Tit-for-Tat
Achieving High Bandwidth Data
Transfers with The Right Incentives

 

Home
Overview
Status
People
Related Work

Peer-to-Peer File Transfer

  1. Keith Kong and Dipak Ghosal, “Pseudo-serving: a user responsible paradigm for internet access,” in Selected papers from the sixth international conference on World Wide Web, Essex, UK, 1997, pp. 1053–1064, Elsevier Science Publishers Ltd.
     
  2. Keith Kong and Dipak Ghosal, “Mitigating server-side congestion in the internet through pseudoserving,” IEEE/ACM Transactions on Networking, vol. 7, no. 4, pp. 530–544, 1999.
     
  3. Venkata N. Padmanabhan and Kunwadee Sripanidkulchai, “The case for cooperative networking,” in Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 2002, pp. 178–190.
     
  4. John Byers, Jeffrey Considine, Michael Mitzenmacher, and Stanislav Rost, “Informed content delivery across adaptive overlay networks,” 2002.
     
  5.  Rob Sherwood, Ryan Braud, and Bobby Bhattacharjee, “Slurpie:A cooperative bulk data transfer protocol,” March 2004.
     
  6. Xiangying Yang and Gustavo de Veciana, “Service capacity of  peer to peer networks,” in Proceedings of the IEEE INFOCOM 2004, 2004.
     
  7. Dave Levin, Rob Sherwood, and Bobby Bhattacharjee, “Fair file swarming with FOX,” in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS ’05), February 2005.
     
  8. Micah Adler, Rakesh Kumar, Keith W. Ross, Dan Rubenstein, Torsten Suel, and David. D. Yao, “Optimal peer selection for P2P downloading and streaming,” March 2005.
     
  9. Chuan Wu and Baochun Li, “Optimal peer selection for minimum-delay peer-to-peer streaming with rateless codes,” in
    P2PMMS’05: Proceedings of the ACM workshop on Advances in peer-to-peer multimedia streaming, New York, NY, USA, 2005, pp. 69–78, ACM Press.
     
  10. Christos Gkantsidis, Thomas Karagiannis, Pablo Rodriguez, and Milan Vojnovi´c, “Planet scale software updates,” in Proceedings of ACM Sigcomm Conference, Pisa, Italy, September 2006.
     
  11. Richard J. Dunn, Steven D. Gribble, Henry M. Levy, and John Zahorjan, “The importance of history in a media delivery system,” in Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS ’07), February 2007.
     

Handling Flash Crowds and Malicious Attacks

  1. Angelos Stavrou, Dan Rubenstein, and Sambit Sahu, “A lightweight, robust p2p system to handle flash crowds,” Tech. Rep. EE020321-1, Columbia University, New York, NY, Feb. 2002.
     
  2. John Douceur, “The sybil attack,” in Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 2002, pp. 178–190.
     
  3. Jaeyeon Jung, Balachander Krishnamurthy, and Michael Rabinovich, “Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites,” in Proceedings of the 11th international conference on World Wide Web (WWW ’02), New York, NY, USA, 2002, pp. 293–304, ACM Press.
     
  4. Tyron Stading, Petros Maniatis, and Mary Baker, “Peer-to-peer caching schemes to address flash crowds,” in Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’01), London, UK, 2002, pp. 203–213, Springer-Verlag.
     
  5. Dan Rubenstein and Sambit Sahu, “Can unstructured P2P protocols survive flash crowds?,” IEEE/ACM Trans. Netw., vol. 13, no. 3, pp. 501–512, 2005.
     
  6. Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein, “WebSOS: An overlay-based system for protecting web servers from denial of service attacks,” Journal of Communication Networks, vol.48, no. 5, August 2005.
     

Application-Layer Multicast

  1. Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Animesh Nandi, and Antony Rowstron, "SCRIBE: A large-scale and decentralised application-level multicast infrastructure", IEEE Journal on Selected Areas in Communications (JSAC) (Special issue on Network Support for Multicast Communications). 2002
     
  2. Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Animesh Nandi, Antony Rowstron, and Atul Singh, “Splitstream: High-bandwidth multicast in a cooperative environment,” in Proceedings of the 19th SOSP (SOSP ’03), Bolton Landing, New York, October 2003.
     
  3. D. Kostic, A. Rodriguez, J. Albrecht, and A. Vahdat, “Bullet: High bandwidth data dissemination using an overlay mesh,” in Proceedings of the 19th SOSP (SOSP ’03), Bolton Landing, New York, October 2003.
     
  4. Yu-Wei Sung, Michael Bishop, and Sanjay Rao, “Enabling contribution awareness in an overlay broadcasting system,” in Proceedings of ACM Sigcomm Conference, Pisa, Italy, September 2006.
     
  5. Ao-Jan Su and David R. Choffnes, “Drafting behind akamai (travelocity-based detouring),” in Proceedings of ACM Sigcomm Conference, Pisa, Italy, September 2006.

Measurement/Modelling

  1. Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D.Gribble, Henry M. Levy, and John Zahorjan, “Measurement, modeling, and analysis of a peer-to-peer file-sharing workload,” in Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), October 2003.
     
  2. Zihui Ge, Daniel R. Figueiredo, Sharad Jaiswal, Jim Kurose, and Don Towsley, “Modeling peer-peer file sharing systems,” 2003.
     
  3. Anthony Bellissimo, Brian N. Levine, and Prashant Shenoy, “Exploring the use of BitTorrent as the basis for a large trace repository,” Tech. Rep. 04-41, University of Massachusetts Amherst, June 2004.
     
  4. Uichin Lee, Min Choi, Junghoo Cho, M.˜Y. Sanadidi, and Mario Gerla, “Understanding pollution dynamics in p2p file sharing,” in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS ’05), February 2005.
     
  5. Lei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiaoning Ding, and Xiaodong Zhang, “Measurements, analysis, and modeling of BitTorrent-like systems,” in Proceedings of the ACM/SIGCOMM Internet Measurement Conference (IMC-05), October 2005, pp. 35–48.
     

Incentives

  1. Bram Cohen, “Incentives build robustness in BitTorrent,” 2003. 
     
  2. E. Adar and B. Huberman, “Free riding on gnutella,” Tech. Report, Xerox PARC, August 2000.
     
  3. Michael Sirivianos, Jong Han Park, Rex Chen, and Xiaowei Yang, “Free-riding in BitTorrent networks with the large view
    exploit
    ,” in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS ’06), February 2006.
     
  4. Nikitas Liogkas, Robert Nelson, Eddie Kohler, and Lixia Zhang, “Exploiting bittorrent for fun (but not profit),” in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS’05), February 2005.
     
  5. Landon Cox and Brian Noble, “Samsara: Honor among thieves in peer-to-peer storage,” in Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), October 2003.
     
  6. Qiao Lian, Yu Peng, Mao Yang, Zheng Zhang, Yafei Dai, and Xiaoming Li, “Robust incentives via multi-level tit-for-tat,” in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS ’05), February 2005.
     
  7. Michael Piatek, Tomas Isdal, Thomas Anderson, and Arvind Krishnamurthy, “Do incentives build robustness in BitTorrent?,” in Proceedings of the ACM/USENIX Fourth Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007.

$Date: 2008/01/01 06:35:12 $