Back to the main P2PRG Bibliography Project page

author-year.html: grouped by author: sorted by year

--None--

Abdul-Rahman, Alfarez

Aberer, Karl

Adar, E.

Adjie-Winoto, William

Aggarwal, A.

Almeida, Jussara

Ammar, Mostafa H.

Ammar, M.

Ammar, M.H.

Andersen, D.G.

Anderson, T.

Anderson, R.

Aspnes, J.

Asthagiri, N.

Back, Adam

Baker, M.

Balakrishnan, Hari

Balakrishnan, H.

Ballardie, A.

Ballardie, Tony

Ballintijn, Gerco

Banerjee, Suman

Banerjee, S.

Bauer, Daniel

Bawa, M.

Beam, T.K.

Becker, D.

Bhattacharjee, Bobby

Bhattacharjee, S.

Bhattacharjee, Samrat

Bhattacharjee, B.

Bhattarcharjee, S.

Biddle, P.

Bindel, David

Bollaert, M.

Bradley, Neil

Brainard, J.

Braud, Ryan

Bray, T.

Braynard, Rebecca

Breslau, Lee

Breslau, L.

Brewer, E. A.

Brewer, Eric A.

Briscoe, B.

Broder, Andrei Z.

Cain, B.

Calvert, K.

Calvert, Ken

Calvert, Kenneth L.

Canetti, Ran

Cao, P.

Cao, Pei

Cardwell, N.

Caronni, G.

Carter, Robert L.

Carzaniga, Antonio

Casner, S.

Castro, Miguel

Castro, M.

Chae, Y.

Chang, I.

Chase, Jeff

Chawathe, Sudarshan

Chawathe, Sudarshan S.

Chawathe, Y.

Chawathe, Yatin

Chawathe, Y.

Chen, Yan

Cheriton, D.

Cheung, S.Y.

Christin, N.

Chu, Jacky

Chu, Y.-H.

Chuang, J.

Clark, D.

Clarke, I.

Cohen, E.

Cranor, Lorrie Faith

Crispo, B.

Crovella, Mark E.

Crowcroft, Jon

Cuenca-Acuna, F. M.

Culler, David

Czerwinski, Steven

Dabek, Frank

Danezis, G.

Daswani, N.

Deering, S.

Despotovic, Zoran

Dingledine, Roger

Donahoo, Michael J.

Druschel, Peter

Druschel, P.

Dunlap, Kevin J.

Eaton, Patrick

Engel, R.

England, P.

Estrin, D.

Estrin, D.

Fan, Li

Farber, D.

Farinacci, D.

Fei, Zongming

Fisk, A.

Floyd, S.

Foster, I.

Francis, P.

Francis, Paul

Francis, P.

Francis, Paul

Freedman, Michael

Freedman, M.

Ganesh, Ayalvadi

Ganesh, Ayalvadi J.

Ganesh, A.

Garay, Juan

Garcia-Luna-Aceves, J.J.

Garcia-Molina, H.

Geels, Dennis

Gerla, M.

Gifford, D.

Gil, T. M.

Golle, P.

Gopalakrishnan, Vijay

Gouda, M.

Govindan, R.

Govindan, R.

Gribble, Steven D.

Gribble, S. D.

Gummadi, Ramakrishna

Gummadi, K. P.

Gummadi, R.

Gupta, A.

Guttman, Erik

Guttman, E.

Hailes, Stephen

Handley, M.

Handley, Mark

Handley, M.

Harney, H.

Harvey, N. J. A.

Hauck, Franz J.

Hellerstein, Joseph M.

Helmy, A.

Hj'almt'ysson, G'isli

Hodes, Todd

Hoffman, E.

Homburg, Philip

Horne, B.

Hotz, S.

Howes, T.

Hu, Y. C.

Huang, Ling

Huberman, B.

Hurley, Paul

Iamnitchi, A.

Itkis, Gene

Jacobson, V.

Jacobson, V.

Jamin, S.

Janakiraman, Ramaprabhu

Jannotti, J.

Jin, C.

Jin, Y.

Johnson, K.

Jones, M. B.

Josang, Audun

Joseph, A. D.

Joseph, Anthony D.

Joseph, A. D.

Juels, A.

Kaashoek, M.

Kaashoek, M. Frans

Kaashoek, M. F.

Kandlur, D.

Kannan, Karthik

Kar, Koushik

Karger, David

Karger, D.

Karger, D. R.

Karp, Richard

Karp, R.

Kasera, S.

Katabi, D.

Katz, J.

Katz, Jonathan

Katz, R.

Katz, Randy

Katz, R.

Katz, Randy H.

Keleher, Pete

Khuller, Samir

Kille, S.

King, V.

Komareddy, Christopher

Kommareddy, Christopher

Kommareddy, C.

Kommreddy, Christopher

Koo, Simon G. M.

Kostic, Dejan

Kubiatowicz, J.

Kubiatowicz, John

Kubiatowicz, John D.

Kubiatowicz, J. D.

Kumar, R.

Kurose, Jim

Kurose, J.

Kwong, Sze-Wan

Labonte, Kevin

Lam, S.

Lam, Simon

Lanham, Nick

Lanham, N.

Lassila, O.

Ledlie, J.

Lee, Seungjoon

Lee, C. S. George

Lesniewski-Laas, C.

Levien, Raph

Levine, Brian Neil

Levine, B.N.

Li, J.

Li, K.

Li, Steve

Li, X.

Liang, J.

Liben-Nowell, D.

Liebeherr, J.

Lilley, Jeremy

Lin, C.R.

Lin, J.C.

Liu, C.

Liu, C.-G.

Lv, Q.

M., Frans Kaashoek,

M., M. Sundareshan,

Manku, G. S.

Marsh, S.

Martin, R. P.

Maymounkov, P.

Mazieres, D.

McCanne, S.

McCanne, Steven

McCanne, S.

Merugu, S.

Micciancio, Daniele

Mickish, A.

Miconi, T.

Mittra, S.

Moats, R.

Mockapetris, Paul V.

Molnar, David

Morris, Robert

Morris, R.

Morselli, Ruggero

Moy, J.

Muckenhirn, C.

Muralidhar, K.

Myers, A.C.

Naor, Moni

Neuman, B. Clifford

Nguyen, T. D.

O'Toole, J.

P., Krishna Gummadi,

Pandurangan, G.

Paoli, J.

Partridge, C.

Parulkar, C. Papadopoulos, G.

Paul, S.

Peery, C.

Peinado, M.

Pendarakis, D.

Pendarakis, D.

Pendarakis, Dimitris

Pinkas, B.

Pinkas, Benny

Plattner, B.

Plaxton, C. G.

Plaxton, C.

Popescu, B. C.

Prinkey, M. T.

Raghavan, P.

Raghavan, P.

Rajaram, R.

Rajaraman, R.

Ramanathan, R.

Ramasubramanian, V.

Rao, S. G.

Ratnasamy, Sylvia

Ratnasamy, S.

Raz, D.

Reddy, A.

Reed, D. P.

Rejaie, R.

Reschke, D.

Rhea, Sean

Rhea, Sean C.

Richa, A. W.

Richa, A.

Rinaldi, Roberto

Ripeanu, M.

Rodriguez, Adolfo

Rohrs, C.

Rosenberg, Catherine

Rosenberg, J.

Rosenblum, David S.

Ross, K.

Rothermel, K.

Roussopolous, N.

Roussopoulos, M.

Rowstran, Antony

Rowstron, Antony

Rowstron, Antony I. T.

Rowstron, A.

Rubenstein, Dan

Rubin, Aviel D.

Saha, D.

Saia, J.

Saltzer, H.

Sandberg, O.

Sander, T.

Saroiu, S.

Savage, S.

Schulzrinne, H.

Schwartz, Elliot

Seltzer, M.

Serban, L.

Seshan, S.

Seshan, Srinivasan

Shah, G.

Shankar, Narendar

Shankar, N.

Sharma, P.

Shavitt, Y.

Shenker, Scott

Shenker, S.

Sherwood, Rob

Shi, S.

Shi, Sherlia

Silaghi, Bujor

Singh, Munindar P.

Sirer, E. G.

Sit, E.

Snell, J.

Snoeyink, J.

Speakman, T.

Sperberg-McQueen, C.

Srinivasan, Aravind

Sripanidkulchai, K.

Steen, Maarten van

Steenstrup, M.

Stemm, Mark

Sterbenz, J.

Stoica, Ion

Stoica, I.

Stribling, Jeremy

Stribling, J.

Strufe, T.

Stubblebine, S.

Stutzbach, D.

Sun, D.

Suri, S.

Swick, R.

Tanenbaum, Andrew S.

Tanenbaum, A. S.

Tangmunarunkit, H.

Taylor, J.

Thadani, S.

Thaler, D.

Theilmann, W.

Theimer, M.

Touch, Joe

Towsley, Don

Towsley, D.

Ts'o, Theodore

Tsoumakos, D.

Tuvell, W.

Udell, J.

Upfal, E.

Vahdat, A.

Vahdat, Amin

Varghese, G.

Verma, D.

Verma, Dinesh

Vingralek, R.

Voelker, G.

Waitzman, D.

Waldman, Marc

Waldvogel, M.

Waldvogel, Marcel

Waldvogel, Marcel

Wallach, Dan S.

Wallach, D. S.

Weatherspoon, Hakim

Weigend, A. S.

Weiler, N.

Weimer, Westley

Wells, Chris

Willman, B.

Wolf, Alexander L

Wolman, A.

Wong, C.K.

Wong, T.

Wroclawski, J.

X., Rex Xu,

Xi, Y.

Xu, Dongyan

Yang, B.

Yang, R.

Yang, Richard Y.

Yano, Koichi

Yavatkar, R.

Yeong, W.

Yu, Bin

Yung, M.

Zahorjan, J.

Zegura, E.

Zegura, Ellen

Zegura, Ellen W.

Zhang, H.

Zhang, Qi

Zhang, Brian

Zhang, H.

Zhang, L.

Zhao, B. Y.

Zhao, Ben Y.

Zhao, B. Y.

Zhao., Ben

Zhuang, S. Q.

Zimmermann, P.

others,

s, A. Collin

--None--

1. The Gnutella Protocol Specification v0.4.
2. Gnutella Developers' Forum.
3. WASTE website.
4. Gnutella home page
http://gnutella.wego.com..
5. The Directory: Overview of Concepts, Models and Service.
CCITT Recommendation X.500., 1988.
6. The Directory: Models.
CCITT Recommendation X.501 ISO/IEC JTC 1/SC21; International Standard 9594-2, 1988.
7. The Directory: Abstract Service Definition.
CCITT Recommendation X.511, ISO/IEC JTC 1/SC21; International Standard 9594-3, 1988.
8. Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)
CCITT Recommendation X.209, 1988.
9. Uncheatable Distributed Computations
Cryptographers' Track --- RSA, 2001.
10. Incentives for Sharing in Peer-to-Peer Networks
ACM Conference on Electronic Commerce, 2001.

Abdul-Rahman, Alfarez

11. A Distributed Trust Model
Alfarez Abdul-Rahman and Stephen Hailes
Proceedings of the New Security Paradigms Workshop (NSPW-97), 48--60, ACM, sep 23--26, 1997.
12. Supporting Trust in Virtual Communities
Alfarez Abdul-Rahman and Stephen Hailes
Proceedings Hawaii International Conference on System Sciences 33, 2000.

Aberer, Karl

13. Managing Trust in a Peer-2-Peer Information System
Karl Aberer and Zoran Despotovic
Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM-01), 310--317, Editor(s): Henrique Paques and Ling Liu and David Grossman, ACM Press, nov 5--10, 2001.

Adar, E.

14. Free riding on gnutella.
E. Adar and B. Huberman
First Monday, 5(10)2000.
Note: http://www.firstmonday.dk/issues/issue5-10/adar/.

Adjie-Winoto, William

15. The design and implementation of an intentional naming system
William Adjie-Winoto and Elliot Schwartz and Hari Balakrishnan and Jeremy Lilley
Symposium on Operating Systems Principles, 186-201, 1999.

Aggarwal, A.

16. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Almeida, Jussara

17. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Fan, Li and Cao, Pei and Almeida, Jussara and Broder, Andrei Z.
Computer Communications Review (Proceedings of SIGOCOMM'98), 28(4):254--265, September, 1998.
Abstract: The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols. In this paper we propose a new protocol called ''Summary Cache''; each proxy keeps a summary of the URLs of cached documents of each participating proxy and checks these summaries for potential hits before sending any queries. Two factors contribute to the low overhead: the summaries are updated only periodically, and the summary representations are economical -- as low as 8 bits per entry. Using trace-driven simulations and a prototype implementation, we show that compared to the existing Internet Cache Protocol (ICP), Summary Cache reduces the number of inter-cache messages by a factor of 25 to 60, reduces the bandwidth consumption by over 50%, and eliminates between 30% to 95% of the CPU overhead, while at the same time maintaining almost the same hit ratio as ICP. Hence Summary Cache enables cache sharing among a large number of proxies.

Ammar, Mostafa H.

18. Application-layer anycasting: a server selection architecture and use in a replicated Web service
Ellen W. Zegura and Mostafa H. Ammar and Zongming Fei and Samrat Bhattacharjee
j-IEEE-TRANS-NETWORKING, 8(4):455--466, 2000.

Ammar, M.

19. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.
20. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.
21. Layered Video Multicast with Retransmissions (LVMR): Evaluation of Hierarchical Rate Control
Li, X. and Paul, S. and Ammar, M.
Proceedings of INFOCOM, March/April, 1998.
Abstract: Layered Video Multicast with Retransmissions (LVMR) is a system for distributing video using layered coding over the Internet, The two key contributions of the system are: (1) improving the quality of reception within each layer by retransmitting lost packets given an upper bound on recovery time and applying an adaptive playback point scheme to help achieve more successful retransmission, and (2) adapting to network congestion and heterogeneity using hierarchical rate control mechanism. This paper concentrates on the rate control aspects of LVMR. In contrast to the existing sender-based and receiver-based rate control in which the entire information about network congestion is either available at the sender (in sender-based approach) or replicated at the receivers (in receiver-based approach), the hierarchical rate control mechanism distributes the information between the sender, receivers, and some agents in the network in such a way that each entity maintains only the information relevant to itself. In addition to that, the hierarchical approach enables intelligent decisions to be made in terms of conducting concurrent experiments and choosing one of several possible experiments at any instant of time based on minimal state information at the agents in the network. Protocol details are presented in the paper together with experimental and simulation results to back our claims.

Ammar, M.H.

22. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.
23. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.

Andersen, D.G.

24. Resilient Overlay Networks
Andersen, D.G. and Balakrishnan, H. and Frans Kaashoek, M. and Morris, R.
Proceedings of 18th ACM Symposium on Operating Systems Principles, October, 2001.

Anderson, T.

25. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Anderson, R.

26. Sybil-Resistant DHT Routing
Danezis, G. and Lesniewski-Laas, C. and Kaashoek, M. F. and Anderson, R.
10th European Symposium on Research in Computer Security (ESORICS 2005), Milan, Italy, September, 2005.

Aspnes, J.

27. Skip Graphs
Aspnes, J. and Shah, G.
14th Annual ACM-SIAM Symposium on Discrete Algorithms, January, 2003.

Asthagiri, N.

28. Security
Udell, J. and Asthagiri, N. and Tuvell, W.
Peer-to-Peer: Harnessing the Power of Disruptive Technologies, 354-380, Editor(s): Oram, A., O'Reilly, 2001.

Back, Adam

29. Hashcash --- a denial of service countermeasure
Adam Back
Technical Report
cypherspace.org, 2002.
Note: Available at http://www.cypherspace.org/ adam/hashcash/hashcash.pdf.

Baker, M.

30. Incentive-Based Propagation of Metadata Updates in Peer-to-Peer Networks
Roussopoulos, M. and Baker, M.
P2P Journal, 1-6, September, 2003.
31. CUP: Controlled Update Propagation in Peer-to-Peer Networks
Roussopoulos, M. and Baker, M.
USENIX Annual Technical Conference, San Antonio, TX, USA, June, 2003.

Balakrishnan, Hari

32. The design and implementation of an intentional naming system
William Adjie-Winoto and Elliot Schwartz and Hari Balakrishnan and Jeremy Lilley
Symposium on Operating Systems Principles, 186-201, 1999.

Balakrishnan, H.

33. Resilient Overlay Networks
Andersen, D.G. and Balakrishnan, H. and Frans Kaashoek, M. and Morris, R.
Proceedings of 18th ACM Symposium on Operating Systems Principles, October, 2001.
34. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
Stoica, I. and Morris, R. and Karger, D. and Kaashoek, M. F. and Balakrishnan, H.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.
35. Observations on the Dynamic Evolution of Peer-to-Peer Networks
Liben-Nowell, D. and Balakrishnan, H. and Karger, D.
1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March, 2002.

Ballardie, A.

36. Scalable Multicast Key Distribution
A. Ballardie
May, 1996.
Note: Network Working Group, RFC 1949..

Ballardie, Tony

37. Core based trees (CBT)
Ballardie, Tony and Francis, Paul and Crowcroft, Jon
Proceedings of SIGCOMM, 85--95, ACM, September, 1993.
Abstract: One of the central problems in one-to-many wide-area communications is forming the delivery tree -- the collection of nodes and links that a multicast packet traverses. Significant problems remain to be solved in the area of multicast tree formation, the problem of scaling being paramount among these. In this paper we show how the current IP multicast architecture scales poorly (by scale poorly, we mean consume too much memory, bandwidth, or too many processing resources), and subsequently present a multicast protocol based on a new scalable architecture that is low-cost, relatively simple, and efficient. We also show how this architecture is decoupled from (though dependent on) unicast routing, and is therefore easy to install in an internet that comprises multiple heterogeneous unicast routing algorithms.

Ballintijn, Gerco

38. Algorithmic design of the Globe wide-area location service
Maarten van Steen and Franz J. Hauck and Gerco Ballintijn and Andrew S. Tanenbaum
The Computer Journal, 41(5):297--310, 1998.

Banerjee, Suman

39. Scalable Application Layer Multicast
Suman Banerjee and Bobby Bhattacharjee and Christopher Kommreddy
Proceedings of ACM SIGCOMM, 2002.
40. Scalable Secure Group Communication over IP Multicast
Suman Banerjee and Bobby Bhattacharjee
JSAC Special Issue on Network Support for Group Communication, 20(8)Oct, 2002.
41. Construction of an Efficient Overlay Multicast Infrastructure for Real-time Applications
Suman Banerjee and Christopher Kommareddy and Koushik Kar and Bobby Bhattacharjee and Samir Khuller
Proceedings of INFOCOM, 2003.
42. Resilient Multicast using Overlays
Suman Banerjee and Seungjoon Lee and Bobby Bhattacharjee and Aravind Srinivasan
Proceedings of ACM SIGMETRICS, 2003.
43. A Cooperative Framework to Scale Multi-Party Applications
Suman Banerjee
PhD Thesis, University of Maryland, 2003.

Banerjee, S.

44. Scalable Secure Group Communication over IP Mulitcast
Banerjee, S. and Bhattacharjee, B.
Proceedings of International Conference on Network Protocols, November, 2001.
45. Scalable Peer Finding on the Internet
Banerjee, S. and Kommareddy, C. and Bhattacharjee, B.
Proceedings of Global Internet Symposium, Globecom, November, 2002.

Bauer, Daniel

46. Dynamic Replica Management in Distributed Hash Tables
Marcel Waldvogel and Paul Hurley and Daniel Bauer
Technical Report
Research Report, RZ--3502, IBM, July, 2003.
Abstract: Interest in distributed storage is fueled by demand for reliability and resilience combined with decreasing hardware costs. Peer-to-peer storage networks based on distributed hash tables are an attractive solution due to their efficient use of resources and resulting performance. The placement and subsequent efficient location of replicas in such systems remain open problems, especially the requirement to update replicated content, working in the absence of global information, and how to determine the locations in a dynamic system without introducing single points of failure. We present and evaluate a novel and versatile technique, replica enumeration, which allows for controlled replication and replica access. The possibility of enumerating and addressing individual replicas allows dynamic updates as well as superior performance without burdening the network with state information, yet taking advantage of locality information when available. We simulate, analyze, and prove properties of the system, and discuss some applications.

Bawa, M.

47. Symphony: Distributed Hashing in a Small World
Manku, G. S. and Bawa, M. and Raghavan, P.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Beam, T.K.

48. HyperCast: A Protocol for Maintaining Multicast Group Members in a Logical Hypercube Topology
Liebeherr, J. and Beam, T.K.
Proceedings of 1st International Workshop on Networked Group Communications, July, 1999.

Becker, D.

49. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Bhattacharjee, Bobby

50. Design of the TerraDir Distributed Directory
Bobby Bhattacharjee and Pete Keleher and Bujor Silaghi
Technical Report
CS-TR-4163, University of Maryland at College Park, 2001.
51. Finding Close Friends over the Internet
Narendar Shankar and Christopher Komareddy and Bobby Bhattacharjee
Proceedings of International Conference on Network Protocols, November, 2001.
52. Scalable Application Layer Multicast
Suman Banerjee and Bobby Bhattacharjee and Christopher Kommreddy
Proceedings of ACM SIGCOMM, 2002.
53. Routing in the TerraDir Directory Service
Bujor Silaghi and Bobby Bhattacharjee and Pete Keleher
Proceedings of SPIE ITCOM, 2002.
54. Scalable Secure Group Communication over IP Multicast
Suman Banerjee and Bobby Bhattacharjee
JSAC Special Issue on Network Support for Group Communication, 20(8)Oct, 2002.
55. Cooperative peer groups in NICE
Seungjoon Lee and Rob Sherwood and Bobby Bhattacharjee
Proceedings of INFOCOM, 2003.
56. Construction of an Efficient Overlay Multicast Infrastructure for Real-time Applications
Suman Banerjee and Christopher Kommareddy and Koushik Kar and Bobby Bhattacharjee and Samir Khuller
Proceedings of INFOCOM, 2003.
57. Resilient Multicast using Overlays
Suman Banerjee and Seungjoon Lee and Bobby Bhattacharjee and Aravind Srinivasan
Proceedings of ACM SIGMETRICS, 2003.
58. Efficient Peer-To-Peer Searches Using Result-Caching
Bobby Bhattacharjee and Sudarshan Chawathe and Vijay Gopalakrishnan and Pete Keleher and Bujor Silaghi
The 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03), February, 2003.
59. Slurpie: A Cooperative Bulk Data Transfer Protocol
Rob Sherwood and Ryan Braud and Bobby Bhattacharjee
Proceedings of IEEE INFOCOM, 2004.
60. Hierarchical Routing with Soft-State Replicas in TerraDir
Bujor Silaghi and Vijay Gopalakrishnan and Bobby Bhattacharjee and Pete Keleher
The 18th International Parallel and Distributed Processing Symposium, April, 2004.
61. Adaptive Replication in Peer-to-Peer Systems
Vijay Gopalakrishnan and Bujor Silaghi and Bobby Bhattacharjee and Pete Keleher
The 24th International Conference on Distributed Computing Systems, March, 2004.

Bhattacharjee, S.

62. How to Model an Internetwork
K. Calvert and E. Zegura and S. Bhattacharjee
Proceedings of IEEE Infocom, 1996.
63. Reasoning About Active Network Protocols
S. Bhattacharjee and K. Calvert and E. Zegura
Proceedings of International Conference on Network Portocols (ICNP) '98, 1998.
64. Directions in Active Networks
K. Calvert and S. Bhattacharjee and E. Zegura and J. Sterbenz
IEEE Communications Magazine, 1998.
65. Bowman: A Node OS for Active Networks
S. Merugu and S. Bhattacharjee and E. Zegura and K. Calvert
Proceedings IEEE INFOCOM'2000, 2000.

Bhattacharjee, Samrat

66. Self-Organizing Wide-Area Network Caches
Samrat Bhattacharjee and Ken Calvert and Ellen Zegura
IEEE Infocom'98, 1998.
67. Active Networks:Architectures, Composition, and Applications
Samrat Bhattacharjee
Ph.D. Thesis
Georgia Institute of Technology, July, 1999.
68. Control on Demand: An efficient approach to router programmability.
G'isli Hj'almt'ysson and Samrat Bhattacharjee
IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Service Enabling Platforms for Networked Multimedia Systems, August, 1999.
Note: Guest Editors--D. Hutchison, G. Pacifici, B. Plattner, R. Stadler and J. Sventek.
69. Control on Demand
G'isli Hj'almt'ysson and Samrat Bhattacharjee
Proceedings of the First International Working Conference on Active Networks (IWAN), June, 1999.
70. Application-layer anycasting: a server selection architecture and use in a replicated Web service
Ellen W. Zegura and Mostafa H. Ammar and Zongming Fei and Samrat Bhattacharjee
j-IEEE-TRANS-NETWORKING, 8(4):455--466, 2000.
71. Are Virtualized Overlay Networks Too Much of a Good Thing?
Pete Keleher and Samrat Bhattacharjee and Bujor Silaghi
The 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002.
72. Trust-Preserving Set Operations
Ruggero Morselli and Samrat Bhattacharjee and Jonathan Katz and Pete Keleher
The 23rd Conference of the IEEE Communications Society (Infocom), March, 2004.

Bhattacharjee, B.

73. Scalable Secure Group Communication over IP Mulitcast
Banerjee, S. and Bhattacharjee, B.
Proceedings of International Conference on Network Protocols, November, 2001.
74. Finding Close Friends on the Internet
Kommareddy, C. and Shankar, N. and Bhattacharjee, B.
Proceedings of ICNP, November, 2001.
75. Scalable Peer Finding on the Internet
Banerjee, S. and Kommareddy, C. and Bhattacharjee, B.
Proceedings of Global Internet Symposium, Globecom, November, 2002.

Bhattarcharjee, S.

76. Exposing the network: Support for topology-sensitive applications
Y. Chae and S. Merugu and E. Zegura and S. Bhattarcharjee
Proceedings of IEEE OpenArch 2000, 2000.

Biddle, P.

77. The Darknet and the Future of Content Distribution
Biddle, P. and England, P. and Peinado, M. and Willman, B.
Proceedings of the 2nd ACM Workshop on Digital Rights Management, Lecture Notes in Computer Science 2696, 155-176, Springer Verlag, 2003.

Bindel, David

78. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Bollaert, M.

79. The Download Mesh
Bollaert, M. and Thadani, S. and Mickish, A.

Note: Gnutella Developers' Forum, http://www.the-gdf.org/.

Bradley, Neil

80. The XML Companion
Neil Bradley
Edition: Second, Addison-Wesley, 2000.

Brainard, J.

81. Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks
A. Juels and J. Brainard
Proceedings of NDSS '99 (Networks and Distributed Security Systems), 1999.

Braud, Ryan

82. Slurpie: A Cooperative Bulk Data Transfer Protocol
Rob Sherwood and Ryan Braud and Bobby Bhattacharjee
Proceedings of IEEE INFOCOM, 2004.

Bray, T.

83. Extensible Markup Language (XML) 1.0
T. Bray and J. Paoli and C. Sperberg-McQueen
World Wide Web Consortium Recommendation. Available at http://www.w3.org/TR/REC-xml, February, 1998.

Braynard, Rebecca

84. OPUS: An Overlay Utility Service
Rebecca Braynard and Dejan Kostic and Adolfo Rodriguez and Jeff Chase and Amin Vahdat
Poster at 18th ACM Symposium on Operating System Principles, October, 2001.

Breslau, Lee

85. Making gnutella-like P2P systems scalable
Yatin Chawathe and Sylvia Ratnasamy and Lee Breslau and Nick Lanham and Scott Shenker
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 407--418, ACM Press, 2003.

Breslau, L.

86. Making Gnutella-like P2P Systems Scalable
Chawathe, Y. and Ratnasamy, S. and Breslau, L. and Lanham, N. and Shenker, S.
Proceedings of SIGCOMM, August, 2003.

Brewer, E. A.

87. RMX: Reliable Multicast for Heterogeneous Networks
Y. Chawathe and S. McCanne and E. A. Brewer
Proceedings of Infocom, 2000.

Brewer, Eric A.

88. Scalable, distributed data structures for internet service construction.
Steven D. Gribble and Eric A. Brewer and Joseph M. Hellerstein and David Culler
In Symposium on Operating Systems Design and Implementation, 2000.

Briscoe, B.

89. MARKS : Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
B. Briscoe
1st International Workshop on Networked Group Communication, Pisa, Italy, November 1999., November, 1999.

Broder, Andrei Z.

90. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Fan, Li and Cao, Pei and Almeida, Jussara and Broder, Andrei Z.
Computer Communications Review (Proceedings of SIGOCOMM'98), 28(4):254--265, September, 1998.
Abstract: The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols. In this paper we propose a new protocol called ''Summary Cache''; each proxy keeps a summary of the URLs of cached documents of each participating proxy and checks these summaries for potential hits before sending any queries. Two factors contribute to the low overhead: the summaries are updated only periodically, and the summary representations are economical -- as low as 8 bits per entry. Using trace-driven simulations and a prototype implementation, we show that compared to the existing Internet Cache Protocol (ICP), Summary Cache reduces the number of inter-cache messages by a factor of 25 to 60, reduces the bandwidth consumption by over 50%, and eliminates between 30% to 95% of the CPU overhead, while at the same time maintaining almost the same hit ratio as ICP. Hence Summary Cache enables cache sharing among a large number of proxies.

Cain, B.

91. Generic Router Assist (GRA) Building Block Motivation and Architecture
Cain, B. and Speakman, T. and Towsley, D.
Technical Report
Internet Draft, Internet Engineering Task Force, March, 2000.
Note: Work in progress.

Calvert, K.

92. How to Model an Internetwork
K. Calvert and E. Zegura and S. Bhattacharjee
Proceedings of IEEE Infocom, 1996.
93. Reasoning About Active Network Protocols
S. Bhattacharjee and K. Calvert and E. Zegura
Proceedings of International Conference on Network Portocols (ICNP) '98, 1998.
94. Directions in Active Networks
K. Calvert and S. Bhattacharjee and E. Zegura and J. Sterbenz
IEEE Communications Magazine, 1998.
95. Bowman: A Node OS for Active Networks
S. Merugu and S. Bhattacharjee and E. Zegura and K. Calvert
Proceedings IEEE INFOCOM'2000, 2000.

Calvert, Ken

96. A quantitative comparison of graph-based models for Internet topology
Ellen W. Zegura and Kenneth L. Calvert and Michael J. Donahoo
IEEEslash ACM Transactions on Networking, 5(6):770--783, 1997.
97. Self-Organizing Wide-Area Network Caches
Samrat Bhattacharjee and Ken Calvert and Ellen Zegura
IEEE Infocom'98, 1998.

Calvert, Kenneth L.

98. A quantitative comparison of graph-based models for Internet topology
Ellen W. Zegura and Kenneth L. Calvert and Michael J. Donahoo
IEEEslash ACM Transactions on Networking, 5(6):770--783, 1997.

Canetti, Ran

99. Multicast Security: A Taxonomy and Efficient Constructions
Canetti, Ran and Garay, Juan and Itkis, Gene and Micciancio, Daniele and Naor, Moni and Pinkas, Benny
Proceedings of INFOCOM, March, 1999.
Abstract: Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide founded security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only very partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out the relevant security concerns. Next we identify two major security problems of multicast communication: individual authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a `midpoint' between traditional Message Authentication Codes and digital signatures. We also present an improved and very efficient solution to another prevailing problem for multicast protocols, namely the key revocation problem.

Cao, P.

100. Search and Replication in Unstructured Peer-to-Peer Networks
Lv, Q. and Cao, P. and Cohen, E. and Li, K. and Shenker, S.
16th International Conference on Supercomputing, New York, NY, USA, June, 2002.

Cao, Pei

101. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Fan, Li and Cao, Pei and Almeida, Jussara and Broder, Andrei Z.
Computer Communications Review (Proceedings of SIGOCOMM'98), 28(4):254--265, September, 1998.
Abstract: The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols. In this paper we propose a new protocol called ''Summary Cache''; each proxy keeps a summary of the URLs of cached documents of each participating proxy and checks these summaries for potential hits before sending any queries. Two factors contribute to the low overhead: the summaries are updated only periodically, and the summary representations are economical -- as low as 8 bits per entry. Using trace-driven simulations and a prototype implementation, we show that compared to the existing Internet Cache Protocol (ICP), Summary Cache reduces the number of inter-cache messages by a factor of 25 to 60, reduces the bandwidth consumption by over 50%, and eliminates between 30% to 95% of the CPU overhead, while at the same time maintaining almost the same hit ratio as ICP. Hence Summary Cache enables cache sharing among a large number of proxies.

Cardwell, N.

102. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Caronni, G.

103. The VersaKey Framework: Versatile Group Key Management
M. Waldvogel and G. Caronni and D. Sun and N. Weiler and B. Plattner
IEEE Journal on Selected Areas in Communications, Special Issue on Middleware, 17(9)August, 1999.

Carter, Robert L.

104. Server Selection Using Dynamic Path Characterization in Wide-Area Networks
Carter, Robert L. and Crovella, Mark E.
Proceedings of INFOCOMM, 1014, Boston University, April, 1997.
Abstract: Replication is a commonly proposed solution to problems of scale associated with distributed services. However, when a service is replicated, each client must be assigned a server. Prior work has generally assumed that assignment to be static. In contrast, we propose dynamic server selection, and show that enables application-level congestion avoidance. Using tools to measure available bandwidth and round trip latency (RTT), we demonstrate dynamic server selection and compare it to previous static approaches. We show that because of the variability of paths in the Internet, dynamic server selection consistently outperforms static policies, reducing response times by as much as 50%. However, we also must adopt a systems perspective and consider the impact of the measurement method on the network. Therefore, we look at alternative low-cost approximations and find that the careful measurements provided by our tools can be closely approximated by much lighter-weight measurements. We propose a protocol using this method which is limited to at most a 1% increase in network traffic but which often costs much less in practice.

Carzaniga, Antonio

105. Design and Evaluation of a Wide-Area Event Notification Service
Antonio Carzaniga and David S. Rosenblum and Alexander L Wolf
ACM Transactions on Computer Systems, 19(3):332--383, August, 2001.

Casner, S.

106. First IETF Internet Audiocast
S. Casner and S. Deering
1992.

Castro, Miguel

107. Security for structured peer-to-peer overlay networks
Miguel Castro and Peter Druschel and Ayalvadi Ganesh and Antony Rowstron and Dan S. Wallach
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.
108. Secure Routing for Structured Peer-to-Peer Overlay Networks
Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach
Proceedings of OSDI, 2002.

Castro, M.

109. Security for Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Ganesh, A. and Rowstron, A. and Wallach, D. S.
5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, December, 2002.
110. Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2002-82, Microsoft Research, 2002.
111. Proximity Neighbor Selection in Tree-Based Structured Peer-to-Peer Overlays
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2003-52, Microsoft Research, 2003.

Chae, Y.

112. Exposing the network: Support for topology-sensitive applications
Y. Chae and S. Merugu and E. Zegura and S. Bhattarcharjee
Proceedings of IEEE OpenArch 2000, 2000.

Chang, I.

113. Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques
Chang, I. and Engel, R. and Kandlur, D. and Pendarakis, D. and Saha, D.
Proceedings of Infocom, March, 1999.
Abstract: The Internet today provides no support for privacy or authentication of multicast data distribution. However, an increasing number of applications will require secure multicast services in order to restrict group membership and enforce accountability of group members. A major problem associated with the deployment of secure multicast delivery services is the scalability of the key distribution protocol. This is particularly true with regard to the handling of group membership changes, such as member departures and/or expulsions, which necessitate the distribution of a new session key to all the remaining group members. In this paper, we present a new multicast key management scheme which uses a set of auxiliary keys in order to improve scalability. In contrast to previous schemes which generate a fixed hierarchy of keys, we dynamically generate the most suitable key hierarchy by composing different keys. However, our work goes one step further by focusing on the problem of cumulative member removal. Using Boolean function minimization techniques, our scheme outperforms all other schemes known to us in terms of message complexity in removing multiple group members. The efficiency of our scheme in aggregating key updates, due to multiple member departures, offers the potential of a significant performance advantage. The proposed scheme has been used within a toolkit for secure Internet multicast services that we have developed.

Chase, Jeff

114. OPUS: An Overlay Utility Service
Rebecca Braynard and Dejan Kostic and Adolfo Rodriguez and Jeff Chase and Amin Vahdat
Poster at 18th ACM Symposium on Operating System Principles, October, 2001.

Chawathe, Sudarshan

115. Describing and Manipulating XML Data
Sudarshan S. Chawathe
Bulletin of the IEEE Technical Committee on Data Engineering, 22(3):3--9, 1999.
Note: Available at http://www.cs.umd.edu/verb# #chaw/pubs/.
116. Efficient Peer-To-Peer Searches Using Result-Caching
Bobby Bhattacharjee and Sudarshan Chawathe and Vijay Gopalakrishnan and Pete Keleher and Bujor Silaghi
The 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03), February, 2003.

Chawathe, Sudarshan S.

117. Describing and Manipulating XML Data
Sudarshan S. Chawathe
Bulletin of the IEEE Technical Committee on Data Engineering, 22(3):3--9, 1999.
Note: Available at http://www.cs.umd.edu/verb# #chaw/pubs/.

Chawathe, Y.

118. Scattercast: An Architecture for Internet Broadcast Distribution as an Infrastructure Service
Y. Chawathe
Ph.D. Thesis, University of California, Berkeley, December, 2000.
119. RMX: Reliable Multicast for Heterogeneous Networks
Y. Chawathe and S. McCanne and E. A. Brewer
Proceedings of Infocom, 2000.

Chawathe, Yatin

120. Making gnutella-like P2P systems scalable
Yatin Chawathe and Sylvia Ratnasamy and Lee Breslau and Nick Lanham and Scott Shenker
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 407--418, ACM Press, 2003.

Chawathe, Y.

121. Making Gnutella-like P2P Systems Scalable
Chawathe, Y. and Ratnasamy, S. and Breslau, L. and Lanham, N. and Shenker, S.
Proceedings of SIGCOMM, August, 2003.

Chen, Yan

122. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Cheriton, D.

123. Multicast Routing in Datagram Internetworks and Extended LANs
S. Deering and D. Cheriton
ACM Transactions on Computer Systems, May, 1990.

Cheung, S.Y.

124. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.
125. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.

Christin, N.

126. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks
Christin, N. and Weigend, A. S. and Chuang, J.
ACM Conference on Electronic Commerce, Vancouver, Canada, June, 2005.

Chu, Jacky

127. Availability and Locality Measurements of Peer-to-Peer File Systems
Jacky Chu and Kevin Labonte and Brian Neil Levine
Proc. ITCom: Scalability and Traffic Control in IP Networks, july, 2002.

Chu, Y.-H.

128. A Case for End System Multicast
Y.-H. Chu and S. G. Rao and H. Zhang
Proceedings of ACM SIGMETRICS, June, 2000.
129. Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture
Y.-H. Chu and S. G. Rao and S. Seshan and H. Zhang
Proceedings of ACM SIGCOMM, August, 2001.

Chuang, J.

130. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks
Christin, N. and Weigend, A. S. and Chuang, J.
ACM Conference on Electronic Commerce, Vancouver, Canada, June, 2005.

Clark, D.

131. End-To-End Arguments in System Design
H. Saltzer and D. P. Reed and D. Clark
ACM Transactions on Computing Systems, 2(4)1984.

Clarke, I.

132. Routing in the Dark: Scalable Searches in Dark P2P Networks
Clarke, I. and Sandberg, O.
DefCon 13, Las Vegas, NV, USA, July, 2005.

Cohen, E.

133. Search and Replication in Unstructured Peer-to-Peer Networks
Lv, Q. and Cao, P. and Cohen, E. and Li, K. and Shenker, S.
16th International Conference on Supercomputing, New York, NY, USA, June, 2002.

Cranor, Lorrie Faith

134. Publius: A robust, tamper-evident, censorship-resistant, web publishing system
Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor
Proc. 9th USENIX Security Symposium, 59--72, August, 2000.

Crispo, B.

135. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
Popescu, B. C. and Crispo, B. and Tanenbaum, A. S.
12th International Workshop on Security Protocols, Cambridge, UK, April, 2004.

Crovella, Mark E.

136. Server Selection Using Dynamic Path Characterization in Wide-Area Networks
Carter, Robert L. and Crovella, Mark E.
Proceedings of INFOCOMM, 1014, Boston University, April, 1997.
Abstract: Replication is a commonly proposed solution to problems of scale associated with distributed services. However, when a service is replicated, each client must be assigned a server. Prior work has generally assumed that assignment to be static. In contrast, we propose dynamic server selection, and show that enables application-level congestion avoidance. Using tools to measure available bandwidth and round trip latency (RTT), we demonstrate dynamic server selection and compare it to previous static approaches. We show that because of the variability of paths in the Internet, dynamic server selection consistently outperforms static policies, reducing response times by as much as 50%. However, we also must adopt a systems perspective and consider the impact of the measurement method on the network. Therefore, we look at alternative low-cost approximations and find that the careful measurements provided by our tools can be closely approximated by much lighter-weight measurements. We propose a protocol using this method which is limited to at most a 1% increase in network traffic but which often costs much less in practice.

Crowcroft, Jon

137. Core based trees (CBT)
Ballardie, Tony and Francis, Paul and Crowcroft, Jon
Proceedings of SIGCOMM, 85--95, ACM, September, 1993.
Abstract: One of the central problems in one-to-many wide-area communications is forming the delivery tree -- the collection of nodes and links that a multicast packet traverses. Significant problems remain to be solved in the area of multicast tree formation, the problem of scaling being paramount among these. In this paper we show how the current IP multicast architecture scales poorly (by scale poorly, we mean consume too much memory, bandwidth, or too many processing resources), and subsequently present a multicast protocol based on a new scalable architecture that is low-cost, relatively simple, and efficient. We also show how this architecture is decoupled from (though dependent on) unicast routing, and is therefore easy to install in an internet that comprises multiple heterogeneous unicast routing algorithms.

Cuenca-Acuna, F. M.

138. Collaborative Management of Global Directories in P2P Systems
Peery, C. and Cuenca-Acuna, F. M. and Martin, R. P. and Nguyen, T. D.
Technical Report
DCS-TR-510, November, 2002.

Culler, David

139. Scalable, distributed data structures for internet service construction.
Steven D. Gribble and Eric A. Brewer and Joseph M. Hellerstein and David Culler
In Symposium on Operating Systems Design and Implementation, 2000.

Czerwinski, Steven

140. An Architecture for a Secure Service Discovery Service
Steven Czerwinski and Ben Y. Zhao and Todd Hodes and Anthony D. Joseph and Randy Katz
Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom-99, 24--35, ACM Press, aug 15--20, 1999.
141. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Dabek, Frank

142. Wide-area cooperative storage with CFS
Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October, 2001.

Danezis, G.

143. Sybil-Resistant DHT Routing
Danezis, G. and Lesniewski-Laas, C. and Kaashoek, M. F. and Anderson, R.
10th European Symposium on Research in Computer Security (ESORICS 2005), Milan, Italy, September, 2005.

Daswani, N.

144. Open Problems in Data-Sharing Peer-to-Peer Systems
Daswani, N. and Garcia-Molina, H. and Yang, B.
Proceedings of the 9th International Conference on Database Theory, Lecture Notes in Computer Science 2572, 1-15, Springer Verlag, 2003.

Deering, S.

145. Multicast Routing in Datagram Internetworks and Extended LANs
S. Deering and D. Cheriton
ACM Transactions on Computer Systems, May, 1990.
146. First IETF Internet Audiocast
S. Casner and S. Deering
1992.
147. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
148. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.
149. Distance Vector Multicast Routing Protocol
D. Waitzman and C. Partridge and S. Deering
RFC 1075, 1998.

Despotovic, Zoran

150. Managing Trust in a Peer-2-Peer Information System
Karl Aberer and Zoran Despotovic
Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM-01), 310--317, Editor(s): Henrique Paques and Ling Liu and David Grossman, ACM Press, nov 5--10, 2001.

Dingledine, Roger

151. Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Roger Dingledine and Michael Freedman and David Molnar
Editor(s): Edited by Andy Oram, O'Reilly, March, 2001.

Donahoo, Michael J.

152. A quantitative comparison of graph-based models for Internet topology
Ellen W. Zegura and Kenneth L. Calvert and Michael J. Donahoo
IEEEslash ACM Transactions on Networking, 5(6):770--783, 1997.

Druschel, Peter

153. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
Antony Rowstran and Peter Druschel
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP'01), 2001.
154. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
Antony Rowstran and Peter Druschel
Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001), 2001.
155. Security for structured peer-to-peer overlay networks
Miguel Castro and Peter Druschel and Ayalvadi Ganesh and Antony Rowstron and Dan S. Wallach
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.
156. Secure Routing for Structured Peer-to-Peer Overlay Networks
Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach
Proceedings of OSDI, 2002.

Druschel, P.

157. Pastry: Scalable Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems
Druschel, P. and Rowstron, A.
18th IFIP/ACM Conference on Distributed Systems Platforms (Middleware 2001), Heidelberg, Germany, November, 2001.
158. Security for Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Ganesh, A. and Rowstron, A. and Wallach, D. S.
5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, December, 2002.
159. Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2002-82, Microsoft Research, 2002.
160. Proximity Neighbor Selection in Tree-Based Structured Peer-to-Peer Overlays
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2003-52, Microsoft Research, 2003.

Dunlap, Kevin J.

161. Development of the Domain Name System
Mockapetris, Paul V. and Dunlap, Kevin J.
Proceedings of SIGCOMM, 123--133, ACM, August, 1988.
Abstract: The Domain Name System (DNS) provides name service for the DARPA Internet. It is one of the largest name services in operation today, serves a highly diverse community of hosts, users, and networks, and uses a unique combination of hierarchies, caching, and datagram access. This paper examines the ideas behind the initial design of DNS in 1983, discusses the evolution of these ideas into the current implementations and usages, notes conspicuous surprises, successess and shortcomings, and attempts to predict its future evolution.

Note: also in Computer Communication Review 18 (4), Aug. 1988

Eaton, Patrick

162. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Engel, R.

163. Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques
Chang, I. and Engel, R. and Kandlur, D. and Pendarakis, D. and Saha, D.
Proceedings of Infocom, March, 1999.
Abstract: The Internet today provides no support for privacy or authentication of multicast data distribution. However, an increasing number of applications will require secure multicast services in order to restrict group membership and enforce accountability of group members. A major problem associated with the deployment of secure multicast delivery services is the scalability of the key distribution protocol. This is particularly true with regard to the handling of group membership changes, such as member departures and/or expulsions, which necessitate the distribution of a new session key to all the remaining group members. In this paper, we present a new multicast key management scheme which uses a set of auxiliary keys in order to improve scalability. In contrast to previous schemes which generate a fixed hierarchy of keys, we dynamically generate the most suitable key hierarchy by composing different keys. However, our work goes one step further by focusing on the problem of cumulative member removal. Using Boolean function minimization techniques, our scheme outperforms all other schemes known to us in terms of message complexity in removing multiple group members. The efficiency of our scheme in aggregating key updates, due to multiple member departures, offers the potential of a significant performance advantage. The proposed scheme has been used within a toolkit for secure Internet multicast services that we have developed.

England, P.

164. The Darknet and the Future of Content Distribution
Biddle, P. and England, P. and Peinado, M. and Willman, B.
Proceedings of the 2nd ACM Workshop on Digital Rights Management, Lecture Notes in Computer Science 2696, 155-176, Springer Verlag, 2003.

Estrin, D.

165. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
166. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Estrin, D.

167. Fault Isolation in Multicast Trees
Reddy, A. and Govindan, R. and Estrin, D.
Proceedings of SIGCOMM, August, 2000.
168. Fault Isolation in Multicast Trees
Reddy, A. and Govindan, R. and Estrin, D.
Computer Communications Review, August, 2000.
Note: Proceedings of ACM SIGCOMM'00.

Fan, Li

169. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Fan, Li and Cao, Pei and Almeida, Jussara and Broder, Andrei Z.
Computer Communications Review (Proceedings of SIGOCOMM'98), 28(4):254--265, September, 1998.
Abstract: The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols. In this paper we propose a new protocol called ''Summary Cache''; each proxy keeps a summary of the URLs of cached documents of each participating proxy and checks these summaries for potential hits before sending any queries. Two factors contribute to the low overhead: the summaries are updated only periodically, and the summary representations are economical -- as low as 8 bits per entry. Using trace-driven simulations and a prototype implementation, we show that compared to the existing Internet Cache Protocol (ICP), Summary Cache reduces the number of inter-cache messages by a factor of 25 to 60, reduces the bandwidth consumption by over 50%, and eliminates between 30% to 95% of the CPU overhead, while at the same time maintaining almost the same hit ratio as ICP. Hence Summary Cache enables cache sharing among a large number of proxies.

Farber, D.

170. More on See You on the Darknet - note on etymology
Farber, D..

Farinacci, D.

171. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
172. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Fei, Zongming

173. Application-layer anycasting: a server selection architecture and use in a replicated Web service
Ellen W. Zegura and Mostafa H. Ammar and Zongming Fei and Samrat Bhattacharjee
j-IEEE-TRANS-NETWORKING, 8(4):455--466, 2000.

Fisk, A.

174. Dynamic Query Protocol
Fisk, A.

Note: Gnutella Developers' Forum, http://www.the-gdf.org/.

Floyd, S.

175. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.
176. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.

Foster, I.

177. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Ripeanu, M. and Foster, I. and Iamnitchi, A.
IEEE Internet Computing, 6(1)2002.

Francis, P.

178. Yoid: Extending the Multicast Internet Architecture
P. Francis
1999.
Note: White paper http://www.aciri.org/yoid/.

Francis, Paul

179. A Scalable Content Addressable Network
Sylvia Ratnasamy and Paul Francis and Mark Handley and Richard Karp and Scott Shenker
In Proceedings of the ACM SIGCOMM 2001 Technical Conference, 2001.

Francis, P.

180. A Scalable Content-Addressable Network
Ratnasamy, S. and Francis, P. and Handley, M. and Karp, R. and Shenker, S.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.

Francis, Paul

181. Core based trees (CBT)
Ballardie, Tony and Francis, Paul and Crowcroft, Jon
Proceedings of SIGCOMM, 85--95, ACM, September, 1993.
Abstract: One of the central problems in one-to-many wide-area communications is forming the delivery tree -- the collection of nodes and links that a multicast packet traverses. Significant problems remain to be solved in the area of multicast tree formation, the problem of scaling being paramount among these. In this paper we show how the current IP multicast architecture scales poorly (by scale poorly, we mean consume too much memory, bandwidth, or too many processing resources), and subsequently present a multicast protocol based on a new scalable architecture that is low-cost, relatively simple, and efficient. We also show how this architecture is decoupled from (though dependent on) unicast routing, and is therefore easy to install in an internet that comprises multiple heterogeneous unicast routing algorithms.

Freedman, Michael

182. Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Roger Dingledine and Michael Freedman and David Molnar
Editor(s): Edited by Andy Oram, O'Reilly, March, 2001.

Freedman, M.

183. Efficient Peer-to-Peer Lookup Based on a Distributed Trie
Freedman, M. and Vingralek, R.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 66-75, Springer Verlag, 2002.

Ganesh, Ayalvadi

184. Security for structured peer-to-peer overlay networks
Miguel Castro and Peter Druschel and Ayalvadi Ganesh and Antony Rowstron and Dan S. Wallach
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.
185. Secure Routing for Structured Peer-to-Peer Overlay Networks
Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach
Proceedings of OSDI, 2002.

Ganesh, Ayalvadi J.

186. Secure Routing for Structured Peer-to-Peer Overlay Networks
Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach
Proceedings of OSDI, 2002.

Ganesh, A.

187. Security for Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Ganesh, A. and Rowstron, A. and Wallach, D. S.
5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, December, 2002.

Garay, Juan

188. Multicast Security: A Taxonomy and Efficient Constructions
Canetti, Ran and Garay, Juan and Itkis, Gene and Micciancio, Daniele and Naor, Moni and Pinkas, Benny
Proceedings of INFOCOM, March, 1999.
Abstract: Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide founded security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only very partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out the relevant security concerns. Next we identify two major security problems of multicast communication: individual authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a `midpoint' between traditional Message Authentication Codes and digital signatures. We also present an improved and very efficient solution to another prevailing problem for multicast protocols, namely the key revocation problem.

Garcia-Luna-Aceves, J.J.

189. Improving Internet Multicast with Routing Labels
Levine, B.N. and Garcia-Luna-Aceves, J.J.
Proc. IEEE International Conference on Network Protocols, 241--50, October, 1997.
190. Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
Levine, B.N. and Paul, S. and Garcia-Luna-Aceves, J.J.
Proc. Sixth ACM International Multimedia Conference (ACM Multimedia 98), September, 1998.
191. Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
Levine, B.N. and Paul, S. and Garcia-Luna-Aceves, J.J.
Proc. Sixth ACM International Multimedia Conference (ACM Multimedia 98), September, 1998.

Garcia-Molina, H.

192. Improving Search in Peer-to-Peer Networks
Yang, B. and Garcia-Molina, H.
Proceedings of the 22nd International Conference on Distributed Computing Systems, Vienna, Austria, July, 2002.
193. Open Problems in Data-Sharing Peer-to-Peer Systems
Daswani, N. and Garcia-Molina, H. and Yang, B.
Proceedings of the 9th International Conference on Database Theory, Lecture Notes in Computer Science 2572, 1-15, Springer Verlag, 2003.
194. Designing a Super-Peer Network
Yang, B. and Garcia-Molina, H.
Proceedings of the IEEE International Conference on Data Engineering, March, 2003.

Geels, Dennis

195. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Gerla, M.

196. Adaptive Clustering for Mobile, Wireless Networks
Lin, C.R. and Gerla, M.
Journal on Selected Areas of Communication, 15(7)September, 1997.

Gifford, D.

197. Overcast: Reliable Multicasting with an Overlay Network
J. Jannotti and D. Gifford and K. Johnson and M. Kaashoek and J. O'Toole
Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000.

Gil, T. M.

198. Comparing the Performance of Distributed Hash Tables Under Churn
Li, J. and Stribling, J. and Gil, T. M. and Morris, R. and Kaashoek, M. F.
3rd International Workshop on Peer-to-Peer Systems (IPTPS '04), San Diego, CA, USA, February, 2004.

Golle, P.

199. Secure Distributed Computing in a Commercial Environment
P. Golle and S. Stubblebine
Financial Cryptography, 2001.

Gopalakrishnan, Vijay

200. Efficient Peer-To-Peer Searches Using Result-Caching
Bobby Bhattacharjee and Sudarshan Chawathe and Vijay Gopalakrishnan and Pete Keleher and Bujor Silaghi
The 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03), February, 2003.
201. Hierarchical Routing with Soft-State Replicas in TerraDir
Bujor Silaghi and Vijay Gopalakrishnan and Bobby Bhattacharjee and Pete Keleher
The 18th International Parallel and Distributed Processing Symposium, April, 2004.
202. Adaptive Replication in Peer-to-Peer Systems
Vijay Gopalakrishnan and Bujor Silaghi and Bobby Bhattacharjee and Pete Keleher
The 24th International Conference on Distributed Computing Systems, March, 2004.

Gouda, M.

203. Secure Group Communications Using Key Graphs
Wong, C.K. and Gouda, M. and Lam, S.
Proceedings of SIGCOMM, 28(4):68--79, September, 1998.
Abstract: Many emerging applications (e.g. teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work ) are based upon a group communications model, i.e., they require packet delivery from one or more authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue. In this paper, we present a novel solution to the scalability problem of group/multicast key management. We formalize the notion of a secure group as a triple (U, K, R) where U denotes a set of users, K a set of keys held by the users ,and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely distributing rekey messages after a join/leave, and specify protocols for joining and leaving a secure group. The rekeying strategies and join/leave protocols are implemented in a prototype group key server we have built. We present measurement results from experiments and discuss performance comparisons. We show that our group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves. In particular, the average measured processing time per join/leave increases linearly with the logarithm of group size.
204. Batch Updates for Key Trees
Li, X. and Yang, R. and Gouda, M. and Lam, S.
Technical Report
University of Texas, Austin, September, 2000.

Govindan, R.

205. Heuristics for Internet Map Discovery
R. Govindan and H. Tangmunarunkit
Proceedings of Infocom, March, 2000.
206. Heuristics for Internet Map Discovery
R. Govindan and H. Tangmunarunkit
Proceedings of Infocom, March, 2000.

Govindan, R.

207. Fault Isolation in Multicast Trees
Reddy, A. and Govindan, R. and Estrin, D.
Proceedings of SIGCOMM, August, 2000.
208. Fault Isolation in Multicast Trees
Reddy, A. and Govindan, R. and Estrin, D.
Computer Communications Review, August, 2000.
Note: Proceedings of ACM SIGCOMM'00.

Gribble, Steven D.

209. Scalable, distributed data structures for internet service construction.
Steven D. Gribble and Eric A. Brewer and Joseph M. Hellerstein and David Culler
In Symposium on Operating Systems Design and Implementation, 2000.

Gribble, S. D.

210. A Measurement Study of Peer-to-Peer File Sharing Systems
Saroiu, S. and Krishna Gummadi, P. and Gribble, S. D.
Proceedings of Multimedia Computing and Networking (MMCN '02), January, 2002.
211. The Impact of DHT Routing Geometry on Resilience and Proximity
Gummadi, K. P. and Gummadi, R. and Gribble, S. D. and Ratnasamy, S. and Shenker, S. and Stoica, I.
SIGCOMM 2003, Karlsruhe, Germany, August, 2003.

Gummadi, Ramakrishna

212. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Gummadi, K. P.

213. The Impact of DHT Routing Geometry on Resilience and Proximity
Gummadi, K. P. and Gummadi, R. and Gribble, S. D. and Ratnasamy, S. and Shenker, S. and Stoica, I.
SIGCOMM 2003, Karlsruhe, Germany, August, 2003.

Gummadi, R.

214. The Impact of DHT Routing Geometry on Resilience and Proximity
Gummadi, K. P. and Gummadi, R. and Gribble, S. D. and Ratnasamy, S. and Shenker, S. and Stoica, I.
SIGCOMM 2003, Karlsruhe, Germany, August, 2003.

Gupta, A.

215. Steiner points in tree metrics don't (really) help
A. Gupta
Symposium of Discrete Algorithms, January, 2001.

Guttman, Erik

216. The Service Location Protocol
Erik Guttman
IEEE Internet Computing, July, 1999.

Guttman, E.

217. WASRV Architectural Principles
Rosenberg, J. and Schulzrinne, H. and Guttman, E. and Moats, R.
Technical Report
Internet Draft, Internet Engineering Task Force, February, 1998.
Abstract: This document defines the problem of wide area service location, describing its key attributes, and giving examples of location prob- lems which do or do not fall under its definition. It also touches on a number of related protocols, and looks at how they fit, or do not fit, the problem of wide area service location.

Note: Work in progress

Hailes, Stephen

218. A Distributed Trust Model
Alfarez Abdul-Rahman and Stephen Hailes
Proceedings of the New Security Paradigms Workshop (NSPW-97), 48--60, ACM, sep 23--26, 1997.
219. Supporting Trust in Virtual Communities
Alfarez Abdul-Rahman and Stephen Hailes
Proceedings Hawaii International Conference on System Sciences 33, 2000.

Handley, M.

220. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
221. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Handley, Mark

222. A Scalable Content Addressable Network
Sylvia Ratnasamy and Paul Francis and Mark Handley and Richard Karp and Scott Shenker
In Proceedings of the ACM SIGCOMM 2001 Technical Conference, 2001.

Handley, M.

223. Application-level Multicast using Content-Addressable Networks
Ratnasamy, S. and Handley, M. and Karp, R. and Shenker, S.
Proceedings of 3rd International Workshop on Networked Group Communications, November, 2001.
224. A Scalable Content-Addressable Network
Ratnasamy, S. and Francis, P. and Handley, M. and Karp, R. and Shenker, S.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.

Harney, H.

225. Group Key Management Protocol (GKMP) Architecture
Harney, H. and Muckenhirn, C.
Technical Report
Request for Comments (Experimental), 2094, Internet Engineering Task Force, July, 1997.
Abstract: This document describes an architecture for the management of cryptographic keys for multicast communications. We identify the roles and responsibilities of communications system elements in accomplishing multicast key management, define security and functional requirements of each, and provide a detailed introduction to the Group Key Management Protocol (GKMP) which provides the ability to create and distribute keys within arbitrary-sized groups without the intervention of a global/centralized key manager.
226. Group Key Management Protocol (GKMP) Architecture
Harney, H. and Muckenhirn, C.
Technical Report
Request for Comments (Experimental), 2094, Internet Engineering Task Force, July, 1997.
Abstract: This document describes an architecture for the management of cryptographic keys for multicast communications. We identify the roles and responsibilities of communications system elements in accomplishing multicast key management, define security and functional requirements of each, and provide a detailed introduction to the Group Key Management Protocol (GKMP) which provides the ability to create and distribute keys within arbitrary-sized groups without the intervention of a global/centralized key manager.

Harvey, N. J. A.

227. Skipnet: A Scalable Overlay Network with Practical Locality Properties
Harvey, N. J. A. and Jones, M. B. and Saroiu, S. and Theimer, M. and Wolman, A.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Hauck, Franz J.

228. Algorithmic design of the Globe wide-area location service
Maarten van Steen and Franz J. Hauck and Gerco Ballintijn and Andrew S. Tanenbaum
The Computer Journal, 41(5):297--310, 1998.

Hellerstein, Joseph M.

229. Scalable, distributed data structures for internet service construction.
Steven D. Gribble and Eric A. Brewer and Joseph M. Hellerstein and David Culler
In Symposium on Operating Systems Design and Implementation, 2000.
230. Range Queries over DHTs
Sylvia Ratnasamy and Joseph M. Hellerstein and Scott Shenker
Technical Report
IRB-TR-03-009, Intel Research, June, 2003.

Helmy, A.

231. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
232. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Hj'almt'ysson, G'isli

233. Control on Demand: An efficient approach to router programmability.
G'isli Hj'almt'ysson and Samrat Bhattacharjee
IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Service Enabling Platforms for Networked Multimedia Systems, August, 1999.
Note: Guest Editors--D. Hutchison, G. Pacifici, B. Plattner, R. Stadler and J. Sventek.
234. Control on Demand
G'isli Hj'almt'ysson and Samrat Bhattacharjee
Proceedings of the First International Working Conference on Active Networks (IWAN), June, 1999.

Hodes, Todd

235. An Architecture for a Secure Service Discovery Service
Steven Czerwinski and Ben Y. Zhao and Todd Hodes and Anthony D. Joseph and Randy Katz
Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom-99, 24--35, ACM Press, aug 15--20, 1999.

Hoffman, E.

236. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Homburg, Philip

237. Globe: A Wide-Area Distributed System
Maarten van Steen and Philip Homburg and Andrew S. Tanenbaum
IEEE Concurrency, 7(1):70--78, jan-mar, 1999.

Horne, B.

238. Escrow Services and Incentives in Peer-to-Peer Networks
B. Horne and B. Pinkas and T. Sander
Proceedings of the 3rd ACM conference on Electronic Commerce, October, 2001.

Hotz, S.

239. Routing Information Organization To Support Scalable Interdomain Routing with Heterogeneous Path Requirements
S. Hotz
Ph.D. Thesis
University of Southern California, 1996.

Howes, T.

240. X.500 Lightweight Directory Access Protocol
W. Yeong and T. Howes and S. Kille
Network Working Group RFC 1487, ISODE Consortium, 1993.

Hu, Y. C.

241. Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2002-82, Microsoft Research, 2002.
242. Proximity Neighbor Selection in Tree-Based Structured Peer-to-Peer Overlays
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2003-52, Microsoft Research, 2003.

Huang, Ling

243. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Huberman, B.

244. Free riding on gnutella.
E. Adar and B. Huberman
First Monday, 5(10)2000.
Note: http://www.firstmonday.dk/issues/issue5-10/adar/.

Hurley, Paul

245. Dynamic Replica Management in Distributed Hash Tables
Marcel Waldvogel and Paul Hurley and Daniel Bauer
Technical Report
Research Report, RZ--3502, IBM, July, 2003.
Abstract: Interest in distributed storage is fueled by demand for reliability and resilience combined with decreasing hardware costs. Peer-to-peer storage networks based on distributed hash tables are an attractive solution due to their efficient use of resources and resulting performance. The placement and subsequent efficient location of replicas in such systems remain open problems, especially the requirement to update replicated content, working in the absence of global information, and how to determine the locations in a dynamic system without introducing single points of failure. We present and evaluate a novel and versatile technique, replica enumeration, which allows for controlled replication and replica access. The possibility of enumerating and addressing individual replicas allows dynamic updates as well as superior performance without burdening the network with state information, yet taking advantage of locality information when available. We simulate, analyze, and prove properties of the system, and discuss some applications.

Iamnitchi, A.

246. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Ripeanu, M. and Foster, I. and Iamnitchi, A.
IEEE Internet Computing, 6(1)2002.

Itkis, Gene

247. Multicast Security: A Taxonomy and Efficient Constructions
Canetti, Ran and Garay, Juan and Itkis, Gene and Micciancio, Daniele and Naor, Moni and Pinkas, Benny
Proceedings of INFOCOM, March, 1999.
Abstract: Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide founded security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only very partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out the relevant security concerns. Next we identify two major security problems of multicast communication: individual authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a `midpoint' between traditional Message Authentication Codes and digital signatures. We also present an improved and very efficient solution to another prevailing problem for multicast protocols, namely the key revocation problem.

Jacobson, V.

248. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
249. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Jacobson, V.

250. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.
251. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.

Jamin, S.

252. On the Placement of Internet Instrumentation
Jamin, S. and Jin, C. and Jin, Y. and Raz, D. and Shavitt, Y. and Zhang, L.
Proceedings of Infocom'00, March, 2000.

Janakiraman, Ramaprabhu

253. Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention
Ramaprabhu Janakiraman and Marcel Waldvogel and Qi Zhang
Proceedings of IEEE WETICE 2003, June, 2003.
Abstract: While the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed. We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way.

Jannotti, J.

254. Overcast: Reliable Multicasting with an Overlay Network
J. Jannotti and D. Gifford and K. Johnson and M. Kaashoek and J. O'Toole
Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000.

Jin, C.

255. On the Placement of Internet Instrumentation
Jamin, S. and Jin, C. and Jin, Y. and Raz, D. and Shavitt, Y. and Zhang, L.
Proceedings of Infocom'00, March, 2000.

Jin, Y.

256. On the Placement of Internet Instrumentation
Jamin, S. and Jin, C. and Jin, Y. and Raz, D. and Shavitt, Y. and Zhang, L.
Proceedings of Infocom'00, March, 2000.

Johnson, K.

257. Overcast: Reliable Multicasting with an Overlay Network
J. Jannotti and D. Gifford and K. Johnson and M. Kaashoek and J. O'Toole
Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000.

Jones, M. B.

258. Skipnet: A Scalable Overlay Network with Practical Locality Properties
Harvey, N. J. A. and Jones, M. B. and Saroiu, S. and Theimer, M. and Wolman, A.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Josang, Audun

259. The Right Type of Trust for Distributed Systems
Audun Josang
Proceedings on the Workshop on New Security Paradigms, 119--131, ACM Press, sep 17--20, 1997.

Joseph, A. D.

260. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination
S. Q. Zhuang and B. Y. Zhao and A. D. Joseph and R. Katz and J. Kubiatowicz
Eleventh International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2001), 2001.

Joseph, Anthony D.

261. An Architecture for a Secure Service Discovery Service
Steven Czerwinski and Ben Y. Zhao and Todd Hodes and Anthony D. Joseph and Randy Katz
Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom-99, 24--35, ACM Press, aug 15--20, 1999.
262. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Joseph, A. D.

263. Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing
Zhao, B. Y. and Kubiatowicz, J. D. and Joseph, A. D.
Technical Report
UCB/CSD-01-1141, UC Berkeley, April, 2001.

Juels, A.

264. Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks
A. Juels and J. Brainard
Proceedings of NDSS '99 (Networks and Distributed Security Systems), 1999.

Kaashoek, M.

265. Overcast: Reliable Multicasting with an Overlay Network
J. Jannotti and D. Gifford and K. Johnson and M. Kaashoek and J. O'Toole
Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000.
266. Wide-area cooperative storage with CFS
Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October, 2001.

Kaashoek, M. Frans

267. Wide-area cooperative storage with CFS
Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October, 2001.

Kaashoek, M. F.

268. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
Stoica, I. and Morris, R. and Karger, D. and Kaashoek, M. F. and Balakrishnan, H.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.
269. Koorde: A Simple Degree-Optimal Distributed Hash Table
Kaashoek, M. F. and Karger, D. R.
Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), Lecture Notes in Computer Science 2735, 98-107, Springer Verlag, 2003.
270. Comparing the Performance of Distributed Hash Tables Under Churn
Li, J. and Stribling, J. and Gil, T. M. and Morris, R. and Kaashoek, M. F.
3rd International Workshop on Peer-to-Peer Systems (IPTPS '04), San Diego, CA, USA, February, 2004.
271. Sybil-Resistant DHT Routing
Danezis, G. and Lesniewski-Laas, C. and Kaashoek, M. F. and Anderson, R.
10th European Symposium on Research in Computer Security (ESORICS 2005), Milan, Italy, September, 2005.

Kandlur, D.

272. Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques
Chang, I. and Engel, R. and Kandlur, D. and Pendarakis, D. and Saha, D.
Proceedings of Infocom, March, 1999.
Abstract: The Internet today provides no support for privacy or authentication of multicast data distribution. However, an increasing number of applications will require secure multicast services in order to restrict group membership and enforce accountability of group members. A major problem associated with the deployment of secure multicast delivery services is the scalability of the key distribution protocol. This is particularly true with regard to the handling of group membership changes, such as member departures and/or expulsions, which necessitate the distribution of a new session key to all the remaining group members. In this paper, we present a new multicast key management scheme which uses a set of auxiliary keys in order to improve scalability. In contrast to previous schemes which generate a fixed hierarchy of keys, we dynamically generate the most suitable key hierarchy by composing different keys. However, our work goes one step further by focusing on the problem of cumulative member removal. Using Boolean function minimization techniques, our scheme outperforms all other schemes known to us in terms of message complexity in removing multiple group members. The efficiency of our scheme in aggregating key updates, due to multiple member departures, offers the potential of a significant performance advantage. The proposed scheme has been used within a toolkit for secure Internet multicast services that we have developed.

Kannan, Karthik

273. On the economics of peer-to-peer content distribution systems for large-volume contents
Koo, Simon G. M. and Kannan, Karthik and Lee, C. S. George and Kwong, Sze-Wan
Proceedings of the 8th World Conference on Systemics, Cybernetics and Informatics (SCI 2004), 422--424, July, 2004.
274. A genetic-algorithm-based neighbor-selection strategy for hybrid peer-to-peer networks
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 13th IEEE International Conference on Computer Communications and Networks (ICCCN'04), 469--474, October, 2004.
275. An incentive-compatible capacity assignment algorithm for bulk data distribution using P2P
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 24th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2005), 127, July, 2005.
276. A resource-trading mechanism for efficient distribution of large-volume contents on peer-to-peer networks
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 14th IEEE International Conference on Computer Communications and Networks (ICCCN'05), 428--433, October, 2005.

Kar, Koushik

277. Construction of an Efficient Overlay Multicast Infrastructure for Real-time Applications
Suman Banerjee and Christopher Kommareddy and Koushik Kar and Bobby Bhattacharjee and Samir Khuller
Proceedings of INFOCOM, 2003.

Karger, David

278. Wide-area cooperative storage with CFS
Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October, 2001.

Karger, D.

279. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
Stoica, I. and Morris, R. and Karger, D. and Kaashoek, M. F. and Balakrishnan, H.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.
280. Observations on the Dynamic Evolution of Peer-to-Peer Networks
Liben-Nowell, D. and Balakrishnan, H. and Karger, D.
1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March, 2002.
281. Koorde: A Simple Degree-Optimal Distributed Hash Table
Kaashoek, M. F. and Karger, D. R.
Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), Lecture Notes in Computer Science 2735, 98-107, Springer Verlag, 2003.

Karger, D. R.

282. Koorde: A Simple Degree-Optimal Distributed Hash Table
Kaashoek, M. F. and Karger, D. R.
Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), Lecture Notes in Computer Science 2735, 98-107, Springer Verlag, 2003.

Karp, Richard

283. A Scalable Content Addressable Network
Sylvia Ratnasamy and Paul Francis and Mark Handley and Richard Karp and Scott Shenker
In Proceedings of the ACM SIGCOMM 2001 Technical Conference, 2001.

Karp, R.

284. Application-level Multicast using Content-Addressable Networks
Ratnasamy, S. and Handley, M. and Karp, R. and Shenker, S.
Proceedings of 3rd International Workshop on Networked Group Communications, November, 2001.
285. A Scalable Content-Addressable Network
Ratnasamy, S. and Francis, P. and Handley, M. and Karp, R. and Shenker, S.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.

Kasera, S.

286. Scalable Reliable Multicast Using Multiple Multicast Channels
Kasera, S. and Towsley, D. and Kurose, J.
Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics '97), June, 1997.
287. Scalable Reliable Multicast Using Multiple Multicast Channels
Kasera, S. and Towsley, D. and Kurose, J.
Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics '97), June, 1997.
288. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast
Kasera, S. and Kurose, J. and Towsley, D.
Proceedings of Infocom, April, 1998.
289. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast
Kasera, S. and Kurose, J. and Towsley, D.
Proceedings of Infocom, April, 1998.

Katabi, D.

290. A Framework for Global IP-Anycast (GIA)
Katabi, D. and Wroclawski, J.
Technical Report
Internet Draft, Internet Engineering Task Force, June, 1999.
Abstract: This document describes GIA, an architecture for a scalable Global IP-Anycast service. In contrast to previous approaches, which route IP-anycast through the unicast routing system, GIA provides IP-anycast with its own routing protocol. To scale, GIA pushes the overhead of anycast routing to the edge of the network and off-load the middle routers of the burden of storing anycast routes.

Note: Work in progress
291. A Framework for Global IP-Anycast (GIA)
Katabi, D. and Wroclawski, J.
Proceedings of SIGCOMM, 2000.

Katz, J.

292. Authenticated Multi-Party Key Agreement in Constant Rounds
J. Katz and M. Yung
Submitted to Eurocrypt 2003.

Katz, Jonathan

293. A Forward-Secure Public-Key Encryption Scheme
Jonathan Katz
2002.
294. Trust-Preserving Set Operations
Ruggero Morselli and Samrat Bhattacharjee and Jonathan Katz and Pete Keleher
The 23rd Conference of the IEEE Communications Society (Infocom), March, 2004.

Katz, R.

295. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination
S. Q. Zhuang and B. Y. Zhao and A. D. Joseph and R. Katz and J. Kubiatowicz
Eleventh International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2001), 2001.

Katz, Randy

296. An Architecture for a Secure Service Discovery Service
Steven Czerwinski and Ben Y. Zhao and Todd Hodes and Anthony D. Joseph and Randy Katz
Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom-99, 24--35, ACM Press, aug 15--20, 1999.

Katz, R.

297. An Evaluation of Preference Clustering in Large-scale Multicast Applications
Wong, T. and Katz, R. and McCanne, S.
Proceedings of INFOCOM, March, 2000.
298. An Evaluation of Preference Clustering in Large-scale Multicast Applications
Wong, T. and Katz, R. and McCanne, S.
Proceedings of INFOCOM, March, 2000.

Katz, Randy H.

299. A Network Measurement Architecture for Adaptive Applications
Stemm, Mark and Seshan, Srinivasan and Katz, Randy H.
Proceedings of INFOCOM, March, 2000.

Keleher, Pete

300. Design of the TerraDir Distributed Directory
Bobby Bhattacharjee and Pete Keleher and Bujor Silaghi
Technical Report
CS-TR-4163, University of Maryland at College Park, 2001.
301. Routing in the TerraDir Directory Service
Bujor Silaghi and Bobby Bhattacharjee and Pete Keleher
Proceedings of SPIE ITCOM, 2002.
302. Are Virtualized Overlay Networks Too Much of a Good Thing?
Pete Keleher and Samrat Bhattacharjee and Bujor Silaghi
The 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002.
303. Efficient Peer-To-Peer Searches Using Result-Caching
Bobby Bhattacharjee and Sudarshan Chawathe and Vijay Gopalakrishnan and Pete Keleher and Bujor Silaghi
The 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03), February, 2003.
304. Hierarchical Routing with Soft-State Replicas in TerraDir
Bujor Silaghi and Vijay Gopalakrishnan and Bobby Bhattacharjee and Pete Keleher
The 18th International Parallel and Distributed Processing Symposium, April, 2004.
305. Adaptive Replication in Peer-to-Peer Systems
Vijay Gopalakrishnan and Bujor Silaghi and Bobby Bhattacharjee and Pete Keleher
The 24th International Conference on Distributed Computing Systems, March, 2004.
306. Trust-Preserving Set Operations
Ruggero Morselli and Samrat Bhattacharjee and Jonathan Katz and Pete Keleher
The 23rd Conference of the IEEE Communications Society (Infocom), March, 2004.

Khuller, Samir

307. Construction of an Efficient Overlay Multicast Infrastructure for Real-time Applications
Suman Banerjee and Christopher Kommareddy and Koushik Kar and Bobby Bhattacharjee and Samir Khuller
Proceedings of INFOCOM, 2003.

Kille, S.

308. X.500 Lightweight Directory Access Protocol
W. Yeong and T. Howes and S. Kille
Network Working Group RFC 1487, ISODE Consortium, 1993.

King, V.

309. Choosing a Random Peer
King, V. and Saia, J.
Proceedings of the 23rd Annual ACM Symposium on Principles of Distributed Computing, 125-130, July, 2004.

Komareddy, Christopher

310. Finding Close Friends over the Internet
Narendar Shankar and Christopher Komareddy and Bobby Bhattacharjee
Proceedings of International Conference on Network Protocols, November, 2001.

Kommareddy, Christopher

311. Construction of an Efficient Overlay Multicast Infrastructure for Real-time Applications
Suman Banerjee and Christopher Kommareddy and Koushik Kar and Bobby Bhattacharjee and Samir Khuller
Proceedings of INFOCOM, 2003.

Kommareddy, C.

312. Finding Close Friends on the Internet
Kommareddy, C. and Shankar, N. and Bhattacharjee, B.
Proceedings of ICNP, November, 2001.
313. Scalable Peer Finding on the Internet
Banerjee, S. and Kommareddy, C. and Bhattacharjee, B.
Proceedings of Global Internet Symposium, Globecom, November, 2002.

Kommreddy, Christopher

314. Scalable Application Layer Multicast
Suman Banerjee and Bobby Bhattacharjee and Christopher Kommreddy
Proceedings of ACM SIGCOMM, 2002.

Koo, Simon G. M.

315. Analysis of Parallel Downloading for Large File Distribution
Koo, Simon G. M. and Rosenberg, Catherine and Xu, Dongyan
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 128--135, May, 2003.
316. On the economics of peer-to-peer content distribution systems for large-volume contents
Koo, Simon G. M. and Kannan, Karthik and Lee, C. S. George and Kwong, Sze-Wan
Proceedings of the 8th World Conference on Systemics, Cybernetics and Informatics (SCI 2004), 422--424, July, 2004.
317. A genetic-algorithm-based neighbor-selection strategy for hybrid peer-to-peer networks
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 13th IEEE International Conference on Computer Communications and Networks (ICCCN'04), 469--474, October, 2004.
318. An incentive-compatible capacity assignment algorithm for bulk data distribution using P2P
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 24th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2005), 127, July, 2005.
319. A resource-trading mechanism for efficient distribution of large-volume contents on peer-to-peer networks
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 14th IEEE International Conference on Computer Communications and Networks (ICCCN'05), 428--433, October, 2005.
320. Bulk content distribution using peer-to-peer overlay: design and analysis
Koo, Simon G. M.
Ph.D. Thesis
School or Electrical and Computer Engineering, Purdue University, August, 2005.

Kostic, Dejan

321. OPUS: An Overlay Utility Service
Rebecca Braynard and Dejan Kostic and Adolfo Rodriguez and Jeff Chase and Amin Vahdat
Poster at 18th ACM Symposium on Operating System Principles, October, 2001.

Kubiatowicz, J.

322. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination
S. Q. Zhuang and B. Y. Zhao and A. D. Joseph and R. Katz and J. Kubiatowicz
Eleventh International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2001), 2001.

Kubiatowicz, John

323. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.
324. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Kubiatowicz, John D.

325. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Kubiatowicz, J. D.

326. Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing
Zhao, B. Y. and Kubiatowicz, J. D. and Joseph, A. D.
Technical Report
UCB/CSD-01-1141, UC Berkeley, April, 2001.

Kumar, R.

327. Pollution in P2P File Sharing Systems
Liang, J. and Kumar, R. and Xi, Y. and Ross, K.
IEEE Infocom, Miami, FL, USA, March, 2005.

Kurose, Jim

328. Real-Time Reliable Multicast Using Proactive Forward Error Correction
Dan Rubenstein and Jim Kurose and Don Towsley
Proceedings of NOSSDAV, 279--293, U. Mass, Amherst, July, 1998.
Abstract: Real-Time reliable multicast over a best-effort service network remains a challenging research problem. Most protocols for reliable multicast use repair techniques that result in significant and variable delay, which can lead to missed deadlines in real-time scenarios. In this paper we present a repair technique that combines forward error correction (FEC) with automatic repeat request (ARQ). The novel aspect of the technique is its ability to reduce delay in reliable multicast delivery by sending repairs proactively (i.e., before they are required). The technique requires minimal state at senders and receivers, and no additional active router functionality beyond what is required by the current multicast service model. Furthermore, the technique uses only end-to-end mechanisms, where all data and repairs are transmitted by the data-originating source, leaving receivers free from any burden of sending repairs. We simulate a simple round-based version of a protocol embodying this technique to show its effectiveness in preventing repair request implosion, reducing the expected time of reliable delivery of data, and keeping bandwidth usage for repairs low. We show how a protocol using the technique can be adapted to provide delivery that is reliable before a real-time deadline with probability extremely close to one. Finally, we develop several variations of the protocol that use the technique in various fashions for high rate data streaming applications, and present results from additional simulations that examine performance in a variety of Internet-like heterogeneous networks.
329. Detecting Shared Congestion of Flows Via End-to-end Measurement
Dan Rubenstein and Jim Kurose and Don Towsley
Proceedings of Sigmetrics, June, 2000.
Abstract: Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flows can improve performance for a variety of applications, ranging from aggregated TCP transmissions to multiple-sender multicast applications. However, in order for this cooperation to be effective, one must first identify the flows that are congested at the same set of resources. In this paper, we present techniques based on loss or delay observations at end-hosts to infer whether or not two flows experiencing congestion are congested at the same network resources. We validate these techniques via queueing analysis, simulation, and experimentation within the Internet.

Kurose, J.

330. Scalable Reliable Multicast Using Multiple Multicast Channels
Kasera, S. and Towsley, D. and Kurose, J.
Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics '97), June, 1997.
331. Scalable Reliable Multicast Using Multiple Multicast Channels
Kasera, S. and Towsley, D. and Kurose, J.
Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics '97), June, 1997.
332. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast
Kasera, S. and Kurose, J. and Towsley, D.
Proceedings of Infocom, April, 1998.
333. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast
Kasera, S. and Kurose, J. and Towsley, D.
Proceedings of Infocom, April, 1998.

Kwong, Sze-Wan

334. On the economics of peer-to-peer content distribution systems for large-volume contents
Koo, Simon G. M. and Kannan, Karthik and Lee, C. S. George and Kwong, Sze-Wan
Proceedings of the 8th World Conference on Systemics, Cybernetics and Informatics (SCI 2004), 422--424, July, 2004.

Labonte, Kevin

335. Availability and Locality Measurements of Peer-to-Peer File Systems
Jacky Chu and Kevin Labonte and Brian Neil Levine
Proc. ITCom: Scalability and Traffic Control in IP Networks, july, 2002.

Lam, S.

336. Secure Group Communications Using Key Graphs
Wong, C.K. and Gouda, M. and Lam, S.
Proceedings of SIGCOMM, 28(4):68--79, September, 1998.
Abstract: Many emerging applications (e.g. teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work ) are based upon a group communications model, i.e., they require packet delivery from one or more authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue. In this paper, we present a novel solution to the scalability problem of group/multicast key management. We formalize the notion of a secure group as a triple (U, K, R) where U denotes a set of users, K a set of keys held by the users ,and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely distributing rekey messages after a join/leave, and specify protocols for joining and leaving a secure group. The rekeying strategies and join/leave protocols are implemented in a prototype group key server we have built. We present measurement results from experiments and discuss performance comparisons. We show that our group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves. In particular, the average measured processing time per join/leave increases linearly with the logarithm of group size.
337. Batch Updates for Key Trees
Li, X. and Yang, R. and Gouda, M. and Lam, S.
Technical Report
University of Texas, Austin, September, 2000.

Lam, Simon

338. Reliable Group Re-keying: A Performance Analysis
Yang, Richard Y. and Li, Steve and Zhang, Brian and Lam, Simon
Proceedings of SIGCOMM, August, 2001.

Lanham, Nick

339. Making gnutella-like P2P systems scalable
Yatin Chawathe and Sylvia Ratnasamy and Lee Breslau and Nick Lanham and Scott Shenker
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 407--418, ACM Press, 2003.

Lanham, N.

340. Making Gnutella-like P2P Systems Scalable
Chawathe, Y. and Ratnasamy, S. and Breslau, L. and Lanham, N. and Shenker, S.
Proceedings of SIGCOMM, August, 2003.

Lassila, O.

341. Resource Description Framework (RDF) Model and Syntax Specification
O. Lassila and R. Swick
W3C Proposed Recommendation, January, 1999.
Note: Available at http://www.w3.org/TR/PR-rdf-syntax.

Ledlie, J.

342. Self-Organization in Peer-to-Peer Systems
Ledlie, J. and Taylor, J. and Serban, L. and Seltzer, M.
10th ACM SIGOPS European Workshop, Saint-Emilion, France, September, 2002.

Lee, Seungjoon

343. Cooperative peer groups in NICE
Seungjoon Lee and Rob Sherwood and Bobby Bhattacharjee
Proceedings of INFOCOM, 2003.
344. Resilient Multicast using Overlays
Suman Banerjee and Seungjoon Lee and Bobby Bhattacharjee and Aravind Srinivasan
Proceedings of ACM SIGMETRICS, 2003.

Lee, C. S. George

345. On the economics of peer-to-peer content distribution systems for large-volume contents
Koo, Simon G. M. and Kannan, Karthik and Lee, C. S. George and Kwong, Sze-Wan
Proceedings of the 8th World Conference on Systemics, Cybernetics and Informatics (SCI 2004), 422--424, July, 2004.
346. A genetic-algorithm-based neighbor-selection strategy for hybrid peer-to-peer networks
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 13th IEEE International Conference on Computer Communications and Networks (ICCCN'04), 469--474, October, 2004.
347. An incentive-compatible capacity assignment algorithm for bulk data distribution using P2P
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 24th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2005), 127, July, 2005.
348. A resource-trading mechanism for efficient distribution of large-volume contents on peer-to-peer networks
Koo, Simon G. M. and Lee, C. S. George and Kannan, Karthik
Proceedings of the 14th IEEE International Conference on Computer Communications and Networks (ICCCN'05), 428--433, October, 2005.

Lesniewski-Laas, C.

349. Sybil-Resistant DHT Routing
Danezis, G. and Lesniewski-Laas, C. and Kaashoek, M. F. and Anderson, R.
10th European Symposium on Research in Computer Security (ESORICS 2005), Milan, Italy, September, 2005.

Levien, Raph

350. Advogato's Trust Metric
Raph Levien

Note: Available on-line at http://www.advogato.org/trust-metric.html.

Levine, Brian Neil

351. Availability and Locality Measurements of Peer-to-Peer File Systems
Jacky Chu and Kevin Labonte and Brian Neil Levine
Proc. ITCom: Scalability and Traffic Control in IP Networks, july, 2002.

Levine, B.N.

352. Improving Internet Multicast with Routing Labels
Levine, B.N. and Garcia-Luna-Aceves, J.J.
Proc. IEEE International Conference on Network Protocols, 241--50, October, 1997.
353. Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
Levine, B.N. and Paul, S. and Garcia-Luna-Aceves, J.J.
Proc. Sixth ACM International Multimedia Conference (ACM Multimedia 98), September, 1998.
354. Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
Levine, B.N. and Paul, S. and Garcia-Luna-Aceves, J.J.
Proc. Sixth ACM International Multimedia Conference (ACM Multimedia 98), September, 1998.

Li, J.

355. Comparing the Performance of Distributed Hash Tables Under Churn
Li, J. and Stribling, J. and Gil, T. M. and Morris, R. and Kaashoek, M. F.
3rd International Workshop on Peer-to-Peer Systems (IPTPS '04), San Diego, CA, USA, February, 2004.

Li, K.

356. Search and Replication in Unstructured Peer-to-Peer Networks
Lv, Q. and Cao, P. and Cohen, E. and Li, K. and Shenker, S.
16th International Conference on Supercomputing, New York, NY, USA, June, 2002.

Li, Steve

357. Reliable Group Re-keying: A Performance Analysis
Yang, Richard Y. and Li, Steve and Zhang, Brian and Lam, Simon
Proceedings of SIGCOMM, August, 2001.

Li, X.

358. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.
359. On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution
Cheung, S.Y. and Ammar, M.H. and Li, X.
Proceedings of Infocom, March, 1996.
Abstract: We address the problem of fairness in a feedback-controlled multicast video distribution scheme. In a fair scheme each receiver should receive a video stream with a quality that is commensurate with its capabilities or the capabilities of the path leading to it, regardless of other receivers or network paths. This fairness problem results from the fact that multicast communication trades economy of bandwidth with granularity of control. Distributing video using individual feedback-controlled point-to-point streams results in high bandwidth utilization but the granularity of control is high as communication parameters can be negotiated individually with each receiver. In contrast, using a single multicast stream has good bandwidth economy, but very low granularity of control. In this paper we propose, implement and experiment with a system that spans the spectrum represented by the two extremes above. In the scheme, Californialled destination set grouping (DSG), a source maintains a small number of video streams, carrying the same video but each targeted at receivers with different capabilities. Each stream is feedback-controlled within prescribed limits by its group of receivers. Receivers may move among streams as their capabilities or the capabilities of the network paths leading to them change. The scheme is shown to improve fairness significantly at a small bandwidth cost.
360. Layered Video Multicast with Retransmissions (LVMR): Evaluation of Hierarchical Rate Control
Li, X. and Paul, S. and Ammar, M.
Proceedings of INFOCOM, March/April, 1998.
Abstract: Layered Video Multicast with Retransmissions (LVMR) is a system for distributing video using layered coding over the Internet, The two key contributions of the system are: (1) improving the quality of reception within each layer by retransmitting lost packets given an upper bound on recovery time and applying an adaptive playback point scheme to help achieve more successful retransmission, and (2) adapting to network congestion and heterogeneity using hierarchical rate control mechanism. This paper concentrates on the rate control aspects of LVMR. In contrast to the existing sender-based and receiver-based rate control in which the entire information about network congestion is either available at the sender (in sender-based approach) or replicated at the receivers (in receiver-based approach), the hierarchical rate control mechanism distributes the information between the sender, receivers, and some agents in the network in such a way that each entity maintains only the information relevant to itself. In addition to that, the hierarchical approach enables intelligent decisions to be made in terms of conducting concurrent experiments and choosing one of several possible experiments at any instant of time based on minimal state information at the agents in the network. Protocol details are presented in the paper together with experimental and simulation results to back our claims.
361. Batch Updates for Key Trees
Li, X. and Yang, R. and Gouda, M. and Lam, S.
Technical Report
University of Texas, Austin, September, 2000.

Liang, J.

362. Pollution in P2P File Sharing Systems
Liang, J. and Kumar, R. and Xi, Y. and Ross, K.
IEEE Infocom, Miami, FL, USA, March, 2005.

Liben-Nowell, D.

363. Observations on the Dynamic Evolution of Peer-to-Peer Networks
Liben-Nowell, D. and Balakrishnan, H. and Karger, D.
1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March, 2002.

Liebeherr, J.

364. HyperCast: A Protocol for Maintaining Multicast Group Members in a Logical Hypercube Topology
Liebeherr, J. and Beam, T.K.
Proceedings of 1st International Workshop on Networked Group Communications, July, 1999.

Lilley, Jeremy

365. The design and implementation of an intentional naming system
William Adjie-Winoto and Elliot Schwartz and Hari Balakrishnan and Jeremy Lilley
Symposium on Operating Systems Principles, 186-201, 1999.

Lin, C.R.

366. Adaptive Clustering for Mobile, Wireless Networks
Lin, C.R. and Gerla, M.
Journal on Selected Areas of Communication, 15(7)September, 1997.

Lin, J.C.

367. RMTP: a reliable multicast transport protocol
Lin, J.C. and Paul, S.
Proceedings of INFOCOM, March, 1996.
Abstract: This paper describes the design and implementation of a reliable multicast transport protocol called RMTP. RMTP provides sequenced, lossless delivery of bulk data from one sender to a group of receivers. It allows a receiver to join or leave a group without notifying the sender or other receivers. Protocol state maintained at each multicast participant is independent of the number of participants. The sender knows neither the identity of each receiver nor the number of receivers in the multicast group. RMTP is based on a multi-level hierarchical approach, in which the receivers are grouped into a hierarchy of local regions, with a Designated Receiver (DR) in each local region. Receivers in each local region periodically send acknowledgments (ACKs) to their corresponding DR, DRs send ACKs to the higher-level DRs, until the DRs in the highest level send ACKs to the sender, thereby avoiding the ACK-implosion problem. DRs cache received data and respond to retransmission requests of the receivers in their corresponding local regions, thereby decreasing end-to-end latency. RMTP uses a packet-based selective repeat retransmission scheme for higher throughput. This paper also provides the measurements of RMTP's performance with receivers located at various sites in the Internet.
368. RMTP: a reliable multicast transport protocol
Lin, J.C. and Paul, S.
Proceedings of INFOCOM, March, 1996.
Abstract: This paper describes the design and implementation of a reliable multicast transport protocol called RMTP. RMTP provides sequenced, lossless delivery of bulk data from one sender to a group of receivers. It allows a receiver to join or leave a group without notifying the sender or other receivers. Protocol state maintained at each multicast participant is independent of the number of participants. The sender knows neither the identity of each receiver nor the number of receivers in the multicast group. RMTP is based on a multi-level hierarchical approach, in which the receivers are grouped into a hierarchy of local regions, with a Designated Receiver (DR) in each local region. Receivers in each local region periodically send acknowledgments (ACKs) to their corresponding DR, DRs send ACKs to the higher-level DRs, until the DRs in the highest level send ACKs to the sender, thereby avoiding the ACK-implosion problem. DRs cache received data and respond to retransmission requests of the receivers in their corresponding local regions, thereby decreasing end-to-end latency. RMTP uses a packet-based selective repeat retransmission scheme for higher throughput. This paper also provides the measurements of RMTP's performance with receivers located at various sites in the Internet.

Liu, C.

369. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
370. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Liu, C.-G.

371. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.
372. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.

Lv, Q.

373. Search and Replication in Unstructured Peer-to-Peer Networks
Lv, Q. and Cao, P. and Cohen, E. and Li, K. and Shenker, S.
16th International Conference on Supercomputing, New York, NY, USA, June, 2002.
374. Can Heterogeneity Make Gnutella Scalable?
Lv, Q. and Ratnasamy, S. and Shenker, S.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 94-103, Springer Verlag, 2002.

M., Frans Kaashoek,

375. Resilient Overlay Networks
Andersen, D.G. and Balakrishnan, H. and Frans Kaashoek, M. and Morris, R.
Proceedings of 18th ACM Symposium on Operating Systems Principles, October, 2001.

M., M. Sundareshan,

376. On the Decomposition of Large Communication Networks for Hierarchical Control Implementation
Muralidhar, K. and M. Sundareshan, M.
IEEE Transactions on Communications, COM-34, 10, 985--987, 1986.

Manku, G. S.

377. Symphony: Distributed Hashing in a Small World
Manku, G. S. and Bawa, M. and Raghavan, P.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Marsh, S.

378. Formalising Trust as a Computational Concept
S. Marsh
Ph.D. Thesis
University of Sterling, 1994.

Martin, R. P.

379. Collaborative Management of Global Directories in P2P Systems
Peery, C. and Cuenca-Acuna, F. M. and Martin, R. P. and Nguyen, T. D.
Technical Report
DCS-TR-510, November, 2002.

Maymounkov, P.

380. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
Maymounkov, P. and Mazieres, D.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 53-65, Springer Verlag, 2002.

Mazieres, D.

381. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
Maymounkov, P. and Mazieres, D.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 53-65, Springer Verlag, 2002.

McCanne, S.

382. RMX: Reliable Multicast for Heterogeneous Networks
Y. Chawathe and S. McCanne and E. A. Brewer
Proceedings of Infocom, 2000.

McCanne, Steven

383. The Breadcrumb Forwarding Service: A Synthesis of PGM and EXPRESS to Improve and Simplify Global IP Multicast
Koichi Yano and Steven McCanne
ACM Computer Communication Review, 30(2)2000.

McCanne, S.

384. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.
385. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.
386. An Evaluation of Preference Clustering in Large-scale Multicast Applications
Wong, T. and Katz, R. and McCanne, S.
Proceedings of INFOCOM, March, 2000.
387. An Evaluation of Preference Clustering in Large-scale Multicast Applications
Wong, T. and Katz, R. and McCanne, S.
Proceedings of INFOCOM, March, 2000.

Merugu, S.

388. Bowman: A Node OS for Active Networks
S. Merugu and S. Bhattacharjee and E. Zegura and K. Calvert
Proceedings IEEE INFOCOM'2000, 2000.
389. Exposing the network: Support for topology-sensitive applications
Y. Chae and S. Merugu and E. Zegura and S. Bhattarcharjee
Proceedings of IEEE OpenArch 2000, 2000.

Micciancio, Daniele

390. Multicast Security: A Taxonomy and Efficient Constructions
Canetti, Ran and Garay, Juan and Itkis, Gene and Micciancio, Daniele and Naor, Moni and Pinkas, Benny
Proceedings of INFOCOM, March, 1999.
Abstract: Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide founded security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only very partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out the relevant security concerns. Next we identify two major security problems of multicast communication: individual authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a `midpoint' between traditional Message Authentication Codes and digital signatures. We also present an improved and very efficient solution to another prevailing problem for multicast protocols, namely the key revocation problem.

Mickish, A.

391. The Download Mesh
Bollaert, M. and Thadani, S. and Mickish, A.

Note: Gnutella Developers' Forum, http://www.the-gdf.org/.

Miconi, T.

392. I Jumped in the GnutellaNet and What Did I See? Lessons From a Simple Gnutella Network Simulation
Miconi, T.
October, 2002.

Mittra, S.

393. Iolus: A Framework for Scalable Secure Multicasting
Mittra, S.
Proceedings of SIGCOMM, October, 1997.
Abstract: As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show, securing multicast (or group) communications is fundamentally different from securing unicast (or paired) communications. In turn, these differences can result in scalability problems for many typical applications. In this paper, we examine and model the differences between unicast and multicast security and then propose Iolus: a novel framework for scalable secure multicasting. Protocols based on Iolus can be used to achieve a variety of security objectives and may be used either to directly secure multicast communications or to provide a separate group key management service to other

Moats, R.

394. WASRV Architectural Principles
Rosenberg, J. and Schulzrinne, H. and Guttman, E. and Moats, R.
Technical Report
Internet Draft, Internet Engineering Task Force, February, 1998.
Abstract: This document defines the problem of wide area service location, describing its key attributes, and giving examples of location prob- lems which do or do not fall under its definition. It also touches on a number of related protocols, and looks at how they fit, or do not fit, the problem of wide area service location.

Note: Work in progress

Mockapetris, Paul V.

395. Development of the Domain Name System
Mockapetris, Paul V. and Dunlap, Kevin J.
Proceedings of SIGCOMM, 123--133, ACM, August, 1988.
Abstract: The Domain Name System (DNS) provides name service for the DARPA Internet. It is one of the largest name services in operation today, serves a highly diverse community of hosts, users, and networks, and uses a unique combination of hierarchies, caching, and datagram access. This paper examines the ideas behind the initial design of DNS in 1983, discusses the evolution of these ideas into the current implementations and usages, notes conspicuous surprises, successess and shortcomings, and attempts to predict its future evolution.

Note: also in Computer Communication Review 18 (4), Aug. 1988

Molnar, David

396. Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Roger Dingledine and Michael Freedman and David Molnar
Editor(s): Edited by Andy Oram, O'Reilly, March, 2001.

Morris, Robert

397. Wide-area cooperative storage with CFS
Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October, 2001.

Morris, R.

398. Resilient Overlay Networks
Andersen, D.G. and Balakrishnan, H. and Frans Kaashoek, M. and Morris, R.
Proceedings of 18th ACM Symposium on Operating Systems Principles, October, 2001.
399. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
Stoica, I. and Morris, R. and Karger, D. and Kaashoek, M. F. and Balakrishnan, H.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.
400. Security Considerations for Peer-to-Peer Distributed Hash Tables
Sit, E. and Morris, R.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 261-269, Springer Verlag, 2002.
401. Comparing the Performance of Distributed Hash Tables Under Churn
Li, J. and Stribling, J. and Gil, T. M. and Morris, R. and Kaashoek, M. F.
3rd International Workshop on Peer-to-Peer Systems (IPTPS '04), San Diego, CA, USA, February, 2004.

Morselli, Ruggero

402. Trust-Preserving Set Operations
Ruggero Morselli and Samrat Bhattacharjee and Jonathan Katz and Pete Keleher
The 23rd Conference of the IEEE Communications Society (Infocom), March, 2004.

Moy, J.

403. Open Shortest Path First (Version 2)
Moy, J.
RFC 2178, 1997.

Muckenhirn, C.

404. Group Key Management Protocol (GKMP) Architecture
Harney, H. and Muckenhirn, C.
Technical Report
Request for Comments (Experimental), 2094, Internet Engineering Task Force, July, 1997.
Abstract: This document describes an architecture for the management of cryptographic keys for multicast communications. We identify the roles and responsibilities of communications system elements in accomplishing multicast key management, define security and functional requirements of each, and provide a detailed introduction to the Group Key Management Protocol (GKMP) which provides the ability to create and distribute keys within arbitrary-sized groups without the intervention of a global/centralized key manager.
405. Group Key Management Protocol (GKMP) Architecture
Harney, H. and Muckenhirn, C.
Technical Report
Request for Comments (Experimental), 2094, Internet Engineering Task Force, July, 1997.
Abstract: This document describes an architecture for the management of cryptographic keys for multicast communications. We identify the roles and responsibilities of communications system elements in accomplishing multicast key management, define security and functional requirements of each, and provide a detailed introduction to the Group Key Management Protocol (GKMP) which provides the ability to create and distribute keys within arbitrary-sized groups without the intervention of a global/centralized key manager.

Muralidhar, K.

406. On the Decomposition of Large Communication Networks for Hierarchical Control Implementation
Muralidhar, K. and M. Sundareshan, M.
IEEE Transactions on Communications, COM-34, 10, 985--987, 1986.

Myers, A.C.

407. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.
408. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.

Naor, Moni

409. Multicast Security: A Taxonomy and Efficient Constructions
Canetti, Ran and Garay, Juan and Itkis, Gene and Micciancio, Daniele and Naor, Moni and Pinkas, Benny
Proceedings of INFOCOM, March, 1999.
Abstract: Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide founded security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only very partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out the relevant security concerns. Next we identify two major security problems of multicast communication: individual authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a `midpoint' between traditional Message Authentication Codes and digital signatures. We also present an improved and very efficient solution to another prevailing problem for multicast protocols, namely the key revocation problem.

Neuman, B. Clifford

410. Kerberos: An Authentication Service for Computer Networks
B. Clifford Neuman and Theodore Ts'o
IEEE Communications, 32(9)September, 1994.

Nguyen, T. D.

411. Collaborative Management of Global Directories in P2P Systems
Peery, C. and Cuenca-Acuna, F. M. and Martin, R. P. and Nguyen, T. D.
Technical Report
DCS-TR-510, November, 2002.

O'Toole, J.

412. Overcast: Reliable Multicasting with an Overlay Network
J. Jannotti and D. Gifford and K. Johnson and M. Kaashoek and J. O'Toole
Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000.

P., Krishna Gummadi,

413. A Measurement Study of Peer-to-Peer File Sharing Systems
Saroiu, S. and Krishna Gummadi, P. and Gribble, S. D.
Proceedings of Multimedia Computing and Networking (MMCN '02), January, 2002.

Pandurangan, G.

414. Building low-diameter peer-to-peer networks
G. Pandurangan and P. Raghavan and E. Upfal
IEEE Journal on Selected Areas in Communications, 21, 995--1002, 2003.

Paoli, J.

415. Extensible Markup Language (XML) 1.0
T. Bray and J. Paoli and C. Sperberg-McQueen
World Wide Web Consortium Recommendation. Available at http://www.w3.org/TR/REC-xml, February, 1998.

Partridge, C.

416. Distance Vector Multicast Routing Protocol
D. Waitzman and C. Partridge and S. Deering
RFC 1075, 1998.

Parulkar, C. Papadopoulos, G.

417. An error control scheme for large-scale multicast applications
C. Papadopoulos, G. Parulkar and G. Varghese
Proceedings of Infocom'98, 1998.
418. An error control scheme for large-scale multicast applications
C. Papadopoulos, G. Parulkar and G. Varghese
Proceedings of Infocom'98, 1998.

Paul, S.

419. RMTP: a reliable multicast transport protocol
Lin, J.C. and Paul, S.
Proceedings of INFOCOM, March, 1996.
Abstract: This paper describes the design and implementation of a reliable multicast transport protocol called RMTP. RMTP provides sequenced, lossless delivery of bulk data from one sender to a group of receivers. It allows a receiver to join or leave a group without notifying the sender or other receivers. Protocol state maintained at each multicast participant is independent of the number of participants. The sender knows neither the identity of each receiver nor the number of receivers in the multicast group. RMTP is based on a multi-level hierarchical approach, in which the receivers are grouped into a hierarchy of local regions, with a Designated Receiver (DR) in each local region. Receivers in each local region periodically send acknowledgments (ACKs) to their corresponding DR, DRs send ACKs to the higher-level DRs, until the DRs in the highest level send ACKs to the sender, thereby avoiding the ACK-implosion problem. DRs cache received data and respond to retransmission requests of the receivers in their corresponding local regions, thereby decreasing end-to-end latency. RMTP uses a packet-based selective repeat retransmission scheme for higher throughput. This paper also provides the measurements of RMTP's performance with receivers located at various sites in the Internet.
420. RMTP: a reliable multicast transport protocol
Lin, J.C. and Paul, S.
Proceedings of INFOCOM, March, 1996.
Abstract: This paper describes the design and implementation of a reliable multicast transport protocol called RMTP. RMTP provides sequenced, lossless delivery of bulk data from one sender to a group of receivers. It allows a receiver to join or leave a group without notifying the sender or other receivers. Protocol state maintained at each multicast participant is independent of the number of participants. The sender knows neither the identity of each receiver nor the number of receivers in the multicast group. RMTP is based on a multi-level hierarchical approach, in which the receivers are grouped into a hierarchy of local regions, with a Designated Receiver (DR) in each local region. Receivers in each local region periodically send acknowledgments (ACKs) to their corresponding DR, DRs send ACKs to the higher-level DRs, until the DRs in the highest level send ACKs to the sender, thereby avoiding the ACK-implosion problem. DRs cache received data and respond to retransmission requests of the receivers in their corresponding local regions, thereby decreasing end-to-end latency. RMTP uses a packet-based selective repeat retransmission scheme for higher throughput. This paper also provides the measurements of RMTP's performance with receivers located at various sites in the Internet.
421. Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
Levine, B.N. and Paul, S. and Garcia-Luna-Aceves, J.J.
Proc. Sixth ACM International Multimedia Conference (ACM Multimedia 98), September, 1998.
422. Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
Levine, B.N. and Paul, S. and Garcia-Luna-Aceves, J.J.
Proc. Sixth ACM International Multimedia Conference (ACM Multimedia 98), September, 1998.
423. Layered Video Multicast with Retransmissions (LVMR): Evaluation of Hierarchical Rate Control
Li, X. and Paul, S. and Ammar, M.
Proceedings of INFOCOM, March/April, 1998.
Abstract: Layered Video Multicast with Retransmissions (LVMR) is a system for distributing video using layered coding over the Internet, The two key contributions of the system are: (1) improving the quality of reception within each layer by retransmitting lost packets given an upper bound on recovery time and applying an adaptive playback point scheme to help achieve more successful retransmission, and (2) adapting to network congestion and heterogeneity using hierarchical rate control mechanism. This paper concentrates on the rate control aspects of LVMR. In contrast to the existing sender-based and receiver-based rate control in which the entire information about network congestion is either available at the sender (in sender-based approach) or replicated at the receivers (in receiver-based approach), the hierarchical rate control mechanism distributes the information between the sender, receivers, and some agents in the network in such a way that each entity maintains only the information relevant to itself. In addition to that, the hierarchical approach enables intelligent decisions to be made in terms of conducting concurrent experiments and choosing one of several possible experiments at any instant of time based on minimal state information at the agents in the network. Protocol details are presented in the paper together with experimental and simulation results to back our claims.

Peery, C.

424. Collaborative Management of Global Directories in P2P Systems
Peery, C. and Cuenca-Acuna, F. M. and Martin, R. P. and Nguyen, T. D.
Technical Report
DCS-TR-510, November, 2002.

Peinado, M.

425. The Darknet and the Future of Content Distribution
Biddle, P. and England, P. and Peinado, M. and Willman, B.
Proceedings of the 2nd ACM Workshop on Digital Rights Management, Lecture Notes in Computer Science 2696, 155-176, Springer Verlag, 2003.

Pendarakis, D.

426. ALMI: An Application Level Multicast Infrastructure
D. Pendarakis and S. Shi and D. Verma and M. Waldvogel
Proceedings of 3rd Usenix Symposium on Internet Technologies & Systems, March, 2001.

Pendarakis, D.

427. Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques
Chang, I. and Engel, R. and Kandlur, D. and Pendarakis, D. and Saha, D.
Proceedings of Infocom, March, 1999.
Abstract: The Internet today provides no support for privacy or authentication of multicast data distribution. However, an increasing number of applications will require secure multicast services in order to restrict group membership and enforce accountability of group members. A major problem associated with the deployment of secure multicast delivery services is the scalability of the key distribution protocol. This is particularly true with regard to the handling of group membership changes, such as member departures and/or expulsions, which necessitate the distribution of a new session key to all the remaining group members. In this paper, we present a new multicast key management scheme which uses a set of auxiliary keys in order to improve scalability. In contrast to previous schemes which generate a fixed hierarchy of keys, we dynamically generate the most suitable key hierarchy by composing different keys. However, our work goes one step further by focusing on the problem of cumulative member removal. Using Boolean function minimization techniques, our scheme outperforms all other schemes known to us in terms of message complexity in removing multiple group members. The efficiency of our scheme in aggregating key updates, due to multiple member departures, offers the potential of a significant performance advantage. The proposed scheme has been used within a toolkit for secure Internet multicast services that we have developed.

Pendarakis, Dimitris

428. ALMI: An Application Level Multicast Infrastructure
Pendarakis, Dimitris and Shi, Sherlia and Verma, Dinesh and Waldvogel, Marcel
3rd USNIX Symposium on Internet Technologies and Systems (USITS '01), 49--60, March, 2001.
Abstract: The IP multicast model allows scalable and efficient multi-party communication, particularly for groups of large size. However, deployment of IP multicast requires substantial infrastructure modifications and is hampered by a host of unresolved open problems. To circumvent this situation, we have designed and implemented ALMI, an application level group communication middleware, which allows accelerated application deployment and simplified network configuration, without the need of network infrastructure support. ALMI is tailored toward support of multicast groups of relatively small size (several 10s of members) with many to many semantics. Session participants are connected via a virtual multicast tree, which consists of unicast connections between end hosts and is formed as a minimum spanning tree (MST) using application-specific performance metric. Using simulation, we show that the performance penalties, introduced by this shift of multicast to end systems, is a relatively small increase in traffic load and that ALMI multicast trees approach the efficiency of IP multicast trees. We have also implemented ALMI as a Java based middleware package and performed experiments over the Internet. Experimental results show that ALMI is able to cope with network dynamics and keep the multicast tree efficient.

Pinkas, B.

429. Escrow Services and Incentives in Peer-to-Peer Networks
B. Horne and B. Pinkas and T. Sander
Proceedings of the 3rd ACM conference on Electronic Commerce, October, 2001.

Pinkas, Benny

430. Multicast Security: A Taxonomy and Efficient Constructions
Canetti, Ran and Garay, Juan and Itkis, Gene and Micciancio, Daniele and Naor, Moni and Pinkas, Benny
Proceedings of INFOCOM, March, 1999.
Abstract: Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide founded security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only very partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out the relevant security concerns. Next we identify two major security problems of multicast communication: individual authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a `midpoint' between traditional Message Authentication Codes and digital signatures. We also present an improved and very efficient solution to another prevailing problem for multicast protocols, namely the key revocation problem.

Plattner, B.

431. The VersaKey Framework: Versatile Group Key Management
M. Waldvogel and G. Caronni and D. Sun and N. Weiler and B. Plattner
IEEE Journal on Selected Areas in Communications, Special Issue on Middleware, 17(9)August, 1999.

Plaxton, C. G.

432. Accessing Nearby Copies of Replicated Objects in a Distributed Environment
C. G. Plaxton and R. Rajaraman and A. W. Richa
ACM Symposium on Parallel Algorithms and Architectures, 1997.

Plaxton, C.

433. Accessing Nearby Copies of Replicated Objects in a Distributed Environment
Plaxton, C. and Rajaram, R. and Richa, A.
Proceedings of the 9th Annual ACM Symposium on Parallel Algorithms and Architectures, 311-320, June, 1997.

Popescu, B. C.

434. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
Popescu, B. C. and Crispo, B. and Tanenbaum, A. S.
12th International Workshop on Security Protocols, Cambridge, UK, April, 2004.

Prinkey, M. T.

435. An Efficient Scheme for Query Processing on Peer-to-Peer Networks
Prinkey, M. T.
2001.

Raghavan, P.

436. Building low-diameter peer-to-peer networks
G. Pandurangan and P. Raghavan and E. Upfal
IEEE Journal on Selected Areas in Communications, 21, 995--1002, 2003.

Raghavan, P.

437. Symphony: Distributed Hashing in a Small World
Manku, G. S. and Bawa, M. and Raghavan, P.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Rajaram, R.

438. Accessing Nearby Copies of Replicated Objects in a Distributed Environment
Plaxton, C. and Rajaram, R. and Richa, A.
Proceedings of the 9th Annual ACM Symposium on Parallel Algorithms and Architectures, 311-320, June, 1997.

Rajaraman, R.

439. Accessing Nearby Copies of Replicated Objects in a Distributed Environment
C. G. Plaxton and R. Rajaraman and A. W. Richa
ACM Symposium on Parallel Algorithms and Architectures, 1997.

Ramanathan, R.

440. Hierarchically organzied, Multi-hop Mobile Wireless Networks for Quality-of-Service Support
Ramanathan, R. and Steenstrup, M.
Mobile Networks and Applications, 3(1)June, 1998.

Ramasubramanian, V.

441. Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Ramasubramanian, V. and Sirer, E. G.
Symposium on Networked System Design and Implementation, San Francisco, CA, USA, March, 2004.

Rao, S. G.

442. A Case for End System Multicast
Y.-H. Chu and S. G. Rao and H. Zhang
Proceedings of ACM SIGMETRICS, June, 2000.
443. Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture
Y.-H. Chu and S. G. Rao and S. Seshan and H. Zhang
Proceedings of ACM SIGCOMM, August, 2001.

Ratnasamy, Sylvia

444. A Scalable Content Addressable Network
Sylvia Ratnasamy and Paul Francis and Mark Handley and Richard Karp and Scott Shenker
In Proceedings of the ACM SIGCOMM 2001 Technical Conference, 2001.
445. Making gnutella-like P2P systems scalable
Yatin Chawathe and Sylvia Ratnasamy and Lee Breslau and Nick Lanham and Scott Shenker
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 407--418, ACM Press, 2003.
446. Range Queries over DHTs
Sylvia Ratnasamy and Joseph M. Hellerstein and Scott Shenker
Technical Report
IRB-TR-03-009, Intel Research, June, 2003.

Ratnasamy, S.

447. Application-level Multicast using Content-Addressable Networks
Ratnasamy, S. and Handley, M. and Karp, R. and Shenker, S.
Proceedings of 3rd International Workshop on Networked Group Communications, November, 2001.
448. A Scalable Content-Addressable Network
Ratnasamy, S. and Francis, P. and Handley, M. and Karp, R. and Shenker, S.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.
449. Can Heterogeneity Make Gnutella Scalable?
Lv, Q. and Ratnasamy, S. and Shenker, S.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 94-103, Springer Verlag, 2002.
450. The Impact of DHT Routing Geometry on Resilience and Proximity
Gummadi, K. P. and Gummadi, R. and Gribble, S. D. and Ratnasamy, S. and Shenker, S. and Stoica, I.
SIGCOMM 2003, Karlsruhe, Germany, August, 2003.
451. Making Gnutella-like P2P Systems Scalable
Chawathe, Y. and Ratnasamy, S. and Breslau, L. and Lanham, N. and Shenker, S.
Proceedings of SIGCOMM, August, 2003.

Raz, D.

452. On the Placement of Internet Instrumentation
Jamin, S. and Jin, C. and Jin, Y. and Raz, D. and Shavitt, Y. and Zhang, L.
Proceedings of Infocom'00, March, 2000.

Reddy, A.

453. Fault Isolation in Multicast Trees
Reddy, A. and Govindan, R. and Estrin, D.
Proceedings of SIGCOMM, August, 2000.
454. Fault Isolation in Multicast Trees
Reddy, A. and Govindan, R. and Estrin, D.
Computer Communications Review, August, 2000.
Note: Proceedings of ACM SIGCOMM'00.

Reed, D. P.

455. End-To-End Arguments in System Design
H. Saltzer and D. P. Reed and D. Clark
ACM Transactions on Computing Systems, 2(4)1984.

Rejaie, R.

456. Towards a Better Understanding of Churn in Peer-to-Peer Networks
Stutzbach, D. and Rejaie, R.
Technical Report
UO-CIS-TR-04-06, Department of Computer Science, University of Oregon, November, 2004.

Reschke, D.

457. Efficient Content Distribution in Semi-Decentralized Peer-to-Peer-Networks
Strufe, T. and Reschke, D.
Proceedings of the 8th International Netties Conference, 33-38, 2002.

Rhea, Sean

458. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.
459. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Rhea, Sean C.

460. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Richa, A. W.

461. Accessing Nearby Copies of Replicated Objects in a Distributed Environment
C. G. Plaxton and R. Rajaraman and A. W. Richa
ACM Symposium on Parallel Algorithms and Architectures, 1997.

Richa, A.

462. Accessing Nearby Copies of Replicated Objects in a Distributed Environment
Plaxton, C. and Rajaram, R. and Richa, A.
Proceedings of the 9th Annual ACM Symposium on Parallel Algorithms and Architectures, 311-320, June, 1997.

Rinaldi, Roberto

463. Routing and Data Location in Overlay Peer-to-Peer Networks
Roberto Rinaldi and Marcel Waldvogel
Technical Report
Research Report, RZ--3433, IBM, July, 2002.
Abstract: Peer-to-peer overlay networks offer a novel platform for a variety of scalable and decentralized distributed applications. Systems known as Distributed Hash Tables provide efficient and fault- tolerant routing, object location and load balancing within a self- organizing overlay network. The alternative solution we propose is an overlay location and routing infrastructure that efficiently uses minimal local information to achieve global routing. The main novelty of our approach consists in fitting the overlay network in a hyper- toroidal space and building it with locality awareness. Thanks to this specific network construction phase, forwarding decisions always take into account locality preservation in an implicit manner, leading to significant improvements in end-to-end delays and path lengths. With this overlay network it is possible to obtain global routing by adding minimal information to each single host and by making only local forwarding decisions. Our analysis shows how the average path length coming from the overlay routing is close to the optimal average path length of the underlaying network: on average, they only differ by a factor of 2. Furthermore, locality preservation has a significant impact on the end-to-end latency of the routing process as well. Such a system can be viewed as novel in the field of peer-to- peer data location and addressing, allowing the development of new applications in a real low-latency environment.
464. Efficient Topology-Aware Overlay Network
Marcel Waldvogel and Roberto Rinaldi
Proceedings of HotNets-I, October, 2002.
Abstract: Peer-to-peer (P2P) networking has become a household word in the past few years, being marketed as a work-around for server scalability problems and ``wonder drug'' to achieve resilience. Current widely-used P2P networks rely on central directory servers or massive message flooding, clearly not scalable solutions. Distributed Hash Tables (DHT) are expected to eliminate flooding and central servers, but can require many long-haul message deliveries. We introduce Mithos, an content-addressable overlay network that only uses minimal routing information and is directly suitable as an underlay network for P2P systems, both using traditional and DHT addressing. Unlike other schemes, it also efficiently provides locality-aware connectivity, thereby ensuring that a message reaches its destination with minimal overhead. Mithos provides for highly efficient forwarding, making it suitable for use in high-throughput applications. Paired with its ability to have addresses directly mapped into a subspace of the IPv6 address space, it provides a potential candidate for native deployment. Additionally, Mithos can be used to support third-party triangulation to quickly select a close-by replica of data or services.

Ripeanu, M.

465. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Ripeanu, M. and Foster, I. and Iamnitchi, A.
IEEE Internet Computing, 6(1)2002.

Rodriguez, Adolfo

466. OPUS: An Overlay Utility Service
Rebecca Braynard and Dejan Kostic and Adolfo Rodriguez and Jeff Chase and Amin Vahdat
Poster at 18th ACM Symposium on Operating System Principles, October, 2001.

Rohrs, C.

467. Query Routing for the Gnutella Network
Rohrs, C.
May, 2002.

Rosenberg, Catherine

468. Analysis of Parallel Downloading for Large File Distribution
Koo, Simon G. M. and Rosenberg, Catherine and Xu, Dongyan
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 128--135, May, 2003.

Rosenberg, J.

469. WASRV Architectural Principles
Rosenberg, J. and Schulzrinne, H. and Guttman, E. and Moats, R.
Technical Report
Internet Draft, Internet Engineering Task Force, February, 1998.
Abstract: This document defines the problem of wide area service location, describing its key attributes, and giving examples of location prob- lems which do or do not fall under its definition. It also touches on a number of related protocols, and looks at how they fit, or do not fit, the problem of wide area service location.

Note: Work in progress

Rosenblum, David S.

470. Design and Evaluation of a Wide-Area Event Notification Service
Antonio Carzaniga and David S. Rosenblum and Alexander L Wolf
ACM Transactions on Computer Systems, 19(3):332--383, August, 2001.

Ross, K.

471. Pollution in P2P File Sharing Systems
Liang, J. and Kumar, R. and Xi, Y. and Ross, K.
IEEE Infocom, Miami, FL, USA, March, 2005.

Rothermel, K.

472. Dynamic Distance Maps of the Internet
W. Theilmann and K. Rothermel
Proceedings of Infocom, March, 2000.
473. Dynamic Distance Maps of the Internet
W. Theilmann and K. Rothermel
Proceedings of Infocom, March, 2000.

Roussopolous, N.

474. Probabilistic Knowledge Discovery and Management for P2P Networks
Tsoumakos, D. and Roussopolous, N.
P2P Journal, 15-20, November, 2003.

Roussopoulos, M.

475. Incentive-Based Propagation of Metadata Updates in Peer-to-Peer Networks
Roussopoulos, M. and Baker, M.
P2P Journal, 1-6, September, 2003.
476. CUP: Controlled Update Propagation in Peer-to-Peer Networks
Roussopoulos, M. and Baker, M.
USENIX Annual Technical Conference, San Antonio, TX, USA, June, 2003.

Rowstran, Antony

477. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
Antony Rowstran and Peter Druschel
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP'01), 2001.
478. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
Antony Rowstran and Peter Druschel
Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001), 2001.

Rowstron, Antony

479. Security for structured peer-to-peer overlay networks
Miguel Castro and Peter Druschel and Ayalvadi Ganesh and Antony Rowstron and Dan S. Wallach
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.
480. Secure Routing for Structured Peer-to-Peer Overlay Networks
Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach
Proceedings of OSDI, 2002.

Rowstron, Antony I. T.

481. Secure Routing for Structured Peer-to-Peer Overlay Networks
Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach
Proceedings of OSDI, 2002.

Rowstron, A.

482. Pastry: Scalable Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems
Druschel, P. and Rowstron, A.
18th IFIP/ACM Conference on Distributed Systems Platforms (Middleware 2001), Heidelberg, Germany, November, 2001.
483. Security for Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Ganesh, A. and Rowstron, A. and Wallach, D. S.
5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, December, 2002.
484. Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2002-82, Microsoft Research, 2002.
485. Proximity Neighbor Selection in Tree-Based Structured Peer-to-Peer Overlays
Castro, M. and Druschel, P. and Hu, Y. C. and Rowstron, A.
Technical Report
MSR-TR-2003-52, Microsoft Research, 2003.

Rubenstein, Dan

486. Real-Time Reliable Multicast Using Proactive Forward Error Correction
Dan Rubenstein and Jim Kurose and Don Towsley
Proceedings of NOSSDAV, 279--293, U. Mass, Amherst, July, 1998.
Abstract: Real-Time reliable multicast over a best-effort service network remains a challenging research problem. Most protocols for reliable multicast use repair techniques that result in significant and variable delay, which can lead to missed deadlines in real-time scenarios. In this paper we present a repair technique that combines forward error correction (FEC) with automatic repeat request (ARQ). The novel aspect of the technique is its ability to reduce delay in reliable multicast delivery by sending repairs proactively (i.e., before they are required). The technique requires minimal state at senders and receivers, and no additional active router functionality beyond what is required by the current multicast service model. Furthermore, the technique uses only end-to-end mechanisms, where all data and repairs are transmitted by the data-originating source, leaving receivers free from any burden of sending repairs. We simulate a simple round-based version of a protocol embodying this technique to show its effectiveness in preventing repair request implosion, reducing the expected time of reliable delivery of data, and keeping bandwidth usage for repairs low. We show how a protocol using the technique can be adapted to provide delivery that is reliable before a real-time deadline with probability extremely close to one. Finally, we develop several variations of the protocol that use the technique in various fashions for high rate data streaming applications, and present results from additional simulations that examine performance in a variety of Internet-like heterogeneous networks.
487. Detecting Shared Congestion of Flows Via End-to-end Measurement
Dan Rubenstein and Jim Kurose and Don Towsley
Proceedings of Sigmetrics, June, 2000.
Abstract: Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flows can improve performance for a variety of applications, ranging from aggregated TCP transmissions to multiple-sender multicast applications. However, in order for this cooperation to be effective, one must first identify the flows that are congested at the same set of resources. In this paper, we present techniques based on loss or delay observations at end-hosts to infer whether or not two flows experiencing congestion are congested at the same network resources. We validate these techniques via queueing analysis, simulation, and experimentation within the Internet.

Rubin, Aviel D.

488. Publius: A robust, tamper-evident, censorship-resistant, web publishing system
Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor
Proc. 9th USENIX Security Symposium, 59--72, August, 2000.

Saha, D.

489. Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques
Chang, I. and Engel, R. and Kandlur, D. and Pendarakis, D. and Saha, D.
Proceedings of Infocom, March, 1999.
Abstract: The Internet today provides no support for privacy or authentication of multicast data distribution. However, an increasing number of applications will require secure multicast services in order to restrict group membership and enforce accountability of group members. A major problem associated with the deployment of secure multicast delivery services is the scalability of the key distribution protocol. This is particularly true with regard to the handling of group membership changes, such as member departures and/or expulsions, which necessitate the distribution of a new session key to all the remaining group members. In this paper, we present a new multicast key management scheme which uses a set of auxiliary keys in order to improve scalability. In contrast to previous schemes which generate a fixed hierarchy of keys, we dynamically generate the most suitable key hierarchy by composing different keys. However, our work goes one step further by focusing on the problem of cumulative member removal. Using Boolean function minimization techniques, our scheme outperforms all other schemes known to us in terms of message complexity in removing multiple group members. The efficiency of our scheme in aggregating key updates, due to multiple member departures, offers the potential of a significant performance advantage. The proposed scheme has been used within a toolkit for secure Internet multicast services that we have developed.

Saia, J.

490. Choosing a Random Peer
King, V. and Saia, J.
Proceedings of the 23rd Annual ACM Symposium on Principles of Distributed Computing, 125-130, July, 2004.

Saltzer, H.

491. End-To-End Arguments in System Design
H. Saltzer and D. P. Reed and D. Clark
ACM Transactions on Computing Systems, 2(4)1984.

Sandberg, O.

492. Routing in the Dark: Scalable Searches in Dark P2P Networks
Clarke, I. and Sandberg, O.
DefCon 13, Las Vegas, NV, USA, July, 2005.

Sander, T.

493. Escrow Services and Incentives in Peer-to-Peer Networks
B. Horne and B. Pinkas and T. Sander
Proceedings of the 3rd ACM conference on Electronic Commerce, October, 2001.

Saroiu, S.

494. A Measurement Study of Peer-to-Peer File Sharing Systems
Saroiu, S. and Krishna Gummadi, P. and Gribble, S. D.
Proceedings of Multimedia Computing and Networking (MMCN '02), January, 2002.
495. Skipnet: A Scalable Overlay Network with Practical Locality Properties
Harvey, N. J. A. and Jones, M. B. and Saroiu, S. and Theimer, M. and Wolman, A.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Savage, S.

496. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Schulzrinne, H.

497. WASRV Architectural Principles
Rosenberg, J. and Schulzrinne, H. and Guttman, E. and Moats, R.
Technical Report
Internet Draft, Internet Engineering Task Force, February, 1998.
Abstract: This document defines the problem of wide area service location, describing its key attributes, and giving examples of location prob- lems which do or do not fall under its definition. It also touches on a number of related protocols, and looks at how they fit, or do not fit, the problem of wide area service location.

Note: Work in progress

Schwartz, Elliot

498. The design and implementation of an intentional naming system
William Adjie-Winoto and Elliot Schwartz and Hari Balakrishnan and Jeremy Lilley
Symposium on Operating Systems Principles, 186-201, 1999.

Seltzer, M.

499. Self-Organization in Peer-to-Peer Systems
Ledlie, J. and Taylor, J. and Serban, L. and Seltzer, M.
10th ACM SIGOPS European Workshop, Saint-Emilion, France, September, 2002.

Serban, L.

500. Self-Organization in Peer-to-Peer Systems
Ledlie, J. and Taylor, J. and Serban, L. and Seltzer, M.
10th ACM SIGOPS European Workshop, Saint-Emilion, France, September, 2002.

Seshan, S.

501. Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture
Y.-H. Chu and S. G. Rao and S. Seshan and H. Zhang
Proceedings of ACM SIGCOMM, August, 2001.

Seshan, Srinivasan

502. A Network Measurement Architecture for Adaptive Applications
Stemm, Mark and Seshan, Srinivasan and Katz, Randy H.
Proceedings of INFOCOM, March, 2000.

Shah, G.

503. Skip Graphs
Aspnes, J. and Shah, G.
14th Annual ACM-SIAM Symposium on Discrete Algorithms, January, 2003.

Shankar, Narendar

504. Finding Close Friends over the Internet
Narendar Shankar and Christopher Komareddy and Bobby Bhattacharjee
Proceedings of International Conference on Network Protocols, November, 2001.

Shankar, N.

505. Finding Close Friends on the Internet
Kommareddy, C. and Shankar, N. and Bhattacharjee, B.
Proceedings of ICNP, November, 2001.

Sharma, P.

506. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
507. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Shavitt, Y.

508. On the Placement of Internet Instrumentation
Jamin, S. and Jin, C. and Jin, Y. and Raz, D. and Shavitt, Y. and Zhang, L.
Proceedings of Infocom'00, March, 2000.

Shenker, Scott

509. A Scalable Content Addressable Network
Sylvia Ratnasamy and Paul Francis and Mark Handley and Richard Karp and Scott Shenker
In Proceedings of the ACM SIGCOMM 2001 Technical Conference, 2001.
510. Making gnutella-like P2P systems scalable
Yatin Chawathe and Sylvia Ratnasamy and Lee Breslau and Nick Lanham and Scott Shenker
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 407--418, ACM Press, 2003.
511. Range Queries over DHTs
Sylvia Ratnasamy and Joseph M. Hellerstein and Scott Shenker
Technical Report
IRB-TR-03-009, Intel Research, June, 2003.

Shenker, S.

512. Application-level Multicast using Content-Addressable Networks
Ratnasamy, S. and Handley, M. and Karp, R. and Shenker, S.
Proceedings of 3rd International Workshop on Networked Group Communications, November, 2001.
513. A Scalable Content-Addressable Network
Ratnasamy, S. and Francis, P. and Handley, M. and Karp, R. and Shenker, S.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.
514. Search and Replication in Unstructured Peer-to-Peer Networks
Lv, Q. and Cao, P. and Cohen, E. and Li, K. and Shenker, S.
16th International Conference on Supercomputing, New York, NY, USA, June, 2002.
515. Can Heterogeneity Make Gnutella Scalable?
Lv, Q. and Ratnasamy, S. and Shenker, S.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 94-103, Springer Verlag, 2002.
516. The Impact of DHT Routing Geometry on Resilience and Proximity
Gummadi, K. P. and Gummadi, R. and Gribble, S. D. and Ratnasamy, S. and Shenker, S. and Stoica, I.
SIGCOMM 2003, Karlsruhe, Germany, August, 2003.
517. Making Gnutella-like P2P Systems Scalable
Chawathe, Y. and Ratnasamy, S. and Breslau, L. and Lanham, N. and Shenker, S.
Proceedings of SIGCOMM, August, 2003.

Sherwood, Rob

518. Cooperative peer groups in NICE
Seungjoon Lee and Rob Sherwood and Bobby Bhattacharjee
Proceedings of INFOCOM, 2003.
519. Slurpie: A Cooperative Bulk Data Transfer Protocol
Rob Sherwood and Ryan Braud and Bobby Bhattacharjee
Proceedings of IEEE INFOCOM, 2004.

Shi, S.

520. ALMI: An Application Level Multicast Infrastructure
D. Pendarakis and S. Shi and D. Verma and M. Waldvogel
Proceedings of 3rd Usenix Symposium on Internet Technologies & Systems, March, 2001.

Shi, Sherlia

521. ALMI: An Application Level Multicast Infrastructure
Pendarakis, Dimitris and Shi, Sherlia and Verma, Dinesh and Waldvogel, Marcel
3rd USNIX Symposium on Internet Technologies and Systems (USITS '01), 49--60, March, 2001.
Abstract: The IP multicast model allows scalable and efficient multi-party communication, particularly for groups of large size. However, deployment of IP multicast requires substantial infrastructure modifications and is hampered by a host of unresolved open problems. To circumvent this situation, we have designed and implemented ALMI, an application level group communication middleware, which allows accelerated application deployment and simplified network configuration, without the need of network infrastructure support. ALMI is tailored toward support of multicast groups of relatively small size (several 10s of members) with many to many semantics. Session participants are connected via a virtual multicast tree, which consists of unicast connections between end hosts and is formed as a minimum spanning tree (MST) using application-specific performance metric. Using simulation, we show that the performance penalties, introduced by this shift of multicast to end systems, is a relatively small increase in traffic load and that ALMI multicast trees approach the efficiency of IP multicast trees. We have also implemented ALMI as a Java based middleware package and performed experiments over the Internet. Experimental results show that ALMI is able to cope with network dynamics and keep the multicast tree efficient.

Silaghi, Bujor

522. Design of the TerraDir Distributed Directory
Bobby Bhattacharjee and Pete Keleher and Bujor Silaghi
Technical Report
CS-TR-4163, University of Maryland at College Park, 2001.
523. Routing in the TerraDir Directory Service
Bujor Silaghi and Bobby Bhattacharjee and Pete Keleher
Proceedings of SPIE ITCOM, 2002.
524. Are Virtualized Overlay Networks Too Much of a Good Thing?
Pete Keleher and Samrat Bhattacharjee and Bujor Silaghi
The 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002.
525. Efficient Peer-To-Peer Searches Using Result-Caching
Bobby Bhattacharjee and Sudarshan Chawathe and Vijay Gopalakrishnan and Pete Keleher and Bujor Silaghi
The 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03), February, 2003.
526. Hierarchical Routing with Soft-State Replicas in TerraDir
Bujor Silaghi and Vijay Gopalakrishnan and Bobby Bhattacharjee and Pete Keleher
The 18th International Parallel and Distributed Processing Symposium, April, 2004.
527. Adaptive Replication in Peer-to-Peer Systems
Vijay Gopalakrishnan and Bujor Silaghi and Bobby Bhattacharjee and Pete Keleher
The 24th International Conference on Distributed Computing Systems, March, 2004.

Singh, Munindar P.

528. A Social Mechanism of Reputation Management in Electronic Communities
Bin Yu and Munindar P. Singh
Proceedings of Fourth International Workshop on Cooperative Information Agents, 2000.

Sirer, E. G.

529. Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Ramasubramanian, V. and Sirer, E. G.
Symposium on Networked System Design and Implementation, San Francisco, CA, USA, March, 2004.

Sit, E.

530. Security Considerations for Peer-to-Peer Distributed Hash Tables
Sit, E. and Morris, R.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 261-269, Springer Verlag, 2002.

Snell, J.

531. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Snoeyink, J.

532. A Lower Bound for Multicast Key Distribution
J. Snoeyink and S. Suri and G. Varghese
IEEE Infocom, April, 2001.

Speakman, T.

533. PGM Reliable Transport Protocol
Speakman, T. and others
Technical Report
draft-speakman-pgm-spec-04 txt, Internet Draft, Internet Engineering Task Force, April, 2000.
Abstract: Pragmatic General Multicast (PGM) is a reliable multicast transport pro- tocol for applications that require ordered or unordered, duplicate- free, multicast data delivery from multiple sources to multiple receivers. PGM guarantees that a receiver in the group either receives all data packets from transmissions and repairs, or is able to detect unrecoverable data packet loss. PGM is specifically intended as a work- able solution for multicast applications with basic reliability require- ments. Its central design goal is simplicity of operation with due regard for scalability and network efficiency.

Note: Work in progress
534. Generic Router Assist (GRA) Building Block Motivation and Architecture
Cain, B. and Speakman, T. and Towsley, D.
Technical Report
Internet Draft, Internet Engineering Task Force, March, 2000.
Note: Work in progress.

Sperberg-McQueen, C.

535. Extensible Markup Language (XML) 1.0
T. Bray and J. Paoli and C. Sperberg-McQueen
World Wide Web Consortium Recommendation. Available at http://www.w3.org/TR/REC-xml, February, 1998.

Srinivasan, Aravind

536. Resilient Multicast using Overlays
Suman Banerjee and Seungjoon Lee and Bobby Bhattacharjee and Aravind Srinivasan
Proceedings of ACM SIGMETRICS, 2003.

Sripanidkulchai, K.

537. The Popularity of Gnutella Queries and its Implications on Scalability
Sripanidkulchai, K.
February, 2001.

Steen, Maarten van

538. Algorithmic design of the Globe wide-area location service
Maarten van Steen and Franz J. Hauck and Gerco Ballintijn and Andrew S. Tanenbaum
The Computer Journal, 41(5):297--310, 1998.
539. Globe: A Wide-Area Distributed System
Maarten van Steen and Philip Homburg and Andrew S. Tanenbaum
IEEE Concurrency, 7(1):70--78, jan-mar, 1999.

Steenstrup, M.

540. Hierarchically organzied, Multi-hop Mobile Wireless Networks for Quality-of-Service Support
Ramanathan, R. and Steenstrup, M.
Mobile Networks and Applications, 3(1)June, 1998.

Stemm, Mark

541. A Network Measurement Architecture for Adaptive Applications
Stemm, Mark and Seshan, Srinivasan and Katz, Randy H.
Proceedings of INFOCOM, March, 2000.

Sterbenz, J.

542. Directions in Active Networks
K. Calvert and S. Bhattacharjee and E. Zegura and J. Sterbenz
IEEE Communications Magazine, 1998.

Stoica, Ion

543. Wide-area cooperative storage with CFS
Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), October, 2001.

Stoica, I.

544. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
Stoica, I. and Morris, R. and Karger, D. and Kaashoek, M. F. and Balakrishnan, H.
SIGCOMM 2001, San Diego, CA, USA, August, 2001.
545. The Impact of DHT Routing Geometry on Resilience and Proximity
Gummadi, K. P. and Gummadi, R. and Gribble, S. D. and Ratnasamy, S. and Shenker, S. and Stoica, I.
SIGCOMM 2003, Karlsruhe, Germany, August, 2003.

Stribling, Jeremy

546. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Stribling, J.

547. Comparing the Performance of Distributed Hash Tables Under Churn
Li, J. and Stribling, J. and Gil, T. M. and Morris, R. and Kaashoek, M. F.
3rd International Workshop on Peer-to-Peer Systems (IPTPS '04), San Diego, CA, USA, February, 2004.

Strufe, T.

548. Efficient Content Distribution in Semi-Decentralized Peer-to-Peer-Networks
Strufe, T. and Reschke, D.
Proceedings of the 8th International Netties Conference, 33-38, 2002.

Stubblebine, S.

549. Secure Distributed Computing in a Commercial Environment
P. Golle and S. Stubblebine
Financial Cryptography, 2001.

Stutzbach, D.

550. Towards a Better Understanding of Churn in Peer-to-Peer Networks
Stutzbach, D. and Rejaie, R.
Technical Report
UO-CIS-TR-04-06, Department of Computer Science, University of Oregon, November, 2004.

Sun, D.

551. The VersaKey Framework: Versatile Group Key Management
M. Waldvogel and G. Caronni and D. Sun and N. Weiler and B. Plattner
IEEE Journal on Selected Areas in Communications, Special Issue on Middleware, 17(9)August, 1999.

Suri, S.

552. A Lower Bound for Multicast Key Distribution
J. Snoeyink and S. Suri and G. Varghese
IEEE Infocom, April, 2001.

Swick, R.

553. Resource Description Framework (RDF) Model and Syntax Specification
O. Lassila and R. Swick
W3C Proposed Recommendation, January, 1999.
Note: Available at http://www.w3.org/TR/PR-rdf-syntax.

Tanenbaum, Andrew S.

554. Algorithmic design of the Globe wide-area location service
Maarten van Steen and Franz J. Hauck and Gerco Ballintijn and Andrew S. Tanenbaum
The Computer Journal, 41(5):297--310, 1998.
555. Globe: A Wide-Area Distributed System
Maarten van Steen and Philip Homburg and Andrew S. Tanenbaum
IEEE Concurrency, 7(1):70--78, jan-mar, 1999.

Tanenbaum, A. S.

556. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
Popescu, B. C. and Crispo, B. and Tanenbaum, A. S.
12th International Workshop on Security Protocols, Cambridge, UK, April, 2004.

Tangmunarunkit, H.

557. Heuristics for Internet Map Discovery
R. Govindan and H. Tangmunarunkit
Proceedings of Infocom, March, 2000.
558. Heuristics for Internet Map Discovery
R. Govindan and H. Tangmunarunkit
Proceedings of Infocom, March, 2000.

Taylor, J.

559. Self-Organization in Peer-to-Peer Systems
Ledlie, J. and Taylor, J. and Serban, L. and Seltzer, M.
10th ACM SIGOPS European Workshop, Saint-Emilion, France, September, 2002.

Thadani, S.

560. The Download Mesh
Bollaert, M. and Thadani, S. and Mickish, A.

Note: Gnutella Developers' Forum, http://www.the-gdf.org/.

Thaler, D.

561. Protocol Independent Multicast-Sparse Mode, RFC 2117
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
Technical Report
IETF, 1997.
562. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
D. Estrin and D. Farinacci and A. Helmy and D. Thaler and S. Deering and M. Handley and V. Jacobson and C. Liu and P. Sharma
RFC 2362, IETF, 1998.

Theilmann, W.

563. Dynamic Distance Maps of the Internet
W. Theilmann and K. Rothermel
Proceedings of Infocom, March, 2000.
564. Dynamic Distance Maps of the Internet
W. Theilmann and K. Rothermel
Proceedings of Infocom, March, 2000.

Theimer, M.

565. Skipnet: A Scalable Overlay Network with Practical Locality Properties
Harvey, N. J. A. and Jones, M. B. and Saroiu, S. and Theimer, M. and Wolman, A.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Touch, Joe

566. Dynamic Internet Overlay Deployment and Management Using the X-Bone
Joe Touch
Proceedings of Internet Conference on Network Protocols, November, 2000.

Towsley, Don

567. Real-Time Reliable Multicast Using Proactive Forward Error Correction
Dan Rubenstein and Jim Kurose and Don Towsley
Proceedings of NOSSDAV, 279--293, U. Mass, Amherst, July, 1998.
Abstract: Real-Time reliable multicast over a best-effort service network remains a challenging research problem. Most protocols for reliable multicast use repair techniques that result in significant and variable delay, which can lead to missed deadlines in real-time scenarios. In this paper we present a repair technique that combines forward error correction (FEC) with automatic repeat request (ARQ). The novel aspect of the technique is its ability to reduce delay in reliable multicast delivery by sending repairs proactively (i.e., before they are required). The technique requires minimal state at senders and receivers, and no additional active router functionality beyond what is required by the current multicast service model. Furthermore, the technique uses only end-to-end mechanisms, where all data and repairs are transmitted by the data-originating source, leaving receivers free from any burden of sending repairs. We simulate a simple round-based version of a protocol embodying this technique to show its effectiveness in preventing repair request implosion, reducing the expected time of reliable delivery of data, and keeping bandwidth usage for repairs low. We show how a protocol using the technique can be adapted to provide delivery that is reliable before a real-time deadline with probability extremely close to one. Finally, we develop several variations of the protocol that use the technique in various fashions for high rate data streaming applications, and present results from additional simulations that examine performance in a variety of Internet-like heterogeneous networks.
568. Detecting Shared Congestion of Flows Via End-to-end Measurement
Dan Rubenstein and Jim Kurose and Don Towsley
Proceedings of Sigmetrics, June, 2000.
Abstract: Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flows can improve performance for a variety of applications, ranging from aggregated TCP transmissions to multiple-sender multicast applications. However, in order for this cooperation to be effective, one must first identify the flows that are congested at the same set of resources. In this paper, we present techniques based on loss or delay observations at end-hosts to infer whether or not two flows experiencing congestion are congested at the same network resources. We validate these techniques via queueing analysis, simulation, and experimentation within the Internet.

Towsley, D.

569. Scalable Reliable Multicast Using Multiple Multicast Channels
Kasera, S. and Towsley, D. and Kurose, J.
Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics '97), June, 1997.
570. Scalable Reliable Multicast Using Multiple Multicast Channels
Kasera, S. and Towsley, D. and Kurose, J.
Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics '97), June, 1997.
571. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast
Kasera, S. and Kurose, J. and Towsley, D.
Proceedings of Infocom, April, 1998.
572. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast
Kasera, S. and Kurose, J. and Towsley, D.
Proceedings of Infocom, April, 1998.
573. Generic Router Assist (GRA) Building Block Motivation and Architecture
Cain, B. and Speakman, T. and Towsley, D.
Technical Report
Internet Draft, Internet Engineering Task Force, March, 2000.
Note: Work in progress.

Ts'o, Theodore

574. Kerberos: An Authentication Service for Computer Networks
B. Clifford Neuman and Theodore Ts'o
IEEE Communications, 32(9)September, 1994.

Tsoumakos, D.

575. Probabilistic Knowledge Discovery and Management for P2P Networks
Tsoumakos, D. and Roussopolous, N.
P2P Journal, 15-20, November, 2003.

Tuvell, W.

576. Security
Udell, J. and Asthagiri, N. and Tuvell, W.
Peer-to-Peer: Harnessing the Power of Disruptive Technologies, 354-380, Editor(s): Oram, A., O'Reilly, 2001.

Udell, J.

577. Security
Udell, J. and Asthagiri, N. and Tuvell, W.
Peer-to-Peer: Harnessing the Power of Disruptive Technologies, 354-380, Editor(s): Oram, A., O'Reilly, 2001.

Upfal, E.

578. Building low-diameter peer-to-peer networks
G. Pandurangan and P. Raghavan and E. Upfal
IEEE Journal on Selected Areas in Communications, 21, 995--1002, 2003.

Vahdat, A.

579. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Vahdat, Amin

580. OPUS: An Overlay Utility Service
Rebecca Braynard and Dejan Kostic and Adolfo Rodriguez and Jeff Chase and Amin Vahdat
Poster at 18th ACM Symposium on Operating System Principles, October, 2001.

Varghese, G.

581. An error control scheme for large-scale multicast applications
C. Papadopoulos, G. Parulkar and G. Varghese
Proceedings of Infocom'98, 1998.
582. An error control scheme for large-scale multicast applications
C. Papadopoulos, G. Parulkar and G. Varghese
Proceedings of Infocom'98, 1998.
583. A Lower Bound for Multicast Key Distribution
J. Snoeyink and S. Suri and G. Varghese
IEEE Infocom, April, 2001.

Verma, D.

584. ALMI: An Application Level Multicast Infrastructure
D. Pendarakis and S. Shi and D. Verma and M. Waldvogel
Proceedings of 3rd Usenix Symposium on Internet Technologies & Systems, March, 2001.

Verma, Dinesh

585. ALMI: An Application Level Multicast Infrastructure
Pendarakis, Dimitris and Shi, Sherlia and Verma, Dinesh and Waldvogel, Marcel
3rd USNIX Symposium on Internet Technologies and Systems (USITS '01), 49--60, March, 2001.
Abstract: The IP multicast model allows scalable and efficient multi-party communication, particularly for groups of large size. However, deployment of IP multicast requires substantial infrastructure modifications and is hampered by a host of unresolved open problems. To circumvent this situation, we have designed and implemented ALMI, an application level group communication middleware, which allows accelerated application deployment and simplified network configuration, without the need of network infrastructure support. ALMI is tailored toward support of multicast groups of relatively small size (several 10s of members) with many to many semantics. Session participants are connected via a virtual multicast tree, which consists of unicast connections between end hosts and is formed as a minimum spanning tree (MST) using application-specific performance metric. Using simulation, we show that the performance penalties, introduced by this shift of multicast to end systems, is a relatively small increase in traffic load and that ALMI multicast trees approach the efficiency of IP multicast trees. We have also implemented ALMI as a Java based middleware package and performed experiments over the Internet. Experimental results show that ALMI is able to cope with network dynamics and keep the multicast tree efficient.

Vingralek, R.

586. Efficient Peer-to-Peer Lookup Based on a Distributed Trie
Freedman, M. and Vingralek, R.
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Lecture Notes in Computer Science 2429, 66-75, Springer Verlag, 2002.

Voelker, G.

587. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Waitzman, D.

588. Distance Vector Multicast Routing Protocol
D. Waitzman and C. Partridge and S. Deering
RFC 1075, 1998.

Waldman, Marc

589. Publius: A robust, tamper-evident, censorship-resistant, web publishing system
Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor
Proc. 9th USENIX Security Symposium, 59--72, August, 2000.

Waldvogel, M.

590. The VersaKey Framework: Versatile Group Key Management
M. Waldvogel and G. Caronni and D. Sun and N. Weiler and B. Plattner
IEEE Journal on Selected Areas in Communications, Special Issue on Middleware, 17(9)August, 1999.
591. ALMI: An Application Level Multicast Infrastructure
D. Pendarakis and S. Shi and D. Verma and M. Waldvogel
Proceedings of 3rd Usenix Symposium on Internet Technologies & Systems, March, 2001.

Waldvogel, Marcel

592. Routing and Data Location in Overlay Peer-to-Peer Networks
Roberto Rinaldi and Marcel Waldvogel
Technical Report
Research Report, RZ--3433, IBM, July, 2002.
Abstract: Peer-to-peer overlay networks offer a novel platform for a variety of scalable and decentralized distributed applications. Systems known as Distributed Hash Tables provide efficient and fault- tolerant routing, object location and load balancing within a self- organizing overlay network. The alternative solution we propose is an overlay location and routing infrastructure that efficiently uses minimal local information to achieve global routing. The main novelty of our approach consists in fitting the overlay network in a hyper- toroidal space and building it with locality awareness. Thanks to this specific network construction phase, forwarding decisions always take into account locality preservation in an implicit manner, leading to significant improvements in end-to-end delays and path lengths. With this overlay network it is possible to obtain global routing by adding minimal information to each single host and by making only local forwarding decisions. Our analysis shows how the average path length coming from the overlay routing is close to the optimal average path length of the underlaying network: on average, they only differ by a factor of 2. Furthermore, locality preservation has a significant impact on the end-to-end latency of the routing process as well. Such a system can be viewed as novel in the field of peer-to- peer data location and addressing, allowing the development of new applications in a real low-latency environment.
593. Efficient Topology-Aware Overlay Network
Marcel Waldvogel and Roberto Rinaldi
Proceedings of HotNets-I, October, 2002.
Abstract: Peer-to-peer (P2P) networking has become a household word in the past few years, being marketed as a work-around for server scalability problems and ``wonder drug'' to achieve resilience. Current widely-used P2P networks rely on central directory servers or massive message flooding, clearly not scalable solutions. Distributed Hash Tables (DHT) are expected to eliminate flooding and central servers, but can require many long-haul message deliveries. We introduce Mithos, an content-addressable overlay network that only uses minimal routing information and is directly suitable as an underlay network for P2P systems, both using traditional and DHT addressing. Unlike other schemes, it also efficiently provides locality-aware connectivity, thereby ensuring that a message reaches its destination with minimal overhead. Mithos provides for highly efficient forwarding, making it suitable for use in high-throughput applications. Paired with its ability to have addresses directly mapped into a subspace of the IPv6 address space, it provides a potential candidate for native deployment. Additionally, Mithos can be used to support third-party triangulation to quickly select a close-by replica of data or services.
594. Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention
Ramaprabhu Janakiraman and Marcel Waldvogel and Qi Zhang
Proceedings of IEEE WETICE 2003, June, 2003.
Abstract: While the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed. We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way.
595. Dynamic Replica Management in Distributed Hash Tables
Marcel Waldvogel and Paul Hurley and Daniel Bauer
Technical Report
Research Report, RZ--3502, IBM, July, 2003.
Abstract: Interest in distributed storage is fueled by demand for reliability and resilience combined with decreasing hardware costs. Peer-to-peer storage networks based on distributed hash tables are an attractive solution due to their efficient use of resources and resulting performance. The placement and subsequent efficient location of replicas in such systems remain open problems, especially the requirement to update replicated content, working in the absence of global information, and how to determine the locations in a dynamic system without introducing single points of failure. We present and evaluate a novel and versatile technique, replica enumeration, which allows for controlled replication and replica access. The possibility of enumerating and addressing individual replicas allows dynamic updates as well as superior performance without burdening the network with state information, yet taking advantage of locality information when available. We simulate, analyze, and prove properties of the system, and discuss some applications.

Waldvogel, Marcel

596. ALMI: An Application Level Multicast Infrastructure
Pendarakis, Dimitris and Shi, Sherlia and Verma, Dinesh and Waldvogel, Marcel
3rd USNIX Symposium on Internet Technologies and Systems (USITS '01), 49--60, March, 2001.
Abstract: The IP multicast model allows scalable and efficient multi-party communication, particularly for groups of large size. However, deployment of IP multicast requires substantial infrastructure modifications and is hampered by a host of unresolved open problems. To circumvent this situation, we have designed and implemented ALMI, an application level group communication middleware, which allows accelerated application deployment and simplified network configuration, without the need of network infrastructure support. ALMI is tailored toward support of multicast groups of relatively small size (several 10s of members) with many to many semantics. Session participants are connected via a virtual multicast tree, which consists of unicast connections between end hosts and is formed as a minimum spanning tree (MST) using application-specific performance metric. Using simulation, we show that the performance penalties, introduced by this shift of multicast to end systems, is a relatively small increase in traffic load and that ALMI multicast trees approach the efficiency of IP multicast trees. We have also implemented ALMI as a Java based middleware package and performed experiments over the Internet. Experimental results show that ALMI is able to cope with network dynamics and keep the multicast tree efficient.

Wallach, Dan S.

597. Security for structured peer-to-peer overlay networks
Miguel Castro and Peter Druschel and Ayalvadi Ganesh and Antony Rowstron and Dan S. Wallach
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.
598. Secure Routing for Structured Peer-to-Peer Overlay Networks
Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach
Proceedings of OSDI, 2002.

Wallach, D. S.

599. Security for Structured Peer-to-Peer Overlay Networks
Castro, M. and Druschel, P. and Ganesh, A. and Rowstron, A. and Wallach, D. S.
5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, December, 2002.

Weatherspoon, Hakim

600. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Weigend, A. S.

601. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks
Christin, N. and Weigend, A. S. and Chuang, J.
ACM Conference on Electronic Commerce, Vancouver, Canada, June, 2005.

Weiler, N.

602. The VersaKey Framework: Versatile Group Key Management
M. Waldvogel and G. Caronni and D. Sun and N. Weiler and B. Plattner
IEEE Journal on Selected Areas in Communications, Special Issue on Middleware, 17(9)August, 1999.

Weimer, Westley

603. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Wells, Chris

604. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Willman, B.

605. The Darknet and the Future of Content Distribution
Biddle, P. and England, P. and Peinado, M. and Willman, B.
Proceedings of the 2nd ACM Workshop on Digital Rights Management, Lecture Notes in Computer Science 2696, 155-176, Springer Verlag, 2003.

Wolf, Alexander L

606. Design and Evaluation of a Wide-Area Event Notification Service
Antonio Carzaniga and David S. Rosenblum and Alexander L Wolf
ACM Transactions on Computer Systems, 19(3):332--383, August, 2001.

Wolman, A.

607. Skipnet: A Scalable Overlay Network with Practical Locality Properties
Harvey, N. J. A. and Jones, M. B. and Saroiu, S. and Theimer, M. and Wolman, A.
4th USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA, March, 2003.

Wong, C.K.

608. Secure Group Communications Using Key Graphs
Wong, C.K. and Gouda, M. and Lam, S.
Proceedings of SIGCOMM, 28(4):68--79, September, 1998.
Abstract: Many emerging applications (e.g. teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work ) are based upon a group communications model, i.e., they require packet delivery from one or more authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue. In this paper, we present a novel solution to the scalability problem of group/multicast key management. We formalize the notion of a secure group as a triple (U, K, R) where U denotes a set of users, K a set of keys held by the users ,and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely distributing rekey messages after a join/leave, and specify protocols for joining and leaving a secure group. The rekeying strategies and join/leave protocols are implemented in a prototype group key server we have built. We present measurement results from experiments and discuss performance comparisons. We show that our group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves. In particular, the average measured processing time per join/leave increases linearly with the logarithm of group size.

Wong, T.

609. An Evaluation of Preference Clustering in Large-scale Multicast Applications
Wong, T. and Katz, R. and McCanne, S.
Proceedings of INFOCOM, March, 2000.
610. An Evaluation of Preference Clustering in Large-scale Multicast Applications
Wong, T. and Katz, R. and McCanne, S.
Proceedings of INFOCOM, March, 2000.

Wroclawski, J.

611. A Framework for Global IP-Anycast (GIA)
Katabi, D. and Wroclawski, J.
Technical Report
Internet Draft, Internet Engineering Task Force, June, 1999.
Abstract: This document describes GIA, an architecture for a scalable Global IP-Anycast service. In contrast to previous approaches, which route IP-anycast through the unicast routing system, GIA provides IP-anycast with its own routing protocol. To scale, GIA pushes the overhead of anycast routing to the edge of the network and off-load the middle routers of the burden of storing anycast routes.

Note: Work in progress
612. A Framework for Global IP-Anycast (GIA)
Katabi, D. and Wroclawski, J.
Proceedings of SIGCOMM, 2000.

X., Rex Xu,

613. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.
614. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.

Xi, Y.

615. Pollution in P2P File Sharing Systems
Liang, J. and Kumar, R. and Xi, Y. and Ross, K.
IEEE Infocom, Miami, FL, USA, March, 2005.

Xu, Dongyan

616. Analysis of Parallel Downloading for Large File Distribution
Koo, Simon G. M. and Rosenberg, Catherine and Xu, Dongyan
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 128--135, May, 2003.

Yang, B.

617. Improving Search in Peer-to-Peer Networks
Yang, B. and Garcia-Molina, H.
Proceedings of the 22nd International Conference on Distributed Computing Systems, Vienna, Austria, July, 2002.
618. Open Problems in Data-Sharing Peer-to-Peer Systems
Daswani, N. and Garcia-Molina, H. and Yang, B.
Proceedings of the 9th International Conference on Database Theory, Lecture Notes in Computer Science 2572, 1-15, Springer Verlag, 2003.
619. Designing a Super-Peer Network
Yang, B. and Garcia-Molina, H.
Proceedings of the IEEE International Conference on Data Engineering, March, 2003.

Yang, R.

620. Batch Updates for Key Trees
Li, X. and Yang, R. and Gouda, M. and Lam, S.
Technical Report
University of Texas, Austin, September, 2000.

Yang, Richard Y.

621. Reliable Group Re-keying: A Performance Analysis
Yang, Richard Y. and Li, Steve and Zhang, Brian and Lam, Simon
Proceedings of SIGCOMM, August, 2001.

Yano, Koichi

622. The Breadcrumb Forwarding Service: A Synthesis of PGM and EXPRESS to Improve and Simplify Global IP Multicast
Koichi Yano and Steven McCanne
ACM Computer Communication Review, 30(2)2000.

Yavatkar, R.

623. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.
624. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.

Yeong, W.

625. X.500 Lightweight Directory Access Protocol
W. Yeong and T. Howes and S. Kille
Network Working Group RFC 1487, ISODE Consortium, 1993.

Yu, Bin

626. A Social Mechanism of Reputation Management in Electronic Communities
Bin Yu and Munindar P. Singh
Proceedings of Fourth International Workshop on Cooperative Information Agents, 2000.

Yung, M.

627. Authenticated Multi-Party Key Agreement in Constant Rounds
J. Katz and M. Yung
Submitted to Eurocrypt 2003.

Zahorjan, J.

628. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.

Zegura, E.

629. How to Model an Internetwork
K. Calvert and E. Zegura and S. Bhattacharjee
Proceedings of IEEE Infocom, 1996.
630. Reasoning About Active Network Protocols
S. Bhattacharjee and K. Calvert and E. Zegura
Proceedings of International Conference on Network Portocols (ICNP) '98, 1998.
631. Directions in Active Networks
K. Calvert and S. Bhattacharjee and E. Zegura and J. Sterbenz
IEEE Communications Magazine, 1998.
632. Bowman: A Node OS for Active Networks
S. Merugu and S. Bhattacharjee and E. Zegura and K. Calvert
Proceedings IEEE INFOCOM'2000, 2000.
633. Exposing the network: Support for topology-sensitive applications
Y. Chae and S. Merugu and E. Zegura and S. Bhattarcharjee
Proceedings of IEEE OpenArch 2000, 2000.

Zegura, Ellen

634. A quantitative comparison of graph-based models for Internet topology
Ellen W. Zegura and Kenneth L. Calvert and Michael J. Donahoo
IEEEslash ACM Transactions on Networking, 5(6):770--783, 1997.
635. Self-Organizing Wide-Area Network Caches
Samrat Bhattacharjee and Ken Calvert and Ellen Zegura
IEEE Infocom'98, 1998.
636. Application-layer anycasting: a server selection architecture and use in a replicated Web service
Ellen W. Zegura and Mostafa H. Ammar and Zongming Fei and Samrat Bhattacharjee
j-IEEE-TRANS-NETWORKING, 8(4):455--466, 2000.

Zegura, Ellen W.

637. A quantitative comparison of graph-based models for Internet topology
Ellen W. Zegura and Kenneth L. Calvert and Michael J. Donahoo
IEEEslash ACM Transactions on Networking, 5(6):770--783, 1997.
638. Application-layer anycasting: a server selection architecture and use in a replicated Web service
Ellen W. Zegura and Mostafa H. Ammar and Zongming Fei and Samrat Bhattacharjee
j-IEEE-TRANS-NETWORKING, 8(4):455--466, 2000.

Zhang, H.

639. A Case for End System Multicast
Y.-H. Chu and S. G. Rao and H. Zhang
Proceedings of ACM SIGMETRICS, June, 2000.
640. Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture
Y.-H. Chu and S. G. Rao and S. Seshan and H. Zhang
Proceedings of ACM SIGCOMM, August, 2001.

Zhang, Qi

641. Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention
Ramaprabhu Janakiraman and Marcel Waldvogel and Qi Zhang
Proceedings of IEEE WETICE 2003, June, 2003.
Abstract: While the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed. We propose Indra---a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable way.

Zhang, Brian

642. Reliable Group Re-keying: A Performance Analysis
Yang, Richard Y. and Li, Steve and Zhang, Brian and Lam, Simon
Proceedings of SIGCOMM, August, 2001.

Zhang, H.

643. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.
644. Resilient Multicast Support for Continuous-Media Applications
Rex Xu, X. and Myers, A.C. and Zhang, H. and Yavatkar, R.
Proceedings of NOSSDAV, May, 1997.
Abstract: The IP multicast delivery mechanism provides a popular basis for delivery of continuous media to many participants in a conferencing application. However, the best-effort nature of multicast delivery results in poor playback quality in the presence of network congestion and packet loss. Contrary to widespread belief that the real-time nature of continuous media applications precludes the possibility of recovery of lost packets using retransmissions, we have found that these applications offer an interesting tradeoff between the desired playback quality and the desired degree of interactivity. In particular, we propose a new model of multicast delivery called resilient multicast in which each receiver in a multicast group can decide its own tradeoff between reliability and real-time requirements. To be effective, error recovery mechanisms in such a model need to be both fast (due to the real-time constraint) and have a low overhead (due to high volume of continuous media data). We have designed a resilient multicast protocol called STORM (STructure-Oriented Resilient Multicast) in which senders and receivers collaborate to recover from lost packets using two key ideas. First, group participants self-organize themselves into a distribution structure and use the structure to recover lost packets from adjacent nodes. Second, the distribution structure is dynamic and a lightweight algorithm is used to adapt the structure to changing network traffic conditions and group membership. We have implemented STORM in both VAT and a packet level simulator. Experimental results using both the MBONE and a simulation model demonstrate the effectiveness of our approach.

Zhang, L.

645. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.
646. Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
Floyd, S. and Jacobson, V. and Liu, C.-G. and McCanne, S. and Zhang, L.
Proceedings of SIGCOMM, September, 1995.
Abstract: This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.
647. On the Placement of Internet Instrumentation
Jamin, S. and Jin, C. and Jin, Y. and Raz, D. and Shavitt, Y. and Zhang, L.
Proceedings of Infocom'00, March, 2000.

Zhao, B. Y.

648. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination
S. Q. Zhuang and B. Y. Zhao and A. D. Joseph and R. Katz and J. Kubiatowicz
Eleventh International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2001), 2001.

Zhao, Ben Y.

649. An Architecture for a Secure Service Discovery Service
Steven Czerwinski and Ben Y. Zhao and Todd Hodes and Anthony D. Joseph and Randy Katz
Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom-99, 24--35, ACM Press, aug 15--20, 1999.
650. Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John D. Kubiatowicz
IEEE Journal on Selected Areas in Communications, 22(1)January, 2004.

Zhao, B. Y.

651. Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing
Zhao, B. Y. and Kubiatowicz, J. D. and Joseph, A. D.
Technical Report
UCB/CSD-01-1141, UC Berkeley, April, 2001.

Zhao., Ben

652. OceanStore: An Architecture for Global-Scale Persistent Storage
John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Zhao.
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), 2000.

Zhuang, S. Q.

653. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination
S. Q. Zhuang and B. Y. Zhao and A. D. Joseph and R. Katz and J. Kubiatowicz
Eleventh International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2001), 2001.

Zimmermann, P.

654. Pretty Good Privacy User's Guide
P. Zimmermann
Distributed with PGP software, June, 1993.

others,

655. PGM Reliable Transport Protocol
Speakman, T. and others
Technical Report
draft-speakman-pgm-spec-04 txt, Internet Draft, Internet Engineering Task Force, April, 2000.
Abstract: Pragmatic General Multicast (PGM) is a reliable multicast transport pro- tocol for applications that require ordered or unordered, duplicate- free, multicast data delivery from multiple sources to multiple receivers. PGM guarantees that a receiver in the group either receives all data packets from transmissions and repairs, or is able to detect unrecoverable data packet loss. PGM is specifically intended as a work- able solution for multicast applications with basic reliability require- ments. Its central design goal is simplicity of operation with due regard for scalability and network efficiency.

Note: Work in progress

s, A. Collin

656. Detour: A Case for Informed Internet Routing and Transport
S. Savage and T. Anderson and A. Aggarwal and D. Becker and N. Cardwell and A. Collin s and E. Hoffman and J. Snell and A. Vahdat and G. Voelker and J. Zahorjan
IEEE Micro, 1999.
Back to the main P2PRG Bibliography Project page

Web Accessibility