Page MenuHomec4science

r-201.xml
No OneTemporary

File Metadata

Created
Wed, Jan 8, 06:55

r-201.xml

<?xml version="1.0" encoding="UTF-8" ?>
<response>
<sessionID>B18PHPo8FC1Gga9bHo8</sessionID>
<searchResults>
<queryID>2</queryID>
<occurancesFound>5670</occurancesFound>
<recordsFound>1641</recordsFound>
<recordsSearched>36250344</recordsSearched>
</searchResults>
<records>
<REC inst_id="0" recid="149337584" hot="yes" sortkey="3119749140" timescited="0" sharedrefs="0" inpi="false">
<item issue="149337363" recid="149337584" coverdate="200500" sortkey="3119749140" refkey="12257" dbyear="2006">
<ut>000235835600025</ut>
<i_ckey>ABEC0222053782LA</i_ckey>
<i_cid>0109934310</i_cid>
<source_title>PROFESSIONAL KNOWLEDGE MANAGEMENT</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>PAIKM-2005 - Peer-to-Peer and agent infrastructures for knowledge management</item_title>
<sq>B5029B0</sq>
<bib_id>3782: 222-223 2005</bib_id>
<bib_pages begin="222" end="223" pages="2">222-223</bib_pages>
<bib_issue year="2005" vol="3782"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Abecker, A</primaryauthor>
<author key="7167510">van Elst, L</author>
<author key="6628237">Staab, S</author>
</authors>
<emails count="3">
<email>
<name>Abecker, A</name>
<email_addr>abecker@fzi.de</email_addr>
</email>
<email>
<name>van Elst, L</name>
<email_addr>elst@dfki.de</email_addr>
</email>
<email>
<name>Staab, S</name>
<email_addr>staab@uni-koblenz.de</email_addr>
</email>
</emails>
<reprint>
<rp_author>Abecker, A</rp_author>
<rp_address>FZI, Karlsruhe, Germany</rp_address>
<rp_organization>FZI</rp_organization>
<rp_city>Karlsruhe</rp_city>
<rp_country>Germany</rp_country>
</reprint>
<research_addrs count="3">
<research>
<rs_address>FZI, Karlsruhe, Germany</rs_address>
<rs_organization>FZI</rs_organization>
<rs_city>Karlsruhe</rs_city>
<rs_country>Germany</rs_country>
</research>
<research>
<rs_address>German Res Ctr AI, Kaiserslautern, Germany</rs_address>
<rs_organization>German Res Ctr AI</rs_organization>
<rs_city>Kaiserslautern</rs_city>
<rs_country>Germany</rs_country>
</research>
<research>
<rs_address>Univ Koblenz Landau, Inst Comp Sci, Koblenz, Germany</rs_address>
<rs_organization>Univ Koblenz Landau</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Inst Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Koblenz</rs_city>
<rs_country>Germany</rs_country>
</research>
</research_addrs>
<abstract avail="N"/>
<refs count="0"/>
</item>
</REC>
<REC inst_id="0" recid="149337585" hot="yes" sortkey="3119749141" timescited="0" sharedrefs="0" inpi="false">
<item issue="149337363" recid="149337585" coverdate="200500" sortkey="3119749141" refkey="1431118" dbyear="2006">
<ut>000235835600026</ut>
<i_ckey>COUR0224053782LS</i_ckey>
<i_cid>0109934312</i_cid>
<source_title>PROFESSIONAL KNOWLEDGE MANAGEMENT</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>Automatic hyperlink creation using P2P and publish/subscribe</item_title>
<sq>B5029B0</sq>
<bib_id>3782: 224-233 2005</bib_id>
<bib_pages begin="224" end="233" pages="10">224-233</bib_pages>
<bib_issue year="2005" vol="3782"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Courtenage, S</primaryauthor>
<author key="7558602">Williams, S</author>
</authors>
<emails count="2">
<email>
<name>Courtenage, S</name>
<email_addr>courtes@wmin.ac.uk</email_addr>
</email>
<email>
<name>Williams, S</name>
<email_addr>williast@wmin.ac.uk</email_addr>
</email>
</emails>
<reprint>
<rp_author>Courtenage, S</rp_author>
<rp_address>Univ Westminster, Cavendish Sch Comp Sci, 115 New Cavendish St, London W1R 8AL, England</rp_address>
<rp_organization>Univ Westminster</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cavendish Sch Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>115 New Cavendish St</rp_street>
<rp_city>London</rp_city>
<rp_country>England</rp_country>
<rp_zips count="1">
<rp_zip location="AC">W1R 8AL</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Westminster, Cavendish Sch Comp Sci, London W1R 8AL, England</rs_address>
<rs_organization>Univ Westminster</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cavendish Sch Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>London</rs_city>
<rs_country>England</rs_country>
<rs_zips count="1">
<rs_zip location="AC">W1R 8AL</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="3">
<p>The World-Wide Web allows users to quickly and easily publish information in the form of web pages. Pages are linked to other pages already on the web using a hyperlink inserted into a web page by the page's author that contains the URL address of another existing web page. This model of web publishing, although simple and efficient, also has the effect that links between pages must be created manually and only to pages that are known to the author of the links. This can be a disadvantage if, for example, information in a particular field is incomplete and expanding rapidly over time, and where a page author cannot be expected to know which pages are the most appropriate to link to and when they become available.</p>
<p>In this paper, we look at a radically different model of web publishing in which the author of a web page does not specify links using URLs. Instead, the page author expresses an interest about the kind of content the page should link to and as new content comes online that matches that interest, links are inserted automatically into the original page to point to the new content. This leads to the possibility that a hyperlink from a particular location in a web page can lead to multiple destinations, something we call a multi-valued hyperlink.</p>
<p>We also describe a prototype implementation of our web architecture, based on the CHORD-based peer-to-peer overlay network, which uses publish/subscribe to communicate page author interests to other peers in order to create links between pages.</p>
</abstract>
<refs count="15">
<ref>134911723</ref>
<ref>120901131</ref>
<ref>147907083</ref>
<ref>147907084</ref>
<ref>147907086</ref>
<ref>147907088</ref>
<ref>147907089</ref>
<ref>149337586</ref>
<ref>147907092</ref>
<ref>130950557</ref>
<ref>147907094</ref>
<ref>123110037</ref>
<ref>149337587</ref>
<ref>147907096</ref>
<ref>147907097</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149337588" hot="yes" sortkey="3119749142" timescited="0" sharedrefs="0" inpi="false">
<item issue="149337363" recid="149337588" coverdate="200500" sortkey="3119749142" refkey="6179985" dbyear="2006">
<ut>000235835600027</ut>
<i_ckey>SCHE0234053782LS</i_ckey>
<i_cid>0109934326</i_cid>
<source_title>PROFESSIONAL KNOWLEDGE MANAGEMENT</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>Introducing social aspects to search in peer-to-peer networks</item_title>
<sq>B5029B0</sq>
<bib_id>3782: 234-242 2005</bib_id>
<bib_pages begin="234" end="242" pages="9">234-242</bib_pages>
<bib_issue year="2005" vol="3782"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Schenk, S</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Schenk, S</name>
<email_addr>simon.schenk@whitepla.net</email_addr>
</email>
</emails>
<reprint>
<rp_author>Schenk, S</rp_author>
<rp_address>FH NORDAKADMIE, Kollner Chaussee 11, D-25337 Elmshorn, Germany</rp_address>
<rp_organization>FH NORDAKADMIE</rp_organization>
<rp_street>Kollner Chaussee 11</rp_street>
<rp_city>Elmshorn</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-25337</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>FH NORDAKADMIE, D-25337 Elmshorn, Germany</rs_address>
<rs_organization>FH NORDAKADMIE</rs_organization>
<rs_city>Elmshorn</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-25337</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Searching social networks is determined by two factors: reputation and relevance. Reputation is the memory and summary of behavior from past transactions. Relevance is the probability that useful information can be obtained from a person. Search in social networks is performed by asking persons of high relevance and a good reputation or persons who are supposed to know somebody like that. We describe how these social aspects can be used in peer-to-peer networks in order to increase efficiency and scalability. Based on a social peer-to-peer network a knowledge management application with advantages over centralized approaches can be implemented.</p>
</abstract>
<refs count="25">
<ref>149337589</ref>
<ref>149337590</ref>
<ref>18404182</ref>
<ref>149337591</ref>
<ref>149337592</ref>
<ref>130246228</ref>
<ref>142351342</ref>
<ref>136088587</ref>
<ref>149337593</ref>
<ref>136467998</ref>
<ref>149337594</ref>
<ref>149337595</ref>
<ref>149337596</ref>
<ref>129695736</ref>
<ref>149337597</ref>
<ref>149337598</ref>
<ref>105427774</ref>
<ref>149337599</ref>
<ref>149337600</ref>
<ref>149337601</ref>
<ref>149337602</ref>
<ref>137391429</ref>
<ref>16172046</ref>
<ref>124754941</ref>
<ref>92398658</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149290588" hot="yes" sortkey="3119763083" timescited="0" sharedrefs="0" inpi="false">
<item issue="149290578" recid="149290588" coverdate="200605" sortkey="3119763083" refkey="1255711" dbyear="2006">
<ut>000236161700003</ut>
<i_ckey>CHOU0419060017IJ</i_ckey>
<i_cid>0109991568</i_cid>
<source_title>IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS</source_title>
<source_abbrev>IEEE T PARALL DISTR</source_abbrev>
<item_title>SCALLOP: A scalable and load-balanced peer-to-peer lookup protocol</item_title>
<sq>09422J0</sq>
<bib_id>17 (5): 419-433 MAY 2006</bib_id>
<bib_pages begin="419" end="433" pages="15">419-433</bib_pages>
<bib_issue year="2006" vol="17"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Chou, JCY</primaryauthor>
<author key="3156869">Huang, TY</author>
<author key="3154551">Huang, KL</author>
<author key="1209402">Chen, TY</author>
</authors>
<emails count="3">
<email>
<name>Chou, JCY</name>
<email_addr>jchou@csag.ucsd.edu</email_addr>
</email>
<email>
<name>Huang, TY</name>
<email_addr>tyhuang@cs.nthu.edu.tw</email_addr>
</email>
<email>
<name>Huang, KL</name>
<email_addr>yen@eos.cs.nthu.edu.tw</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer distributed systems</keyword>
<keyword>lookup protocols</keyword>
<keyword>routing bottlenecks</keyword>
<keyword>balanced routing</keyword>
</keywords>
<reprint>
<rp_author>Chou, JCY</rp_author>
<rp_address>Univ Calif San Diego, San Diego, CA 92103 USA</rp_address>
<rp_organization>Univ Calif San Diego</rp_organization>
<rp_city>San Diego</rp_city>
<rp_state>CA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">92103</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Calif San Diego, San Diego, CA 92103 USA</rs_address>
<rs_organization>Univ Calif San Diego</rs_organization>
<rs_city>San Diego</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">92103</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan</rs_address>
<rs_organization>Natl Tsing Hua Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Hsinchu</rs_city>
<rs_country>Taiwan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">300</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A number of structured peer-to-peer (P2P) lookup protocols have been proposed recently. A P2P lookup protocol routes a lookup request to its target node in a P2P distributed system. Existing protocols achieve balanced routing traffic among nodes by assuming that lookup requests are evenly targeted at every node. However, when lookup requests concentrate on a few nodes simultaneously, these nodes become hot spots. Due to uneven routing patterns in existing protocols, hot spots cause unbalanced routing traffic which leads to routing bottlenecks. In this paper, we present a novel structured P2P lookup protocol called SCALLOP that delivers balanced routing and avoids routing bottlenecks at occurrences of hot spots. Among existing protocols, SCALLOP is the first one to accomplish this goal at the fundamental nature of a routing protocol. SCALLOP achieves balanced routing by uniquely constructing a balanced lookup tree for each node. The balanced tree evenly distributes routing traffic among sibling nodes and, therefore, avoids or reduces routing bottlenecks. In addition, as a load-balanced protocol, SCALLOP delivers asymptotically optimal lookup performance at the tradeoff between routing path and routing table size. We conducted a set of simulations to demonstrate the effectiveness of SCALLOP. The results show that, compared with a most-referenced and representative structured P2P lookup protocol and a graph-based extension of this protocol, SCALLOP significantly reduces routing bottlenecks while all three protocols deliver comparable lookup performance.</p>
</abstract>
<refs count="34">
<ref>149290589</ref>
<ref>149290590</ref>
<ref>149290591</ref>
<ref>121684233</ref>
<ref>137494718</ref>
<ref>149290592</ref>
<ref>149290593</ref>
<ref>123110013</ref>
<ref>149290594</ref>
<ref>135614294</ref>
<ref>149290595</ref>
<ref>149290596</ref>
<ref>148591040</ref>
<ref>143848821</ref>
<ref>149290597</ref>
<ref>137015234</ref>
<ref>109420759</ref>
<ref>122611831</ref>
<ref>147349528</ref>
<ref>149290598</ref>
<ref>137280668</ref>
<ref>130352959</ref>
<ref>149290599</ref>
<ref>134865390</ref>
<ref>111651653</ref>
<ref>134538952</ref>
<ref>123110024</ref>
<ref>128882241</ref>
<ref>131684148</ref>
<ref>122611834</ref>
<ref>122611823</ref>
<ref>149290600</ref>
<ref>121684257</ref>
<ref>137128813</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149289708" hot="yes" sortkey="3119763249" timescited="0" sharedrefs="0" inpi="false">
<item issue="149289705" recid="149289708" coverdate="200603" sortkey="3119763249" refkey="5233516" dbyear="2006">
<ut>000236055100002</ut>
<i_ckey>OLFA0401060051IR</i_ckey>
<i_cid>0109925773</i_cid>
<source_title>IEEE TRANSACTIONS ON AUTOMATIC CONTROL</source_title>
<source_abbrev>IEEE T AUTOMAT CONTR</source_abbrev>
<item_title>Flocking for multi-agent dynamic systems: Algorithms and theory</item_title>
<sq>42592J0</sq>
<bib_id>51 (3): 401-420 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1109/TAC.2005.864190</article_no>
</article_nos>
<bib_pages begin="401" end="420" pages="20">401-420</bib_pages>
<bib_issue year="2006" vol="51"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Olfati-Saber, R</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Olfati-Saber, R</name>
<email_addr>olfati@dartmouth.edu</email_addr>
</email>
</emails>
<keywords count="8">
<keyword>consensus theory</keyword>
<keyword>distributed control</keyword>
<keyword>dynamic graphs</keyword>
<keyword>mobile sensor networks</keyword>
<keyword>networked autonomous vehicles</keyword>
<keyword>self-assembly of networks</keyword>
<keyword>self-organizing systems</keyword>
<keyword>swarms</keyword>
</keywords>
<keywords_plus count="8">
<keyword>STABILITY ANALYSIS</keyword>
<keyword>FISH SCHOOLS</keyword>
<keyword>NETWORKS</keyword>
<keyword>CONSENSUS</keyword>
<keyword>TOPOLOGY</keyword>
<keyword>GRAPHS</keyword>
<keyword>SWARMS</keyword>
<keyword>AGENTS</keyword>
</keywords_plus>
<reprint>
<rp_author>Olfati-Saber, R</rp_author>
<rp_address>Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA</rp_address>
<rp_organization>Dartmouth Coll</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Thayer Sch Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Hanover</rp_city>
<rp_state>NH</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">03755</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA</rs_address>
<rs_organization>Dartmouth Coll</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Thayer Sch Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Hanover</rs_city>
<rs_state>NH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">03755</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we present a theoretical framework for design and analysis of distributed flocking algorithms. Two cases of flocking in free-space and presence of multiple obstacles are considered. We present three flocking algorithms: two for free-flocking and one for constrained flocking. A comprehensive analysis of the first two algorithms is provided. We demonstrate the first algorithm embodies all three rules of Reynolds. This is a formal approach to extraction of interaction rules that lead to the emergence of collective behavior. We show that the first algorithm generically leads to regular fragmentation, whereas the second and third algorithms both lead to flocking. A systematic method is provided for construction of cost functions (or collective potentials) for flocking. These collective potentials penalize deviation from a class of lattice-shape objects called alpha-lattices. We use a multi-species framework for construction of collective potentials that consist of flock-members, or alpha-agents, and virtual agents associated with alpha-agents called beta- and gamma-agents. We show that migration of flocks can be performed using a peer-to-peer network of agents, i.e., "flocks need no leaders." A "universal" definition of flocking for particle systems with similarities to Lyapunov stability is given. Several simulation results are provided that demonstrate performing 2-D and 3-D flocking, split/rejoin maneuver, and squeezing maneuver for hundreds of agents using the proposed algorithms.</p>
</abstract>
<refs count="53">
<ref>130816440</ref>
<ref>116232900</ref>
<ref>149289709</ref>
<ref>134102184</ref>
<ref>149289710</ref>
<ref>119858537</ref>
<ref>149289711</ref>
<ref>118454247</ref>
<ref>136376189</ref>
<ref>23666626</ref>
<ref>129115441</ref>
<ref>130484781</ref>
<ref>116840195</ref>
<ref>73622006</ref>
<ref>130023070</ref>
<ref>149289712</ref>
<ref>59144087</ref>
<ref>149289713</ref>
<ref>129115447</ref>
<ref>122671850</ref>
<ref>127975864</ref>
<ref>143366738</ref>
<ref>149289714</ref>
<ref>94217007</ref>
<ref>110819087</ref>
<ref>142797430</ref>
<ref>149289715</ref>
<ref>66197085</ref>
<ref>136376185</ref>
<ref>149289716</ref>
<ref>149289717</ref>
<ref>149289718</ref>
<ref>149289719</ref>
<ref>149289720</ref>
<ref>149289721</ref>
<ref>125361079</ref>
<ref>45883945</ref>
<ref>149289722</ref>
<ref>149289723</ref>
<ref>144241486</ref>
<ref>66742944</ref>
<ref>149289724</ref>
<ref>81308983</ref>
<ref>145796834</ref>
<ref>149289725</ref>
<ref>27792039</ref>
<ref>95732836</ref>
<ref>118870439</ref>
<ref>142420422</ref>
<ref>107446574</ref>
<ref>149289726</ref>
<ref>119913893</ref>
<ref>92315696</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149281330" hot="yes" sortkey="3119764822" timescited="0" sharedrefs="0" inpi="false">
<item issue="149281280" recid="149281330" coverdate="200600" sortkey="3119764822" refkey="2611033" dbyear="2006">
<ut>000235837300008</ut>
<i_ckey>GREC0116063861LG</i_ckey>
<i_cid>0109935450</i_cid>
<source_title>FOUNDATIONS OF INFORMATION AND KNOWLEDGE SYSTEMS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Solving abduction by computing joint explanations: Logic programming formalization, applications to P2P data integration, and cmplexity results</item_title>
<sq>B5032B0</sq>
<bib_id>3861: 116-136 2006</bib_id>
<bib_pages begin="116" end="136" pages="21">116-136</bib_pages>
<bib_issue year="2006" vol="3861"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Greco, G</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Greco, G</name>
<email_addr>ggreco@mat.unical.it</email_addr>
</email>
</emails>
<keywords_plus count="4">
<keyword>COST-BASED ABDUCTION</keyword>
<keyword>COMPLEXITY</keyword>
<keyword>AGENTS</keyword>
<keyword>HARD</keyword>
</keywords_plus>
<reprint>
<rp_author>Greco, G</rp_author>
<rp_address>Univ Calabria, Dipartimento Matemat, I-87030 Commenda Di Rende, Italy</rp_address>
<rp_organization>Univ Calabria</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dipartimento Matemat</rp_suborganization>
</rp_suborganizations>
<rp_city>Commenda Di Rende</rp_city>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-87030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Calabria, Dipartimento Matemat, I-87030 Commenda Di Rende, Italy</rs_address>
<rs_organization>Univ Calabria</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Matemat</rs_suborganization>
</rs_suborganizations>
<rs_city>Commenda Di Rende</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-87030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>An extension of abduction is investigated where explanations for bunches of observations may be jointly computed by sets of interacting agents. At one hand, agents are allowed to partially contribute to the reasoning task, so that joint explanations can be singled out even if each agent does not have enough knowledge for carrying out abduction on its own. At the other hand, agents maintain their autonomy in choosing explanations, each one being equipped with a weighting function reflecting its perception about the reliability of set of hypotheses. Given that different agents may have different and possibly contrasting preferences, some reasonable notions of agents' agreement are introduced, and their computational properties are thoroughly studied. As an example application of the framework discussed in the paper, it is shown how to handle data management issues in Peer-to-Peer systems and, specifically, how to provide a repair-based semantics to inconsistent ones.</p>
</abstract>
<refs count="45">
<ref>136824026</ref>
<ref>149281331</ref>
<ref>136296269</ref>
<ref>149159130</ref>
<ref>149281332</ref>
<ref>133034704</ref>
<ref>133360183</ref>
<ref>149281333</ref>
<ref>133034706</ref>
<ref>133034705</ref>
<ref>143536670</ref>
<ref>86727293</ref>
<ref>123563782</ref>
<ref>126345846</ref>
<ref>80707827</ref>
<ref>146247080</ref>
<ref>142507055</ref>
<ref>149281334</ref>
<ref>87663912</ref>
<ref>91502511</ref>
<ref>149281335</ref>
<ref>132136899</ref>
<ref>149281336</ref>
<ref>149281337</ref>
<ref>146461662</ref>
<ref>127878804</ref>
<ref>149281338</ref>
<ref>149281339</ref>
<ref>136256424</ref>
<ref>128826978</ref>
<ref>82901241</ref>
<ref>66778088</ref>
<ref>149281340</ref>
<ref>147302158</ref>
<ref>128670527</ref>
<ref>149281341</ref>
<ref>149281342</ref>
<ref>35560165</ref>
<ref>143322039</ref>
<ref>149281343</ref>
<ref>132753839</ref>
<ref>149281344</ref>
<ref>149281345</ref>
<ref>149281346</ref>
<ref>149281347</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149251640" hot="yes" sortkey="3119772648" timescited="0" sharedrefs="0" inpi="false">
<item issue="149251621" recid="149251640" coverdate="200603" sortkey="3119772648" refkey="648574" dbyear="2006">
<ut>000236095400005</ut>
<i_ckey>BIND0219060012AW</i_ckey>
<i_cid>0109962668</i_cid>
<source_title>AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS</source_title>
<source_abbrev>AUTON AGENT MULTI-AG</source_abbrev>
<item_title>A multiagent system for the reliable execution of automatically composed ad-hoc processes</item_title>
<sq>13516J0</sq>
<bib_id>12 (2): 219-237 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1007/s10458-006-5836-0</article_no>
</article_nos>
<bib_pages begin="219" end="237" pages="19">219-237</bib_pages>
<bib_issue year="2006" vol="12"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Binder, W</primaryauthor>
<author key="1382075">Constantinescu, I</author>
<author key="2047709">Faltings, B</author>
<author key="2767125">Haller, K</author>
<author key="7085469">Turker, C</author>
</authors>
<emails count="4">
<email>
<name>Binder, W</name>
<email_addr>walter.binder@epfl.ch</email_addr>
</email>
<email>
<name>Constantinescu, I</name>
<email_addr>ion.constantinescu@epfl.ch</email_addr>
</email>
<email>
<name>Faltings, B</name>
<email_addr>boi.faltings@epfl.ch</email_addr>
</email>
<email>
<name>Haller, K</name>
<email_addr>tuerker@fgcz.ethz.ch</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>service composition</keyword>
<keyword>ad-hoc processes</keyword>
<keyword>process execution</keyword>
<keyword>process expansion</keyword>
<keyword>failure handling</keyword>
</keywords>
<reprint>
<rp_author>Binder, W</rp_author>
<rp_address>Ecole Polytech Fed Lausanne, Artificial Intelligence Lab, CH-1015 Lausanne, Switzerland</rp_address>
<rp_organization>Ecole Polytech Fed Lausanne</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Artificial Intelligence Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Lausanne</rp_city>
<rp_country>Switzerland</rp_country>
<rp_zips count="1">
<rp_zip location="BC">CH-1015</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Ecole Polytech Fed Lausanne, Artificial Intelligence Lab, CH-1015 Lausanne, Switzerland</rs_address>
<rs_organization>Ecole Polytech Fed Lausanne</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Artificial Intelligence Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Lausanne</rs_city>
<rs_country>Switzerland</rs_country>
<rs_zips count="1">
<rs_zip location="BC">CH-1015</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Zurich, ETH, CH-8057 Zurich, Switzerland</rs_address>
<rs_organization>Univ Zurich</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>ETH</rs_suborganization>
</rs_suborganizations>
<rs_city>Zurich</rs_city>
<rs_country>Switzerland</rs_country>
<rs_zips count="1">
<rs_zip location="BC">CH-8057</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This article presents an architecture to automatically create ad-hoc processes for complex value-added services and to execute them in a reliable way. The uniqueness of ad-hoc processes is to support users not only in standardized situations like traditional workflows do, but also in unique non-recurring situations. Based on user requirements, a service composition engine generates such ad-hoc processes, which integrate individual services in order to provide the desired functionality. Our infrastructure executes ad-hoc processes by transactional agents in a peer-to-peer style. The process execution is thereby performed under transactional guarantees. Moreover, the service composition engine is used to re-plan in the case of execution failures.</p>
</abstract>
<refs count="27">
<ref>62291353</ref>
<ref>99856685</ref>
<ref>149251641</ref>
<ref>128882389</ref>
<ref>130986493</ref>
<ref>149251642</ref>
<ref>147420709</ref>
<ref>147420710</ref>
<ref>149251643</ref>
<ref>149251644</ref>
<ref>85691757</ref>
<ref>130986494</ref>
<ref>149251645</ref>
<ref>149251646</ref>
<ref>149251647</ref>
<ref>149251648</ref>
<ref>112768928</ref>
<ref>134865665</ref>
<ref>127062673</ref>
<ref>131030223</ref>
<ref>122129540</ref>
<ref>128882394</ref>
<ref>128882395</ref>
<ref>134820862</ref>
<ref>142351536</ref>
<ref>84492485</ref>
<ref>134820863</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149243452" hot="yes" sortkey="3119774849" timescited="0" sharedrefs="0" inpi="false">
<item issue="149243261" recid="149243452" coverdate="200500" sortkey="3119774849" refkey="4185679" dbyear="2006">
<ut>000235836100043</ut>
<i_ckey>LIN 0405053809LA</i_ckey>
<i_cid>0109935038</i_cid>
<source_title>AI 2005: ADVANCES IN ARTIFICIAL INTELLIGENCE</source_title>
<source_series>LECTURE NOTES IN ARTIFICIAL INTELLIGENCE</source_series>
<source_abbrev>LECT NOTES ARTIF INT</source_abbrev>
<item_title>Agent-based middleware for web service dynamic integration on peer-to-peer networks</item_title>
<sq>B5030B0</sq>
<bib_id>3809: 405-414 2005</bib_id>
<bib_pages begin="405" end="414" pages="10">405-414</bib_pages>
<bib_issue year="2005" vol="3809"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Lin, AZ</primaryauthor>
<author key="4389562">Maheshwari, P</author>
</authors>
<emails count="2">
<email>
<name>Lin, AZ</name>
<email_addr>alin@cse.unsw.edu.au</email_addr>
</email>
<email>
<name>Maheshwari, P</name>
<email_addr>piyush@cse.unsw.edu.au</email_addr>
</email>
</emails>
<reprint>
<rp_author>Lin, AZ</rp_author>
<rp_address>Univ New S Wales, Sch Comp Sci &amp; Engn, Sydney, NSW 2052, Australia</rp_address>
<rp_organization>Univ New S Wales</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Sydney</rp_city>
<rp_state>NSW</rp_state>
<rp_country>Australia</rp_country>
<rp_zips count="1">
<rp_zip location="AP">2052</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ New S Wales, Sch Comp Sci &amp; Engn, Sydney, NSW 2052, Australia</rs_address>
<rs_organization>Univ New S Wales</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Sydney</rs_city>
<rs_state>NSW</rs_state>
<rs_country>Australia</rs_country>
<rs_zips count="1">
<rs_zip location="AP">2052</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Performing business processes normally requires dynamic and casual collaborations among enterprises that are not centrally controlled. Enterprise application integration and Peer-to-Peer computing provide a solution to the business processes. Web service integration and agent-based middleware constitute the paradigms to implement enterprise application integration on Peer-to-Peer networks because of the loosely-coupled property of Web services and the autonomous, adaptive, and interactive properties of agents. Previous Web service integration researches focused on Web service integration based on client/server network architecture. However, along with the highly demands of Web service quality, Web services are not always provided on client/server networks. This research aims to construct an agent-based middleware for Web service dynamic integration on Peer-to-Peer networks to pursue the integration of optimal quality of Web services for enterprise application integration. The paper introduces the agent-based middleware including the formalization, Web service dynamic integration model, agent reasoning model, and the application.</p>
</abstract>
<refs count="16">
<ref>83407816</ref>
<ref>80818608</ref>
<ref>127062668</ref>
<ref>149243453</ref>
<ref>109449962</ref>
<ref>147519596</ref>
<ref>147695979</ref>
<ref>142629132</ref>
<ref>149243454</ref>
<ref>149243455</ref>
<ref>149243456</ref>
<ref>132786876</ref>
<ref>128801355</ref>
<ref>135505083</ref>
<ref>128939454</ref>
<ref>149243457</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149237733" hot="yes" sortkey="3119814362" timescited="0" sharedrefs="0" inpi="false">
<item issue="149237731" recid="149237733" coverdate="200600" sortkey="3119814362" refkey="5929860" dbyear="2006">
<ut>000235934600002</ut>
<i_ckey>ROLL0007060048WD</i_ckey>
<i_cid>0109906807</i_cid>
<source_title>WIRTSCHAFTSINFORMATIK</source_title>
<source_abbrev>WIRTSCHAFTSINF</source_abbrev>
<item_title>Distributed ascending proxy auction - A cryptographic approach</item_title>
<sq>09222J0</sq>
<bib_id>48 (1): 7-15 2006</bib_id>
<bib_pages begin="7" end="15" pages="9">7-15</bib_pages>
<bib_issue year="2006" vol="48"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Rolli, D</primaryauthor>
<author key="1379507">Conrad, M</author>
<author key="5065105">Neumann, D</author>
<author key="6584077">Sorge, C</author>
</authors>
<emails count="4">
<email>
<name>Rolli, D</name>
<email_addr>rolli@iw.uka.de</email_addr>
</email>
<email>
<name>Conrad, M</name>
<email_addr>conrad@tm.uka.de</email_addr>
</email>
<email>
<name>Neumann, D</name>
<email_addr>neumann@iw.uka.de</email_addr>
</email>
<email>
<name>Sorge, C</name>
<email_addr>sorge@tm.uka.de</email_addr>
</email>
</emails>
<keywords count="6">
<keyword>Internet economics</keyword>
<keyword>distributed auctions</keyword>
<keyword>privacy</keyword>
<keyword>trust</keyword>
<keyword>security Protocols</keyword>
<keyword>peer-to-peer systems</keyword>
</keywords>
<reprint>
<rp_author>Rolli, D</rp_author>
<rp_address>Univ Karlsruhe, Inst Informat Wirtschaft &amp; Management, TH, Englerstr 14, D-76131 Karlsruhe, Germany</rp_address>
<rp_organization>Univ Karlsruhe</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>Inst Informat Wirtschaft &amp; Management</rp_suborganization>
<rp_suborganization>TH</rp_suborganization>
</rp_suborganizations>
<rp_street>Englerstr 14</rp_street>
<rp_city>Karlsruhe</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-76131</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Karlsruhe, Inst Informat Wirtschaft &amp; Management, TH, D-76131 Karlsruhe, Germany</rs_address>
<rs_organization>Univ Karlsruhe</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Inst Informat Wirtschaft &amp; Management</rs_suborganization>
<rs_suborganization>TH</rs_suborganization>
</rs_suborganizations>
<rs_city>Karlsruhe</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-76131</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Karlsruhe, Inst Telemat, D-76131 Karlsruhe, Germany</rs_address>
<rs_organization>Univ Karlsruhe</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Inst Telemat</rs_suborganization>
</rs_suborganizations>
<rs_city>Karlsruhe</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-76131</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>Distributed Ascending Proxy Auction - A Cryptographic Approach. In recent years, auctions have become a very popular price discovery mechanism in the Internet. The common auction formats are typically centralized in nature. The peer-to-peer paradigm demands gearing up auctions for decentralized infrastructures. In this context, this paper proposes a distributed mechanism for ascending second-price auctions that relies on standard cryptographic algorithms. in essence, the auction protocol has the capability of preserving the privacy of the winning bidder's true valuation.</p>
<p>The auction protocol makes use of a high number of auctioneers divided into several groups. A bidder creates an encrypted chain of monotonously increasing bidding steps, where each bidding step can be decrypted by a different auctioneer group. This considerably reduces the attack and manipulation possibilities of malicious auctioneers. In addition, this secure approach does not require bidders to be online unless they are submitting their bid chain to the auctioneers.</p>
</abstract>
<refs count="17">
<ref>149237734</ref>
<ref>149237735</ref>
<ref>149237736</ref>
<ref>149237737</ref>
<ref>149237738</ref>
<ref>145798795</ref>
<ref>149237739</ref>
<ref>96003131</ref>
<ref>148149013</ref>
<ref>149237740</ref>
<ref>149237741</ref>
<ref>149237742</ref>
<ref>149237743</ref>
<ref>117265005</ref>
<ref>130986616</ref>
<ref>133635964</ref>
<ref>127960587</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149228597" hot="yes" sortkey="3119816180" timescited="0" sharedrefs="0" inpi="false">
<item issue="149228549" recid="149228597" coverdate="200600" sortkey="3119816180" refkey="5984981" dbyear="2006">
<ut>000235805500008</ut>
<i_ckey>ROUS0084063831LM</i_ckey>
<i_cid>0109884602</i_cid>
<source_title>SOFSEM 2006: THEORY AND PRACTICE OF COMPUTER SCIENCE, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>SomeWhere in the Semantic Web</item_title>
<sq>B5016B0</sq>
<bib_id>3831: 84-99 2006</bib_id>
<bib_pages begin="84" end="99" pages="16">84-99</bib_pages>
<bib_issue year="2006" vol="3831"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Rousset, MC</primaryauthor>
<author key="46010">Adjiman, P</author>
<author key="1184345">Chatalic, P</author>
<author key="2499771">Goasdoue, F</author>
<author key="6456668">Simon, L</author>
</authors>
<emails count="1">
<email>
<name>Rousset, MC</name>
<email_addr>Marie-Christine.Rousset@imag.fr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Rousset, MC</rp_author>
<rp_address>IMAG, LSR, BP 72, F-38402 St Martin Dheres, France</rp_address>
<rp_organization>IMAG</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>LSR</rp_suborganization>
</rp_suborganizations>
<rp_street>BP 72</rp_street>
<rp_city>St Martin Dheres</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-38402</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>IMAG, LSR, F-38402 St Martin Dheres, France</rs_address>
<rs_organization>IMAG</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>LSR</rs_suborganization>
</rs_suborganizations>
<rs_city>St Martin Dheres</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-38402</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Paris 11, CNRS, LRI, INRIA,UR Futurs, F-91405 Orsay, France</rs_address>
<rs_organization>Univ Paris 11</rs_organization>
<rs_suborganizations count="3">
<rs_suborganization>CNRS</rs_suborganization>
<rs_suborganization>LRI</rs_suborganization>
<rs_suborganization>INRIA,UR Futurs</rs_suborganization>
</rs_suborganizations>
<rs_city>Orsay</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91405</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we describe the SomeWhere semantic peer-to-peer data management system that promotes a "small is beautiful" vision of the Semantic Web based on simple personalized ontologies (e.g., taxonomies of classes) but which are distributed at a large scale. In this vision of the Semantic Web, no user imposes to others his own ontology. Logical mappings between ontologies make possible the creation of a web of people in which personalized semantic marking up of data cohabits nicely with a collaborative exchange of data. In this view, the Web is a huge peer-to-peer data management system based on simple distributed ontologies and mappings.</p>
</abstract>
<refs count="22">
<ref>149228598</ref>
<ref>149228599</ref>
<ref>147679519</ref>
<ref>147679520</ref>
<ref>142351236</ref>
<ref>131693403</ref>
<ref>122330998</ref>
<ref>147679521</ref>
<ref>147679522</ref>
<ref>147679523</ref>
<ref>147679524</ref>
<ref>142351240</ref>
<ref>142351241</ref>
<ref>147679525</ref>
<ref>142351242</ref>
<ref>142351243</ref>
<ref>142351244</ref>
<ref>142351246</ref>
<ref>147679526</ref>
<ref>149228600</ref>
<ref>149228601</ref>
<ref>142351248</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149187532" hot="yes" sortkey="3119828313" timescited="0" sharedrefs="0" inpi="false">
<item issue="149187429" recid="149187532" coverdate="200500" sortkey="3119828313" refkey="7823397" dbyear="2006">
<ut>000235803700010</ut>
<i_ckey>ZHOU0194053834LD</i_ckey>
<i_cid>0109902025</i_cid>
<source_title>JOB SCHEDULING STRATEGIES FOR PARALLEL PROCESSING</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Wave scheduler: Scheduling for faster turnaround time in peer-based desktop grid systems</item_title>
<sq>B5013B0</sq>
<bib_id>3834: 194-218 2005</bib_id>
<bib_pages begin="194" end="218" pages="25">194-218</bib_pages>
<bib_issue year="2005" vol="3834"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Zhou, DY</primaryauthor>
<author key="4243785">Lo, V</author>
</authors>
<reprint>
<rp_author>Zhou, DY</rp_author>
<rp_address>Univ Oregon, Eugene, OR 97402 USA</rp_address>
<rp_organization>Univ Oregon</rp_organization>
<rp_city>Eugene</rp_city>
<rp_state>OR</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">97402</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Oregon, Eugene, OR 97402 USA</rs_address>
<rs_organization>Univ Oregon</rs_organization>
<rs_city>Eugene</rs_city>
<rs_state>OR</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">97402</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>The recent success of Internet-based computing projects, coupled with rapid developments in peer-to-peer systems, has stimulated interest in the notion of harvesting idle cycles under a peer-to-peer model. The problem we address in this paper is the development of scheduling strategies to achieve faster turnaround time in an open peer-based desktop grid system. The challenges for this problem are two-fold: How does the scheduler quickly discover idle cycles in the absence of global information about host availability? And how can faster turnaround time be achieved within the opportunistic scheduling environment offered by volunteer hosts? We propose a novel peer-based scheduling method, Wave Scheduler, which allows peers to self organize into a timezone-aware overlay network using structured overlay network, The Wave Scheduler then exploits large blocks of idle night-time cycles by migrating jobs to hosts located in night-time zones around the globe, which are discovered by scalable resource discovery methods.</p>
<p>Simulation results show that the slowdown factors of all migration schemes are consistently lower than the slowdown factors of the nonmigration schemes. Compared to traditional migration strategies we tested, the Wave Scheduler performs best. However under heavy load conditions, there is contention for those night-time hosts. Therefore, we propose an adaptive migration strategy for Wave Scheduler to further improve performance.</p>
</abstract>
<refs count="13">
<ref>149187533</ref>
<ref>149187534</ref>
<ref>143848936</ref>
<ref>149187443</ref>
<ref>149187535</ref>
<ref>114612426</ref>
<ref>111468705</ref>
<ref>149187536</ref>
<ref>148749920</ref>
<ref>102635741</ref>
<ref>149187537</ref>
<ref>143107332</ref>
<ref>121782164</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149181541" hot="yes" sortkey="3119829592" timescited="0" sharedrefs="0" inpi="false">
<item issue="149181483" recid="149181541" coverdate="200605" sortkey="3119829592" refkey="2702609" dbyear="2006">
<ut>000235987900008</ut>
<i_ckey>GUO 0669060018IL</i_ckey>
<i_cid>0109914447</i_cid>
<source_title>IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING</source_title>
<source_abbrev>IEEE T KNOWL DATA EN</source_abbrev>
<item_title>Design and evaluation of a scalable and reliable P2P assisted proxy for on-demand streaming media delivery</item_title>
<sq>09405J0</sq>
<bib_id>18 (5): 669-682 MAY 2006</bib_id>
<bib_pages begin="669" end="682" pages="14">669-682</bib_pages>
<bib_issue year="2006" vol="18"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Guo, L</primaryauthor>
<author key="1208467">Chen, SQ</author>
<author key="7811061">Zhang, XD</author>
</authors>
<emails count="3">
<email>
<name>Guo, L</name>
<email_addr>lguo@cse.ohio-state.edu</email_addr>
</email>
<email>
<name>Chen, SQ</name>
<email_addr>sqchen@cs.gmu.edu</email_addr>
</email>
<email>
<name>Zhang, XD</name>
<email_addr>zhang@cse.ohio-state.edu</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>Internet media streaming</keyword>
<keyword>peer-to-peer systems</keyword>
<keyword>proxy caching</keyword>
<keyword>distributed hash table</keyword>
</keywords>
<reprint>
<rp_author>Guo, L</rp_author>
<rp_address>Ohio State Univ, Dept Comp Sci &amp; Engn, Columbus, OH 43210 USA</rp_address>
<rp_organization>Ohio State Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Columbus</rp_city>
<rp_state>OH</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">43210</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Ohio State Univ, Dept Comp Sci &amp; Engn, Columbus, OH 43210 USA</rs_address>
<rs_organization>Ohio State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Columbus</rs_city>
<rs_state>OH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">43210</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA</rs_address>
<rs_organization>George Mason Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Fairfax</rs_city>
<rs_state>VA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">22030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>To efficiently deliver streaming media, researchers have developed technical solutions that fall into three categories, each of which has its merits and limitations. Infrastructure-based CDNs with dedicated network bandwidths and hardware supports can provide high-quality streaming services, but at a high cost. Server-based proxies are cost-effective but not scalable due to the limited proxy capacity in storage and bandwidth, and its centralized control also brings a single point of failure. Client-based P2P networks are scalable, but do not guarantee high-quality streaming service due to the transient nature of peers. To address these limitations, we present a novel and efficient design of a scalable and reliable media proxy system assisted by P2P networks, called PROP. In the PROP system, the clients' machines in an intranet are self-organized into a structured P2P system to provide a large media storage and to actively participate in the streaming media delivery, where the proxy is also embedded as an important member to ensure the quality of streaming service. The coordination and collaboration in the system are efficiently conducted by our P2P management structure and replacement policies. Our system has the following merits: 1) It addresses both the scalability problem in centralized proxy systems and the unreliable service concern by only relying on the P2P sharing of clients. 2) The proposed content locating scheme can timely serve the demanded media data and fairly dispatch media streaming tasks in appropriate granularity across the system. 3) Based on the modeling and analysis, we propose global replacement policies for proxy and clients, which well balance the demand and supply of streaming data in the system, achieving a high utilization of peers' cache. We have comparatively evaluated our system through trace-driven simulations with synthetic workloads and with a real-life workload extracted from the media server logs in an enterprise network, which shows our design significantly improves the quality of media streaming and the system scalability.</p>
</abstract>
<refs count="32">
<ref>149181542</ref>
<ref>132361390</ref>
<ref>126448886</ref>
<ref>119320044</ref>
<ref>134003910</ref>
<ref>149181543</ref>
<ref>149181544</ref>
<ref>127805490</ref>
<ref>142116598</ref>
<ref>136066988</ref>
<ref>115438504</ref>
<ref>147834611</ref>
<ref>149181545</ref>
<ref>149181546</ref>
<ref>142602381</ref>
<ref>149181547</ref>
<ref>131196496</ref>
<ref>134083543</ref>
<ref>149181548</ref>
<ref>126448874</ref>
<ref>149181549</ref>
<ref>132793847</ref>
<ref>123110024</ref>
<ref>149181550</ref>
<ref>143686350</ref>
<ref>124434650</ref>
<ref>115438517</ref>
<ref>149181551</ref>
<ref>149181552</ref>
<ref>121307406</ref>
<ref>149181553</ref>
<ref>119120045</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149178157" hot="yes" sortkey="3119830315" timescited="0" sharedrefs="0" inpi="false">
<item issue="149178101" recid="149178157" coverdate="200500" sortkey="3119830315" refkey="5612452" dbyear="2006">
<ut>000235801700010</ut>
<i_ckey>POWE0051053769LK</i_ckey>
<i_cid>0109901525</i_cid>
<source_title>HIGH PERFORMANCE COMPUTING - HIPC 2005, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A fault recovery scheme for P2P metacomputers</item_title>
<sq>B5010B0</sq>
<bib_id>3769: 51-61 2005</bib_id>
<bib_pages begin="51" end="61" pages="11">51-61</bib_pages>
<bib_issue year="2005" vol="3769"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Power, K</primaryauthor>
<author key="4884047">Morrison, JP</author>
</authors>
<emails count="2">
<email>
<name>Power, K</name>
<email_addr>k.power@cs.ucc.ie</email_addr>
</email>
<email>
<name>Morrison, JP</name>
<email_addr>j.morrison@cs.ucc.ie</email_addr>
</email>
</emails>
<keywords count="7">
<keyword>peer-to-peer</keyword>
<keyword>fault</keyword>
<keyword>tolerance</keyword>
<keyword>recovery</keyword>
<keyword>decentralized</keyword>
<keyword>distributed computing</keyword>
<keyword>condensed graphs</keyword>
</keywords>
<reprint>
<rp_author>Power, K</rp_author>
<rp_address>Natl Univ Ireland Univ Coll Cork, Cork, Ireland</rp_address>
<rp_organization>Natl Univ Ireland Univ Coll Cork</rp_organization>
<rp_city>Cork</rp_city>
<rp_country>Ireland</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Natl Univ Ireland Univ Coll Cork, Cork, Ireland</rs_address>
<rs_organization>Natl Univ Ireland Univ Coll Cork</rs_organization>
<rs_city>Cork</rs_city>
<rs_country>Ireland</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="3">
<p>Despite the leaps and bounds made by the P2P research field in the last few years, the benefit of this innovation has been constrained to a few areas; search and file-sharing and storage to name a few. In particular, this innovation has had little significant impact in the field of distributed computing.</p>
<p>There are several obstacles to be overcome in the development of any distributed computer, most notably: scalability, fault tolerance, security and load balancing. The difficulty of these is compounded in the dynamic, decentralized environment which characterizes the P2P arena. This paper presents a method of recovering from faults which exploits the distributed hash table functionality provided by modem overlay networks. Its effectiveness is evaluated experimentally using a proof of concept P2P distributed computer.</p>
<p>It is hoped that by providing a solution to one of the obstacles, global, decentralized, dependable distributed computers will be one step closer to reality.</p>
</abstract>
<refs count="15">
<ref>149178158</ref>
<ref>149178159</ref>
<ref>149178160</ref>
<ref>132637148</ref>
<ref>137494721</ref>
<ref>149178161</ref>
<ref>149178162</ref>
<ref>149178163</ref>
<ref>149178164</ref>
<ref>149178165</ref>
<ref>130906373</ref>
<ref>128882241</ref>
<ref>123110037</ref>
<ref>124889712</ref>
<ref>149178166</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149172666" hot="yes" sortkey="3119831494" timescited="0" sharedrefs="0" inpi="false">
<item issue="149172103" recid="149172666" coverdate="200600" sortkey="3119831494" refkey="4154861" dbyear="2006">
<ut>000235658000077</ut>
<i_ckey>LI M0806063841LM</i_ckey>
<i_cid>0109882736</i_cid>
<source_title>FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A chord-based novel mobile peer-to-peer file sharing protocol</item_title>
<sq>B4949B0</sq>
<bib_id>3841: 806-811 2006</bib_id>
<bib_pages begin="806" end="811" pages="6">806-811</bib_pages>
<bib_issue year="2006" vol="3841"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Li, M</primaryauthor>
<author key="1199184">Chen, EH</author>
<author key="6380267">Sheu, PC</author>
</authors>
<emails count="3">
<email>
<name>Li, M</name>
<email_addr>minli@mail.ustc.edu.cn</email_addr>
</email>
<email>
<name>Chen, EH</name>
<email_addr>cheneh@ustc.edu.cn</email_addr>
</email>
<email>
<name>Sheu, PC</name>
<email_addr>psheu@uci.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Li, M</rp_author>
<rp_address>Univ Sci &amp; Technol China, Dept Comp Sci &amp; Technol, Hefei 230027, Anhui, Peoples R China</rp_address>
<rp_organization>Univ Sci &amp; Technol China</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Hefei</rp_city>
<rp_state>Anhui</rp_state>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">230027</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Sci &amp; Technol China, Dept Comp Sci &amp; Technol, Hefei 230027, Anhui, Peoples R China</rs_address>
<rs_organization>Univ Sci &amp; Technol China</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Hefei</rs_city>
<rs_state>Anhui</rs_state>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">230027</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Calif Irvine, Dept EECS, Irvine, CA 92697 USA</rs_address>
<rs_organization>Univ Calif Irvine</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept EECS</rs_suborganization>
</rs_suborganizations>
<rs_city>Irvine</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">92697</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>With the increasingly developed technology of mobile devices and wireless networks, more and more users share resources by mobile devices via wireless networks. Compared to traditional C/S architecture, P2P network is more appropriate for mobile computing environment. However, all existing P2P protocols have not well considered the characteristics and constraints of mobile devices and wireless networks. In this paper, we will present a novel mobile P2P protocol, M-Chord, by adopting hierarchical structure and registering mechanism on the basis of Chord. The experimental results show that M-Chord system has high-efficiency and good robustness in mobile P2P network.</p>
</abstract>
<refs count="5">
<ref>149172667</ref>
<ref>123110024</ref>
<ref>127960302</ref>
<ref>122611834</ref>
<ref>121684257</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149172769" hot="yes" sortkey="3119831515" timescited="0" sharedrefs="0" inpi="false">
<item issue="149172103" recid="149172769" coverdate="200600" sortkey="3119831515" refkey="7759903" dbyear="2006">
<ut>000235658000098</ut>
<i_ckey>YU Y0937063841LY</i_ckey>
<i_cid>0109882775</i_cid>
<source_title>FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Building a semantic P2P scientific references sharing system with JXTA</item_title>
<sq>B4949B0</sq>
<bib_id>3841: 937-942 2006</bib_id>
<bib_pages begin="937" end="942" pages="6">937-942</bib_pages>
<bib_issue year="2006" vol="3841"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Yu, YJ</primaryauthor>
<author key="3393638">Jin, H</author>
</authors>
<emails count="2">
<email>
<name>Yu, YJ</name>
<email_addr>yjyu@mail.ccnu.edu.cn</email_addr>
</email>
<email>
<name>Jin, H</name>
<email_addr>hjin@mail.hust.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Yu, YJ</rp_author>
<rp_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rp_address>
<rp_organization>Huazhong Univ Sci &amp; Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cluster &amp; Grid Comp Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Wuhan</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">430074</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rs_address>
<rs_organization>Huazhong Univ Sci &amp; Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cluster &amp; Grid Comp Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A semantic Peer-to-Peer (P2P) scientific references sharing system, SemreX, is introduced in this paper. As a P2P application system based on JXTA, the implementation technologies of the P2P communication layer of SemreX are illustrated, including the software architecture and the classes in P2P communication layer. Some lessons about JXTA, from the system development practices and software testing, are also concluded, such as peer automatic discovery, program robustness and bug report.</p>
</abstract>
<refs count="6">
<ref>149172770</ref>
<ref>120072057</ref>
<ref>149172771</ref>
<ref>137544542</ref>
<ref>149172772</ref>
<ref>149172773</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164392" hot="yes" sortkey="3119833090" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164392" coverdate="200500" sortkey="3119833090" refkey="5056630" dbyear="2006">
<ut>000235802200063</ut>
<i_ckey>NEOV0602053823LM</i_ckey>
<i_cid>0109901826</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An abstract model for incentive-enhanced trust in P2P networks</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 602-611 2005</bib_id>
<bib_pages begin="602" end="611" pages="10">602-611</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Neovius, M</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Neovius, M</name>
<email_addr>mats@neovius.com</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>Peer-to-Peer networks</keyword>
<keyword>incentive</keyword>
<keyword>trustworthiness</keyword>
<keyword>anticipation</keyword>
</keywords>
<reprint>
<rp_author>Neovius, M</rp_author>
<rp_address>Abo Akad Univ, Dept Comp Sci, Lemminkaisenkatu 14, FIN-20520 Turku, Finland</rp_address>
<rp_organization>Abo Akad Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Lemminkaisenkatu 14</rp_street>
<rp_city>Turku</rp_city>
<rp_country>Finland</rp_country>
<rp_zips count="1">
<rp_zip location="BC">FIN-20520</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Abo Akad Univ, Dept Comp Sci, FIN-20520 Turku, Finland</rs_address>
<rs_organization>Abo Akad Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Turku</rs_city>
<rs_country>Finland</rs_country>
<rs_zips count="1">
<rs_zip location="BC">FIN-20520</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-Peer (P2P) networks have emerged as a prime research topic, partly due to the vast unexploited possibilities unrestricted distribution of the workload provides. The main hindrance for unrestricted exploitation of the P2P topology is, due to lack of security-related issues, the gullible attitude taken towards unknown agents. Therefore, the severity of the vulnerabilities caused by gullibility must be mended by other means, for example, by an effective incentive scheme encouraging agents to trustworthy behaviour. This paper presents an abstract model for incentive enhanced trust, to progressively assign the participating agents rights for accessing distributed resources, emphasising consistent behaviour. The model consists of a degrading formula, an illustrative incentive triangle and a best-effort distributed supervision model. Moreover, the same incentive model facilitates anticipation of future behaviour concerning any given agent founded on several distinct agents' opinion, suggesting that any knowledge concerning the counterpart is better than none.</p>
</abstract>
<refs count="14">
<ref>144782401</ref>
<ref>149164393</ref>
<ref>126921054</ref>
<ref>149164394</ref>
<ref>108991382</ref>
<ref>120647754</ref>
<ref>112572232</ref>
<ref>130246179</ref>
<ref>149164395</ref>
<ref>134865327</ref>
<ref>149164396</ref>
<ref>149164397</ref>
<ref>149164398</ref>
<ref>146775527</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164431" hot="yes" sortkey="3119833096" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164431" coverdate="200500" sortkey="3119833096" refkey="1734491" dbyear="2006">
<ut>000235802200069</ut>
<i_ckey>DING0663053823LY</i_ckey>
<i_cid>0109901834</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Design of integrated routing system for mobile ad hoc networks overlaying peer-to-peer applications</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 663-672 2005</bib_id>
<bib_pages begin="663" end="672" pages="10">663-672</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Ding, YA</primaryauthor>
<author key="2024113">Everitt, D</author>
</authors>
<emails count="2">
<email>
<name>Ding, YA</name>
<email_addr>annie@it.usyd.edu.au</email_addr>
</email>
<email>
<name>Everitt, D</name>
<email_addr>deveritt@it.usyd.edu.au</email_addr>
</email>
</emails>
<reprint>
<rp_author>Ding, YA</rp_author>
<rp_address>Univ Sydney, Sch Informat Technol, Sydney, NSW 2006, Australia</rp_address>
<rp_organization>Univ Sydney</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Informat Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Sydney</rp_city>
<rp_state>NSW</rp_state>
<rp_country>Australia</rp_country>
<rp_zips count="1">
<rp_zip location="AP">2006</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Sydney, Sch Informat Technol, Sydney, NSW 2006, Australia</rs_address>
<rs_organization>Univ Sydney</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Informat Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Sydney</rs_city>
<rs_state>NSW</rs_state>
<rs_country>Australia</rs_country>
<rs_zips count="1">
<rs_zip location="AP">2006</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper proposes a novel distributed routing system for integration between peer-to-peer (P2P) applications and mobile ad hoc networks (MANETs). This system takes advantage of the "zone" concept to reduce the multicast flooding. Significantly, the system investigates a mechanism to integrate key lookup in the application layer with routing in the link layer. The routing method provides a general-purpose technique that is not limited to any specific P2P applications. This paper presents the design of the routing system and sketches the layered architecture built according to the system functions.</p>
</abstract>
<refs count="16">
<ref>136365893</ref>
<ref>149164432</ref>
<ref>149164433</ref>
<ref>129677755</ref>
<ref>149164434</ref>
<ref>149164435</ref>
<ref>149164436</ref>
<ref>142265198</ref>
<ref>120146863</ref>
<ref>133202438</ref>
<ref>134282442</ref>
<ref>123110024</ref>
<ref>127960302</ref>
<ref>123110037</ref>
<ref>137495075</ref>
<ref>132793729</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164469" hot="yes" sortkey="3119833102" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164469" coverdate="200500" sortkey="3119833102" refkey="3157603" dbyear="2006">
<ut>000235802200075</ut>
<i_ckey>HUAN0724053823LX</i_ckey>
<i_cid>0109901848</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Exploring small-world-like topologies via SplitProber: Turning power laws into an advantage in unstructured overlays</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 724-733 2005</bib_id>
<bib_pages begin="724" end="733" pages="10">724-733</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Huang, XL</primaryauthor>
<author key="7810348">Zhang, WJ</author>
<author key="4342664">Ma, FY</author>
<author key="4160351">Li, Y</author>
</authors>
<emails count="4">
<email>
<name>Huang, XL</name>
<email_addr>huang-xl@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Zhang, WJ</name>
<email_addr>zwj03@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Ma, FY</name>
<email_addr>fyma@sjtu.edu.cn</email_addr>
</email>
<email>
<name>Li, Y</name>
<email_addr>li-yin@sjtu.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Huang, XL</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200030</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200030, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200030</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Recent unstructured Peer-to-Peer systems, represented by Gnutella and Freenet, offer an administration-free and fault-tolerant application-level overlay network. While elegant from a theoretical perspective, these systems have some serious disadvantages. First, due to knowing very little about the nature of the network topology, the search algorithms operating on these networks result in fatal scaling problems. Second, these systems rely on application-level routing, which may be inefficient with respect to network delays and bandwidth consumption. In this paper, we propose a novel search algorithm, called Split-Prober, to explore the small-world-like topologies of these networks efficiently and scalablely, by turning the power-law degree distributions in these networks to an advantage, and by making discriminative use of nodes according to their different roles in the network. As a result, we are able to reconcile the conflict of remedying the mismatch between the overlay topology and its projection on the underlying physical network, while at the same time navigating these networks with a guaranteed high efficiency and using only local knowledge as cues. Our simulation results indicate that the proposed algorithm outperforms several other well-known methods with significant performance gains.</p>
</abstract>
<refs count="19">
<ref>123110394</ref>
<ref>148591167</ref>
<ref>149164470</ref>
<ref>122012127</ref>
<ref>148582148</ref>
<ref>124204869</ref>
<ref>124204868</ref>
<ref>149164471</ref>
<ref>149164472</ref>
<ref>137495147</ref>
<ref>132500081</ref>
<ref>134864260</ref>
<ref>129515870</ref>
<ref>132562451</ref>
<ref>105378900</ref>
<ref>111893017</ref>
<ref>149164473</ref>
<ref>130986486</ref>
<ref>149164474</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164482" hot="yes" sortkey="3119833104" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164482" coverdate="200500" sortkey="3119833104" refkey="1255168" dbyear="2006">
<ut>000235802200077</ut>
<i_ckey>CHOT0744053823LT</i_ckey>
<i_cid>0109901852</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Survey of anonymous peer-to-peer file-sharing</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 744-755 2005</bib_id>
<bib_pages begin="744" end="755" pages="12">744-755</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Chothia, T</primaryauthor>
<author key="1187016">Chatzikokolakis, K</author>
</authors>
<emails count="2">
<email>
<name>Chothia, T</name>
<email_addr>tomc@lix.polytechnique.fr</email_addr>
</email>
<email>
<name>Chatzikokolakis, K</name>
<email_addr>kostas@lix.polytechnique.fr</email_addr>
</email>
</emails>
<reprint>
<rp_author>Chothia, T</rp_author>
<rp_address>Ecole Polytech, Lab Informat, F-91128 Palaiseau, France</rp_address>
<rp_organization>Ecole Polytech</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Lab Informat</rp_suborganization>
</rp_suborganizations>
<rp_city>Palaiseau</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-91128</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Ecole Polytech, Lab Informat, F-91128 Palaiseau, France</rs_address>
<rs_organization>Ecole Polytech</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Lab Informat</rs_suborganization>
</rs_suborganizations>
<rs_city>Palaiseau</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91128</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting, MIXes and UDP address spoofing. We then describe a number of implemented systems based on one, or a combination of, these methods. Finally, we discuss possible attacks on the anonymity of these systems and give examples of particular attacks and defences used by the systems we describe.</p>
</abstract>
<refs count="28">
<ref>131102683</ref>
<ref>149164483</ref>
<ref>149164484</ref>
<ref>149164485</ref>
<ref>123110013</ref>
<ref>96626021</ref>
<ref>144649419</ref>
<ref>121684235</ref>
<ref>127880981</ref>
<ref>148345532</ref>
<ref>149164486</ref>
<ref>106622611</ref>
<ref>149164487</ref>
<ref>149164488</ref>
<ref>149164489</ref>
<ref>149164490</ref>
<ref>149164491</ref>
<ref>149164492</ref>
<ref>149164493</ref>
<ref>131526539</ref>
<ref>120743221</ref>
<ref>128642665</ref>
<ref>133780112</ref>
<ref>149164494</ref>
<ref>149164495</ref>
<ref>149164496</ref>
<ref>149164497</ref>
<ref>149164498</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149164504" hot="yes" sortkey="3119833106" timescited="0" sharedrefs="0" inpi="false">
<item issue="149163962" recid="149164504" coverdate="200500" sortkey="3119833106" refkey="7375036" dbyear="2006">
<ut>000235802200079</ut>
<i_ckey>WANG0766053823LH</i_ckey>
<i_cid>0109901859</i_cid>
<source_title>EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Building a peer-to-peer overlay for efficient routing and low maintenance</item_title>
<sq>B5011B0</sq>
<bib_id>3823: 766-775 2005</bib_id>
<bib_pages begin="766" end="775" pages="10">766-775</bib_pages>
<bib_issue year="2005" vol="3823"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Wang, HH</primaryauthor>
<author key="3150527">Hu, YM</author>
</authors>
<reprint>
<rp_author>Wang, HH</rp_author>
<rp_address>Univ Cincinnati, Cincinnati, OH 45219 USA</rp_address>
<rp_organization>Univ Cincinnati</rp_organization>
<rp_city>Cincinnati</rp_city>
<rp_state>OH</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">45219</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Cincinnati, Cincinnati, OH 45219 USA</rs_address>
<rs_organization>Univ Cincinnati</rs_organization>
<rs_city>Cincinnati</rs_city>
<rs_state>OH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">45219</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Most of current structured P2P systems exploit Distributed Hash Table (DHT) to archive an administration-free, fault tolerant overlay network and guarantee to deliver a message to its destination within O(logN) hops. While elegant from a theoretical perspective, those systems face difficulties in a realistic environment. Instead of building P2P overlays from a theoretical perspective, this design tries to construct an overlay from the physical network. By combining different network topology aware techniques, a distinctive overlay structure closely matching the Internet topology is created. The P2P overlay based on this structure is not only highly efficient for routing, but also keeps maintenance overhead very low even under highly dynamic environment.</p>
</abstract>
<refs count="16">
<ref>149164505</ref>
<ref>136331515</ref>
<ref>149164506</ref>
<ref>149164507</ref>
<ref>149164508</ref>
<ref>144732593</ref>
<ref>148291310</ref>
<ref>149164509</ref>
<ref>149164510</ref>
<ref>149164511</ref>
<ref>148291346</ref>
<ref>128138422</ref>
<ref>124204884</ref>
<ref>131684115</ref>
<ref>123110037</ref>
<ref>143848876</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149160509" hot="yes" sortkey="3119833938" timescited="0" sharedrefs="0" inpi="false">
<item issue="149160351" recid="149160509" coverdate="200500" sortkey="3119833938" refkey="1514669" dbyear="2006">
<ut>000235804200034</ut>
<i_ckey>DAI 0297053816LX</i_ckey>
<i_cid>0109884463</i_cid>
<source_title>DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Off-line micro-payment system for content sharing in P2P networks</item_title>
<sq>B5014B0</sq>
<bib_id>3816: 297-307 2005</bib_id>
<bib_pages begin="297" end="307" pages="11">297-307</bib_pages>
<bib_issue year="2005" vol="3816"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Dai, XL</primaryauthor>
<author key="2670949">Grundy, J</author>
</authors>
<emails count="2">
<email>
<name>Dai, XL</name>
<email_addr>dai_s@usp.ac.fj</email_addr>
</email>
<email>
<name>Grundy, J</name>
<email_addr>john-g@cs.auckland.ac.nz</email_addr>
</email>
</emails>
<reprint>
<rp_author>Dai, XL</rp_author>
<rp_address>Univ S Pacific, Dept Math &amp; Comp Sci, Laucala Campus, Suva, Fiji</rp_address>
<rp_organization>Univ S Pacific</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Math &amp; Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Laucala Campus</rp_street>
<rp_city>Suva</rp_city>
<rp_country>Fiji</rp_country>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Univ S Pacific, Dept Math &amp; Comp Sci, Suva, Fiji</rs_address>
<rs_organization>Univ S Pacific</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Math &amp; Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Suva</rs_city>
<rs_country>Fiji</rs_country>
</research>
<research>
<rs_address>Univ Auckland, Dept Elect &amp; Comp Engn, Auckland 1, New Zealand</rs_address>
<rs_organization>Univ Auckland</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Auckland</rs_city>
<rs_country>New Zealand</rs_country>
<rs_zips count="1">
<rs_zip location="AC">1</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand</rs_address>
<rs_organization>Univ Auckland</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Auckland</rs_city>
<rs_country>New Zealand</rs_country>
<rs_zips count="1">
<rs_zip location="AC">1</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer network services sharing. Our approach provides high performance and security using one-way hashing functions for e-coin encryption. In our P2P-NetPay protocol, each peer's transaction does not involve any broker and double spending is detected during the redeeming transaction. We describe the motivation for P2P-NetPay and describe three transactions of the P2P-NetPay protocol in detail to illustrate the approach. We then discuss future research on this protocol.</p>
</abstract>
<refs count="16">
<ref>129797574</ref>
<ref>142629215</ref>
<ref>130884766</ref>
<ref>142629217</ref>
<ref>130884770</ref>
<ref>130884772</ref>
<ref>142629220</ref>
<ref>142629219</ref>
<ref>149160510</ref>
<ref>149160511</ref>
<ref>130884780</ref>
<ref>100339852</ref>
<ref>113298296</ref>
<ref>96572364</ref>
<ref>135839459</ref>
<ref>137439739</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149159127" hot="yes" sortkey="3119834289" timescited="0" sharedrefs="0" inpi="false">
<item issue="149159055" recid="149159127" coverdate="200500" sortkey="3119834289" refkey="1030504" dbyear="2006">
<ut>000235803000006</ut>
<i_ckey>CALV0090053774LD</i_ckey>
<i_cid>0109884293</i_cid>
<source_title>DATABASE PROGRAMMING LANGUAGES</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Inconsistency tolerance in P2P data integration: An epistemic logic approach</item_title>
<sq>B5012B0</sq>
<bib_id>3774: 90-105 2005</bib_id>
<bib_pages begin="90" end="105" pages="16">90-105</bib_pages>
<bib_issue year="2005" vol="3774"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Calvanese, D</primaryauthor>
<author key="1583096">De Giacomo, G</author>
<author key="4093007">Lembo, D</author>
<author key="4101254">Lenzerini, M</author>
<author key="5945202">Rosati, R</author>
</authors>
<emails count="5">
<email>
<name>Calvanese, D</name>
<email_addr>calvanese@inf.unibz.it</email_addr>
</email>
<email>
<name>De Giacomo, G</name>
<email_addr>degiacomo@dis.uniroma1.it</email_addr>
</email>
<email>
<name>Lembo, D</name>
<email_addr>lembo@dis.uniroma1.it</email_addr>
</email>
<email>
<name>Lenzerini, M</name>
<email_addr>lenzerini@dis.uniroma1.it</email_addr>
</email>
<email>
<name>Rosati, R</name>
<email_addr>rosati@dis.uniroma1.it</email_addr>
</email>
</emails>
<keywords_plus count="3">
<keyword>MINIMAL BELIEF</keyword>
<keyword>NEGATION</keyword>
<keyword>FAILURE</keyword>
</keywords_plus>
<reprint>
<rp_author>Calvanese, D</rp_author>
<rp_address>Free Univ Bolzano Bozen, Fac Comp Sci, Piazza Domenicani 3, I-39100 Bolzano, Italy</rp_address>
<rp_organization>Free Univ Bolzano Bozen</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Fac Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Piazza Domenicani 3</rp_street>
<rp_city>Bolzano</rp_city>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-39100</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Free Univ Bolzano Bozen, Fac Comp Sci, I-39100 Bolzano, Italy</rs_address>
<rs_organization>Free Univ Bolzano Bozen</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Fac Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Bolzano</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-39100</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Roma La Sapienza, Dipartimento Informat &amp; Sistemist, I-00198 Rome, Italy</rs_address>
<rs_organization>Univ Roma La Sapienza</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Informat &amp; Sistemist</rs_suborganization>
</rs_suborganizations>
<rs_city>Rome</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-00198</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>We study peer-to-peer data integration, where each peer models an autonomous system that exports data in terms of its own schema, and data interoperation is achieved by means of mappings among the peer schemas, rather than through a global schema. We propose a multi-modal epistemic semantics based on the idea that each peer is conceived as a rational agent that exchanges knowledge/belief with other peers, thus nicely modeling the modular structure of the system. We then address the issue of dealing with possible inconsistencies, and distinguish between two types of inconsistencies, called local and P2P, respectively. We define a nonmonotonic extension of our logic that is able to reason on the beliefs of peers under inconsistency tolerance. Tolerance to local inconsistency essentially means that the presence of inconsistency within one peer does not affect the consistency of the whole system. Tolerance to P2P inconsistency means being able to resolve inconsistencies arising from the interaction between peers. We study query answering and its data complexity in this setting, and we present an algorithm that is sound and complete with respect to the proposed semantics, and optimal with respect to worst-case complexity.</p>
</abstract>
<refs count="28">
<ref>55907453</ref>
<ref>149159128</ref>
<ref>117648579</ref>
<ref>149159129</ref>
<ref>149159130</ref>
<ref>133034704</ref>
<ref>133333737</ref>
<ref>133034706</ref>
<ref>133034705</ref>
<ref>143536670</ref>
<ref>42718386</ref>
<ref>113414372</ref>
<ref>81189801</ref>
<ref>94083106</ref>
<ref>133716603</ref>
<ref>149159131</ref>
<ref>75180516</ref>
<ref>149159132</ref>
<ref>142533876</ref>
<ref>123177631</ref>
<ref>143446450</ref>
<ref>130986337</ref>
<ref>135008480</ref>
<ref>89238358</ref>
<ref>131883793</ref>
<ref>112130916</ref>
<ref>149159133</ref>
<ref>69869901</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149155550" hot="yes" sortkey="3119835099" timescited="0" sharedrefs="0" inpi="false">
<item issue="149155465" recid="149155550" coverdate="200604" sortkey="3119835099" refkey="4233855" dbyear="2006">
<ut>000235857500008</ut>
<i_ckey>LIU 0859060050CX</i_ckey>
<i_cid>0109860020</i_cid>
<source_title>COMPUTER NETWORKS</source_title>
<source_abbrev>COMPUT NETW</source_abbrev>
<item_title>Consistency maintenance in dynamic peer-to-peer overlay networks</item_title>
<sq>12854J0</sq>
<bib_id>50 (6): 859-876 APR 13 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.comnet.2005.07.010</article_no>
</article_nos>
<bib_pages begin="859" end="876" pages="18">859-876</bib_pages>
<bib_issue year="2006" vol="50"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Liu, XT</primaryauthor>
<author key="3968628">Lan, J</author>
<author key="6371658">Shenoy, P</author>
<author key="5718046">Ramaritham, K</author>
</authors>
<emails count="1">
<email>
<name>Liu, XT</name>
<email_addr>xiaotaol@cs.umass.edu</email_addr>
</email>
</emails>
<keywords count="3">
<keyword>P2P</keyword>
<keyword>consistency</keyword>
<keyword>overlay network</keyword>
</keywords>
<keywords_plus count="3">
<keyword>FILE SYSTEM</keyword>
<keyword>SCALE</keyword>
<keyword>CODA</keyword>
</keywords_plus>
<reprint>
<rp_author>Liu, XT</rp_author>
<rp_address>Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA</rp_address>
<rp_organization>Univ Massachusetts</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Amherst</rp_city>
<rp_state>MA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">01003</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA</rs_address>
<rs_organization>Univ Massachusetts</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Amherst</rs_city>
<rs_state>MA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">01003</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Verizon Corp, GTE Labs, Verizon Data Serv, Waltham, MA 02451 USA</rs_address>
<rs_organization>Verizon Corp</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>GTE Labs</rs_suborganization>
<rs_suborganization>Verizon Data Serv</rs_suborganization>
</rs_suborganizations>
<rs_city>Waltham</rs_city>
<rs_state>MA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">02451</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Indian Inst Technol, Dept Comp Sci &amp; Engn, Bombay 400076, Maharashtra, India</rs_address>
<rs_organization>Indian Inst Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Bombay</rs_city>
<rs_state>Maharashtra</rs_state>
<rs_country>India</rs_country>
<rs_zips count="1">
<rs_zip location="AC">400076</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper, we present techniques to maintain temporal consistency of replicated objects in data-centric peer-to-peer overlay applications. We consider both structured and unstructured overlay networks, represented by Chord and Gnutella, respectively, and present techniques for maintaining consistency of replicated data objects in the presence of dynamic joins and leaves. We present extensions to the Chord and Gnutella protocol to incorporate our consistency techniques and implement our extensions to Gnutella into a Gtk-Gnutella prototype. Ail experimental evaluation of our techniques shows that: (i) a push-based approach achieves near-perfect fidelity in a stable overlay network, (ii) a hybrid approach based on push and pull achieves high fidelity in highly dynamic overlay networks and (iii) the run-time overheads of our techniques are small, making them it practical choice for overlay networks. (c) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="34">
<ref>111648105</ref>
<ref>126921051</ref>
<ref>104676859</ref>
<ref>149155551</ref>
<ref>130809159</ref>
<ref>136365666</ref>
<ref>132500244</ref>
<ref>127960294</ref>
<ref>149155552</ref>
<ref>149155553</ref>
<ref>121862304</ref>
<ref>100121457</ref>
<ref>132793763</ref>
<ref>78735613</ref>
<ref>122611831</ref>
<ref>109425037</ref>
<ref>149155554</ref>
<ref>132793765</ref>
<ref>111651653</ref>
<ref>123110024</ref>
<ref>123110019</ref>
<ref>130355044</ref>
<ref>127960302</ref>
<ref>130832200</ref>
<ref>71946304</ref>
<ref>149155555</ref>
<ref>124689499</ref>
<ref>123110036</ref>
<ref>123110037</ref>
<ref>99748675</ref>
<ref>130246209</ref>
<ref>133439275</ref>
<ref>132793758</ref>
<ref>129914622</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149146000" hot="yes" sortkey="3119838103" timescited="0" sharedrefs="0" inpi="false">
<item issue="149145862" recid="149146000" coverdate="200600" sortkey="3119838103" refkey="5228584" dbyear="2006">
<ut>000235807500024</ut>
<i_ckey>OKUY0294063853LT</i_ckey>
<i_cid>0109902163</i_cid>
<source_title>BIOLOGICALLY INSPIRED APPROACHES TO ADVANCED INFORMATION TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Improving the robustness of epidemic communication in scale-free networks</item_title>
<sq>B5024B0</sq>
<bib_id>3853: 294-305 2006</bib_id>
<bib_pages begin="294" end="305" pages="12">294-305</bib_pages>
<bib_issue year="2006" vol="3853"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Okuyama, T</primaryauthor>
<author key="7067273">Tsuchiya, T</author>
<author key="3653676">Kikuno, T</author>
</authors>
<emails count="3">
<email>
<name>Okuyama, T</name>
<email_addr>t-okuyama@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Tsuchiya, T</name>
<email_addr>t-tutiya@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Kikuno, T</name>
<email_addr>kikuno@ist.osaka-u.ac.jp</email_addr>
</email>
</emails>
<keywords_plus count="1">
<keyword>BROADCAST</keyword>
</keywords_plus>
<reprint>
<rp_author>Okuyama, T</rp_author>
<rp_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Osaka 5670851, Japan</rp_address>
<rp_organization>Osaka Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Grad Sch Informat Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Osaka</rp_city>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">5670851</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Osaka 5670851, Japan</rs_address>
<rs_organization>Osaka Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Grad Sch Informat Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Osaka</rs_city>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">5670851</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>As the name suggests, epidemic protocols mimic spread of virus to implement broadcasting with high reliability and low communication cost in peer-to-peer (P2P) overlay networks. In this paper, we study the reliability of epidemic protocols in scale-free networks, an important class of P2P overlay network topologies. In order to improve the robustness of epidemic protocols, we optimize the basic epidemic protocol in the following two ways. One optimization is to introduce an adaptive mechanism that allows each node to retransmit a broadcast message adaptively to the environment. The other optimization is to modify the protocol such that nodes will forward broadcast messages preferentially to neighbor nodes of small degree. The usefulness of these optimizations is demonstrated through simulation results.</p>
</abstract>
<refs count="23">
<ref>129896391</ref>
<ref>112080970</ref>
<ref>111440046</ref>
<ref>149146001</ref>
<ref>149146002</ref>
<ref>131595486</ref>
<ref>137280663</ref>
<ref>130832153</ref>
<ref>135883700</ref>
<ref>116944973</ref>
<ref>149146003</ref>
<ref>123748238</ref>
<ref>146213848</ref>
<ref>120146863</ref>
<ref>149146004</ref>
<ref>129896390</ref>
<ref>131693412</ref>
<ref>137573445</ref>
<ref>128138422</ref>
<ref>123110037</ref>
<ref>131214760</ref>
<ref>149146005</ref>
<ref>149146006</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149146010" hot="yes" sortkey="3119838105" timescited="0" sharedrefs="0" inpi="false">
<item issue="149145862" recid="149146010" coverdate="200600" sortkey="3119838105" refkey="4083602" dbyear="2006">
<ut>000235807500026</ut>
<i_ckey>LEIB0322063853LK</i_ckey>
<i_cid>0109902169</i_cid>
<source_title>BIOLOGICALLY INSPIRED APPROACHES TO ADVANCED INFORMATION TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Modeling of epidemic diffusion in peer-to-peer file-sharing networks</item_title>
<sq>B5024B0</sq>
<bib_id>3853: 322-329 2006</bib_id>
<bib_pages begin="322" end="329" pages="8">322-329</bib_pages>
<bib_issue year="2006" vol="3853"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Leibnitz, K</primaryauthor>
<author key="3122918">Hossfeld, T</author>
<author key="7340591">Wakamiya, N</author>
<author key="4947029">Murata, M</author>
</authors>
<emails count="4">
<email>
<name>Leibnitz, K</name>
<email_addr>leibnitz@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Hossfeld, T</name>
<email_addr>hossfeld@informatik.uni-wuerzburg.de</email_addr>
</email>
<email>
<name>Wakamiya, N</name>
<email_addr>wakamiya@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Murata, M</name>
<email_addr>murata@ist.osaka-u.ac.jp</email_addr>
</email>
</emails>
<reprint>
<rp_author>Leibnitz, K</rp_author>
<rp_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, 1-5 Yamadaoka, Suita, Osaka 5650871, Japan</rp_address>
<rp_organization>Osaka Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Grad Sch Informat Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_street>1-5 Yamadaoka</rp_street>
<rp_city>Suita</rp_city>
<rp_state>Osaka</rp_state>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AP">5650871</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Suita, Osaka 5650871, Japan</rs_address>
<rs_organization>Osaka Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Grad Sch Informat Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Suita</rs_city>
<rs_state>Osaka</rs_state>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AP">5650871</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Wurzburg, Dept Distributed Syst, D-97074 Wurzburg, Germany</rs_address>
<rs_organization>Univ Wurzburg</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Distributed Syst</rs_suborganization>
</rs_suborganizations>
<rs_city>Wurzburg</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-97074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper we propose an analytical model for file diffusion in a peer-to-peer (P2P) file-sharing network based on biological epidemics. During the downloading process, the peer shares the downloaded parts of the file and, thus, contributes to distributing it in the network. This behavior is similar to the spreading of epidemic diseases which is a well researched subject in mathematical biology. Unlike other P2P models based on epidemics, we show that steady state assumptions are not sufficient and that the granularity of the diffusion model may be appropriately selected.</p>
</abstract>
<refs count="9">
<ref>149146011</ref>
<ref>149146012</ref>
<ref>149146013</ref>
<ref>149146014</ref>
<ref>131575353</ref>
<ref>149146015</ref>
<ref>149146016</ref>
<ref>149146017</ref>
<ref>149146018</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149146037" hot="yes" sortkey="3119838112" timescited="0" sharedrefs="0" inpi="false">
<item issue="149145862" recid="149146037" coverdate="200600" sortkey="3119838112" refkey="3307151" dbyear="2006">
<ut>000235807500033</ut>
<i_ckey>IZUM0379063853LT</i_ckey>
<i_cid>0109902187</i_cid>
<source_title>BIOLOGICALLY INSPIRED APPROACHES TO ADVANCED INFORMATION TECHNOLOGY, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>An interest-based peer clustering algorithm using ant paradigm</item_title>
<sq>B5024B0</sq>
<bib_id>3853: 379-386 2006</bib_id>
<bib_pages begin="379" end="386" pages="8">379-386</bib_pages>
<bib_issue year="2006" vol="3853"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Izumi, T</primaryauthor>
<author key="4526002">Masuzawa, T</author>
</authors>
<emails count="2">
<email>
<name>Izumi, T</name>
<email_addr>t-izumi@ist.osaka-u.ac.jp</email_addr>
</email>
<email>
<name>Masuzawa, T</name>
<email_addr>masuzawa@ist.osaka-u.ac.jp</email_addr>
</email>
</emails>
<reprint>
<rp_author>Izumi, T</rp_author>
<rp_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, 1-3 Machikaneyama, Toyonaka, Osaka 5608531, Japan</rp_address>
<rp_organization>Osaka Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Grad Sch Informat Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_street>1-3 Machikaneyama</rp_street>
<rp_city>Toyonaka</rp_city>
<rp_state>Osaka</rp_state>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AP">5608531</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Osaka Univ, Grad Sch Informat Sci &amp; Technol, Toyonaka, Osaka 5608531, Japan</rs_address>
<rs_organization>Osaka Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Grad Sch Informat Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Toyonaka</rs_city>
<rs_state>Osaka</rs_state>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AP">5608531</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The interest-based clustering is one of promising approaches to achieve low-cost search in peer-to-peer file sharing. It organizes the logical overlay network where peers having similar interests are closely located. In this paper, we propose an interest-based peer clustering algorithm using ant paradigm. Our algorithm is inspired by the ant-based clustering algorithm, which is one of heuristic methods to categorize many data items. We also evaluate this algorithm by simulations.</p>
</abstract>
<refs count="6">
<ref>59788686</ref>
<ref>111443100</ref>
<ref>107591590</ref>
<ref>149146038</ref>
<ref>142329190</ref>
<ref>130494565</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149134283" hot="yes" sortkey="3119840801" timescited="0" sharedrefs="0" inpi="false">
<item issue="149133854" recid="149134283" coverdate="200600" sortkey="3119840801" refkey="1201014" dbyear="2006">
<ut>000235659100071</ut>
<i_ckey>CHEN0545063842LH</i_ckey>
<i_cid>0109883077</i_cid>
<source_title>ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Semantic peer-to-peer overlay for efficient content locating</item_title>
<sq>B4952B0</sq>
<bib_id>3842: 545-554 2006</bib_id>
<bib_pages begin="545" end="554" pages="10">545-554</bib_pages>
<bib_issue year="2006" vol="3842"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Chen, HH</primaryauthor>
<author key="3393638">Jin, H</author>
<author key="5111594">Ning, XM</author>
</authors>
<emails count="1">
<email>
<name>Chen, HH</name>
<email_addr>hjin@hust.edu.cn</email_addr>
</email>
</emails>
<reprint>
<rp_author>Chen, HH</rp_author>
<rp_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rp_address>
<rp_organization>Huazhong Univ Sci &amp; Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Cluster &amp; Grid Comp Lab</rp_suborganization>
</rp_suborganizations>
<rp_city>Wuhan</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">430074</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Huazhong Univ Sci &amp; Technol, Cluster &amp; Grid Comp Lab, Wuhan 430074, Peoples R China</rs_address>
<rs_organization>Huazhong Univ Sci &amp; Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Cluster &amp; Grid Comp Lab</rs_suborganization>
</rs_suborganizations>
<rs_city>Wuhan</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">430074</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The decentralized structure together with the features of self-organization and fault-tolerance makes peer-to-peer network a promising information-sharing model. However, the efficient content-based location remains a challenge of large scale peer-to-peer network. In this paper we present SemreX, a semantic overlay for desktop literature documents sharing in peer-to-peer networks. We present a semantic overlay algorithm by which peers are locally clustered together according to their semantic similarity and long-range connections are rewired for short-cut in the peer-to-peer networks. Experiment results show that routing in the semantic overlay greatly improves the recall of search as well as reduces routing hops and messages.</p>
</abstract>
<refs count="10">
<ref>123110012</ref>
<ref>149134284</ref>
<ref>148499595</ref>
<ref>149134285</ref>
<ref>149134286</ref>
<ref>149134287</ref>
<ref>134550484</ref>
<ref>149134288</ref>
<ref>105378900</ref>
<ref>149134289</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149134408" hot="yes" sortkey="3119840827" timescited="0" sharedrefs="0" inpi="false">
<item issue="149133854" recid="149134408" coverdate="200600" sortkey="3119840827" refkey="4235870" dbyear="2006">
<ut>000235659100097</ut>
<i_ckey>LIU 0717063842LZ</i_ckey>
<i_cid>0109883178</i_cid>
<source_title>ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Modeling fetch-at-most-once behavior in peer-to-peer file-sharing systems</item_title>
<sq>B4952B0</sq>
<bib_id>3842: 717-724 2006</bib_id>
<bib_pages begin="717" end="724" pages="8">717-724</bib_pages>
<bib_issue year="2006" vol="3842"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Liu, ZQ</primaryauthor>
<author key="1197586">Chen, CJ</author>
</authors>
<emails count="2">
<email>
<name>Liu, ZQ</name>
<email_addr>liu_ziqian@yahoo.com.cn</email_addr>
</email>
<email>
<name>Chen, CJ</name>
<email_addr>changjiachen@sina.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>Liu, ZQ</rp_author>
<rp_address>Beijing Jiaotong Univ, Sch Elect &amp; Informat Engn, Beijing 100044, Peoples R China</rp_address>
<rp_organization>Beijing Jiaotong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Elect &amp; Informat Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">100044</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Beijing Jiaotong Univ, Sch Elect &amp; Informat Engn, Beijing 100044, Peoples R China</rs_address>
<rs_organization>Beijing Jiaotong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Elect &amp; Informat Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100044</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Recent measurement studies show that the object popularity distribution in Kazaa file sharing systems deviates significantly from the Zipf distribution which is commonly seen for the World Wide Web, We measure a real BitTorrent network and we figure its object popularity distribution, which also shows, on a log-log scale, a non-Zipf curve with flattened head. The fetch-at-most-once behavior of peer-to-peer (P2P) client is responsible for such a non-Zipf distribution and we propose two mathematical models to describe this. The models are based on different probability assumptions, though both indicate flatter heads in object popularity distribution curves than Zipf would predict. Our models provide theoretic tools to analyze differences between P2P File-sharing system and Web systems.</p>
</abstract>
<refs count="10">
<ref>115767479</ref>
<ref>137191146</ref>
<ref>149134409</ref>
<ref>130246203</ref>
<ref>143848928</ref>
<ref>149134410</ref>
<ref>43083238</ref>
<ref>130950568</ref>
<ref>144662546</ref>
<ref>149134411</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149134457" hot="yes" sortkey="3119840836" timescited="0" sharedrefs="0" inpi="false">
<item issue="149133854" recid="149134457" coverdate="200600" sortkey="3119840836" refkey="4228069" dbyear="2006">
<ut>000235659100106</ut>
<i_ckey>LIU 0779063842LJ</i_ckey>
<i_cid>0109883214</i_cid>
<source_title>ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>Deployment of Web services for Enterprise Application Integration (EAI) system</item_title>
<sq>B4952B0</sq>
<bib_id>3842: 779-782 2006</bib_id>
<bib_pages begin="779" end="782" pages="4">779-782</bib_pages>
<bib_issue year="2006" vol="3842"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Liu, J</primaryauthor>
<author key="7803404">Zhang, EP</author>
<author key="7669397">Xiong, JF</author>
<author key="4332574">Lv, ZY</author>
</authors>
<emails count="1">
<email>
<name>Liu, J</name>
<email_addr>zhangep@163.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>Liu, J</rp_author>
<rp_address>Harbin Engn Univ, Sch Comp Sci &amp; Technol, Harbin, Peoples R China</rp_address>
<rp_organization>Harbin Engn Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Harbin</rp_city>
<rp_country>Peoples R China</rp_country>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Harbin Engn Univ, Sch Comp Sci &amp; Technol, Harbin, Peoples R China</rs_address>
<rs_organization>Harbin Engn Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Harbin</rs_city>
<rs_country>Peoples R China</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The process to explore application integration for enterprise information system is called Enterprise Application Integration (EAI). Generally, EAI that based on the peer-to-peer has many limitations, such as poor extensibility, difficulty of management, and high-cost etc. These disadvantages can be overcome by Web services technology which helps to integrate large-scale, distributed enterprise applications together. This paper presents a framework of EAI which based on Web services, and gives discussions on its major functional modules.</p>
</abstract>
<refs count="7">
<ref>129280287</ref>
<ref>149134458</ref>
<ref>129280292</ref>
<ref>149134459</ref>
<ref>149134460</ref>
<ref>149134461</ref>
<ref>149134462</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149067053" hot="yes" sortkey="3119892703" timescited="0" sharedrefs="0" inpi="false">
<item issue="149067052" recid="149067053" coverdate="200600" sortkey="3119892703" refkey="46010" dbyear="2006">
<ut>000235720800001</ut>
<i_ckey>ADJI0269060025JP</i_ckey>
<i_cid>0109793753</i_cid>
<source_title>JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH</source_title>
<source_abbrev>J ARTIF INTELL RES</source_abbrev>
<item_title>Distributed reasoning in a peer-to-peer setting: Application to the Semantic Web</item_title>
<sq>11648J0</sq>
<bib_id>25: 269-314 2006</bib_id>
<bib_pages begin="269" end="314" pages="46">269-314</bib_pages>
<bib_issue year="2006" vol="25"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Adjiman, P</primaryauthor>
<author key="1184345">Chatalic, P</author>
<author key="2499771">Goasdoue, F</author>
<author key="5984981">Rousset, MC</author>
<author key="6456653">Simon, L</author>
</authors>
<emails count="5">
<email>
<name>Adjiman, P</name>
<email_addr>ADJIMAN@LRI.FR</email_addr>
</email>
<email>
<name>Chatalic, P</name>
<email_addr>CHATALIC@LRI.FR</email_addr>
</email>
<email>
<name>Goasdoue, F</name>
<email_addr>FG@LRI.FR</email_addr>
</email>
<email>
<name>Rousset, MC</name>
<email_addr>MCR@LRI.FR</email_addr>
</email>
<email>
<name>Simon, L</name>
<email_addr>SIMON@LRI.FR</email_addr>
</email>
</emails>
<reprint>
<rp_author>Adjiman, P</rp_author>
<rp_address>CNRS, LRI, PCRI, Batiment 490, F-91405 Orsay, France</rp_address>
<rp_organization>CNRS</rp_organization>
<rp_suborganizations count="2">
<rp_suborganization>LRI</rp_suborganization>
<rp_suborganization>PCRI</rp_suborganization>
</rp_suborganizations>
<rp_street>Batiment 490</rp_street>
<rp_city>Orsay</rp_city>
<rp_country>France</rp_country>
<rp_zips count="1">
<rp_zip location="BC">F-91405</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>CNRS, LRI, PCRI, F-91405 Orsay, France</rs_address>
<rs_organization>CNRS</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>LRI</rs_suborganization>
<rs_suborganization>PCRI</rs_suborganization>
</rs_suborganizations>
<rs_city>Orsay</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91405</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Paris 11, INRIA Futurs, F-91405 Orsay, France</rs_address>
<rs_organization>Univ Paris 11</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>INRIA Futurs</rs_suborganization>
</rs_suborganizations>
<rs_city>Orsay</rs_city>
<rs_country>France</rs_country>
<rs_zips count="1">
<rs_zip location="BC">F-91405</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In a peer-to-peer inferencesystem, each peer can reason locally but can also lso solicit licit some of its acquatances, which are peers sharing part of its vocabulary. In this paper, we consider peer-to-peer inference systems in which the local theory of each peer is a set et of propositional clauses defined upon a local vocabulary. An important characteristic of peer-to peer infererence systems is that the global theory (the union of all peer theories) is not known (as opposed to partition-based reasoning systems). The main contribution of this paper is to provide the first consequence finding algorithm in a peer-to-peer setting: DeCA. It is anytime and computes consequences gradually from the solicited peer to peers that are more and more distant. We exhibit a sufficient condition on the acquaintance graph of the peer-to-peer inference system for guaranteeing the completeness of this algorithm. Another important contribution is to apply this general distributed reasoning setting to the setting etting of the Semantic Web through the Somewhere semantic peer-to-peer data management system. The last contribution of this paper is to provide an experimental analysis of the scalability of the peer-to-peer infrastructure that we propose, on large networks of 1000 peers.</p>
</abstract>
<refs count="46">
<ref>149067054</ref>
<ref>149067055</ref>
<ref>149067056</ref>
<ref>126710858</ref>
<ref>137287367</ref>
<ref>131693401</ref>
<ref>122330998</ref>
<ref>149067057</ref>
<ref>142351713</ref>
<ref>143536670</ref>
<ref>103305687</ref>
<ref>104529245</ref>
<ref>131881906</ref>
<ref>149067058</ref>
<ref>78096319</ref>
<ref>149067059</ref>
<ref>149067060</ref>
<ref>149067061</ref>
<ref>146677078</ref>
<ref>147679525</ref>
<ref>131194754</ref>
<ref>142533876</ref>
<ref>80707883</ref>
<ref>18611210</ref>
<ref>133716617</ref>
<ref>128827338</ref>
<ref>72579175</ref>
<ref>112346051</ref>
<ref>129695036</ref>
<ref>117506116</ref>
<ref>149067062</ref>
<ref>68612884</ref>
<ref>149067063</ref>
<ref>149067064</ref>
<ref>149067065</ref>
<ref>142351230</ref>
<ref>95267557</ref>
<ref>149067066</ref>
<ref>149067067</ref>
<ref>63097790</ref>
<ref>128387184</ref>
<ref>126654497</ref>
<ref>143446458</ref>
<ref>148898840</ref>
<ref>107408181</ref>
<ref>103866001</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149055974" hot="yes" sortkey="3119895153" timescited="0" sharedrefs="0" inpi="false">
<item issue="149055788" recid="149055974" coverdate="200500" sortkey="3119895153" refkey="3035228" dbyear="2006">
<ut>000235474700026</ut>
<i_ckey>HLAV0235053814LH</i_ckey>
<i_cid>0109798893</i_cid>
<source_title>INTELLIGENT TECHNOLOGIES FOR INTERACTIVE ENTERTAINMENT, PROCEEDINGS</source_title>
<source_series>LECTURE NOTES IN COMPUTER SCIENCE</source_series>
<source_abbrev>LECT NOTES COMPUT SC</source_abbrev>
<item_title>A ubiquitous and interactive zoo guide system</item_title>
<sq>B4849B0</sq>
<bib_id>3814: 235-239 2005</bib_id>
<bib_pages begin="235" end="239" pages="5">235-239</bib_pages>
<bib_issue year="2005" vol="3814"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Hlavacs, H</primaryauthor>
<author key="2404490">Gelies, R</author>
<author key="701840">Blossey, D</author>
<author key="3714132">Klein, B</author>
</authors>
<emails count="2">
<email>
<name>Hlavacs, H</name>
<email_addr>helmut.hlavacs@univie.ac.at</email_addr>
</email>
<email>
<name>Gelies, R</name>
<email_addr>bernhard.klein@univie.ac.at</email_addr>
</email>
</emails>
<reprint>
<rp_author>Hlavacs, H</rp_author>
<rp_address>Univ Vienna, Inst Distributed &amp; Multimedia Syst, Lenaug 2-8, A-1080 Vienna, Austria</rp_address>
<rp_organization>Univ Vienna</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Inst Distributed &amp; Multimedia Syst</rp_suborganization>
</rp_suborganizations>
<rp_street>Lenaug 2-8</rp_street>
<rp_city>Vienna</rp_city>
<rp_country>Austria</rp_country>
<rp_zips count="1">
<rp_zip location="BC">A-1080</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Vienna, Inst Distributed &amp; Multimedia Syst, A-1080 Vienna, Austria</rs_address>
<rs_organization>Univ Vienna</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Inst Distributed &amp; Multimedia Syst</rs_suborganization>
</rs_suborganizations>
<rs_city>Vienna</rs_city>
<rs_country>Austria</rs_country>
<rs_zips count="1">
<rs_zip location="BC">A-1080</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Otto Von Guericke Univ, Fak Informat, IWS, D-39112 Magdeburg, Germany</rs_address>
<rs_organization>Otto Von Guericke Univ</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Fak Informat</rs_suborganization>
<rs_suborganization>IWS</rs_suborganization>
</rs_suborganizations>
<rs_city>Magdeburg</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-39112</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>We describe a new prototype for a zoo information system. The system is based on RFID and allows to retrieve information about the zoo animals in a quick and easy way. RFID tags identifying the respective animals are placed near the animal habitats. Zoo visitors are equipped with PDAs containing RFID readers and WLAN cards. The PDAs may then read the RFID tag IDs and retrieve respective HTML-documents from a zoo Web server showing information about the animals at various levels of detail and languages. Additionally, the system contains a JXTA and XML based peer-to-peer subsystem, enabling zoos to share their content with other zoos in an easy way. This way, the effort for creating multimedia content can be reduced drastically.</p>
</abstract>
<refs count="5">
<ref>149055975</ref>
<ref>146909052</ref>
<ref>149055976</ref>
<ref>149055977</ref>
<ref>135636881</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149055464" hot="yes" sortkey="3119895277" timescited="0" sharedrefs="0" inpi="false">
<item issue="149055373" recid="149055464" coverdate="200605" sortkey="3119895277" refkey="4481557" dbyear="2006">
<ut>000235828800012</ut>
<i_ckey>MARS0405060012IJ</i_ckey>
<i_cid>0109844565</i_cid>
<source_title>IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS</source_title>
<source_abbrev>IEEE T VIS COMPUT GR</source_abbrev>
<item_title>A network architecture supporting consistent rich behavior in collaborative interactive applications</item_title>
<sq>11534J0</sq>
<bib_id>12 (3): 405-416 MAY-JUN 2006</bib_id>
<bib_pages begin="405" end="416" pages="12">405-416</bib_pages>
<bib_issue year="2006" vol="12"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Marsh, J</primaryauthor>
<author key="2490833">Glencross, M</author>
<author key="5490529">Pettifer, S</author>
<author key="3160460">Hubbold, R</author>
</authors>
<emails count="4">
<email>
<name>Marsh, J</name>
<email_addr>james.marsh@manchester.ac.uk</email_addr>
</email>
<email>
<name>Glencross, M</name>
<email_addr>mashhuda.glencross@manchester.ac.uk</email_addr>
</email>
<email>
<name>Pettifer, S</name>
<email_addr>steve.pettifer@manchester.ac.uk</email_addr>
</email>
<email>
<name>Hubbold, R</name>
<email_addr>roger.hubbold@manchester.ac.uk</email_addr>
</email>
</emails>
<keywords count="11">
<keyword>virtual reality</keyword>
<keyword>network architecture and design</keyword>
<keyword>haptic I/O</keyword>
<keyword>computer supported collaborative work</keyword>
<keyword>computer-supported cooperative work</keyword>
<keyword>simulation</keyword>
<keyword>modeling</keyword>
<keyword>and visualization</keyword>
<keyword>client/server</keyword>
<keyword>distributed applications</keyword>
<keyword>computer aided design</keyword>
</keywords>
<keywords_plus count="6">
<keyword>GEOMETRICALLY NONLINEAR RODS</keyword>
<keyword>DYNAMICS</keyword>
<keyword>SYSTEM</keyword>
<keyword>MOTION</keyword>
<keyword>REAL</keyword>
<keyword>TIME</keyword>
</keywords_plus>
<reprint>
<rp_author>Marsh, J</rp_author>
<rp_address>Univ Manchester, Sch Comp Sci, Oxford Rd, Manchester M13 9PL, Lancs, England</rp_address>
<rp_organization>Univ Manchester</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Oxford Rd</rp_street>
<rp_city>Manchester</rp_city>
<rp_state>Lancs</rp_state>
<rp_country>England</rp_country>
<rp_zips count="1">
<rp_zip location="AC">M13 9PL</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Manchester, Sch Comp Sci, Manchester M13 9PL, Lancs, England</rs_address>
<rs_organization>Univ Manchester</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Manchester</rs_city>
<rs_state>Lancs</rs_state>
<rs_country>England</rs_country>
<rs_zips count="1">
<rs_zip location="AC">M13 9PL</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Network architectures for collaborative virtual reality have traditionally been dominated by client-server and peer-to-peer approaches, with peer-to-peer strategies typically being favored where minimizing latency is a priority, and client-server where consistency is key. With increasingly sophisticated behavior models and the demand for better support for haptics, we argue that neither approach provides sufficient support for these scenarios and, thus, a hybrid architecture is required. We discuss the relative performance of different distribution strategies in the face of real network conditions and illustrate the problems they face. Finally, we present an architecture that successfully meets many of these challenges and demonstrate its use in a distributed virtual prototyping application which supports simultaneous collaboration for assembly, maintenance, and training applications utilizing haptics.</p>
</abstract>
<refs count="50">
<ref>144915102</ref>
<ref>126248998</ref>
<ref>105686318</ref>
<ref>149055465</ref>
<ref>112228412</ref>
<ref>101958017</ref>
<ref>149055466</ref>
<ref>149055467</ref>
<ref>149055468</ref>
<ref>104596465</ref>
<ref>149055469</ref>
<ref>80709369</ref>
<ref>123148962</ref>
<ref>149055470</ref>
<ref>99690697</ref>
<ref>136375168</ref>
<ref>95085170</ref>
<ref>135635710</ref>
<ref>149055471</ref>
<ref>149055472</ref>
<ref>149055473</ref>
<ref>146452499</ref>
<ref>127674897</ref>
<ref>111105875</ref>
<ref>149055474</ref>
<ref>130497423</ref>
<ref>34820797</ref>
<ref>147660352</ref>
<ref>95085173</ref>
<ref>149055475</ref>
<ref>149055476</ref>
<ref>133010812</ref>
<ref>129943758</ref>
<ref>122979711</ref>
<ref>126562138</ref>
<ref>149055477</ref>
<ref>149055478</ref>
<ref>130496862</ref>
<ref>149055479</ref>
<ref>145242580</ref>
<ref>135417599</ref>
<ref>122382576</ref>
<ref>132952619</ref>
<ref>98934185</ref>
<ref>149055480</ref>
<ref>122156734</ref>
<ref>133733686</ref>
<ref>127471407</ref>
<ref>127471418</ref>
<ref>128439222</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="149011455" hot="yes" sortkey="3119906041" timescited="0" sharedrefs="0" inpi="false">
<item issue="149011438" recid="149011455" coverdate="200603" sortkey="3119906041" refkey="2217694" dbyear="2006">
<ut>000235817900003</ut>
<i_ckey>FOX 0110060032AC</i_ckey>
<i_cid>0109842042</i_cid>
<source_title>AGGRESSIVE BEHAVIOR</source_title>
<source_abbrev>AGGRESSIVE BEHAV</source_abbrev>
<item_title>Friendship as a moderator of the relationship between social skills problems and peer victimisation</item_title>
<sq>05520J0</sq>
<bib_id>32 (2): 110-121 MAR-APR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1002/ab.20114</article_no>
</article_nos>
<bib_pages begin="110" end="121" pages="12">110-121</bib_pages>
<bib_issue year="2006" vol="32"/>
<doctype code="@">Article</doctype>
<editions full="SCI SSCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Fox, CL</primaryauthor>
<author key="792055">Boulton, MJ</author>
</authors>
<emails count="1">
<email>
<name>Fox, CL</name>
<email_addr>c.fox@psy.keele.ac.uk</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer victimisation</keyword>
<keyword>social skills</keyword>
<keyword>friendship</keyword>
<keyword>peer acceptance</keyword>
<keyword>bullying</keyword>
</keywords>
<keywords_plus count="10">
<keyword>MIDDLE-SCHOOL-CHILDREN</keyword>
<keyword>BULLY VICTIM PROBLEMS</keyword>
<keyword>EARLY ADOLESCENCE</keyword>
<keyword>PSYCHOLOGICAL ADJUSTMENT</keyword>
<keyword>AGGRESSION</keyword>
<keyword>PERCEPTIONS</keyword>
<keyword>BOYS</keyword>
<keyword>MALADJUSTMENT</keyword>
<keyword>ANTECEDENTS</keyword>
<keyword>PERSPECTIVE</keyword>
</keywords_plus>
<reprint>
<rp_author>Fox, CL</rp_author>
<rp_address>Univ Keele, Sch Psychol, Keele ST5 5BG, Staffs, England</rp_address>
<rp_organization>Univ Keele</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Psychol</rp_suborganization>
</rp_suborganizations>
<rp_city>Keele</rp_city>
<rp_state>Staffs</rp_state>
<rp_country>England</rp_country>
<rp_zips count="1">
<rp_zip location="AC">ST5 5BG</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Keele, Sch Psychol, Keele ST5 5BG, Staffs, England</rs_address>
<rs_organization>Univ Keele</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Psychol</rs_suborganization>
</rs_suborganizations>
<rs_city>Keele</rs_city>
<rs_state>Staffs</rs_state>
<rs_country>England</rs_country>
<rs_zips count="1">
<rs_zip location="AC">ST5 5BG</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Coll Chester, Chester, Cheshire, England</rs_address>
<rs_organization>Univ Coll Chester</rs_organization>
<rs_city>Chester</rs_city>
<rs_state>Cheshire</rs_state>
<rs_country>England</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Previous research, primarily in North America, has found that individual factors (e.g., 'internalising problems') and social factors (e.g., friendship) interact to influence children's levels of peer victimisation. Some research has found that the identity of children's friends and friendship quality (as 'protective factors') are more important than the sheer number of friends. However, studies have produced conflicting findings. A peer nomination inventory was used to assess social skills problems, peer victimisation, peer acceptance, and several different aspects of friendship. Four hundred and forty-nine children aged 9 to 11 years completed the inventory at two time points over the course of an academic year. Social skills problems were found to predict an increase in peer victimisation over time. Two friendship variables were found to moderate this relationship: a) number of friends, and b) the peer acceptance of the very best-friend. The relationship was found to be weaker for those children with lots of friends and for those children with a 'popular' best-friend. The findings advance understanding of the factors that promote peer victimisation.</p>
</abstract>
<refs count="62">
<ref>103651245</ref>
<ref>80878442</ref>
<ref>75075447</ref>
<ref>61103680</ref>
<ref>78963809</ref>
<ref>149011456</ref>
<ref>111670183</ref>
<ref>88611184</ref>
<ref>78768481</ref>
<ref>87613992</ref>
<ref>82636066</ref>
<ref>46511259</ref>
<ref>91511669</ref>
<ref>104880443</ref>
<ref>104375713</ref>
<ref>57138679</ref>
<ref>149011457</ref>
<ref>99076923</ref>
<ref>99076934</ref>
<ref>63802012</ref>
<ref>73774425</ref>
<ref>117516519</ref>
<ref>87443043</ref>
<ref>115109348</ref>
<ref>102763404</ref>
<ref>109879709</ref>
<ref>149011458</ref>
<ref>108353457</ref>
<ref>99458031</ref>
<ref>97935217</ref>
<ref>17825665</ref>
<ref>81480707</ref>
<ref>98324323</ref>
<ref>44778074</ref>
<ref>116447726</ref>
<ref>109592328</ref>
<ref>85678721</ref>
<ref>35120243</ref>
<ref>78699417</ref>
<ref>83989118</ref>
<ref>110919100</ref>
<ref>131895704</ref>
<ref>122584675</ref>
<ref>49697368</ref>
<ref>88732362</ref>
<ref>13083889</ref>
<ref>95907289</ref>
<ref>85819804</ref>
<ref>116432242</ref>
<ref>110811094</ref>
<ref>90192828</ref>
<ref>111271358</ref>
<ref>89663505</ref>
<ref>100563170</ref>
<ref>109608245</ref>
<ref>110334648</ref>
<ref>72393011</ref>
<ref>83645538</ref>
<ref>6670927</ref>
<ref>96555032</ref>
<ref>63119246</ref>
<ref>55057735</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148961416" hot="yes" sortkey="3119950290" timescited="0" sharedrefs="0" inpi="false">
<item issue="148961346" recid="148961416" coverdate="200602" sortkey="3119950290" refkey="243165" dbyear="2006">
<ut>000235459500009</ut>
<i_ckey>ARIN0528060057JR</i_ckey>
<i_cid>0109673890</i_cid>
<source_title>JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY</source_title>
<source_abbrev>J AM SOC INF SCI TEC</source_abbrev>
<item_title>Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems</item_title>
<sq>13507J0</sq>
<bib_id>57 (4): 528-537 FEB 15 2006</bib_id>
<bib_pages begin="528" end="537" pages="10">528-537</bib_pages>
<bib_issue year="2006" vol="57"/>
<doctype code="@">Article</doctype>
<editions full="SCI SSCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Aringhieri, R</primaryauthor>
<author key="1525711">Damiani, E</author>
<author key="1704252">Di Vimercati, SD</author>
<author key="5355893">Paraboschi, S</author>
<author key="6089636">Samarati, P</author>
</authors>
<emails count="5">
<email>
<name>Aringhieri, R</name>
<email_addr>Aringhieri@dti.unimi.it</email_addr>
</email>
<email>
<name>Damiani, E</name>
<email_addr>Damiani@dti.unimi.it</email_addr>
</email>
<email>
<name>Di Vimercati, SD</name>
<email_addr>Decapita@dti.unimi.it</email_addr>
</email>
<email>
<name>Paraboschi, S</name>
<email_addr>parabosc@unibg.it</email_addr>
</email>
<email>
<name>Samarati, P</name>
<email_addr>samarati@dti.unimi.it</email_addr>
</email>
</emails>
<reprint>
<rp_author>Aringhieri, R</rp_author>
<rp_address>Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, CR, Italy</rp_address>
<rp_organization>Univ Milan</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dipartimento Tecnol Informaz</rp_suborganization>
</rp_suborganizations>
<rp_city>Crema</rp_city>
<rp_state>CR</rp_state>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-26013</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, CR, Italy</rs_address>
<rs_organization>Univ Milan</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Tecnol Informaz</rs_suborganization>
</rs_suborganizations>
<rs_city>Crema</rs_city>
<rs_state>CR</rs_state>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-26013</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Univ Bergamo, Dipartimento Gest &amp; Informaz, Bergamo, Italy</rs_address>
<rs_organization>Univ Bergamo</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Gest &amp; Informaz</rs_suborganization>
</rs_suborganizations>
<rs_city>Bergamo</rs_city>
<rs_country>Italy</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Peer-to-peer (P2P) applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymity of both requesters and providers. However, concerns have been raised about the possibility that malicious users can exploit the network to spread tampered-with resources (e.g., malicious programs and viruses). A considerable amount of research has thus focused on the development of trust and reputation models in P2P networks. In this article, we propose to use fuzzy techniques in the design of reputation systems based on collecting and aggregating peers' opinions. Fuzzy techniques are used in the evaluation and synthesis of all the opinions expressed by peers. The behavior of the proposed system is described by comparison with probabilistic approaches.</p>
</abstract>
<refs count="18">
<ref>130246224</ref>
<ref>61211522</ref>
<ref>127268662</ref>
<ref>142239600</ref>
<ref>148961417</ref>
<ref>130494484</ref>
<ref>130246221</ref>
<ref>130882436</ref>
<ref>128940249</ref>
<ref>148961418</ref>
<ref>119985819</ref>
<ref>98921005</ref>
<ref>148961419</ref>
<ref>148961420</ref>
<ref>65315693</ref>
<ref>123846127</ref>
<ref>130246239</ref>
<ref>118429792</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148939254" hot="yes" sortkey="3119955270" timescited="0" sharedrefs="0" inpi="false">
<item issue="148939193" recid="148939254" coverdate="200604" sortkey="3119955270" refkey="1148078" dbyear="2006">
<ut>000235685200010</ut>
<i_ckey>CHAK0115060020IA</i_ckey>
<i_cid>0109753337</i_cid>
<source_title>INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS</source_title>
<source_abbrev>INT J HIGH PERFORM C</source_abbrev>
<item_title>Self-organizing scheduling on the organic grid</item_title>
<sq>12409J0</sq>
<bib_id>20 (1): 115-130 SPR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1177/1094342006061892</article_no>
</article_nos>
<bib_pages begin="115" end="130" pages="16">115-130</bib_pages>
<bib_issue year="2006" vol="20"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Chakravarti, AJ</primaryauthor>
<author key="476437">Baumgartner, G</author>
<author key="4017147">Lauria, M</author>
</authors>
<emails count="1">
<email>
<name>Chakravarti, AJ</name>
<email_addr>LAURIA@CSE.OHIO-STATE.EDU</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>self-organizing computation</keyword>
<keyword>mobile agents</keyword>
<keyword>grid scheduling</keyword>
<keyword>BLAST</keyword>
<keyword>emergence</keyword>
</keywords>
<reprint>
<rp_author>Chakravarti, AJ</rp_author>
<rp_address>Mathworks Inc, Natick, MA 01760 USA</rp_address>
<rp_organization>Mathworks Inc</rp_organization>
<rp_city>Natick</rp_city>
<rp_state>MA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">01760</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="3">
<research>
<rs_address>Mathworks Inc, Natick, MA 01760 USA</rs_address>
<rs_organization>Mathworks Inc</rs_organization>
<rs_city>Natick</rs_city>
<rs_state>MA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">01760</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Louisiana State Univ, Dept Comp Sci, Baton Rouge, LA 70803 USA</rs_address>
<rs_organization>Louisiana State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Baton Rouge</rs_city>
<rs_state>LA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">70803</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Ohio State Univ, Dept Comp Sci &amp; Engn, Columbus, OH 43210 USA</rs_address>
<rs_organization>Ohio State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Columbus</rs_city>
<rs_state>OH</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">43210</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>The Organic Grid is a biologically inspired and fully decentralized approach to the organization of computation that is based on the autonomous scheduling of strongly mobile agents on a peer-to-peer network. Through the careful design of agent behavior, the emerging organization of the computation can be customized for different classes of applications. In this paper, we report on our experience in adapting the general framework to run two representative applications on our Organic Grid prototype: the National Center for Biotechnology Information (NCBI) basic local alignment search tool (BLAST) code for sequence alignment, and the Cannon's algorithm for matrix multiplication. The first is an example of independent task application, a type of application commonly used for grid scheduling research because of its easily decomposable nature and absence of intra-node communication. The second is a popular block algorithm for parallel matrix multiplication, and represents a challenging application for grid platforms because of its highly structured and synchronous communication pattern.</p>
<p>Agent behavior completely determines the way computation is organized on the Organic Grid. We intentionally chose two applications at opposite ends of the distributed computing spectrum having very different requirements in terms of communication topology, resource use, and response to faults. We detail the design of the agent behavior and show how the different requirements can be satisfied. By encapsulating application code and scheduling functionality into mobile agents, we decouple both computation and scheduling from the underlying grid infrastructure. In the resulting system, every node can inject a computation onto the grid; the computation naturally organizes itself around available resources.</p>
</abstract>
<refs count="30">
<ref>129116106</ref>
<ref>129116096</ref>
<ref>111443100</ref>
<ref>144012122</ref>
<ref>42859036</ref>
<ref>144012124</ref>
<ref>148939255</ref>
<ref>148939256</ref>
<ref>148939257</ref>
<ref>130162185</ref>
<ref>148939258</ref>
<ref>22460537</ref>
<ref>98744566</ref>
<ref>133912096</ref>
<ref>144012130</ref>
<ref>130162152</ref>
<ref>144012131</ref>
<ref>144012132</ref>
<ref>144012133</ref>
<ref>103750600</ref>
<ref>119240775</ref>
<ref>130987116</ref>
<ref>123110024</ref>
<ref>144012137</ref>
<ref>45549147</ref>
<ref>123110037</ref>
<ref>144012138</ref>
<ref>125814117</ref>
<ref>49304</ref>
<ref>121586666</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935626" hot="yes" sortkey="3119956058" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935626" coverdate="200602" sortkey="3119956058" refkey="3092951" dbyear="2006">
<ut>000235508800019</ut>
<i_ckey>HONG0546060089IF</i_ckey>
<i_cid>0109686606</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>PChord: Improvement on Chord to achieve better routing efficiency by exploiting proximity</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 546-554 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.546</article_no>
</article_nos>
<bib_pages begin="546" end="554" pages="9">546-554</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Hong, F</primaryauthor>
<author key="4155068">Li, ML</author>
<author key="7651278">Wu, MY</author>
<author key="7757150">Yu, JD</author>
</authors>
<emails count="1">
<email>
<name>Hong, F</name>
<email_addr>hongfeng@cs.sjtu.edu.cn</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>routing</keyword>
<keyword>Chord</keyword>
<keyword>proximity routing</keyword>
<keyword>RDP</keyword>
</keywords>
<reprint>
<rp_author>Hong, F</rp_author>
<rp_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200240, Peoples R China</rp_address>
<rp_organization>Shanghai Jiao Tong Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Shanghai</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">200240</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Shanghai Jiao Tong Univ, Dept Comp Sci &amp; Engn, Shanghai 200240, Peoples R China</rs_address>
<rs_organization>Shanghai Jiao Tong Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Shanghai</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">200240</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Routing efficiency is the critical issue when constructing peer-to-peer overlay. However, Chord has often been criticized on its careless of routing locality. A routing efficiency enhancement protocol on top of Chord is illustrated in this paper, which is called PChord. PChord aims to achieve better routing efficiency than Chord by exploiting proximity of the underlying network topology. The simulation shows that PChord has achieved lower RDP per message routing.</p>
</abstract>
<refs count="12">
<ref>126921054</ref>
<ref>134350857</ref>
<ref>132793739</ref>
<ref>123110024</ref>
<ref>148935627</ref>
<ref>148935628</ref>
<ref>127960302</ref>
<ref>128939454</ref>
<ref>134350866</ref>
<ref>148935629</ref>
<ref>99948758</ref>
<ref>132793758</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935631" hot="yes" sortkey="3119956060" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935631" coverdate="200602" sortkey="3119956060" refkey="1205264" dbyear="2006">
<ut>000235508800021</ut>
<i_ckey>CHEN0563060089IM</i_ckey>
<i_cid>0109686610</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>Reciprocity: Enforcing contribution in P2P perpendicular downloading</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 563-569 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.563</article_no>
</article_nos>
<bib_pages begin="563" end="569" pages="7">563-569</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Chen, M</primaryauthor>
<author key="7701605">Yang, GW</author>
</authors>
<emails count="1">
<email>
<name>Chen, M</name>
<email_addr>cm01@mails.tsinghua.edu.cn</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>bulk file dissemination</keyword>
<keyword>perpendicular downloading</keyword>
<keyword>incentive</keyword>
<keyword>game theory</keyword>
</keywords>
<reprint>
<rp_author>Chen, M</rp_author>
<rp_address>Tsing Hua Univ, Dept Comp Sci &amp; Technol, Beijing 100084, Peoples R China</rp_address>
<rp_organization>Tsing Hua Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Technol</rp_suborganization>
</rp_suborganizations>
<rp_city>Beijing</rp_city>
<rp_country>Peoples R China</rp_country>
<rp_zips count="1">
<rp_zip location="AC">100084</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Tsing Hua Univ, Dept Comp Sci &amp; Technol, Beijing 100084, Peoples R China</rs_address>
<rs_organization>Tsing Hua Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Beijing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">100084</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Flash bulk files downloading in style of P2P through perpendicular pattern becomes more popular recently. Many peers download different pieces of shared files from the source in parallel. They try to reconstruct complete files by exchanging needed pieces with other downloading peers. The throughput of entire downloading community, as well as the perceived downloading rate of each peer, greatly depends on uploading bandwidth contributed by every individual peer. Unfortunately, without proper built-in incentive mechanism, peers inherently tend to relentlessly download while intentionally limiting their uploading bandwidth. In this paper, we propose a both effective and efficient incentive approach-Reciprocity, which is only based on end-to-end measurement and reaction: a peer caps uploading rate to each of its peers at the rate that is proportional to its downloading rate from that one. It requires no centralized control, or electronic monetary payment, or certification. Preliminary experiments' results reveal that this approach offers favorable performance for cooperative peers, while effectively punishing defective ones.</p>
</abstract>
<refs count="15">
<ref>121371192</ref>
<ref>51848375</ref>
<ref>148935632</ref>
<ref>148935633</ref>
<ref>148935634</ref>
<ref>137439732</ref>
<ref>148935635</ref>
<ref>148935636</ref>
<ref>142796956</ref>
<ref>148935637</ref>
<ref>148935638</ref>
<ref>148935639</ref>
<ref>148935640</ref>
<ref>132892953</ref>
<ref>148935641</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935642" hot="yes" sortkey="3119956061" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935642" coverdate="200602" sortkey="3119956061" refkey="7477138" dbyear="2006">
<ut>000235508800022</ut>
<i_ckey>WEPI0570060089IG</i_ckey>
<i_cid>0109686611</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>HiPeer: A highly reliable P2P system</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 570-580 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.570</article_no>
</article_nos>
<bib_pages begin="570" end="580" pages="11">570-580</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Wepiwte, G</primaryauthor>
<author key="6451251">Simeonov, PL</author>
</authors>
<emails count="1">
<email>
<name>Wepiwte, G</name>
<email_addr>giscard.wepiwe@dai-labor.de</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer networks</keyword>
<keyword>overlay networking</keyword>
<keyword>fault-tolerant routing</keyword>
<keyword>resource distribution and discovery</keyword>
</keywords>
<keywords_plus count="4">
<keyword>MOORE GRAPHS</keyword>
<keyword>NETWORKS</keyword>
<keyword>DIAMETER</keyword>
<keyword>SERVICE</keyword>
</keywords_plus>
<reprint>
<rp_author>Wepiwte, G</rp_author>
<rp_address>Tech Univ Berlin, Fac Elect Engn &amp; Comp Sci, Franklinstr 28-29, D-10587 Berlin, Germany</rp_address>
<rp_organization>Tech Univ Berlin</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Fac Elect Engn &amp; Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_street>Franklinstr 28-29</rp_street>
<rp_city>Berlin</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-10587</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Tech Univ Berlin, Fac Elect Engn &amp; Comp Sci, D-10587 Berlin, Germany</rs_address>
<rs_organization>Tech Univ Berlin</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Fac Elect Engn &amp; Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Berlin</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-10587</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>The paper presents HiPeer, a robust resource distribution and discovery algorithm that can be used for fast and fault-tolerant location of resources in P2P network environments. HiPeer defines a concentric multi-ring overlay networking topology, whereon dynamic network management methods are deployed. In terms of performance, HiPeer delivers of number of lowest bounds. We demonstrate that for any De Bruijn digraph of degree* d &gt;= 2 and diameter** D-DB HiPeer constructs a highly reliable network, where each node maintains a routing table with at most 2d+2 entries independent of the number N of nodes in the system. Further, we show that any existing resource in the network with at most d nodes can be found within at most D-HiPeer = log(d)(N(d - 1) + d) - 1 overlay hops. This result is as close to the Moore bound[1] as the query path length in other outstanding P2P proposals based on the De Bruijn digraphs. Thus, we argue that HiPeer defines a highly connected network with connectivity d and the lowest yet known lookup bound D-HiPeer. Moreover, we show that any node's "join or leave" operation in HiPeer implies a constant expected reorganization cost of the, magnitude order of O(d) control messages.</p>
</abstract>
<refs count="33">
<ref>24845719</ref>
<ref>148935643</ref>
<ref>92522742</ref>
<ref>85998380</ref>
<ref>101912881</ref>
<ref>148935644</ref>
<ref>126824946</ref>
<ref>80609135</ref>
<ref>134150460</ref>
<ref>148935645</ref>
<ref>147349527</ref>
<ref>148935646</ref>
<ref>85557990</ref>
<ref>6149387</ref>
<ref>67290191</ref>
<ref>50605430</ref>
<ref>148935647</ref>
<ref>117789749</ref>
<ref>128939461</ref>
<ref>148935648</ref>
<ref>130352959</ref>
<ref>148935649</ref>
<ref>148935650</ref>
<ref>109420756</ref>
<ref>93255466</ref>
<ref>131693412</ref>
<ref>128642665</ref>
<ref>143848837</ref>
<ref>68670575</ref>
<ref>148935651</ref>
<ref>122611823</ref>
<ref>148935652</ref>
<ref>132793758</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148935653" hot="yes" sortkey="3119956062" timescited="0" sharedrefs="0" inpi="false">
<item issue="148935522" recid="148935653" coverdate="200602" sortkey="3119956062" refkey="7718631" dbyear="2006">
<ut>000235508800023</ut>
<i_ckey>YE B0581060089IB</i_ckey>
<i_cid>0109686618</i_cid>
<source_title>IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS</source_title>
<source_abbrev>IEICE T INF SYST</source_abbrev>
<item_title>A multicast based anonymous information sharing protocol for peer-to-peer systems</item_title>
<sq>09791J0</sq>
<bib_id>E89D (2): 581-588 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1093/ietisy/e89-d.2.581</article_no>
</article_nos>
<bib_pages begin="581" end="588" pages="8">581-588</bib_pages>
<bib_issue year="2006" vol="E89D"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Ye, BL</primaryauthor>
<author key="2702784">Guo, MY</author>
<author key="7824345">Zhou, JY</author>
<author key="1199047">Chen, DX</author>
</authors>
<emails count="1">
<email>
<name>Ye, BL</name>
<email_addr>yebl@u-aizu.ac.jp</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>mutual anonymity</keyword>
<keyword>IP multicast</keyword>
<keyword>multi-proxy</keyword>
<keyword>file retrieval</keyword>
</keywords>
<reprint>
<rp_author>Ye, BL</rp_author>
<rp_address>Univ Aizu, Sch Engn &amp; Comp Sci, Aizu Wakamatsu 9658580, Japan</rp_address>
<rp_organization>Univ Aizu</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Sch Engn &amp; Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Aizu Wakamatsu</rp_city>
<rp_country>Japan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">9658580</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Univ Aizu, Sch Engn &amp; Comp Sci, Aizu Wakamatsu 9658580, Japan</rs_address>
<rs_organization>Univ Aizu</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Sch Engn &amp; Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Aizu Wakamatsu</rs_city>
<rs_country>Japan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">9658580</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China</rs_address>
<rs_organization>Nanjing Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>State Key Lab Novel Software Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Nanjing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">210008</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>A fundamental problem in a pure Peer-to-Peer (P2P) file sharing system is how to protect the anonymity of peer nodes when providing efficient data access services. Most of existing work mainly focus on how to provide the initiator anonymity, but neglect the anonymity of the responder. In this paper, we propose a multicast-based protocol, called Mapper, for efficient file sharing with mutual anonymity. By seamlessly combining the technologies of multi-proxy and IP multicast together, the proposed protocol guarantees mutual anonymity during the entire session of file retrieval. Furthermore, Mapper replicates requested files inside the multicast group, so file distribution can be adjusted adaptively and the cost for multicast can be further reduced. Results of both simulations and theoretical analyses demonstrate that Mapper possesses the merits of scalability, reliability, and high adaptability.</p>
</abstract>
<refs count="16">
<ref>137495156</ref>
<ref>148935654</ref>
<ref>42233798</ref>
<ref>122611837</ref>
<ref>137495158</ref>
<ref>130986614</ref>
<ref>108639759</ref>
<ref>130987062</ref>
<ref>126921048</ref>
<ref>133780110</ref>
<ref>120743221</ref>
<ref>133780112</ref>
<ref>148935655</ref>
<ref>128138416</ref>
<ref>130885001</ref>
<ref>148935656</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148931963" hot="yes" sortkey="3119956803" timescited="0" sharedrefs="0" inpi="false">
<item issue="148931902" recid="148931963" coverdate="200600" sortkey="3119956803" refkey="1505284" dbyear="2006">
<ut>000235594700007</ut>
<i_ckey>DAMO0103060045IB</i_ckey>
<i_cid>0109738516</i_cid>
<source_title>IBM SYSTEMS JOURNAL</source_title>
<source_abbrev>IBM SYST J</source_abbrev>
<item_title>High-performance systems of online server and the next generation games</item_title>
<sq>42020J0</sq>
<bib_id>45 (1): 103-118 2006</bib_id>
<bib_pages begin="103" end="118" pages="16">103-118</bib_pages>
<bib_issue year="2006" vol="45"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>D'Amora, B</primaryauthor>
<author key="4381901">Magerlein, K</author>
<author key="651469">Binstock, A</author>
<author key="5008595">Nanda, A</author>
<author key="7720728">Yee, B</author>
</authors>
<emails count="5">
<email>
<name>D'Amora, B</name>
<email_addr>damora@us.ibm.com</email_addr>
</email>
<email>
<name>Magerlein, K</name>
<email_addr>kmager@us.ibm.com</email_addr>
</email>
<email>
<name>Binstock, A</name>
<email_addr>atman.binstock@gmail.com</email_addr>
</email>
<email>
<name>Nanda, A</name>
<email_addr>ashwini@us.ibm.com</email_addr>
</email>
<email>
<name>Yee, B</name>
<email_addr>bernie@episodetech.com</email_addr>
</email>
</emails>
<reprint>
<rp_author>D'Amora, B</rp_author>
<rp_address>Thomas J Watson Res Ctr, IBM Res Div, 19 Skyline Dr, Hawthorne, NY 10532 USA</rp_address>
<rp_organization>Thomas J Watson Res Ctr</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>IBM Res Div</rp_suborganization>
</rp_suborganizations>
<rp_street>19 Skyline Dr</rp_street>
<rp_city>Hawthorne</rp_city>
<rp_state>NY</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">10532</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Thomas J Watson Res Ctr, IBM Res Div, Hawthorne, NY 10532 USA</rs_address>
<rs_organization>Thomas J Watson Res Ctr</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>IBM Res Div</rs_suborganization>
</rs_suborganizations>
<rs_city>Hawthorne</rs_city>
<rs_state>NY</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">10532</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Episode Technol, S Nyack, NY 10960 USA</rs_address>
<rs_organization>Episode Technol</rs_organization>
<rs_city>S Nyack</rs_city>
<rs_state>NY</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">10960</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Developing a massively multiplayer online game which utilizes physically based simulation to provide realistic behaviors requires numerical integration functions with inherently high computational costs. This simulation, performed on the individual clients of a peer-to-peer networked game or for a client/server online game, presents challenges due to many factors, including limited computing resources at the client level and network latency in the propagation of a client's state to other clients. Computationally intensive simulation may adversely affect performance and result in a situation in which little processing capacity is left for other aspects of the game. in this paper, we explore how a game developer who is aware of these issues might create a game for IBM's recently announced Cell Broadband Engine (TM) processor; we also present an example of the development of a game in which multiple human and robotic characters interact with static and dynamic objects in a virtual environment. Although our experience suggests that porting code to the Cell Broadband Engine core with minimal use of its synergistic processing elements (SPEs) should not be expected to produce significant performance gains at this time, the potential of the Cell SPEs to improve performance is considerable. We discuss performance and design and implementation decisions, with programmability issues being especially noted.</p>
</abstract>
<refs count="10">
<ref>148931964</ref>
<ref>148931965</ref>
<ref>117649337</ref>
<ref>136580180</ref>
<ref>148931966</ref>
<ref>148931967</ref>
<ref>146261320</ref>
<ref>99409738</ref>
<ref>111847490</ref>
<ref>148931968</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148923566" hot="yes" sortkey="3119958736" timescited="0" sharedrefs="0" inpi="false">
<item issue="148923562" recid="148923566" coverdate="200601" sortkey="3119958736" refkey="1447964" dbyear="2006">
<ut>000235580900002</ut>
<i_ckey>CRAM0011060017EC</i_ckey>
<i_cid>0109718200</i_cid>
<source_title>EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS</source_title>
<source_abbrev>EUR T TELECOMMUN</source_abbrev>
<item_title>On the fundamental communication abstraction supplied by P2P overlay networks</item_title>
<sq>09164J0</sq>
<bib_id>17 (1): 11-19 JAN-FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1002/ett.1024</article_no>
</article_nos>
<bib_pages begin="11" end="19" pages="9">11-19</bib_pages>
<bib_issue year="2006" vol="17"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Cramer, C</primaryauthor>
<author key="2289551">Fuhrmann, T</author>
</authors>
<emails count="1">
<email>
<name>Cramer, C</name>
<email_addr>thomas.fuhrmann@ira.uka.de</email_addr>
</email>
</emails>
<reprint>
<rp_author>Fuhrmann, T</rp_author>
<rp_address>Univ Karlsruhe, Syst Architecture Grp, Kaiserstr 12, D-76128 Karlsruhe, Germany</rp_address>
<rp_organization>Univ Karlsruhe</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Syst Architecture Grp</rp_suborganization>
</rp_suborganizations>
<rp_street>Kaiserstr 12</rp_street>
<rp_city>Karlsruhe</rp_city>
<rp_country>Germany</rp_country>
<rp_zips count="1">
<rp_zip location="BC">D-76128</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Karlsruhe, Syst Architecture Grp, D-76128 Karlsruhe, Germany</rs_address>
<rs_organization>Univ Karlsruhe</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Syst Architecture Grp</rs_suborganization>
</rs_suborganizations>
<rs_city>Karlsruhe</rs_city>
<rs_country>Germany</rs_country>
<rs_zips count="1">
<rs_zip location="BC">D-76128</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="3">
<p>The disruptive advent of peer-to-peer (P2P) file sharing in 2000 attracted significant interest. P2P networks have matured from their initial form, unstructured overlays, to structured overlays like distributed hash tables (DHTs), which are considered state-of-the-art. There are huge efforts to improve their performance. Various P2P applications like distributed storage and application-layer multicast were proposed.</p>
<p>However, little effort was spent to understand the communication abstraction P2P overlays supply. Only when it is understood, the reach of P2P ideas will significantly broaden. Furthermore, this clarification reveals novel approaches and highlights future directions.</p>
<p>In this paper, we reconsider well-known P2P overlays, linking them to insights from distributed systems research. We conclude that the main communication abstraction is that of a virtual address space or application-specific naming. On this basis, P2P systems build a functional layer implementing, for example lookup, indirection and distributed processing. Our insights led us to identify interesting and unexplored points in the design space. Copyright (c) 2004 AEI.</p>
</abstract>
<refs count="29">
<ref>72297657</ref>
<ref>107214828</ref>
<ref>114066033</ref>
<ref>148923567</ref>
<ref>148923568</ref>
<ref>132500244</ref>
<ref>130911751</ref>
<ref>123110014</ref>
<ref>105482246</ref>
<ref>130408411</ref>
<ref>148923569</ref>
<ref>148923570</ref>
<ref>54771019</ref>
<ref>148923571</ref>
<ref>116318864</ref>
<ref>142602114</ref>
<ref>134864282</ref>
<ref>148923572</ref>
<ref>123110024</ref>
<ref>148923573</ref>
<ref>147349542</ref>
<ref>123110018</ref>
<ref>128138409</ref>
<ref>130352960</ref>
<ref>135158107</ref>
<ref>98886469</ref>
<ref>115410921</ref>
<ref>148923574</ref>
<ref>148923575</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148885555" hot="yes" sortkey="3119968538" timescited="0" sharedrefs="0" inpi="false">
<item issue="148885540" recid="148885555" coverdate="200511" sortkey="3119968538" refkey="4342716" dbyear="2006">
<ut>000235689900003</ut>
<i_ckey>MA H0720050036AH</i_ckey>
<i_cid>0109753772</i_cid>
<source_title>ADVANCES IN ENGINEERING SOFTWARE</source_title>
<source_abbrev>ADV ENG SOFTW</source_abbrev>
<item_title>Distribution and synchronisation of engineering information using active database technology</item_title>
<sq>10035J0</sq>
<bib_id>36 (11-12): 720-728 NOV-DEC 2005</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.advengsoft.2005.03.018</article_no>
</article_nos>
<bib_pages begin="720" end="728" pages="9">720-728</bib_pages>
<bib_issue year="2005" vol="36"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Ma, H</primaryauthor>
<author key="3402043">Johansson, H</author>
<author key="5273625">Orsborn, K</author>
</authors>
<emails count="1">
<email>
<name>Ma, H</name>
<email_addr>kjell.orsborn@it.uu.se</email_addr>
</email>
</emails>
<keywords count="7">
<keyword>engineering information</keyword>
<keyword>engineering collaborative work</keyword>
<keyword>active database management system</keyword>
<keyword>ECA database rule</keyword>
<keyword>synchronisation</keyword>
<keyword>distribution</keyword>
<keyword>peer-to-peer</keyword>
</keywords>
<keywords_plus count="4">
<keyword>PRODUCT DEVELOPMENT</keyword>
<keyword>ENVIRONMENT</keyword>
<keyword>DESIGN</keyword>
<keyword>SYSTEM</keyword>
</keywords_plus>
<reprint>
<rp_author>Orsborn, K</rp_author>
<rp_address>Uppsala Univ, Dept Informat Technol, Box 337, SE-75105 Uppsala, Sweden</rp_address>
<rp_organization>Uppsala Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Informat Technol</rp_suborganization>
</rp_suborganizations>
<rp_street>Box 337</rp_street>
<rp_city>Uppsala</rp_city>
<rp_country>Sweden</rp_country>
<rp_zips count="1">
<rp_zip location="BC">SE-75105</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Uppsala Univ, Dept Informat Technol, SE-75105 Uppsala, Sweden</rs_address>
<rs_organization>Uppsala Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Informat Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Uppsala</rs_city>
<rs_country>Sweden</rs_country>
<rs_zips count="1">
<rs_zip location="BC">SE-75105</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Lulea Univ Technol, Polhem Lab, Div Comp Aided Design, SE-87187 Lulea, Sweden</rs_address>
<rs_organization>Lulea Univ Technol</rs_organization>
<rs_suborganizations count="2">
<rs_suborganization>Polhem Lab</rs_suborganization>
<rs_suborganization>Div Comp Aided Design</rs_suborganization>
</rs_suborganizations>
<rs_city>Lulea</rs_city>
<rs_country>Sweden</rs_country>
<rs_zips count="1">
<rs_zip location="BC">SE-87187</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Today, work collaboration is normal practice in developing modern products. Engineering collaborative work involves a number of team members that need to share and exchange design ideas while working with engineering analysis tools such as mechanical computer aided engineering systems. This work presents the M-Sync prototype system that uses an active database approach to enable exchange of engineering information among distributed team members in a timely manner. The distributed data is fully accessible by the local member and is automatically synchronised between different places using a database management system that support event-condition-action (ECA) database rules. Only updates introduced at one location are distributed to other locations, thereby minimizing information transfer and enhancing performance. Members working at different locations can therefore work in a peer-to-peer (P2P) manner and interactively manipulate the same set of information at the same time. (C) 2005 Civil-Comp Ltd and Elsevier Ltd. All rights reserved.</p>
</abstract>
<refs count="34">
<ref>148885556</ref>
<ref>115272296</ref>
<ref>114305840</ref>
<ref>103226372</ref>
<ref>115198382</ref>
<ref>117080563</ref>
<ref>120844155</ref>
<ref>148885557</ref>
<ref>105499796</ref>
<ref>148885558</ref>
<ref>105541080</ref>
<ref>148885559</ref>
<ref>148885560</ref>
<ref>121387673</ref>
<ref>148885561</ref>
<ref>148885562</ref>
<ref>130924935</ref>
<ref>148885563</ref>
<ref>120541747</ref>
<ref>119430881</ref>
<ref>131693382</ref>
<ref>148885564</ref>
<ref>125145897</ref>
<ref>124035211</ref>
<ref>103631041</ref>
<ref>74681903</ref>
<ref>148885565</ref>
<ref>106565188</ref>
<ref>148885566</ref>
<ref>111601434</ref>
<ref>125036992</ref>
<ref>95825382</ref>
<ref>81364102</ref>
<ref>148885567</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148877164" hot="yes" sortkey="3120011186" timescited="0" sharedrefs="0" inpi="false">
<item issue="148877160" recid="148877164" coverdate="200602" sortkey="3120011186" refkey="1205535" dbyear="2006">
<ut>000235383800002</ut>
<i_ckey>CHEN0017060006WM</i_ckey>
<i_cid>0109625790</i_cid>
<source_title>WIRELESS COMMUNICATIONS &amp; MOBILE COMPUTING</source_title>
<source_abbrev>WIREL COMMUN MOB COM</source_abbrev>
<item_title>A mobile service platform using proxy technology</item_title>
<sq>13804J0</sq>
<bib_id>6 (1): 17-34 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1002/wcm.240</article_no>
</article_nos>
<bib_pages begin="17" end="34" pages="18">17-34</bib_pages>
<bib_issue year="2006" vol="6"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Chen, MF</primaryauthor>
<author key="4192776">Lin, YB</author>
<author key="5734535">Rao, HCH</author>
<author key="7651701">Wu, Q</author>
</authors>
<emails count="1">
<email>
<name>Chen, MF</name>
<email_addr>liny@csie.nctu.edu.tw</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>mobile computing</keyword>
<keyword>peer-to-peer computing</keyword>
<keyword>proxy server</keyword>
<keyword>wireless network</keyword>
</keywords>
<reprint>
<rp_author>Lin, YB</rp_author>
<rp_address>Natl Chiao Tung Univ, Dept Comp Sci &amp; Informat Engn, Hsinchu 300, Taiwan</rp_address>
<rp_organization>Natl Chiao Tung Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Comp Sci &amp; Informat Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Hsinchu</rp_city>
<rp_country>Taiwan</rp_country>
<rp_zips count="1">
<rp_zip location="AC">300</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Natl Chiao Tung Univ, Dept Comp Sci &amp; Informat Engn, Hsinchu 300, Taiwan</rs_address>
<rs_organization>Natl Chiao Tung Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Comp Sci &amp; Informat Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Hsinchu</rs_city>
<rs_country>Taiwan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">300</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Far EasTone Telecommun, Taipei 114, Taiwan</rs_address>
<rs_organization>Far EasTone Telecommun</rs_organization>
<rs_city>Taipei</rs_city>
<rs_country>Taiwan</rs_country>
<rs_zips count="1">
<rs_zip location="AC">114</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper proposes iMobile, a proxy-based platform for developing mobile services for various mobile devices and wireless access technologies. iMobile acts as a message gateway that allows mobile devices to relay messages to each other through various protocols on different access networks. It allows mobile devices to access internet services, corporate databases and to control various network devices. iMobile implements three key abstractions: dev-let, info-let and app-let. An info-let provides abstract view of information space. An app-let implements service or application logic by processing information from various info-lets. A dev-let receives and sends messages through any particular protocols for mobile devices. The let engine supports user and device profiles for personalization and transcoding, and invokes proper app-lets and info-lets to answer requests from a dev-let. The Mobile modular architecture allows developers to write device drivers, information access methods and application logic independently from each other. Copyright (c) 2005 John Wiley &amp; Sons, Ltd.</p>
</abstract>
<refs count="37">
<ref>148877165</ref>
<ref>148877166</ref>
<ref>129346246</ref>
<ref>148877167</ref>
<ref>148877168</ref>
<ref>148877169</ref>
<ref>148877170</ref>
<ref>148877171</ref>
<ref>148877172</ref>
<ref>148877173</ref>
<ref>148877174</ref>
<ref>148877175</ref>
<ref>117942220</ref>
<ref>148877176</ref>
<ref>148877177</ref>
<ref>137391331</ref>
<ref>148877178</ref>
<ref>148877179</ref>
<ref>148877180</ref>
<ref>121443323</ref>
<ref>116320288</ref>
<ref>106829205</ref>
<ref>148877181</ref>
<ref>129292123</ref>
<ref>148877182</ref>
<ref>127195953</ref>
<ref>148877183</ref>
<ref>148877184</ref>
<ref>148877185</ref>
<ref>119119448</ref>
<ref>129346267</ref>
<ref>148877186</ref>
<ref>94864794</ref>
<ref>115349954</ref>
<ref>126816665</ref>
<ref>148877187</ref>
<ref>136445972</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148869962" hot="yes" sortkey="3120012731" timescited="0" sharedrefs="0" inpi="false">
<item issue="148869905" recid="148869962" coverdate="200602" sortkey="3120012731" refkey="5696092" dbyear="2006">
<ut>000235469000006</ut>
<i_ckey>RADI0591060062SP</i_ckey>
<i_cid>0109668238</i_cid>
<source_title>SOCIAL SCIENCE &amp; MEDICINE</source_title>
<source_abbrev>SOC SCI MED</source_abbrev>
<item_title>"To me, it's my life": Medical communication, trust, and activism in cyberspace</item_title>
<sq>88274J0</sq>
<bib_id>62 (3): 591-601 FEB 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.socscimed.2005.06.022</article_no>
</article_nos>
<bib_pages begin="591" end="601" pages="11">591-601</bib_pages>
<bib_issue year="2006" vol="62"/>
<doctype code="@">Article</doctype>
<editions full="SSCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="1">
<primaryauthor>Radin, P</primaryauthor>
</authors>
<emails count="1">
<email>
<name>Radin, P</name>
<email_addr>kyra_landzelius@yahoo.com</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>breast cancer</keyword>
<keyword>virtual community</keyword>
<keyword>trust</keyword>
<keyword>self-help groups</keyword>
<keyword>Canada</keyword>
</keywords>
<keywords_plus count="3">
<keyword>BREAST-CANCER</keyword>
<keyword>INFORMATION NEEDS</keyword>
<keyword>WOMEN</keyword>
</keywords_plus>
<reprint>
<rp_author>Radin, P</rp_author>
<rp_address>Gothenburg Univ, Dept Sci &amp; Technol Studies, Box 510, S-40530 Gothenburg, Sweden</rp_address>
<rp_organization>Gothenburg Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Sci &amp; Technol Studies</rp_suborganization>
</rp_suborganizations>
<rp_street>Box 510</rp_street>
<rp_city>Gothenburg</rp_city>
<rp_country>Sweden</rp_country>
<rp_zips count="1">
<rp_zip location="BC">S-40530</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Calif State Univ, Hayward, CA USA</rs_address>
<rs_organization>Calif State Univ</rs_organization>
<rs_city>Hayward</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>This paper studies the conversations and activities of an online support group for breast cancer Sufferers and survivors and their supporters. Using communications medium theory and social capital theory, it examines the mundane and profound exchanges, the poignant self-disclosures, the creative expressions of solidarity, and the minor but not-insignificant political actions of people-initially strangers-who come together as a 'virtuous circle,' not only to assist with medical issues but also to meet emotional and even material needs. Sponsored by the Canadian nonprofit organization Breast Cancer Action Nova Scotia (BCANS), this virtual community has logged over a half million messages since 1996. Not every BCANS participant is an activist-many are just trying to grapple with their disease but some find ways to shatter the professional "information monopoly," and to press for healthcare improvements. The study illustrates the scope, passion, and complexity of peer-to-peer medical communication in a virtual environment that promotes "thick trust". BCANS participants discuss with candor, warmth and even humor Such painful topics as death and dying and the crises in intimate relationships brought about by a terminal illness. The sharing of confidences and fears enables participants to pool their 'collective intelligence' about many things, from how to cope with swelling, to how to think about end-of-life issues, to how to improve social policy. (c) 2005 Elsevier Ltd. All rights reserved.</p>
</abstract>
<refs count="51">
<ref>130447596</ref>
<ref>105992988</ref>
<ref>148869963</ref>
<ref>96087380</ref>
<ref>95386292</ref>
<ref>103787592</ref>
<ref>117360831</ref>
<ref>148869964</ref>
<ref>148869965</ref>
<ref>103095825</ref>
<ref>119611536</ref>
<ref>100111282</ref>
<ref>121030387</ref>
<ref>106464970</ref>
<ref>105164011</ref>
<ref>148869966</ref>
<ref>148869967</ref>
<ref>101264452</ref>
<ref>4171150</ref>
<ref>102304633</ref>
<ref>148372550</ref>
<ref>101291360</ref>
<ref>104261442</ref>
<ref>116006553</ref>
<ref>94761059</ref>
<ref>91956973</ref>
<ref>94761047</ref>
<ref>108665373</ref>
<ref>9094063</ref>
<ref>116394564</ref>
<ref>103694125</ref>
<ref>106464977</ref>
<ref>95408985</ref>
<ref>148869968</ref>
<ref>148869969</ref>
<ref>148869970</ref>
<ref>58437097</ref>
<ref>114717183</ref>
<ref>148869971</ref>
<ref>86770823</ref>
<ref>114613845</ref>
<ref>98134269</ref>
<ref>102304636</ref>
<ref>112658737</ref>
<ref>70409758</ref>
<ref>73895062</ref>
<ref>95112639</ref>
<ref>109675524</ref>
<ref>134711398</ref>
<ref>148869972</ref>
<ref>89624526</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858194" hot="yes" sortkey="3120015168" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858194" coverdate="200603" sortkey="3120015168" refkey="2322786" dbyear="2006">
<ut>000235488900002</ut>
<i_ckey>GAET0149060063PR</i_ckey>
<i_cid>0109661397</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Analysis of resource transfers in peer-to-peer file sharing applications using fluid models</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 149-174 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.001</article_no>
</article_nos>
<bib_pages begin="149" end="174" pages="26">149-174</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="4">
<primaryauthor>Gaeta, R</primaryauthor>
<author key="2635214">Gribaudo, M</author>
<author key="4432915">Manini, D</author>
<author key="6316394">Sereno, M</author>
</authors>
<emails count="4">
<email>
<name>Gaeta, R</name>
<email_addr>rossano@di.unito.it</email_addr>
</email>
<email>
<name>Gribaudo, M</name>
<email_addr>marcog@di.unito.it</email_addr>
</email>
<email>
<name>Manini, D</name>
<email_addr>manini@di.unito.it</email_addr>
</email>
<email>
<name>Sereno, M</name>
<email_addr>matteo@di.unito.it</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>file sharing</keyword>
<keyword>stochastic fluid models</keyword>
<keyword>analytical model</keyword>
<keyword>transfer time distribution</keyword>
</keywords>
<keywords_plus count="2">
<keyword>TRANSIENT ANALYSIS</keyword>
<keyword>STOCHASTIC-THEORY</keyword>
</keywords_plus>
<reprint>
<rp_author>Gaeta, R</rp_author>
<rp_address>Univ Turin, Dipartimento Informat, Corso Svizzera 185, I-1049 Turin, Italy</rp_address>
<rp_organization>Univ Turin</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dipartimento Informat</rp_suborganization>
</rp_suborganizations>
<rp_street>Corso Svizzera 185</rp_street>
<rp_city>Turin</rp_city>
<rp_country>Italy</rp_country>
<rp_zips count="1">
<rp_zip location="BC">I-1049</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Turin, Dipartimento Informat, I-1049 Turin, Italy</rs_address>
<rs_organization>Univ Turin</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dipartimento Informat</rs_suborganization>
</rs_suborganizations>
<rs_city>Turin</rs_city>
<rs_country>Italy</rs_country>
<rs_zips count="1">
<rs_zip location="BC">I-1049</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred among peers is represented by a continuous quantity (the fluid level) whose flow rate is modulated by a set of discrete states representing the Concurrent. upload and download operations on the peers participating to the transfer. A transient solution of the model is then performed to compute the probability that a peer can download a given resource in less than t units of time as a function of several system parameters. In particular, the impact of file popularity, bandwidth characteristics, concurrent downloads and uploads, cooperation level among peers, and user behavior are included in our model specification.</p>
<p>We also provide numerical results timing at proving the potentialities of the approach we adopted as well as to investigate interesting issues related to the effect of incentive mechanisms on the user cooperation. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="35">
<ref>148858195</ref>
<ref>129797574</ref>
<ref>52916972</ref>
<ref>148858196</ref>
<ref>130911751</ref>
<ref>89232206</ref>
<ref>146305088</ref>
<ref>148858197</ref>
<ref>146305090</ref>
<ref>148858198</ref>
<ref>148858199</ref>
<ref>103907965</ref>
<ref>130987119</ref>
<ref>148858200</ref>
<ref>146305093</ref>
<ref>148858201</ref>
<ref>148858202</ref>
<ref>148858203</ref>
<ref>122611813</ref>
<ref>67168849</ref>
<ref>148858204</ref>
<ref>133716559</ref>
<ref>146305097</ref>
<ref>123110019</ref>
<ref>121836328</ref>
<ref>148858205</ref>
<ref>129515870</ref>
<ref>130494463</ref>
<ref>147843718</ref>
<ref>105593137</ref>
<ref>92649761</ref>
<ref>126581587</ref>
<ref>146305099</ref>
<ref>146305100</ref>
<ref>142504708</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858206" hot="yes" sortkey="3120015169" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858206" coverdate="200603" sortkey="3120015169" refkey="7706698" dbyear="2006">
<ut>000235488900003</ut>
<i_ckey>YANG0175060063PX</i_ckey>
<i_cid>0109661399</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Performance of peer-to-peer networks: Service capacity and role of resource sharing policies</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 175-194 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.005</article_no>
</article_nos>
<bib_pages begin="175" end="194" pages="20">175-194</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Yang, XY</primaryauthor>
<author key="1583273">de Veciana, G</author>
</authors>
<emails count="2">
<email>
<name>Yang, XY</name>
<email_addr>yangxy@ece.utexas.edu</email_addr>
</email>
<email>
<name>de Veciana, G</name>
<email_addr>gustavo@ece.utexas.edu</email_addr>
</email>
</emails>
<keywords count="5">
<keyword>peer-to-peer</keyword>
<keyword>file sharing</keyword>
<keyword>service capacity</keyword>
<keyword>incentive</keyword>
<keyword>fairness</keyword>
</keywords>
<reprint>
<rp_author>Yang, XY</rp_author>
<rp_address>Univ Texas, ECE Dept, Austin, TX 78712 USA</rp_address>
<rp_organization>Univ Texas</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>ECE Dept</rp_suborganization>
</rp_suborganizations>
<rp_city>Austin</rp_city>
<rp_state>TX</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">78712</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Texas, ECE Dept, Austin, TX 78712 USA</rs_address>
<rs_organization>Univ Texas</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>ECE Dept</rs_suborganization>
</rs_suborganizations>
<rs_city>Austin</rs_city>
<rs_state>TX</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">78712</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>In this paper we model and Study the performance of peer-to-peer (P2P) file sharing systems in terms of their service capacity'. We identify two regimes of interest: the transient and stationary regimes. We show that in both regimes, the performance of P2P systems exhibits a favorable scaling with the offered load. P2P systems achieve this by efficiently leveraging the service capacity of other peers, who possibly are concurrently downloading the same file. Therefore to improve the performance, it is important to design mechanisms to give peers incentives for sharing/cooperation. One approach is to introduce mechanisms for resource allocation that are 'fair', such that a peer's performance improves with his contributions. We find that some intuitive 'fairness' notions may unexpectedly lead to 'unfair' allocations, which do not provide the right incentives for peers. Thus, implementation of P2P systems may want to compromise the degree of 'fairness' in favor of maintaining system robustness and reducing overheads. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="18">
<ref>148858207</ref>
<ref>23759122</ref>
<ref>127841796</ref>
<ref>136011815</ref>
<ref>148858208</ref>
<ref>148858209</ref>
<ref>148858210</ref>
<ref>104493661</ref>
<ref>136011818</ref>
<ref>148858211</ref>
<ref>148858212</ref>
<ref>148858213</ref>
<ref>148858214</ref>
<ref>130832146</ref>
<ref>123110019</ref>
<ref>121836328</ref>
<ref>132558295</ref>
<ref>148858215</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858216" hot="yes" sortkey="3120015170" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858216" coverdate="200603" sortkey="3120015170" refkey="6368448" dbyear="2006">
<ut>000235488900004</ut>
<i_ckey>SHEN0195060063PH</i_ckey>
<i_cid>0109661401</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Cycloid: A constant-degree and lookup-efficient P2P overlay network</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 195-216 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.004</article_no>
</article_nos>
<bib_pages begin="195" end="216" pages="22">195-216</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Shen, HY</primaryauthor>
<author key="7670418">Xu, CZ</author>
<author key="1200039">Chen, GH</author>
</authors>
<emails count="3">
<email>
<name>Shen, HY</name>
<email_addr>shy@ece.eng.wayne.edu</email_addr>
</email>
<email>
<name>Xu, CZ</name>
<email_addr>czxu@ece.eng.wayne.edu</email_addr>
</email>
<email>
<name>Chen, GH</name>
<email_addr>gchen@nju.edu.cn</email_addr>
</email>
</emails>
<keywords count="6">
<keyword>Cycloid</keyword>
<keyword>peer-to-peer</keyword>
<keyword>Viceroy</keyword>
<keyword>Koorde</keyword>
<keyword>distributed hash table</keyword>
<keyword>constant-degree DHT</keyword>
</keywords>
<reprint>
<rp_author>Xu, CZ</rp_author>
<rp_address>Wayne State Univ, Dept Elect &amp; Comp Engn, Detroit, MI 48202 USA</rp_address>
<rp_organization>Wayne State Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_city>Detroit</rp_city>
<rp_state>MI</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">48202</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="2">
<research>
<rs_address>Wayne State Univ, Dept Elect &amp; Comp Engn, Detroit, MI 48202 USA</rs_address>
<rs_organization>Wayne State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Detroit</rs_city>
<rs_state>MI</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">48202</rs_zip>
</rs_zips>
</research>
<research>
<rs_address>Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China</rs_address>
<rs_organization>Nanjing Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>State Key Lab Novel Software Technol</rs_suborganization>
</rs_suborganizations>
<rs_city>Nanjing</rs_city>
<rs_country>Peoples R China</rs_country>
<rs_zips count="1">
<rs_zip location="AC">210008</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>There are many structured P2P systems that use DHT technologies to map data items onto the nodes in various ways for scalable routing and location. Most of the systems require 0(log it) hops per lookup request with 0(log it) neighbors per node, where n is the network size. In this paper, we present a constant-degree P2P architecture, namely Cycloid, which emulates a cube-connected cycles (CCC) graph in the routing of lookup requests. It achieves a time complexity of O(d) per lookup request by using O(l) neighbors per node, where n = d x 2(d). We compare Cycloid with other two constant-degree systems, Viceroy and Koorde in various architectural aspects via simulation. Simulation results show that Cycloid has more advantages for large scale and dynamic systems that have frequent node arrivals and departures. In particular, Cycloid delivers a higher location efficiency in the average case and exhibits a more balanced distribution of keys and query loads between the node.,,. (D (C) 2005 Elsevier B.V. All Rights Reserved.</p>
</abstract>
<refs count="20">
<ref>128705970</ref>
<ref>72536169</ref>
<ref>148858217</ref>
<ref>121103580</ref>
<ref>126332097</ref>
<ref>85131525</ref>
<ref>148858218</ref>
<ref>148858219</ref>
<ref>148858220</ref>
<ref>131684154</ref>
<ref>128138421</ref>
<ref>111651653</ref>
<ref>42999528</ref>
<ref>148858221</ref>
<ref>128138422</ref>
<ref>148858222</ref>
<ref>128939454</ref>
<ref>148858223</ref>
<ref>130987067</ref>
<ref>128939464</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858224" hot="yes" sortkey="3120015171" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858224" coverdate="200603" sortkey="3120015171" refkey="6780127" dbyear="2006">
<ut>000235488900005</ut>
<i_ckey>SURA0217060063PS</i_ckey>
<i_cid>0109661403</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Load balancing in dynamic structured peer-to-peer systems</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 217-240 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.003</article_no>
</article_nos>
<bib_pages begin="217" end="240" pages="24">217-240</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="5">
<primaryauthor>Surana, S</primaryauthor>
<author key="2502960">Godfrey, B</author>
<author key="3955989">Lakshminarayanan, K</author>
<author key="3538823">Karp, R</author>
<author key="6706233">Stoica, I</author>
</authors>
<emails count="5">
<email>
<name>Surana, S</name>
<email_addr>sonesh@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Godfrey, B</name>
<email_addr>pbg@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Lakshminarayanan, K</name>
<email_addr>karthik@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Karp, R</name>
<email_addr>karp@cs.berkeley.edu</email_addr>
</email>
<email>
<name>Stoica, I</name>
<email_addr>istoica@cs.berkeley.edu</email_addr>
</email>
</emails>
<keywords count="3">
<keyword>dynamic load balancing</keyword>
<keyword>structured peer-to-peer</keyword>
<keyword>distributed hash table</keyword>
</keywords>
<reprint>
<rp_author>Surana, S</rp_author>
<rp_address>Univ Calif Berkeley, Div Comp Sci, Berkeley, CA 94720 USA</rp_address>
<rp_organization>Univ Calif Berkeley</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Div Comp Sci</rp_suborganization>
</rp_suborganizations>
<rp_city>Berkeley</rp_city>
<rp_state>CA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">94720</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Univ Calif Berkeley, Div Comp Sci, Berkeley, CA 94720 USA</rs_address>
<rs_organization>Univ Calif Berkeley</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Div Comp Sci</rs_suborganization>
</rs_suborganizations>
<rs_city>Berkeley</rs_city>
<rs_state>CA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">94720</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="2">
<p>Most P2P systems that provide a DHT abstraction distribute objects randomly among "peer nodes" in a way that results in some nodes having Theta(log N) times as many objects as the average node. Further imbalance may result due to nonuniform distribution of objects in the identifier space and a high degree of heterogeneity in object loads and node capacities. Additionally, a node's load may vary greatly over time since the system can experience continuous insertions and deletions of objects, skewed object arrival patterns, and continuous arrival and departure of nodes.</p>
<p>In this paper, we propose an algorithm for load balancing in such heterogeneous, dynamic P2P systems. Our simulation results show that in the face of rapid arrivals and departures of objects of widely varying load, our algorithm improves load balance by more than an order of magnitude for system utilizations as high as 80% while incurring an overhead of only about 6%. We also show that our distributed algorithm performs only negligibly worse than a similar centralized algorithm, and that node heterogeneity helps, not hurts, the scalability of our algorithm. Although many of these results are dependent on the workload, we believe the efficiency and performance improvement demonstrated over the case of no load balancing shows that our technique holds promise for deployed systems. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="27">
<ref>143035403</ref>
<ref>148858225</ref>
<ref>148858226</ref>
<ref>112864889</ref>
<ref>148858227</ref>
<ref>148858228</ref>
<ref>148858229</ref>
<ref>135344107</ref>
<ref>148858230</ref>
<ref>148858231</ref>
<ref>137280622</ref>
<ref>148858232</ref>
<ref>148858233</ref>
<ref>148858234</ref>
<ref>148858235</ref>
<ref>148858236</ref>
<ref>143035409</ref>
<ref>148858237</ref>
<ref>122611833</ref>
<ref>148858238</ref>
<ref>130950544</ref>
<ref>148858239</ref>
<ref>123110037</ref>
<ref>148858240</ref>
<ref>131684136</ref>
<ref>108536709</ref>
<ref>148858241</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148858242" hot="yes" sortkey="3120015172" timescited="0" sharedrefs="0" inpi="false">
<item issue="148858192" recid="148858242" coverdate="200603" sortkey="3120015172" refkey="2482069" dbyear="2006">
<ut>000235488900006</ut>
<i_ckey>GKAN0241060063PC</i_ckey>
<i_cid>0109661405</i_cid>
<source_title>PERFORMANCE EVALUATION</source_title>
<source_abbrev>PERFORM EVALUATION</source_abbrev>
<item_title>Random walks in peer-to-peer networks: Algorithms and evaluation</item_title>
<sq>03678J0</sq>
<bib_id>63 (3): 241-263 MAR 2006</bib_id>
<article_nos count="1">
<article_no>DOI 10.1016/j.peva.2005.01.002</article_no>
</article_nos>
<bib_pages begin="241" end="263" pages="23">241-263</bib_pages>
<bib_issue year="2006" vol="63"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="3">
<primaryauthor>Gkantsidis, C</primaryauthor>
<author key="4726705">Mihail, M</author>
<author key="6044435">Saberi, A</author>
</authors>
<emails count="3">
<email>
<name>Gkantsidis, C</name>
<email_addr>gantsich@cc.gatech.edu</email_addr>
</email>
<email>
<name>Mihail, M</name>
<email_addr>mihail@cc.gatech.edu</email_addr>
</email>
<email>
<name>Saberi, A</name>
<email_addr>saberi@cc.gatech.edu</email_addr>
</email>
</emails>
<keywords count="4">
<keyword>peer-to-peer networks</keyword>
<keyword>statistics</keyword>
<keyword>random walks</keyword>
<keyword>graph theory</keyword>
</keywords>
<keywords_plus count="1">
<keyword>WEB</keyword>
</keywords_plus>
<reprint>
<rp_author>Gkantsidis, C</rp_author>
<rp_address>Georgia Inst Technol, Coll Comp, 801 Atlantic Dr, Atlanta, GA 30332 USA</rp_address>
<rp_organization>Georgia Inst Technol</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Coll Comp</rp_suborganization>
</rp_suborganizations>
<rp_street>801 Atlantic Dr</rp_street>
<rp_city>Atlanta</rp_city>
<rp_state>GA</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">30332</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA</rs_address>
<rs_organization>Georgia Inst Technol</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Coll Comp</rs_suborganization>
</rs_suborganizations>
<rs_city>Atlanta</rs_city>
<rs_state>GA</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">30332</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>We quantify the effectiveness of random walks for searching and construction of unstructured peer-to-peer (P2P) networks. We have identified two cases where the use of random walks for searching achieves better results than flooding: (a) when the overlay topology is clustered, and (b) when a client re-issues the same query while its horizon does not change much. Related to the Simulation of random walks is also the distributed computation of aggregates, such as averaging. For construction, we argue that an expander can be maintained dynamically with constant operations per addition. The key technical ingredient Of Our approach is a deep result of stochastic processes indicating that samples taken from consecutive steps of a random walk on an expander graph can achieve statistical properties similar to independent sampling. This property has been previously used in complexity theory for construction of pseudorandom number generators. We reveal another facet of this theory and translate savings in random bits to savings in processing overhead. (C) 2005 Elsevier B.V. All rights reserved.</p>
</abstract>
<refs count="41">
<ref>122012124</ref>
<ref>105294190</ref>
<ref>68394201</ref>
<ref>148858243</ref>
<ref>119623286</ref>
<ref>112080970</ref>
<ref>131693314</ref>
<ref>131693315</ref>
<ref>148858244</ref>
<ref>69881161</ref>
<ref>115438124</ref>
<ref>148858245</ref>
<ref>148858246</ref>
<ref>129783386</ref>
<ref>125248731</ref>
<ref>148858247</ref>
<ref>14607244</ref>
<ref>43959186</ref>
<ref>148858248</ref>
<ref>148858249</ref>
<ref>148858250</ref>
<ref>148858251</ref>
<ref>148858252</ref>
<ref>72062339</ref>
<ref>103462193</ref>
<ref>148858253</ref>
<ref>137280666</ref>
<ref>110303407</ref>
<ref>148858254</ref>
<ref>148858255</ref>
<ref>148858256</ref>
<ref>148858257</ref>
<ref>148858258</ref>
<ref>148858259</ref>
<ref>92289346</ref>
<ref>121684237</ref>
<ref>134865390</ref>
<ref>148858260</ref>
<ref>148858261</ref>
<ref>148858262</ref>
<ref>11491870</ref>
</refs>
</item>
</REC>
<REC inst_id="0" recid="148839096" hot="yes" sortkey="3120021567" timescited="0" sharedrefs="0" inpi="false">
<item issue="148839032" recid="148839096" coverdate="200602" sortkey="3120021567" refkey="7803997" dbyear="2006">
<ut>000235394700007</ut>
<i_ckey>ZHAN0069060038JG</i_ckey>
<i_cid>0109627984</i_cid>
<source_title>JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY</source_title>
<source_abbrev>J RES PRACT INF TECH</source_abbrev>
<item_title>Cooperative defence against DDoS attacks</item_title>
<sq>13338J0</sq>
<bib_id>38 (1): 69-84 FEB 2006</bib_id>
<bib_pages begin="69" end="84" pages="16">69-84</bib_pages>
<bib_issue year="2006" vol="38"/>
<doctype code="@">Article</doctype>
<editions full="SCI"/>
<languages count="1">
<primarylang code="EN">English</primarylang>
</languages>
<authors count="2">
<primaryauthor>Zhang, GS</primaryauthor>
<author key="5357224">Parashar, M</author>
</authors>
<emails count="2">
<email>
<name>Zhang, GS</name>
<email_addr>gszhang@caip.rutgers.edu</email_addr>
</email>
<email>
<name>Parashar, M</name>
<email_addr>parashar@caip.rutgers.edu</email_addr>
</email>
</emails>
<reprint>
<rp_author>Zhang, GS</rp_author>
<rp_address>Rutgers State Univ, Dept Elect &amp; Comp Engn, 628 CORE,94 Brett Rd, Piscataway, NJ 08854 USA</rp_address>
<rp_organization>Rutgers State Univ</rp_organization>
<rp_suborganizations count="1">
<rp_suborganization>Dept Elect &amp; Comp Engn</rp_suborganization>
</rp_suborganizations>
<rp_street>628 CORE,94 Brett Rd</rp_street>
<rp_city>Piscataway</rp_city>
<rp_state>NJ</rp_state>
<rp_country>USA</rp_country>
<rp_zips count="1">
<rp_zip location="AP">08854</rp_zip>
</rp_zips>
</reprint>
<research_addrs count="1">
<research>
<rs_address>Rutgers State Univ, Dept Elect &amp; Comp Engn, Piscataway, NJ 08854 USA</rs_address>
<rs_organization>Rutgers State Univ</rs_organization>
<rs_suborganizations count="1">
<rs_suborganization>Dept Elect &amp; Comp Engn</rs_suborganization>
</rs_suborganizations>
<rs_city>Piscataway</rs_city>
<rs_state>NJ</rs_state>
<rs_country>USA</rs_country>
<rs_zips count="1">
<rs_zip location="AP">08854</rs_zip>
</rs_zips>
</research>
</research_addrs>
<abstract avail="Y" count="1">
<p>Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defend against distributed denial of service attacks by coordinating across the Internet. Unlike traditional IDS, we detect and stop DDoS attacks within the intermediate network. In the proposed approach, DDoS defence systems are deployed in the network to detect DDoS attacks independently. A gossip based communication mechanism is used to exchange information about network attacks between these independent detection nodes to aggregate information about the overall network attacks observed. Using the aggregated information, the individual defence nodes have approximate information about global network attacks and can stop them more effectively and accurately. To provide reliable, rapid and widespread dissemination of attack information, the system is built as a peer to peer overlay network on top of the internet.</p>
</abstract>
<refs count="21">
<ref>148839097</ref>
<ref>126920862</ref>
<ref>148839098</ref>
<ref>148839099</ref>
<ref>134532710</ref>
<ref>131537327</ref>
<ref>148839100</ref>
<ref>131095002</ref>
<ref>148839101</ref>
<ref>148839102</ref>
<ref>148839103</ref>
<ref>143571897</ref>
<ref>133618487</ref>
<ref>148770828</ref>
<ref>148839104</ref>
<ref>125585353</ref>
<ref>147203366</ref>
<ref>145846470</ref>
<ref>148839105</ref>
<ref>120443918</ref>
<ref>148839106</ref>
</refs>
</item>
</REC>
</records>
</response>

Event Timeline