homemailspeakers

P2P2004 List of accepted regular papers

6: Adaptive Peer-To-Peer Topologies
by Tyson Condie, Sepandar D. Kamvar, Hector Garcia-Molina
8: The Different Dimensions of Dynamcity
by Mayur Deshpande, Nalini Venkatasubramanian
16: Improving Bandwidth Efficiency of Peer-to-Peer Storage
by Patrick R. Eaton, John Kubiatowicz
18: On the Correctness of Query Results in XML P2P Databases
by Carlo Sartiani
28: On de Bruijn routing in distributed hash tables: There and back again
by Anwitaman Datta, Sarunas Girdzijauskas, Karl Aberer
33: SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks
by Nikos Ntarmos, Peter Triantafillou
38: Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave
by Keno Albrecht, Ruedi Arnold, Roger Wattenhofer
41:Reputation Management Framework And Its Use As Currency in Large-Scale Peer-to-Peer Networks
by Rohit Gupta, Arun K. Somanir
45: Analysis and Application of Passive Peer Influenc on Peer-to-Peer Inter-domain Traffic
by Atsushi Tagami, Teruyuki Hasegawa, Toru Hasegawa
62: Reliable Peer-to-peer End System Multicasting through Replication
by Jianjun Zhang, Ling Liu, Calton Pu, Mostafa Ammar
66: ICN: Interest-based Clustering Network
by Xiaole Bai, Shuping Liu, Peng Zhang, Raimo Kantola
69: Cache updates in a peer-to-peer network of mobile agents
by Elias Leontiadis, Vassilios V. Dimakopoulos, Evaggelia Pitoura
72: Erasure Code Replication Revisited
by W. K. Lin, D. M. Chiu, Y. B. Lee
76: Cooperative Pull-Push-Cycle for searching a hybrid P2P network
by Melanie Gnasa, Nadir Guel, Jasmin Grigull, Sascha Alda
78: P2P-based Collaborative Spam Detection and Filtering
by Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
79: PeerStore: Better Performance by Relaxing in Peer-to-Peer Backup
by Martin Landers, Han Zhang, Kian-Lee Tan
81: Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems
by Zhijun Wang, Sajal K Das, Mohan Kumar, Huaping Shen
86: P2P Scrabble: Can P2P Games Commence?
by Adam Wierzbicki,Tomasz Kucharski
87: A Robust Protocol for Building Superpeer Overlay Topologies
by Alberto Montresor
89: Peer-to-Peer Security in Mobile Devices: a User Perspective
by Stefano Campadello
94: A Placement scheme for Peer-to-Peer Networks based on Principles from Geometry
by Michael Kleis, Xiaoming Zhou
99: Automated Trust Negotiation in Peer-to-Peer Systems
by Song Ye, Fillia Makedon
100: PKI-Based Security for Peer-to-Peer Information Sharing
by Karlo Berket, Abdelilah Essiari, Artur Muratas
101: Constructing a Balanced, log(N)-Diameter Super-peer Topology
by Young June Pyun, Douglas S. Reeves
104: On the Security of Polling Protocols in Peer-to-Peer Systems
by Bartlomiej Sieka, Ajay Kshemkalyani, Mukesh Singhal
105: Broose
by Gai, L. Viennot
118: Information Leak in the Chord Lookup Protocol
by Charles W. O'Donnell, Vinod Vaikuntanathan
125: Semantic-laden Peer-to-Peer Service Directory
by Tim Hsin-ting Hu, Aruna Sereviratne
129: From Selfish Nodes to Cooperative Networks Emergent Link-based incentives in Peer-to-Peer Networks
by David Hales
133: Percolation Search in Power Law Networks: Making Unstructured Peer-To-Peer Networks Scalable
by Nima Sarshar, P. Oscar Boykin, Vwani Roychowdhury