Sciweavers

IPTPS
2004
Springer
13 years 9 months ago
2 P2P or Not 2 P2P?
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge how suitable a P2P solution might be for a particular problem. It is bas...
Mema Roussopoulos, Mary Baker, David S. H. Rosenth...
IPTPS
2004
Springer
13 years 9 months ago
On the Cost of Participating in a Peer-to-Peer Network
In this paper, we model the cost incurred by each peer participating in a peer-to-peer network. Such a cost model allows to gauge potential disincentives for peers to collaborate,...
Nicolas Christin, John Chuang
IPTPS
2004
Springer
13 years 9 months ago
When Multi-hop Peer-to-Peer Lookup Matters
Distributed hash tables have been around for a long time [5, 7]. A number of recent projects propose peerto-peer DHTs, based on multi-hop lookup optimizations. Some of these syste...
Rodrigo Rodrigues, Charles Blake
IPTPS
2004
Springer
13 years 9 months ago
Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming
Abstract— We consider the problem of supporting bandwidth heterogeneity and congestion control in the context of P2P multicast streaming. We identify several challenges peculiar ...
Venkata N. Padmanabhan, Helen J. Wang, Philip A. C...
IPTPS
2004
Springer
13 years 9 months ago
Willow: DHT, Aggregation, and Publish/Subscribe in One Protocol
—This paper describes a new peer-to-peer protocol that integrates DHT routing, aggregation, allto-all multicast, as well as both topic- and content-based publish/subscribe. In sp...
Robbert van Renesse, Adrian Bozdog
IPTPS
2004
Springer
13 years 9 months ago
Robust Distributed Name Service
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
Baruch Awerbuch, Christian Scheideler