, sensor fusion, search in peer-to-peer networks, coordinated intrusion detection, and Top-K queries in stream-oriented databases. Efficient algorithms that determine approximate global state could enable near-optimal local decision-making with little overhead. In this position paper, we model this problem and summarize recent work on randomized algorithms that navigate a four-way tradeoff between accuracy, robustness, performance and overhead. Despite these recent successes, many open problems remain. We believe that solving these problems can radically improve the design of robust, efficient and self-managed distributed systems.</p>
</abstract>
<refs count="19">
<ref>148579373</ref>
<ref>148579374</ref>
<ref>148579375</ref>
<ref>148579376</ref>
<ref>148579377</ref>
<ref>146182948</ref>
<ref>148579378</ref>
<ref>148579379</ref>
<ref>115519946</ref>
<ref>148579380</ref>
<ref>148579381</ref>
<ref>148579382</ref>
<ref>137545132</ref>
<ref>129634607</ref>
<ref>148579383</ref>
<ref>132892657</ref>
<ref>128988080</ref>
<ref>136798815</ref>
<ref>148579384</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148562731" hot="yes" sortkey="3120168045" timescited="0" sharedrefs="0" inpi="false">
<item issue="148562598" recid="148562731" coverdate="200500" sortkey="3120168045" refkey="88905" dbyear="2006">
<ut>000234885900031</ut>
<i_ckey>ALAE0298053827LS</i_ckey>
<i_cid>0109486369</i_cid>
<source_title>ALGORITHMS AND COMPUTATION</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>SkipTree: A scalable range-queryable distributed data structure for multidimensional data</item_title>
<sq>B4424B0</sq>
<bib_id>3827: 298-307 2005</bib_id>
<bib_pages begin="298" end="307" pages="10">298-307</bib_pages>
<bib_issue year="2005" vol="3827"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Alaei, S</primaryauthor>
<author key="7010961">Toossi, M</author>
<author key="2437365">Ghodsi, M</author>
</authors>
<reprint>
<rp_author>Alaei, S</rp_author>
<rp_address>Sharif Univ Technol, Dept Comp Engn, Tehran, Iran</rp_address>
<rp_organization>Sharif Univ Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Tehran</rp_city>
<rp_country>Iran</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Sharif Univ Technol, Dept Comp Engn, Tehran, Iran</rs_address>
<rs_organization>Sharif Univ Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Tehran</rs_city>
<rs_country>Iran</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper presents the SkipTree, anew balanced, distributed data structure for storing data with multidimensional keys in a peer-to-peer network. The SkipTree supports range queries as well as single point queries which are routed in O(log n) hops. SkipTree is fully decentralized with each node being connected to O(log n) other nodes. The memory usage for maintaining the links at each node is O(log n log log n) on average and O(log(2) n) in the worst case. Load balance is also guaranteed to be within a constant factor.</p>
</abstract>
<refs count="13">
<ref>131693334</ref>
<ref>131693335</ref>
<ref>148562732</ref>
<ref>148562733</ref>
<ref>146940626</ref>
<ref>148562734</ref>
<ref>128939461</ref>
<ref>99194698</ref>
<ref>148562735</ref>
<ref>130352959</ref>
<ref>148562736</ref>
<ref>127746529</ref>
<ref>148562737</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148562820" hot="yes" sortkey="3120168067" timescited="0" sharedrefs="0" inpi="false">
<item issue="148562598" recid="148562820" coverdate="200500" sortkey="3120168067" refkey="5044934" dbyear="2006">
<ut>000234885900053</ut>
<i_ckey>NEHE0524053827LM</i_ckey>
<i_cid>0109486536</i_cid>
<source_title>ALGORITHMS AND COMPUTATION</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An improved interval routing scheme for almost all networks based on dominating cliques</item_title>
<sq>B4424B0</sq>
<bib_id>3827: 524-532 2005</bib_id>
<bib_pages begin="524" end="532" pages="9">524-532</bib_pages>
<bib_issue year="2005" vol="3827"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Nehez, M</primaryauthor>
<author key="5232531">Olejar, D</author>
</authors>
<emails count="1">
<email>
<name>Nehez, M</name>
<email_addr>nehez@fel.cvut.cz</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>interval routing</keyword>
<keyword>random graphs</keyword>
<keyword>dominating cliques</keyword>
<keyword>additive stretch routing scheme</keyword>
</keywords>
<keywords_plus count="3">
<keyword>RANDOM GRAPHS</keyword>
<keyword>INCOMPRESSIBILITY METHOD</keyword>
<keyword>SYSTEMS</keyword>
</keywords_plus>
<reprint>
<rp_author>Nehez, M</rp_author>
<rp_address>FEE CTU Prague, Dept Comp Sci &amp; Engn, Karlovo Namesti 13, Prague 12135 2, Czech Republic</rp_address>
<rp_organization>FEE CTU Prague</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>Karlovo Namesti 13</rp_street>
<rp_city>Prague</rp_city>
<rp_country>Czech Republic</rp_country>
<rp_zips count="1">
<rp_zip location="AC">12135 2</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>FEE CTU Prague, Dept Comp Sci &amp; Engn, Prague 12135 2, Czech Republic</rs_address>
<rs_organization>FEE CTU Prague</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Prague</rs_city>
<rs_country>Czech Republic</rs_country>
<rs_zips count="1">
<rs_zip location="AC">12135 2</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Comenius Univ, FMPI, Dept Comp Sci, Bratislava 84248, Slovakia</rs_address>
<rs_organization>Comenius Univ</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>FMPI</rs_suborganization>
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Bratislava</rs_city>
<rs_country>Slovakia</rs_country>
<rs_zips count="1">
<rs_zip location="AC">84248</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Motivated by the peer-to-peer content sharing systems in large-scale networks, we will study interval routing schemes in Erdos-Renyi random graphs. C. Gavoille and D. Peleg [13] posed an open question of whether almost all networks support a shortest-path interval routing scheme with 1 interval. In this paper, we answer this question partially by proving that in almost all networks, there is an interval routing scheme with 1 interval up to additive stretch 2. Our proof is based on the properties of dominating cliques in random graphs.</p>
</abstract>
<refs count="28">
<ref>148562821</ref>
<ref>30370732</ref>
<ref>148562822</ref>
<ref>112995460</ref>
<ref>109912574</ref>
<ref>107722924</ref>
<ref>105823484</ref>
<ref>104446422</ref>
<ref>128068353</ref>
<ref>38472827</ref>
<ref>143321882</ref>
<ref>143321883</ref>
<ref>131075963</ref>
<ref>116489590</ref>
<ref>136484952</ref>
<ref>117200197</ref>
<ref>148562823</ref>
<ref>148562824</ref>
<ref>128643762</ref>
<ref>148562825</ref>
<ref>125257006</ref>
<ref>83711564</ref>
<ref>148562826</ref>
<ref>148562827</ref>
<ref>59590636</ref>
<ref>121027629</ref>
<ref>63299659</ref>
<ref>148562828</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148548619" hot="yes" sortkey="3120209122" timescited="0" sharedrefs="0" inpi="false">
<item issue="148548513" recid="148548619" coverdate="200500" sortkey="3120209122" refkey="6059380" dbyear="2006">
<ut>000234716300013</ut>
<i_ckey>SAHI0157053826LO</i_ckey>
<i_cid>0109395712</i_cid>
<source_title>SERVICE-ORIENTED COMPUTING - ICSOC 2005</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>SPiDeR: P2P-based Web service discovery</item_title>
<sq>B4324B0</sq>
<bib_id>3826: 157-169 2005</bib_id>
<bib_pages begin="157" end="169" pages="13">157-169</bib_pages>
<bib_issue year="2005" vol="3826"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="6">
<primaryauthor>Sahin, OD</primaryauthor>
<author key="2420318">Gerede, CE</author>
<author key="60764">Agrawal, D</author>
<author key="1926312">El Abbadi, A</author>
<author key="3217942">Ibarra, O</author>
<author key="6747856">Su, JW</author>
</authors>
<emails count="6">
<email>
<name>Sahin, OD</name>
<email_addr>odsahin@cs.ucsb.edu</email_addr>
</email>
<email>
<name>Gerede, CE</name>
<email_addr>gerede@cs.ucsb.edu</email_addr>
</email>
<email>
<name>Agrawal, D</name>
<email_addr>agrawal@cs.ucsb.edu</email_addr>
</email>
<email>
<name>El Abbadi, A</name>
<email_addr>amr@cs.ucsb.edu</email_addr>
</email>
<email>
<name>Ibarra, O</name>
<email_addr>ibarra@cs.ucsb.edu</email_addr>
</email>
<email>
<name>Su, JW</name>
<email_addr>su@cs.ucsb.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Sahin, OD</rp_author>
<rp_address>Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA</rp_address>
<rp_organization>Univ Calif Santa Barbara</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Santa Barbara</rp_city>
<rp_state>CA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">93106</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA</rs_address>
<rs_organization>Univ Calif Santa Barbara</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Santa Barbara</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">93106</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we describe SPiDeR, a peer-to-peer (P2P) based framework that supports a variety of Web service discovery operations. SPiDeR organizes the service providers into a structured P2P overlay and allows them to advertise and lookup services in a completely decentralized and dynamic manner. It supports three different kinds of search operations: For advertising and locating services, service providers can use keywords extracted from service descriptions (keyword-based search), categories from a global ontology (ontology-based search), and/or paths from the service automaton (behavior-based search). The users can also rate the quality of the services they use. The ratings are accumulated within the system so that users can query for the quality ratings of the discovered services. Finally, we present the performance of SPiDeR in terms of routing using a simulator.</p>
</abstract>
<refs count="30">
<ref>148548620</ref>
<ref>134866748</ref>
<ref>148548621</ref>
<ref>148548622</ref>
<ref>148548623</ref>
<ref>146215991</ref>
<ref>148548624</ref>
<ref>135228847</ref>
<ref>98757509</ref>
<ref>148548625</ref>
<ref>148548626</ref>
<ref>148548627</ref>
<ref>148548628</ref>
<ref>148548629</ref>
<ref>148548630</ref>
<ref>148548631</ref>
<ref>148548632</ref>
<ref>148548633</ref>
<ref>148548634</ref>
<ref>148548635</ref>
<ref>131693412</ref>
<ref>131684220</ref>
<ref>134233548</ref>
<ref>148548636</ref>
<ref>148548637</ref>
<ref>131693413</ref>
<ref>148548638</ref>
<ref>148548639</ref>
<ref>148548640</ref>
<ref>133716688</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148548755" hot="yes" sortkey="3120209136" timescited="0" sharedrefs="0" inpi="false">
<item issue="148548513" recid="148548755" coverdate="200500" sortkey="3120209136" refkey="539926" dbyear="2006">
<ut>000234716300027</ut>
<i_ckey>BENB0353053826LS</i_ckey>
<i_cid>0109395757</i_cid>
<source_title>SERVICE-ORIENTED COMPUTING - ICSOC 2005</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Implicit service calls in ActiveXML through OWL-S</item_title>
<sq>B4324B0</sq>
<bib_id>3826: 353-365 2005</bib_id>
<bib_pages begin="353" end="365" pages="13">353-365</bib_pages>
<bib_issue year="2005" vol="3826"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Benbernou, S</primaryauthor>
<author key="2900402">He, XJ</author>
<author key="2732501">Hacid, MS</author>
</authors>
<emails count="3">
<email>
<name>Benbernou, S</name>
<email_addr>sbenbern@bat710.univ-lyon1.fr</email_addr>
</email>
<email>
<name>He, XJ</name>
<email_addr>x-he04@bat710.univ-lyon1.fr</email_addr>
</email>
<email>
<name>Hacid, MS</name>
<email_addr>mshacid@bat710.univ-lyon1.fr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Benbernou, S</rp_author>
<rp_address>Univ Lyon 1, LIRIS, 43 Bld 11 Novembre 1918, F-69622 Villeurbanne, France</rp_address>
<rp_organization>Univ Lyon 1</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>LIRIS</rp_suborganization>
</rp_suborganizations>
<rp_street>43 Bld 11 Novembre 1918</rp_street>
<rp_city>Villeurbanne</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-69622</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Lyon 1, LIRIS, F-69622 Villeurbanne, France</rs_address>
<rs_organization>Univ Lyon 1</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>LIRIS</rs_suborganization>
</rs_suborganizations>
<rs_city>Villeurbanne</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-69622</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we present a framework for implicit service calls in data centric Peer to Peer Active XML language. Active XML is a language devoted to the management of distributed data by embedding Web service calls into XML document. The aim of implicit calls is to allow dynamic data sources discovey through dynamic services discovery and composition. Implicit service calls are based on the use of ontologies for describing the domain and functionality of services to call and an Active XML engine for calls evaluation. The evaluation process deals mainly with dynamic service composition. It consists in matching OWLS descriptions contained in a query with service descriptions in a peer-to-peer network. Such a network is structured in such a way that peers with similar functionalities are grouped together and each peer makes itself acquainted with matching relationships between its inputs/outputs and those of other peers.</p>
</abstract>
<refs count="13">
<ref>148548756</ref>
<ref>148548757</ref>
<ref>148548758</ref>
<ref>148548759</ref>
<ref>148548760</ref>
<ref>148548761</ref>
<ref>148548762</ref>
<ref>148548763</ref>
<ref>148548764</ref>
<ref>148548765</ref>
<ref>148548766</ref>
<ref>148499486</ref>
<ref>148548767</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148548899" hot="yes" sortkey="3120209153" timescited="0" sharedrefs="0" inpi="false">
<item issue="148548513" recid="148548899" coverdate="200500" sortkey="3120209153" refkey="2446029" dbyear="2006">
<ut>000234716300044</ut>
<i_ckey>GIBE0527053826LN</i_ckey>
<i_cid>0109395801</i_cid>
<source_title>SERVICE-ORIENTED COMPUTING - ICSOC 2005</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Efficient and transparent web-services selection</item_title>
<sq>B4324B0</sq>
<bib_id>3826: 527-532 2005</bib_id>
<bib_pages begin="527" end="532" pages="6">527-532</bib_pages>
<bib_issue year="2005" vol="3826"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Gibelin, N</primaryauthor>
<author key="4406081">Makpangou, M</author>
</authors>
<emails count="2">
<email>
<name>Gibelin, N</name>
<email_addr>nicolas.gibelin@inria.fr</email_addr>
</email>
<email>
<name>Makpangou, M</name>
<email_addr>mesaac.makpangou@inria.fr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Gibelin, N</rp_author>
<rp_address>Inst Natl Rech Informat &amp; Automat, Regak Project, BP 105, F-78153 Le Chesnay, France</rp_address>
<rp_organization>Inst Natl Rech Informat &amp; Automat</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Regak Project</rp_suborganization>
</rp_suborganizations>
<rp_street>BP 105</rp_street>
<rp_city>Le Chesnay</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-78153</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Inst Natl Rech Informat &amp; Automat, Regak Project, F-78153 Le Chesnay, France</rs_address>
<rs_organization>Inst Natl Rech Informat &amp; Automat</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Regak Project</rs_suborganization>
</rs_suborganizations>
<rs_city>Le Chesnay</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-78153</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Web services technology standards enable description, publication, discovery of and binding to services distributed towards the Internet. However, current standards do not address the service selection issue : how did a consumer select the service that matches its functional (e.g. operations' semantics) and non-functional (e.g. price, reputation, response time) properties ? Most projects advocate automatic selection mechanism, advising adaptation or modification of the web-services model and its entities (UDDI, WSDL, Client, Provider). These proposals also do not take advantage of distributed-systems' state of the art, mainly with respect to the collection and the dissemination of services' QoS. This paper presents an extension of the initial model that permits automatic service selection, late binding and collection of metrics that characterize the quality of service. The extension consists on a web-service access infrastructure, made of web service proxies and a peer to peer network of QoS metrics repository (the proposal does not impose modification on UDDI registries or services). The proxies interact with common UDDI registries to find suitable services for selection and to publish descriptions. They collect QoS metrics and store them on a p2p network.</p>
</abstract>
<refs count="8">
<ref>147328128</ref>
<ref>148548900</ref>
<ref>148548901</ref>
<ref>128315031</ref>
<ref>148548902</ref>
<ref>148548903</ref>
<ref>147390085</ref>
<ref>148548904</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148526839" hot="yes" sortkey="3120214629" timescited="0" sharedrefs="0" inpi="false">
<item issue="148526215" recid="148526839" coverdate="200500" sortkey="3120214629" refkey="2551084" dbyear="2006">
<ut>000234715200097</ut>
<i_ckey>GOPA1006053794LA</i_ckey>
<i_cid>0109395352</i_cid>
<source_title>MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>POST: A peer-to-peer overlay structure for service and application deployment in MANETs</item_title>
<sq>B4320B0</sq>
<bib_id>3794: 1006-1015 2005</bib_id>
<bib_pages begin="1006" end="1015" pages="10">1006-1015</bib_pages>
<bib_issue year="2005" vol="3794"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Gopalan, A</primaryauthor>
<author key="7846589">Znati, T</author>
</authors>
<emails count="2">
<email>
<name>Gopalan, A</name>
<email_addr>axgopala@cs.pitt.edu</email_addr>
</email>
<email>
<name>Znati, T</name>
<email_addr>znati@cs.pitt.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Gopalan, A</rp_author>
<rp_address>Univ Pittsburgh, Dept Comp Sci, Pittsburgh, PA 15260 USA</rp_address>
<rp_organization>Univ Pittsburgh</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Pittsburgh</rp_city>
<rp_state>PA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">15260</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Pittsburgh, Dept Comp Sci, Pittsburgh, PA 15260 USA</rs_address>
<rs_organization>Univ Pittsburgh</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Pittsburgh</rs_city>
<rs_state>PA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">15260</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Ad-hoc networks are an emerging technology with immense potential. Providing support for large-scale service and application deployment in these networks, however is crucial to make them a viable alternative. The lack of infrastructure, coupled with the time-varying characteristics of ad-hoc networks, brings about new challenges to the design and deployment of applications. This paper addresses these challenges and presents a unified, overlay-based service architecture to support large-scale service and application deployment in ad-hoc networks. We discuss the main functionalities of the architecture and describe the algorithms for object registration and discovery. Finally, the proposed architecture was evaluated using simulations and the results show that the architecture performs well under different network conditions.</p>
</abstract>
<refs count="16">
<ref>148526840</ref>
<ref>118355348</ref>
<ref>148526841</ref>
<ref>132539751</ref>
<ref>123110032</ref>
<ref>148526842</ref>
<ref>148526843</ref>
<ref>148526844</ref>
<ref>121880992</ref>
<ref>148526845</ref>
<ref>148526846</ref>
<ref>128725171</ref>
<ref>128882241</ref>
<ref>148526847</ref>
<ref>148526848</ref>
<ref>99457048</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148526849" hot="yes" sortkey="3120214630" timescited="0" sharedrefs="0" inpi="false">
<item issue="148526215" recid="148526849" coverdate="200500" sortkey="3120214630" refkey="4119371" dbyear="2006">
<ut>000234715200098</ut>
<i_ckey>LEUN1016053794LA</i_ckey>
<i_cid>0109395354</i_cid>
<source_title>MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An efficient and practical greedy algorithm for server-peer selection in wireless peer-to-peer file sharing networks</item_title>
<sq>B4320B0</sq>
<bib_id>3794: 1016-1025 2005</bib_id>
<bib_pages begin="1016" end="1025" pages="10">1016-1025</bib_pages>
<bib_issue year="2005" vol="3794"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Leung, AKH</primaryauthor>
<author key="3929201">Kwok, YK</author>
</authors>
<emails count="2">
<email>
<name>Leung, AKH</name>
<email_addr>khleung@eee.hku.hk</email_addr>
</email>
<email>
<name>Kwok, YK</name>
<email_addr>ykwok@eee.hku.hk</email_addr>
</email>
</emails>
<keywords count="6">
<keyword>wireless networking</keyword>
<keyword>P2P systems</keyword>
<keyword>file sharing</keyword>
<keyword>energy efficiency</keyword>
<keyword>fairness</keyword>
<keyword>greedy algorithm</keyword>
</keywords>
<reprint>
<rp_author>Kwok, YK</rp_author>
<rp_address>Univ Hong Kong, Dept Elect &amp; Elect Engn, Pokfulam, Hong Kong, Hong Kong, Peoples R China</rp_address>
<rp_organization>Univ Hong Kong</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Elect Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>Pokfulam</rp_street>
<rp_city>Hong Kong</rp_city>
<rp_state>Hong Kong</rp_state>
<rp_country>Peoples R China</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Hong Kong, Dept Elect &amp; Elect Engn, Hong Kong, Hong Kong, Peoples R China</rs_address>
<rs_organization>Univ Hong Kong</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Elect Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Hong Kong</rs_city>
<rs_state>Hong Kong</rs_state>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Toward a new era of "Ubiquitous Networking" where people are interconnected in anywhere and at anytime via, the wired and wireless Internet, we have witnessed an increasing level of impromptu interactions among human beings in recent years. One important aspect of these interactions is the Peer-to-Peer (P2P) Networking that is becoming a dominant traffic source in the wired Internet. In these Internet overlay networks, users are allowed to exchange information through instant messaging and file sharing. Unfortunately, most of the previous work proposed in the literature on P2P networking is designed for the traditional wired Internet, without much regard to important issues pertinent to wireless communications. In this paper, we attempt to provide some insight into P2P networking with respect to a wireless environment. We focus on P2P file sharing, already a hot application in the wired Internet, and will be equally important in the wireless counterpart. We propose a greedy server-peer selection algorithm to decide from which peer should a client download files so that the level of fairness of the whole network is increased and expected service life of the whole file sharing network is extended. We also propose a new performance metric called Energy-Based Data Availability, EBDA, which is an important performance metric for improving the effectiveness of a wireless P2P file sharing network.</p>
</abstract>
<refs count="23">
<ref>119427853</ref>
<ref>148526850</ref>
<ref>148526851</ref>
<ref>148526852</ref>
<ref>148526853</ref>
<ref>131232396</ref>
<ref>148526854</ref>
<ref>148526855</ref>
<ref>148526856</ref>
<ref>148526857</ref>
<ref>124736552</ref>
<ref>148526858</ref>
<ref>148526859</ref>
<ref>148526860</ref>
<ref>101973224</ref>
<ref>148526861</ref>
<ref>2055097</ref>
<ref>96889000</ref>
<ref>131098707</ref>
<ref>128642665</ref>
<ref>128939454</ref>
<ref>132793758</ref>
<ref>148526862</ref>
</refs>
</item>
</REC>
</records>
</response>

Event Timeline