Logo - springer
Slogan - springer

Computer Science - Communication Networks | Peer-to-Peer Systems IV - 4th International Workshop, IPTPS 2005, Ithaca, NY, USA, February 24-25,

Peer-to-Peer Systems IV

4th International Workshop, IPTPS 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers

Castro, Miguel, van Renesse, Robbert (Eds.)

2005, XI, 288 p. Also available online.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$69.99

(net) price for USA

ISBN 978-3-540-31906-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$99.00

(net) price for USA

ISBN 978-3-540-29068-1

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

The4th InternationalWorkshoponPeer-to-PeerSystemswasheld atCornellon February 24th and 25th 2005.The IPTPS workshopcontinued to bring together researchersand practitioners from a variety of disciplines, including networking, theory,databases,security,andscienti?ccomputing. Theydescribedexperim- tal ?ndings, discussed challenges, and presented novel techniques. We received 123 submissions. Submissions were limited to 6 pages, one page morethanin previousyears.ThesubmissionswerereviewedbyaProgramC- mitteeconsistingof18internationalexpertsfromacademiaandindustry.Aftera bidding process,each committee member was assigned 20 papers to review, g- erating 3 reviews for each paper. Controversial papers were assigned additional reviewers.Thepaperswerethenrankedbasedonoriginality,technicalmerit,and topical relevance,aswell asthe likelihood that the ideas expressedwouldlead to insightful technical discussions at the workshop. The program chairs suggested a program which was extensively discussed and revised by the entire committee to produce the ?nal program. We accepted 24 papers, which were organized into 8 sessions: Security and Incentives, Search, Multicast, Overlay Algorithms, Empirical Studies, and N- work Locality, and two sessions on miscellaneous topics. Authors revised their submissions for a preproceedings distributed at the workshop. After the wo- shop, the authors revised their papers once more for the proceedings before you.

Content Level » Research

Keywords » Cluster - Overlay - P2P - Peer - Routing - algorithms - bittorrent system - cluster computing - distributed systems - grid computing - load balancing - object oriented design - pee - peer-to-peer computing - security

Related subjects » Communication Networks - Database Management & Information Retrieval - Software Engineering - Theoretical Computer Science

Table of contents 

Workshop Report.- Workshop Report.- Security and Incentives.- A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn.- A First Look at Peer-to-Peer Worms: Threats and Defenses.- A Taxonomy of Rational Attacks.- Search.- Brushwood: Distributed Trees in Peer-to-Peer Systems.- Arpeggio: Metadata Searching and Content Sharing with Chord.- OverCite: A Cooperative Digital Research Library.- Miscellaneous.- NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation.- A Statistical Theory of Chord Under Churn.- Peering Peer-to-Peer Providers.- Multicast.- The Impact of Heterogeneous Bandwidth Constraints on DHT-Based Multicast Protocols.- Chainsaw: Eliminating Trees from Overlay Multicast.- FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification.- Overlay Algorithms.- Hybrid Overlay Structure Based on Random Walks.- Quickly Routing Searches Without Having to Move Content.- Practical Locality-Awareness for Large Scale Information Sharing.- Empirical Studies.- An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System.- Clustering in P2P Exchanges and Consequences on Performances.- The Bittorrent P2P File-Sharing System: Measurements and Analysis.- Miscellaneous.- Dynamic Load Balancing in Distributed Hash Tables.- High Availability in DHTs: Erasure Coding vs. Replication.- Conservation vs. Consensus in Peer-to-Peer Preservation Systems.- Exploiting Network Locality.- Locality Prediction for Oblivious Clients.- Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks.- Evaluating DHT-Based Service Placement for Stream-Based Overlays.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.