By Topic

2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)

Date 25-27 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 53
  • [Title page]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • List of papers

    Publication Year: 2010, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Message from the General Co-Chairs

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (283 KB)
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (267 KB)
    Freely Available from IEEE
  • Acknowledgment of Sponsors

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (315 KB)
    Freely Available from IEEE
  • Organization

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2010, Page(s):i - iii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Data Backup: A Peer-Assisted Approach

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    In this work we study the benefits of a peer- assisted approach to online backup applications, in which spare bandwidth and storage space of end- hosts complement that of an online storage service. Via simulations, we analyze the interplay between two key aspects of such applications: data placement and bandwidth allocation. Our analysis focuses on metrics such as the time required to complete a b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PeerDedupe: Insights into the Peer-Assisted Sampling Deduplication

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    As the digital data rapidly inflates to a world-wide storage crisis, data deduplication is showing its increasingly prominent function in data storage. Driven by the problems behind the mainstream server-side deduplication schemes, recently there has been a tendency of introducing peer-assisted methods into the deduplication systems. However, this topic is still quite vague at present and lacks th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Near Duplicate Detection for P2P Networks

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB) | HTML iconHTML

    In this paper, we propose a probabilistic algorithm for detecting near duplicate text, audio, and video resources efficiently and effectively in large-scale P2P systems. To this end, we present a thorough cost and probabilistic analysis that allows the algorithm to adapt to network and data collection characteristics for minimizing network cost. In addition, we extend the algorithm so that it can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability and Redundancy in Harmony: Measuring Retrieval Times in P2P Storage Systems

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Peer-to-peer (P2P) storage systems are strongly affected by churn - temporal and permanent peer failures. Because of this churn, the main requirement of such systems is to guarantee that stored objects can always be retrieved. This requirement is specially needed in two main situations: when users want to access the stored objects or when data maintenance processes have to repair lost information.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the DC File Sharing Network

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    This paper investigates the Direct Connect (DC) file sharing network, which to the best of our knowledge, has never been academically studied before. We developed a participating agent, in order to gather protocol specific information. We quantify network characteristics such as distribution of users in hubs, hubs geography, queries distribution and trends in shared folder size. We also characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spring for Vivaldi -- Orchestrating Hierarchical Network Coordinates

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Network coordinates have become an important building block for efficient peer-to-peer applications. They allow the peers to determine those other peers to whom they are likely to experience a low round trip time. So they can preferably attach to these selected peers and thereby create efficient overlay structures. Despite the substantial interest in this topic, there is still room for improvement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empirical traffic measurement of BitTorrent service in various settings (static, bus and subway) in commercial WiMAX networks. To this end, we analyze the connectivity among peers, the download throughput/stability, and the signaling o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do BitTorrent-Like VoD Systems Scale under Flash-Crowds?

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    The efficiency of BitTorrent for file sharing has inspired a number of BitTorrent-based P2P protocols for Video-on-Demand (VoD). It has been shown that these systems are scalable in steady-state: the service quality provided to the users does not depend on the number of users in the system. However, it is not well understood how these systems scale under flash-crowds. In this work, we model a gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Waiting for Anonymity: Understanding Delays in the Tor Overlay

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which are sensitive to latency, it is critical to reduce delays in Tor. To take an important step in this direction, we seek an in-depth understanding of delays in Tor. By taking snapshots of the entire Tor network within a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous NAT Traversal

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Traditional NAT traversal methods require the help of a third party for signalling. This paper investigates a new autonomous method for establishing connections to peers behind NAT. The proposed method for autonomous NAT traversal uses fake ICMP messages to initially contact the NATed peer. This paper presents how the method is supposed to work in theory, discusses some possible variations, introd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifiable Encryption for P2P Block Exchange

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Free-riding is an important problem in Peer-to-Peer (P2P) file-sharing networks. When peers refuse to contribute upload bandwidth, the whole network can collapse. A relatively new free-riding vulnerability in BitTorrent is the Large View Exploit, in which a peer connects to as many other peers as possible to increase the chance to get free data. This exploit can not be thwarted by tit-for-tat-like... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impact of Caching on BitTorrent-Like Peer-to-Peer Systems

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Peer-to-peer file-sharing systems are responsible for a significant share of the traffic between Internet service providers (ISPs) in the Internet. In order to decrease their peer-to-peer related transit traffic costs, many ISPs have deployed caches for peer-to-peer traffic in recent years. We consider how the different types of peer-to-peer caches - caches already available on the market and cach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unraveling BitTorrent's File Unavailability: Measurements and Analysis

    Publication Year: 2010, Page(s):1 - 9
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB) | HTML iconHTML

    BitTorrent suffers from one fundamental problem: the long-term availability of content. This occurs on a massive-scale with 38% of torrents becoming unavailable within the first month. In this paper we explore this problem by performing two large-scale measurement studies including 46K torrents and 29M users. The studies go significantly beyond any previous work by combining per-node, per-torrent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can P2P-Users Benefit from Locality-Awareness?

    Publication Year: 2010, Page(s):1 - 9
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Locality-awareness is considered as a promising approach to increase the efficiency of content distribution by peer-to-peer (P2P) networks, e.g., BitTorrent. It is intended to reduce the inter-domain traffic which is costly for Internet service providers (ISPs) and simultaneously increase the performance from the viewpoint of the P2P users, i.e, shorten download times. This win-win situation shoul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Tracker Selection for Peer-to-Peer Traffic Locality

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    BitTorrent (BT) is an extremely successful peer-to-peer (P2P) application providing efficient file sharing over the Internet. The ever-increasing traffic among the peers has also put unprecedented pressure to Internet Service Providers (ISPs). P2P locality has therefore been widely suggested, which explores finding local resources to optimize the cross-ISP/AS traffic. However, the ISPs would fail ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographically Enforced Permissions for Fully Decentralized File Systems

    Publication Year: 2010, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    Distributed file systems nowadays work well in many ways. They provide efficient solutions, for example, to distribute data among a global team. But most systems do not address the complex subject of secure user and group management. The systems that do, usually offer only a very limited subset of access permissions that is incompatible to the permissions usually used in Unix-like systems. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Access Enforcement in P2P Networks: When Privacy Comes into Play

    Publication Year: 2010, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    In open environments such as peer-to-peer networks, the decision to collaborate with multiple users (e.g., by granting access to a resource) is hard to achieve in practice due to extreme decentralization. The literature contains a plethora of examples where a scalable solution for access control is basic to spur their adoption.Motivated by this need, we introduce a novel protocol to enforce access... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.