Tech-invite3GPPspaceIETFspace
959493929190898887868584838281807978777675747372717069686766656463626160595857565554535251504948474645444342414039383736353433323130292827262524232221201918171615141312111009080706050403020100
in Index   Prev   Next

RFC 4981

Survey of Research towards Robust Peer-to-Peer Networks: Search Methods

Pages: 91
Informational
Part 5 of 5 – Pages 72 to 91
First   Prev   None

Top   ToC   RFC4981 - Page 72   prevText
   [194] M. Surridge and C. Upstill, Grid security: lessons for peer-to-
         peer systems, Proc. Third Int'l IEEE Conf. on Peer-to-Peer
         Computing, Sept 1-3 2003, pp. 2-6.

   [195] E. Sit and R. Morris, Security considerations for peer-to-peer
         distributed hash tables, First Int'l Workshop on Peer-to-Peer
         Systems, March 2002.

   [196] C. O'Donnel and V. Vaikuntanathan, Information leak in the
         Chord lookup protocol, Proc. Fourth IEEE Int'l Conf. on Peer-
         to-Peer Computing, 25-27 August 2004.

   [197] K. Berket, A. Essiari, and A. Muratas, PKI-Based Security for
         Peer-to-Peer Information Sharing, Proc. Fourth IEEE Int'l Conf.
         on Peer-to-Peer Computing, 25-27 August 2004.

   [198] B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker, Spurring
         adoption of DHTs with OpenHash, a public DHT service, The 3rd
         Int'l Workshop on Peer-to-Peer Systems, February 26-27 2004.

   [199] J. Considine, M. Walfish, and D. G. Andersen, A pragmatic
         approach to DHT adoption, Technical Report,, December 2003.

   [200] G. Li, Peer to Peer Networks in Action, IEEE Internet Computing
         6 (1) (2002) 37-39.

   [201] A. Mislove, A. Post, C. Reis, P. Willmann, P. Druschel, D.
         Wallach, X. Bonnaire, P. Sens, J.-M. Busca, and L. Arantes-
         Bezerra, POST:  A Secure, Resilient, Cooperative Messaging
         System, 9th Workshop on Hot Topics in Operating Systems, HotOS,
         May 2003.

   [202] S. Saroiu, P. Gummadi, and S. Gribble, A measurement study of
         peer-to-peer file sharing systems, Proc.  Multimedia Computing
         and Networking 2002 MMCN'02, January 2002.

   [203] A. Muthitacharoen, R. Morris, T. Gil, and B. Chen, Ivy: a
         read/write peer-to-peer file system, ACM SIGOPS Operating
         Systems Review, Special issue on Decentralized storage systems,
         December 2002, pp. 31-44.

   [204] A. Muthitacharoen, R. Morris, T. Gil, and B. Chen, A read/write
         peer-to-peer file system, Proc. 5th Symp. on Operating System
         Design and Implementation (OSDI 2002), Boston, MA, December
         (2002)
Top   ToC   RFC4981 - Page 73
   [205] F. Annexstein, K. Berman, M. Jovanovic, and K. Ponnavaikko,
         Indexing techniques for file sharing in scalable peer to peer
         networks, 11th IEEE Int'l Conf. on Computer Communications and
         Networks (2002) 10-15.

   [206] G. Kan and Y. Faybishenko, Introduction to Gnougat, First Int'l
         Conf. on Peer-to-Peer Computing 2001 2001, pp. 4-12.

   [207] R. Gold and D. Tidhar, Towards a content-based aggregation
         network, Proc. First Int'l Conf. on Peer to Peer Compuuting
         2001, pp. 62-68.

   [208] F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica,
         Wide-area cooperative storage with CFS, Proc. 18th ACM
         symposium on Operating System Principles 2001, pp. 202-215.

   [209] M. Freedman, E. Freudenthal, and D. Mazieres, Democratizing
         content publication with coral, Proc. First Symp. on Networked
         Systems Design and Implementation NSDI'04, March 29-31 2004,
         pp. 239-252.

   [210] J. Li, B. T. Loo, J. Hellerstein, F. Kaashoek, D. Karger, and
         R. Morris, On the Feasibility of Peer-to-Peer Web Indexing and
         Search, Second Int'l Workshop on Peer-to-Peer Systems IPTPS 03,
         20-21 February 2003.

   [211] S. Iyer, A. Rowstron, and P. Druschel, Squirrel: a
         decentralized peer-to-peer web cache, Proc. 21st annual
         symposium on principles of distributed computing 2002, pp.
         213-222.

   [212] M. Bawa, R. Bayardo, S. Rajagopalan, and E. Shekita, Make it
         fresh, make it quick: searching a network of personal
         webservers, Proc. 12th international conference on World Wide
         Web 2003, pp. 577-586.

   [213] B. T. Loo, S. Krishnamurthy, and O. Cooper, Distributed web
         crawling over DHTs, Technical Report, CSD-04-1305, February 9
         2004.

   [214] M. Junginger and Y. Lee, A self-organizing publish/subscribe
         middleware for dynamic peer-to-peer networks, IEEE Network 18
         (1) (2004) 38-43.
Top   ToC   RFC4981 - Page 74
   [215] F. Cuenca-Acuna, C. Peery, R. Martin, and T. Nguyen, PlanetP:
         Using Gossiping to Build Content Addressable Peer-to-Peer
         Information Sharing Communities, Proc. 12th international
         symposium on High Performance Distributed Computing (HPDC),
         June 2002.

   [216] M. Walfish, H. Balakrishnan, and S. Shenker, Untangling the web
         from DNS, Proc. First Symp. on Networked Systems Design and
         Implementation NSDI'04, March 29-31 2004, pp. 225-238.

   [217] B. Awerbuch and C. Scheideler, Robust distributed name service,
         The 3rd Int'l Workshop on Peer-to-Peer Systems, February 26-27
         2004.

   [218] A. Iamnitchi, Resource Discovery in Large Resource-Sharing
         Environments, Doctoral Dissertation 2003.

   [219] R. Cox, A. Muthitacharoen, and R. Morris, Serving DNS using a
         Peer-to-Peer Lookup Service, First Int'l Workshop on Peer-to-
         Peer Systems (IPTPS), March 2002.

   [220] A. Chander, S. Dawson, P. Lincoln, and D. Stringer-Calvert,
         NEVRLATE:  scalable resource discovery, Second IEEE/ACM Int'l
         Symp. on Cluster Computing and the Grid CCGRID2002 2002, pp.
         56-65.

   [221] M. Balazinska, H. Balakrishnan, and D. Karger, INS/Twine:  A
         scalable Peer-to-Peer architecture for Intentional Resource
         Discovery, Proc. First Int'l Conf. on Pervasive Computing
         (IEEE) (2002)

   [222] J. Kangasharju, K. Ross, and D. Turner, Secure and resilient
         peer-to-peer E-mail: design and implementation, Proc. Third
         Int'l IEEE Conf. on Peer-to-Peer Computing, 1-3 Sept 2003.

   [223] V. Lo, D. Zappala, D. Zhou, Y. Liu, and S. Zhao, Cluster
         computing on the fly: P2P scheduling of idle cycles in the
         internet, The 3rd Int'l Workshop on Peer-to-Peer Systems,
         February 26-27 2004.

   [224] A. Iamnitchi, I. Foster, and D. Nurmi, A peer-to-peer approach
         to resource discovery in grid environments, IEEE High
         Performance Distributed Computing 2002.

   [225] I. Foster and A. Iamnitchi, On Death, Taxes and the Convergence
         of Peer-to-Peer and Grid Computing, Second Int'l Workshop on
         Peer-to-Peer Systems IPTPS 03, 20-21 February 2003.
Top   ToC   RFC4981 - Page 75
   [226] W. Hoschek, Peer-to-Peer Grid Databases for Web Service
         Discovery, Concurrency - Practice and Experience (2002) 1-7.

   [227] K. Aberer, A. Datta, and M. Hauswirth, A decentralized public
         key infrastructure for customer-to-customer e-commerce, Int'l
         Journal of Business Process Integration and Management (2004)

   [228] S. Ajmani, D. Clarke, C.-H. Moh, and S. Richman, ConChord:
         Cooperative SDSI Certificate Storage and Name Resolution, First
         Int'l Workshop on Peer-to-Peer Systems IPTPS, March 2002.

   [229] E. Sit, F. Dabek, and J. Robertson, UsenetDHT: a low overhead
         Usenet server, The 3rd Int'l Workshop on Peer-to-Peer Systems,
         February 26-27 2004.

   [230] H.-Y. Hsieh and R. Sivakumar, On transport layer support for
         peer-to-peer networks, The 3rd Int'l Workshop on Peer-to-Peer
         Systems, February 26-27 2004.

   [231] I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana,
         Internet indirection infrastructure, Proc. 2002 conference on
         applications, technologies, architectures and protocols for
         computer communications, August 19-23 2002, pp. 73-86.

   [232] E. Halepovic and R. Deters, Building a P2P forum system with
         JXTA, Proc. Second IEEE Int'l Conf. on Peer to Peer Computing
         P2P'02, September 5-7 2002.

   [233] M. Wawrzoniak, L. Peterson, and T. Roscoe, Sophia: an
         Information Plane for networked systems, ACM SIGCOMM Computer
         Communication Review 34 (1) (2004) 15-20.

   [234] D. Tran, K. Hua, and T. Do, A Peer-to-Peer Architecture for
         Media Streaming, IEEE Journal on Selected Areas in
         Communications 22 (1) (2004) 121-133.

   [235] V. Padmanabhan, H. Wang, and P. Chou, Supporting heterogeneity
         and congestion control in peer-to-peer multicast streaming, The
         3rd Int'l Workshop on Peer-to-Peer Systems, February 26-27
         2004.

   [236] A. Nicolosi and D. Mazieres, Secure acknowledgment of multicast
         messages in open peer-to-peer networks, The 3rd Int'l Workshop
         on Peer-to-Peer Systems, February 26-27 2004.
Top   ToC   RFC4981 - Page 76
   [237] R. Zhang and C. Hu, Borg: a hybrid protocol for scalable
         application-level multicast in peer-to-peer networks, Proc.
         13th international workshop on network and operating systems
         for digital audio and video 2003, pp. 172-179.

   [238] M. Sasabe, N. Wakamiya, M. Murata, and H. Miyahara, Scalable
         and continuous media streaming on peer-to-peer networks, Proc.
         Third Int'l IEEE Conf. on Peer-to-Peer Computing, Sept 1-3
         2003, pp. 92-99.

   [239] M. Hefeeda, A. Habib, B. Botev, D. Xu, and B. Bhargava,
         PROMISE: peer-to-peer media streaming using CollectCast, Proc.
         eleventh ACM international conference on multimedia 2003, pp.
         45-54.

   [240] M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron,
         and A. Singh, SplitStream:  high-bandwidth multicast in
         cooperative environments, Proc. 19th ACM symposium on operating
         systems principles 2003, pp. 298-313.

   [241] M. Castro, P. Druschel, A.-M. Kermarrec, and A. Rowstron,
         SCRIBE: a large-scale and decentralized application-level
         multicast infrastructure, IEEE Journal on Selected Areas in
         Communications 20 (8) (2002)

   [242] S. Zhuang, B. Zhao, A. Joseph, R. Katz, and J. Kubiatowicz,
         Bayeux: an architecture for scalable and fault-tolerant wide-
         area data dissemination, Proc. 11th ACM international workshop
         on network and operating systems support for digital audio and
         video, Jan 2001.

   [243] R. Lienhart, M. Holliman, Y.-K. Chen, I. Kozintsev, and M.
         Yeung, Improving media services on P2P networks, IEEE Internet
         Computing 6 (1) (2002) 58-67.

   [244] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L.
         Yin, and F. Yu, Data Centric Storage in Sensornets with GHT, a
         geographic hash table, Mobile Networks and Applications 8 (4)
         (2003) 427-442.

   [245] M. Demirbas and H. Ferhatosmanoglu, Peer-to-peer spatial
         queries in sensor networks, Proc. Third Int'l IEEE Conf. on
         Peer-to-Peer Computing, 1-3 Sept 2003, pp. 32-39.

   [246] S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan,
         and S. Shenker, GHT:  a geographic hash table for data-centric
         storage, Proc. First ACM Int'l Workshop on Wireless Sensor
         Networks and Applications (Mobicom) 2002, pp. 78-87.
Top   ToC   RFC4981 - Page 77
   [247] J. Hellerstein and W. Wang, Optimization of In-Network Data
         Reduction, Proc. First Workshop on Data Management for Sensor
         Networks DMSN 2004, August 30th 2004.

   [248] J. Li, J. Stribling, T. Gil, R. Morris, and F. Kaashoek,
         Comparing the performance of distributed hash tables under
         churn, The 3rd Int'l Workshop on Peer-to-Peer Systems, February
         26-27 2004.

   [249] S. Shenker, The data-centric revolution in networking, Keynote
         Speech, 29th Int'l Conf. on Very Large Data Bases, September
         9-12 2003.

   [250] S. Gribble, A. Halevy, Z. Ives, M. Rodrig, and D. Suciu, What
         can databases do for P2P?, Proc.  Fourth Int'l Workshop on
         Databases and the Web, WebDB2001, May 24-25 2001.

   [251] D. Clark, The design philosophy of the DARPA internet
         protocols, ACM SIGCOMM Computer Communication Review, Symp.
         proceedings on communications architectures and protocols 18
         (4) (1988)

   [252] J.-C. Laprie, Dependable Computing and Fault Tolerance:
         Concepts and Terminology, Twenty-Fifth Int'l Symp. on Fault-
         Tolerant Computing, Highlights from Twenty-Five Years 1995, pp.
         2-13.

   [253] D. Clark, J. Wroclawski, K. Sollins, and R. Braden, Tussle in
         cyberspace:  defining tomorrow's internet, Conf. on
         Applications, Technologies, Architectures and Protocols for
         Computer Communications 2002, pp. 347-356.

   [254] L. O. Alima, A. Ghodsi, and S. Haridi, "A framework for
         structured peer-to-peer overlay networks," in Global computing,
         vol. 3267, Lecture Notes in Computer Science: Springer Berlin /
         Heidelberg, 2005, pp. 223-249.

   [255] Clip2, The Gnutella Protocol Specification,
         http://www.clip2.com (2000)

   [256] Napster, http://www.napster.com (1999)

   [257] J. Mishchke and B. Stiller, A methodology for the design of
         distributed search in P2P middleware, IEEE Network 18 (1)
         (2004) 30-37.
Top   ToC   RFC4981 - Page 78
   [258] J. Li and K. Sollins, Implementing aggregation and broadcast
         over distributed hash tables.  Full report,
         http://krs.lcs.mit.edu/regions/docs.html (November) (2003)

   [259] M. Castro, M. Costa, and A. Rowstron, Should we build Gnutella
         on a structured overlay?, ACM SIGCOMM Computer Communication
         Review 34 (1) (2004) 131-136.

   [260] A. Singla and C. Rohrs, Ultrapeers: Another Step Towards
         Gnutella Scalability,
         http://groups.yahoo.com/group/the_gdf/files/Proposals/
         Working%20Proposals/Ultrapeer/ Version 1.0, 26 November (2002)

   [261] B. Cooper and H. Garcia-Molina, Ad hoc, Self-Supervising Peer-
         to-Peer Search Networks, Technical Report,
         http://www.cc.gatech.edu/~cooperb/odin/ 2003.

   [262] R. Baeza-Yates and B. Ribeiro-Neto, Modern Information
         Retrieval.  Addison Wesley, Essex, England, 1999.

   [263] S. Sen and J. Wang, Analyzing peer-to-peer traffic across large
         networks, IEEE/ACM Trans. on Networking 12 (2) (2004) 219-232.

   [264] H. Balakrishnan, S. Shenker, and M. Walfish, Semantic-Free
         Referencing in Linked Distributed Systems, Second Int'l
         Workshop on Peer-to-Peer Systems IPTPS 03, 20-21 February 2003.

   [265] B. Yang, P. Vinograd, and H. Garcia-Molina, Evaluating GUESS
         and non-forwarding peer-to-peer search, The 24th Int'l Conf. on
         Distributed Computing Systems ICDCS'04, Mar 23-26 2004.

   [266] A. Gupta, B. Liskov, and R. Rodrigues, One Hop Lookups for
         Peer-to-Peer Overlays, 9th Workshop on Hot Topics in Operating
         Systems (HotOS), 18-21 May 2003.

   [267] A. Gupta, B. Liskov, and R. Rodrigues, Efficient routing for
         peer-to-peer overlays, First symp. on Networked Systems Design
         and Implementation (NSDI), Mar 29-31 2004, pp. 113-126.

   [268] A. Mizrak, Y. Cheng, V. Kumar, and S. Savage, Structured
         superpeers: leveraging heterogeneity to provide constant-time
         lookup, IEEE Workshop on Internet Applications, June 23-24
         2003.

   [269] L. Adamic, R. Lukose, A. Puniyani, and B. Huberman, Search in
         power-law networks, Physical review E, The American Physical
         Society 64 (046135) (2001)
Top   ToC   RFC4981 - Page 79
   [270] F. Banaei-Kashani and C. Shahabi, Criticality-based analysis
         and design of unstructured peer-to-peer networks as "complex
         systems", Proc. 3rd IEEE/ACM Int'l Symp. on Cluster Computing
         and the Grid 2003, pp. 351-358.

   [271] KaZaa, KaZaa Media Desktop, www.kazaa.com (2001)

   [272] S. Sen and J. Wang, Analyzing peer-to-peer traffic across large
         networks, Proc. second ACM SIGCOMM workshop on Internet
         measurement, November 06-08 2002, pp. 137-150.

   [273] DirectConnect, http:www.neo-modus.com (2001)

   [274] S. Saroiu, K. Gummadi, R. Dunn, S. Gribble, and H. Levy, An
         analysis of Internet content delivery systems, ACM SIGOPS
         Operating Systems Review 36 (2002) 315-327.

   [275] A. Loo, The Future or Peer-to-Peer Computing, Communications of
         the ACM 46 (9) (2003) 56-61.

   [276] B. Yang and H. Garcia-Molina, Comparing Hybrid Peer-to-Peer
         Systems (extended), 27th Int'l Conf. on Very Large Data Bases,
         September 11-14 2001.

   [277] D. Scholl, OpenNap Home Page, http://opennap.sourceforge.net/
         (2001)

   [278] S. Ghemawat, H. Gobioff, and S.-T. Leung, The Google file
         system, Proc. 19th ACM symposium on operating systems
         principles 2003, pp. 29-43.

   [279] I. Clarke, S. Miller, T. Hong, O. Sandberg, and B. Wiley,
         Protecting Free Expression Online with Freenet, IEEE Internet
         Computing 6 (1) (2002)

   [280] J. Mache, M. Gilbert, J. Guchereau, J. Lesh, F. Ramli, and M.
         Wilkinson, Request algorithms in Freenet-style peer-to-peer
         systems, Proc. Second IEEE Int'l Conf. on Peer to Peer
         Computing P2P'02, September 5-7 2002.

   [281] C. Rohrs, Query Routing for the Gnutella Networks,
         http://www.limewire.com/developer/query_routing/
         keyword%20routing.htm Version 1.0 (2002)
Top   ToC   RFC4981 - Page 80
   [282] I. Clarke, Freenet's Next Generation Routing Protocol,
         http://freenetproject.org/index.php?page=ngrouting, 20th July
         2003.

   [283] A. Z. Kronfol, FASD: A fault-tolerant, adaptive scalable
         distributed search engine, Master's Thesis
         http://www.cs.princeton.edu/~akronfol/fasd/ 2002.

   [284] S. Gribble, E. Brewer, J. M. Hellerstein, and D. Culler,
         Scalable, Distributed Data Structures for Internet Service
         Construction, Proc. 4th Symp. on Operating Systems Design and
         Implementation OSDI 2000, October 2000.

   [285] K. Aberer, Efficient Search in Unbalanced, Randomized Peer-to-
         Peer Search Trees, EPFL Technical Report IC/2002/79 (2002)

   [286] R. Honicky and E. Miller, A fast algorithm for online placement
         and reorganization of replicated data, Proc. 17th Int'l
         Parallel and Distributed Processing Symp., April 2003.

   [287] G. S. Manku, Routing networks for distributed hash tables,
         Proc. 22nd annual ACM Symp. on Principles of Distributed
         Computing, PODC 2003, July 13-16 2003, pp. 133-142.

   [288] D. Lewin, Consistent hashing and random trees: algorithms for
         caching in distributed networks, Master's Thesis, Department of
         Electrical Engineering and Computer Science, Massachusetts
         Institute of Technology (1998)

   [289] S. Lei and A. Grama, Extended consistent hashing: a framework
         for distributed servers, Proc. 24th Int'l Conf. on Distributed
         Computing Systems ICDCS 2004, March 23-26 2004.

   [290] W. Litwin, Re: Chord & LH*, Email to Ion Stoica, March 23
         2004a.

   [291] J. Li, J. Stribling, R. Morris, F. Kaashoek, and T. Gil, A
         performance vs. cost framework for evaluating DHT design
         tradeoffs under churn, Proc. IEEE Infocom, Mar 13-17 2005.

   [292] S. Zhuang, D. Geels, I. Stoica, and R. Katz, On failure
         detection algorithms in overlay networks, Proc. IEEE Infocomm,
         Mar 13-17 2005.

   [293] X. Li, J. Misra, and C. G. Plaxton, Active and Concurrent
         Topology Maintenance, The 18th Annual Conf. on Distributed
         Computing (DISC 2004), Trippenhuis, Amsterdam, the Netherlands,
         October 4 - October 7 (2004)
Top   ToC   RFC4981 - Page 81
   [294] K. Aberer, L. O. Alima, A. Ghodsi, S. Girdzijauskas, M.
         Hauswirth, and S. Haridi, The essence of P2P: a reference
         architecture for overlay networks, Proc. of the 5th
         international conference on peer-to-peer computing, Aug 31-Sep
         2 2005.

   [295] C. Tang, M. Buco, R. Chang, S. Dwarkadas, L. Luan, E. So, and
         C. Ward, Low traffic overlay networks with large routing
         tables, Proc. of ACM Sigmetrics Int'l Conf. on Measurement and
         Modeling of Comp. Sys., Jun 6-10 2005, pp. 14-25.

   [296] S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, Handling
         churn in a DHT, Proc. of the USENIX Annual Technical
         Conference, June 2004.

   [297] C. Blake and R. Rodrigues, High Availability, Scalable Storage,
         Dynamic Peer Networks:  Pick Two, 9th Workshop on Hot Topics in
         Operating Systems (HotOS), Lihue, Hawaii, 18-21 May (2003)

   [298] S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S.
         Shenker, I. Stoica, and H. Yu, OpenDHT: a public DHT service
         and its uses, Proc. of the conf. on Applications, technologies,
         architectures and protocols for computer communications, Aug
         22-26 2005, pp. 73-84.

   [299] T. Gil, F. Kaashoek, J. Li, R. Morris, and J. Stribling,
         p2psim, a simulator for peer-to-peer protocols,
         http://www.pdos.lcs.mit.edu/p2psim/ (2003)

   [300] K. Hildrum, J. D. Kubiatowicz, S. Rao, and B. Y. Zhao,
         Distributed object location in a dynamic network, Theory of
         Computing Systems (2004)

   [301] N. Lynch, D. Malkhi, and D. Ratajczak, Atomic data access in
         distributed hash tables, Proc. Int'l Peer-to-Peer Symp., March
         7-8 2002.

   [302] S. Gilbert, N. Lynch, and A. Shvartsman, RAMBO II: Rapidly
         Reconfigurable Atomic Memory for Dynamic Networks, Technical
         Report, MIT-CSAIL-TR-890 2004.

   [303] N. Lynch and I. Stoica, MultiChord: A resilient namespace
         management algorithm, Technical Memo MIT-LCS-TR-936 2004.

   [304] J. Risson, K. Robinson, and T. Moors, Fault tolerant active
         rings for structured peer-to-peer overlays, Proc. of the 30th
         Annual IEEE Conf. on Local Computer Networks, Nov 15-17 2005,
         pp. 18-25.
Top   ToC   RFC4981 - Page 82
   [305] B. Awerbuch and C. Scheideler, Peer-to-peer systems for prefix
         search, Proc. 22nd annual ACM Symp. on Principles of
         Distributed Computing 2003, pp. 123-132.

   [306] F. Dabek, B. Zhao, P. Druschel, J. Kubiatowicz, and I. Stoica,
         Towards a common API for structured P2P overlays, Proc. Second
         Int'l Workshop on Peer to Peer Systems IPTPS 2003, February
         2003.

   [307] N. Feamster and H. Balakrishnan, Towards a logic for wide-area
         Internet routing, Proc. ACM SIGCOMM workshop on Future
         Directions in Network Architecture, August 25-27 2003, pp.
         289-300.

   [308] B. Ahlgren, M. Brunner, L. Eggert, R. Hancock, and S. Schmid,
         Invariants: a new design methodology for network architectures,
         Proc. ACM SIGCOMM workshop on Future Direction in Network
         Architecture, August 30 2004, pp. 65-70.

   [309] T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction
         to Algorithms, 2nd Edition. MIT Press, McGraw-Hill, Cambridge,
         London, England, 2003.

   [310] I. Abraham, D. Malkhi, and O. Dubzinski, LAND:Stretch
         (1+epsilon) Locality Aware Networks for DHTs, Proc. ACM-SIAM
         Symp. on Discrete Algorithms SODA-04 2004.

   [311] S. Jain, R. Mahajan, and D. Wetherall, A study of the
         performance potential of DHT-based overlays, Proc. of the 4th
         Usenix symposium on internet technologies and systems (USITS),
         Mar 2003.

   [312] J. Risson, A. Harwood, and T. Moors, Stable high-capacity one-
         hop distributed hash tables, Proc. of the IEEE Symposium on
         Computers and Communications (ISCC'06), Jun 26-29 2006.

   [313] V. Ramasubramanian and E. Sirer, Beehive: O(1) Lookup
         Performance for Power-Law Query Distributions in Peer-to-Peer
         Overlays, Proc. First Symp. on Networked Systems Design and
         Implementation (NSDI'04), San Francisco, California, March
         29-31 (2004) 99-112.

   [314] I. Abraham, A. Badola, D. Bickson, D. Malkhi, S. Maloo, and S.
         Ron, Practical locality-awareness for large scale information
         sharing, Proc. 4th International Workshop on Peer-to-Peer
         Systems, Feb 24-25 2005.
Top   ToC   RFC4981 - Page 83
   [315] B. Leong, B. Liskov, and E. Demaine, Epichord: parallelizing
         the Chord lookup algorithm with reactive routing state
         management, Proc. of the 12th International Conference on
         Networks, Nov 2004.

   [316] J. Li, J. Stribling, R. Morris, and F. Kaashoek, Bandwidth-
         efficient management of DHT routing tables, Proc. 2nd Symposium
         on Networked Systems Design and Implementation, May 2-4 2005.

   [317] S. Rhea, B.-G. Chun, J. Kubiatowicz, and S. Shenker, Fixing the
         embarrassing slowness of OpenDHT on PlanetLab, Proc. of the
         Second USENIX Workshop on Real, Large Distributed Systems, Dec
         13 2005.

   [318] M. Costa, M. Castro, A. Rowstron, and P. Key, PIC: Practical
         Internet coordinates for distance estimation, Proc. of the 24th
         international conference on distributed computing systems, Mar
         2004.

   [319] M. Castro, M. B. Jones, A.-M. Kermarrec, A. Rowstron, M.
         Theimer, H. Wang, and A. Wolman, An evaluation of scalable
         application- level multicast built using peer-to-peer overlays,
         Proc. of the 22nd Annual Joint Conf. of the IEEE Comp. and
         Comm. Soc. (INFOCOM), 30 Mar - 3 Apr 2003, pp. 1510-1520.

   [320] S. Ratnasamy, M. Handley, R. Karp, and S. Shenker,
         Application-level multicast using content-addressable networks,
         Proc. of the Third International Workshop on Networked Group
         Communication, Nov 7-9 2001.

   [321] S. El-Ansary, L. Alima, P. Brand, and S. Haridi, Efficient
         broadcast in structured P2P networks, Second Int'l Workshop on
         Peer-to-Peer Systems (IPTPS 03), Berkeley, CA, USA, 20-21
         February (2003)

   [322] J. Li, K. Sollins, and D.-Y. Lim, Implementing aggregation and
         broadcast over Distributed Hash Tables, ACM Computer
         Communication Reviews 35 (1) (2005) 81-92.

   [323] V. Pai, K. Tamilmani, V. Sambamurthy, K. Kumar, and A. Mohr,
         Chainsaw: eliminating trees from overlay multicast, Proc. 4th
         Int'l Workshop on Peer-to-Peer Systems, February 24-25 2005.

   [324] K. Birman, M. Hayden, O. Ozkasap, Z. Xiao, and M. Budiu,
         Bimodal Multicast, ACM Trans. on Computer Systems 17 (2) (1999)
         41-88.
Top   ToC   RFC4981 - Page 84
   [325] Z. Zhang, S. Chen, Y. Ling, and R. Chow, Resilient capacity-
         aware multicasting based on overlay networks, Proc. of the 25th
         IEEE Int'l Conf. on Distributed Computing Systems, 6-10 June
         2005, pp. 565-574.

   [326] A. Bharambe, S. Rao, V. Padmanabhan, S. Seshan, and H. Zhang,
         The impact of heterogeneous bandwidth constraints on DHT-based
         multicast protocols, Proc. 4th Int'l Workshop on Peer-to-Peer
         Systems, February 24-25 2005.

   [327] A. Ghodsi, L. O. Alima, S. El-Ansary, P. Brand, and S. Haridi,
         Self-correcting broadcast in distributed hash tables, Proc. of
         the 15th IASTED International Conf. on Parallel and Distributed
         Computing and Systems, Nov 2003.

   [328] R. Mahajan, M. Castro, and A. Rowstron, Controlling the cost of
         reliability in peer-to-peer overlays, Second Int'l Workshop on
         Peer-to-Peer Systems IPTPS'03, February 20-21 2003.

   [329] S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, Handling
         churn in a DHT, Report No. UCB/CSD-03-1299, University of
         California, also Proc. USENIX Annual Technical Conference, June
         2003.

   [330] M. Castro, M. Costa, and A. Rowstron, Performance and
         dependability of structured peer-to-peer overlays, Microsoft
         Research Technical Report MSR-TR-2003-94, December. Also 2004
         Int'l Conf. on Dependable Systems and Networks, June 28-July 1
         2003.

   [331] D. Liben-Nowell, H. Balakrishnan, and D. Karger, Analysis of
         the evolution of peer-to-peer systems, Annual ACM Symp. on
         Principles of Distributed Computing 2002, pp. 233-242.

   [332] L. Alima, S. El-Ansary, P. Brand, and S. Haridi, DKS(N,k,f): a
         family of low communication, scalable and fault-tolerant
         infrastructures for P2P applications, Proc. 3rd IEEE/ACM Int'l
         Symp. on Cluster Computing and the Grid (2003) 344-350.

   [333] D. Karger and M. Ruhl, Finding nearest neighbours in growth-
         restricted metrics, Proc. 34th annual ACM symposium on Theory
         of computing 2002, pp. 741-750.

   [334] S. Ratnasamy, A Scalable Content-Addressable Network, Doctoral
         Dissertation 2002.

   [335] S. McCanne and S. Floyd, The LBNL/UCB Network Simulator.
Top   ToC   RFC4981 - Page 85
   [336] M. Naor and U. Wieder, Novel architectures for P2P
         applications: the continuous-discrete approach, Proc. fifteenth
         annual ACM Symp. on Parallel Algorithms and Architectures, SPAA
         2003, June 7-9 2003, pp. 50-59.

   [337] N. D. de Bruijn, A combinatorial problem, Koninklijke
         Netherlands: Academe Van Wetenschappen 49 (1946) 758-764.

   [338] J.-W. Mao, "The Coloring and Routing Problems on de Bruijn
         Interconnection Networks," in Doctoral Dissertation, National
         Sun Yat-sen University, 2003.

   [339] M. L. Schlumberger, De Bruijn communication networks, Doctoral
         Dissertation 1974.

   [340] M. Imase and M. Itoh, Design to minimize diameter on building-
         block network, IEEE Trans. on Computers C-30 (6) (1981) 439-
         442.

   [341] S. M. Reddy, D. K. Pradhan, and J. G. Kuhl, Direct graphs with
         minimal and maximal connectivity, Technical Report, School of
         Engineering, Oakland University (1980)

   [342] R. A. Rowley and B. Bose, Fault-tolerant ring embedding in de
         Bruijn networks, IEEE Trans. on Computers 42 (12) (1993) 1480-
         1486.

   [343] K. Y. Lee, G. Liu, and H. F. Jordan, Hierarchical networks for
         optical communications, Journal of Parallel and Distributed
         Computing 60 (2000) 1-16.

   [344] M. Naor and U. Wieder, Know thy neighbor's neighbor:  better
         routing for skip-graphs and small worlds, The 3rd Int'l
         Workshop on Peer-to-Peer Systems, February 26-27 2004.

   [345] P. Fraigniaud and P. Gauron, The content-addressable networks
         D2B, Technical Report 1349, Laboratoire de Recherche en
         Informatique, January 2003.

   [346] A. Datta, S. Girdzijauskas, and K. Aberer, On de Bruijn routing
         in distributed hash tables: there and back again, Proc. Fourth
         IEEE Int'l Conf. on Peer-to-Peer Computing, , 25-27 August
         2004.

   [347] W. Pugh, Skip lists: a probabilistic alternative to balanced
         trees, Proc. Workshop on Algorithms and Data Structures, August
         17-19 1989, pp. 437-449.
Top   ToC   RFC4981 - Page 86
   [348] W. Pugh, Skip lists: a probabilistic alternative to balanced
         trees, Communications of the ACM 33 (6) (1990) 668-676.

   [349] J. Gray, The transaction concept: Virtues and limitations,
         Proc. VLDB, September 1981.

   [350] B. T. Loo, J. M. Hellerstein, R. Huebsch, S. Shenker, and I.
         Stoica, Enhancing P2P file-sharing with internet-scale query
         processor, Proc. 30th Int'l Conf. on Very Large Data Bases VLDB
         2004, 29 August-3 September 2004.

   [351] M. Stonebraker, P. Aoki, W. Litwin, A. Pfeffer, A. Sah, J.
         Sidell, C. Staelin, and A. Yu, Mariposa: a wide-area
         distributed database system, THE VLDB Journal - The Int'l
         Journal of Very Large Data Bases (5) (1996) 48-63.

   [352] V. Cholvi, P. Felber, and E. Biersack, Efficient Search in
         Unstructured Peer-to-Peer Networks, Proc. Symp. on Parallel
         Algorithms and Architectures, July 2004.

   [353] S. Daswani and A. Fisk, Gnutella UDP Extension for Scalable
         Searches (GUESS) v0.1,
         http://www.limewire.org/fisheye/viewrep/~raw,r=1.2/limecvs/
         core/guess_01.html (2002)

   [354] A. Fisk, Gnutella Dynamic Query Protocol v0.1, Gnutella
         Developer Forum (2003)

   [355] O. Gnawali, A Keyword Set Search System for Peer-to-Peer
         Networks, Master's Thesis 2002.

   [356] Limewire, Limewire Host Count,
         http://www.limewire.com/english/content/netsize.shtml (2004)

   [357] A. Fisk, Gnutella Ultrapeer Query Routing,
         http://groups.yahoo.com/group/the_gdf/files/Proposals/
         Working%20Proposals/search/Ultrapeer%20QRP/ v0.1 (2003)

   [358] A. Fisk, Gnutella Dynamic Query Protocol,
         http://groups.yahoo.com/group/the_gdf/files/Proposals/
         Working%20Proposals/search/Dynamic%20Querying/ v0.1 (2003)

   [359] S. Thadani, Meta Data searches on the Gnutella Network
         (addendum), http://www.limewire.com/developer/MetaProposal2.htm
         (2001)
Top   ToC   RFC4981 - Page 87
   [360] S. Thadani, Meta Information Searches on the Gnutella Networks,
         http://www.limewire.com/developer/metainfo_searches.html (2001)

   [361] P. Reynolds and A. Vahdat, Efficient peer-to-peer keyword
         searching, ACM/IFP/USENIX Int'l Middleware Conference,
         Middleware 2003, June 16-20 2003.

   [362] W. Terpstra, S. Behnel, L. Fiege, J. Kangasharju, and A.
         Buchmann, Bit Zipper Rendezvous, optimal data placement for
         general P2P queries, Proc. First Int'l Workshop on Peer-to-Peer
         Computing and Databases, March 14 2004.

   [363] A. Singhal, Modern Information Retrieval: A Brief Overview,
         IEEE Data Engineering Bulletin 24 (4) (2001) 35-43.

   [364] E. Cohen, A. Fiat, and H. Kaplan, Associative Search in Peer to
         Peer Networks: Harnessing Latent Semantics, IEEE Infocom 2003,
         The 22nd Annual Joint Conf. of the IEEE Computer and
         Communications Societies, March 30-April 3 2003.

   [365] W. Muller and A. Henrich, Fast retrieval of high-dimensional
         feature vectors in P2P networks using compact peer data
         summaries, Proc. 5th ACM SIGMM international workshop on
         Multimedia Information Retrieval, November 7 2003, pp. 79-86.

   [366] M. T. Ozsu and P. Valduriez, Principles of Distributed Database
         Systems, 2nd edition ed. Prentice Hall, 1999.

   [367] G. Salton, A. Wong, and C. S. Yang, A vector space model for
         automatic indexing, Communications of the ACM 18 (11) (1975)
         613- 620.

   [368] S. E. Robertson, S. Walker, and M. Beaulieu, Okapi at TREC-7:
         automatic ad hoc, filtering, VLC and filtering tracks, Proc.
         Seventh Text REtrieval Conference, TREC-7, NIST Special
         Publication 500-242, July 1999, pp. 253-264.

   [369] A. Singhal, J. Choi, D. Hindle, D. Lewis, and F. Pereira, AT&T
         at TREC-7, Proc. Seventh Text REtrieval Conf. TREC-7, July
         1999, pp. 253-264.

   [370] K. Sankaralingam, S. Sethumadhavan, and J. Browne, Distributed
         Pagerank for P2P Systems, Proc. 12th international symposium on
         High Performance Distributed Computing HPDC, June 22-24 2003.

   [371] I. Klampanos and J. Jose, An architecture for information
         retrieval over semi-collaborated peer-to-peer networks, Proc.
         2004 ACM symposium on applied computing 2004, pp. 1078-1083.
Top   ToC   RFC4981 - Page 88
   [372] C. Tang, Z. Xu, and S. Dwarkadas, Peer-to-peer information
         retrieval using self-organizing semantic overlay networks,
         Proc. 2003 conference on Applications, Technologies,
         Architectures and Protocols for Computer Communications, August
         25-29 2003, pp. 175-186.

   [373] C. Tang and S. Dwarkadas, Hybrid global-local indexing for
         efficient peer-to-peer information retrieval, Proc. First Symp.
         on Networked Systems Design and Implementation NSDI'04, March
         29-31 2004, pp. 211-224.

   [374] G. W. Furnas, S. Deerwester, S. T. Dumais, T. K. Landauer, R.
         A. Harshman, L. A. Streeter, and K. E. Lochbaum, Information
         retrieval using a singular value decomposition model of latent
         semantic structure, Proc. 11th Annual Int'l ACM SIGIR Conf. on
         Research and Development in Information Retrieval 1988, pp.
         465-480.

   [375] C. Tang, S. Dwarkadas, and Z. Xu, On scaling latent semantic
         indexing for large peer-to-peer systems, The 27th Annual Int'l
         ACM SIGIR Conf. SIGIR'04, ACM Special Interest Group on
         Information Retrieval, July 2004.

   [376] S. Milgram, The small world problem, Psychology Today 1 (61)
         (1967)

   [377] J. Kleinberg, The small-world phenonemon: An algorithmic
         perspective, Proc. 32nd ACM Symp. on Theory of Computing (2000)

   [378] Y. Petrakis and E. Pitoura, "On constructing small worlds in
         unstructured peer-to-peer systems," in Current trends in
         database technology (Proc. First Int'l Workshop on Peer-to-Peer
         Computing and Databases, Heraklion, Crete, Greece, March 14),
         vol. 3268, Lecture Notes in Computer Science: Springer, 2004,
         pp. 415-424.

   [379] A. Iamnitchi, M. Ripeanu, and I. Foster, Locating Data in
         (Small World?) P2P Scientific Collaborations, First Int'l
         Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, March
         (2002)
Top   ToC   RFC4981 - Page 89
   [380] Y. Ren, C. Sha, W. Qian, A. Zhou, B. Ooi, and K. Tan, Explore
         the "small world phenomena" in pure P2P information sharing
         systems, Proc. 3rd IEEE/ACM Int'l Symp. on Cluster Computing
         and the Grid (2003) 232-239.

   [381] G. S. Manku, M. Bawa, and P. Raghavan, Symphony:  Distributed
         Hashing in a Small World, Proc. 4th USENIX Symp. on Internet
         Technologies and Systems, March 26-28 2003.

   [382] W. Litwin and S. Sahri, Implementing SD-SQL Server: a Scalable
         Distributed Database System, CERIA Research Rerpot 2004-04-02,
         April 2004.

   [383] M. Jarke and J. Koch, Query Optimization in Database Systems,
         ACM Computing Surveys 16 (2) (1984) 111-152.

   [384] J. L. Bentley, Multidimensional binary search trees used for
         associative searching, Communications of the ACM 18 (9) (1975)
         509-517.

   [385] B. Chun, I. Stoica, J. Hellerstein, R. Huebsch, S. Jeffery, B.
         T. Loo, S. Mardanbeigi, T. Roscoe, S. Rhea, and S. Schenker,
         Querying at Internet Scale, Proc. 2004 ACM SIGMOD international
         conference on management of data, demonstration session 2004,
         pp. 935-936.

   [386] P. Cao and Z. Wang, Efficient top-K query calculation in
         distributed networks, Proc. 23rd Annual ACM SIGACT-SIGOPS Symp.
         on Principles of Distributed Computing PODC 2004, July 25-28
         2004, pp. 206-215.

   [387] D. Psaltoulis, I. Kostoulas, I. Gupta, K. Birman, and A.
         Demers, Practical algorithms for size estimation in large and
         dynamic groups, Proc. Twenty-Third Annual ACM SIGACT-SIGOPS
         Symp. on Principles of Distributed Computing, PODC 2004, July
         25-28 2004.

   [388] R. van Renesse, The importance of aggregation, Springer-Verlag
         Lecture Notes in Computer Science  "Future Directions in
         Distributed Computing".  A. Schiper, A. A. Shvartsman, H.
         Weatherspoon, and B. Y. Zhao, editors. Springer-Verlag,
         Heidelberg volume 2584 (2003)
Top   ToC   RFC4981 - Page 90

Author's Addresses

John Risson School of Elec Eng and Telecommunications University of New South Wales Sydney NSW 2052 Australia EMail: jr@tuffit.com Tim Moors School of Elec Eng and Telecommunications University of New South Wales Sydney NSW 2052 Australia EMail: t.moors@unsw.edu.au
Top   ToC   RFC4981 - Page 91
Full Copyright Statement

   Copyright (C) The IETF Trust (2007).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.