Attention: The information contained in this page is subject to changes.
| Requirement | Required Readings | General/Recommended Readings | Reading Summary Posting |
There will be several background readings assigned each week. The readings will either be handed out a week before or listed on the Web page for required readings. You may also access this information from course schedule.
You are expected to read the material each week and write 2-3 paragraphs per reading giving your impressions and thoughts. The summaries should be informal and brief, and should consist of your own comments on the readings, NOT a rehash of the content.
You should email your summaries to TA:Gong Zhang and Myungcheol Doo ({gzhang3, myungcheol }@cc.gatech.edu), preferably before each class but no later than 11:59pm of Friday each week (unless there is no reading assignments for the week). Late assignment will NOT be accepted unless approved in advance by the instructor.
The summary for each reading assignment is expected to consist of 1 paragraph on each of the following three aspects: (1) the positive aspect of the paper; (2) the negative aspect of the paper; and (3) a brief discussion on how the idea or method proposed or used in evaluation may be applied to your own project for the course.
You may want to keep these guidelines in mind when reading papers.
You may find the following short article helpful:
Efficient Reading of Papers in Science and Technology By Michael J. Hanson and updated by D. McNamee
2. Web Servers
4. System Level Issues
5. Advanced Internet System Reading
6. Web2.0/Web3.0 and Social Networks
You are expected to read papers in the required reading list, but only write summary for one paper selected from the list of 2-3 required readings associated with each lecture. Please use the Summary Template to write the reading summaries and follows the summary submission suggestions to submit your summaries.
Questions: How to build a search engine that scales up as the Web grows?
1. Google, The Anatomy of a Large-scale Hypertextual Web Search Engine. Sergey Brin and
2. Inktomi: An Investigation of Documents from the World Wide Web Allison Woodruff, Paul M. Aoki, Eric Brewer, Paul Gauthier, and Lawrence A. Rowe
3. Harvest: Scalable Internet Resource Discovery: Research Problems and Approaches C. Mic Bowman (Tranarc Corp.), Peter Danzig (Univ. Southern California), Udi Manber (Univ. of Arizona), and Michael Schwartz (Univ. Colorado), Appeared in CACM 1994 (Download Harvest Indexer) (Harvest Papers)
4. Harvest: The Harvest Information Discovery and Access System C. Mic Bowman, Peter B. Danzig, Darren R. Hardy, Udi Manber and Michael F. Schwartz, Computer Networks and ISDN Systems, 28 (1995) pp. 119-125
5.
Harvest: A Scalable,Customizable Discovery and
Access System C. Mic Bowman, Peter B.
Danzig, Darren R. Hardy, Udi Manber,
Michael F. Schwartz, and Duane P. Wessels, Technical
Report CU-CS-732-94, Department of Computer Science,
6. Customized Information Extraction as a Basis for Resource Discovery Darren R. Hardy and Michael F. Schwartz, ACM Transactions on Computer Systems.
7. Indie: Distributed Indexing of autonomous Internet Services Peter Danzig, Shih-Hao Li, Katia Obraczka. Journam of Computer Systems, 5(4), 1992. Original description of Indie in 1991 ACM SIGIR
8. Internet resource discovery services Katia Obraczka, Peter Danzig, and Shih-Hao Li, IEEE Computer, Sept. 1993.
9. Research Problems for Scalable Internet Resource Discovery , C. Mic Bowman, Peter B. Danzig, and Michael F. Schwartz, 1993 IEEE Computer.
10. GLIMPSE: A Tool to Search Through Entire File Systems
Udi Manber and Sun Wu (
11. WebGlimpse--Combining
Browsing and Searching Udi Manber,
Mike Smith, and Burra Gopal
(
12. Mercator: A Scalable, Extensible Web Crawler Allan Heydon and Marc Najork,
13. A technique for measuring the relative size and overlap of
public Web search engines Krishna Bharat and Andrei Broder (DIGITAL,
14. The Connectivity Server: fast access to linkage information
on the Web Krishna Bharata, Andrei Brodera, Monika Henzingera, Puneet Kumara, and Suresh Venkatasubramanian,
Proceedings of the 7th International World Wide Web Conference,
15. Efficient Crawling through URL Ordering Junghoo Cho, Hector Garcia-Molina, and Lawrence Page, Proceedings of the 7thInternational World Wide Web Conference, pages 161-172, April 1998
16. Crawling towards Eternity: Building an Archive of the World Wide Web Mike Burner, Web Techniques Magazine, 2(5), May 1997
17. The Truth about the Web: Crawling towards Eternity Z. Smith, Web Techniques Magazine, 2(5), May 1997
18. Measuring Index Quality using Random Walks on the Web Monika Henzinger, Allan Heydon, Michael Mitzenmacher, and Marc A. Najork, Proceedings of the 8th International World Wide Web Conference, pages 213-225, May 1999
19. Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery Soumen Chakrabarti, Martin van den Berg, Byron Dom, Proceedings of the 8thInternational World Wide Web Conference, May 1999
20. Finding What People Want: Experiences with the WebCrawler Brian Pinkerton, Proceedings of the 8th International World Wide Web Conference, 1994
21. SPHINX: A Framework for Creating Personal, Site-specific Web Creawlers Robert C. Miller and Krishna Bharat, Proceedings of the 7th International World Wide Web Conference, pages 119-130, April 1998
22. Information Retrieval on the World Wide Web Venkat N. Gudivada, Vijay V. Raghavan, William I. Grosky, and Rajesh Kasangottu, IEEE Internet Computing, vol. 1, number 5, September/October, 1997.
23. GENVL and WWW: Tools for Taming the Web, Oliver McBryan, Proceedings of the First Int'l World Wide Web Conference, CERN, Geneva, May 1994.
24. A World Wide Web Resource Discovery System Budi Yuwon, Savio L. Y. Lam, Jerry H. Ying, Dik L. Lee Proceedings of the 4th World Wide Web Conference, 1998.
25. A Survey of Information Retrieval and Filtering Methods
Christos Faloutos and Douglas Oard
(
26. Guidelines for Robot Writers, Martijn Koster, 1993
27. Robots in the Web: threat or treat? Martijn Koster, NEXOR, April 1995, [1997: Updated links and addresses]; A Standard for Robot Exclusion Martijn Koster.
28. Authoritative Sources in a Hyperlinked Environment, J. Kleinberg. Proc. 9th ACM-SIAM Symposium on Discrete Algorithms, 1998. Extended version in Journal of the ACM 46(1999). Also appears as IBM Research Report RJ 10076, May 1997. ( IBM Clever Searching Project)
29. How Search Engines Rank Web Pages Danny Courtois and Sullivan.
30. Evaluation of Web search engines and the search for better ranking algorithms. Mildrid Ljosland e-mail: Mildrid.Ljosland@idi.ntnu.no Norwegian University of Science and Technology. the SIGIR99 Workshop on Evaluation of Web Retrieval, August 19, 1999
31. Automatic Resource Compilation by Analyzing Hyperlink
Structure and Associated Text. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg,
P. Raghavan, and S. Rajagopalan. Proceedings of the 7th
World-Wide Web conference, 1998. Copyright owned by Elsevier Sciences,
32. Inferring Web Communities from Link Topologies. D. Gibson, J. Kleinberg, and P. Raghavan. Proceedings of The Ninth ACM Conference on Hypertext and Hypermedia, 1998. Copyright owned by ACM.
33. Scalable feature selection, classification and signature generation for organizing large text databases into hierarchical topic taxonomies. S. Chakrabarti, B. Dom, R. Agrawal, P. Raghavan. VLDB Journal, 1998 (invited).
34. Enhanced hypertext categorization using hyperlinks.S. Chakrabarti, B. Dom and P. Indyk. Proceedings of ACM SIGMOD 1998.
35. Hypersearching the web. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan and A. Tomkins. Scientific American, June, 1999.
36. Mining the link structure of the World Wide Web. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan and A. Tomkins. IEEE Computer.
37. Trawling the Web for emerging cyber-communities. S.R.
Kumar, P. Raghavan, S. Rajagopalan,
and A. Tomkins. Eighth World Wide Web conference,
38. Focused crawling: a new approach to topic specific resource discovery. S. Chakrabarti, M. Van den Berg, B. Dom Eighth World Wide Web conference, Toronto, 1999.
39. The web as a graph: Measurements, models and methods. J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Proceedings of the International Conference on Combinatorics and Computing, 1999; invited paper.
40. Extracting large scale knowledge bases from the web.
S.R. Kumar, P. Raghavan, S. Rajagopalan,
and A. Tomkins. IEEE International conference on Very Large Databases (VLDB),
41. Clustering categorical data: an approach based on dynamical systems. D. Gibson, J. Kleinberg and P. Raghavan. Proceedings of the VLDB conference, 1998.
42. Search and Ranking Algorithms for Locating Resources on the World Wide Web B. Yuwono and D. Lee. IEEE conference on Data Engineering, 1996 (pp391-400).
43. A Machine Learning Architecture for Optimizing Web Search Engines, J. Boyan, D. Freitag, and T. Joachims. AAAI Workshop on Internet-based Information Systems, 1996.
44. SIBRIS: the Sandwich Interactive Browsing and Ranking Information System S. Wade, P. Willett, and D. Bawden. Journal of Information Science, 15, 1989, pp249-260
45. Estimating the Usefulness of Search Engines
46. The effectiveness of GlOSS for the Text Database Discovery Problem L. Gravano, H. Garcia-Molina, A. Tomasic. SIGMOD 1994. (GlOSS)
47. Adaptive methods for the computation of PageRank, Sepandar Kamvar1, Taher Haveliwala2, Gene Golub, Technical Report,, Standford University, 2003
48. Building a Distributed Full-Text Index for the Web,
Melnik, Sergey and Raghavan,
Sriram and Yang,
49. Parallel Crawlers, Junghoo Cho, Hector
Garcia-Molina, 11th WWW
50 An adaptive model for optimizing performance of an incremental web
crawler , Edwards, J., McCurley, K.
S., and Tomlin, J. A., In Proceedings of
the Tenth Conference on World Wide Web (2001)
51. Focused crawling using context graphs, 26th International Conference on Very Large Databases
52. Effective page refresh policies for web crawlers. Junghoo Cho, Hector Garcia-Molina, ACM Transactions on Database Systems
53. Self-similarity
in the web. Stephen Dill etc. ACM Transactions on Internet Technology
(TOIT) archive (August 2002)
54. Finding replicated web collections. Junghoo Cho,
55. Hilltop: A search engine based on expert documents. K. Bharat and G. A. Mihaila, 9th WWW Conference (Poster), 2000.
56. TopicSensitive PageRank, In Proceedings of the Eleventh International
World Wide Web Conference
57. Generalizing PageRank: Damping functions for link-based ranking algorithms, Ricardo BaezaYates etc, In Proceedings of SIGIR2002
58. Site Level Noise Removal for Search Engines,
Carvalho, Paul - Alexandru Chirita,
Edleno Silva de Moura,
etc, In 15th WWW
59. Efficient crawling through URL ordering, Junghoo Cho etc , Computer Networks and ISDN Systems archive 1998,
60. Stuff I’ve Seen: A System for Personal Information Retrieval and Re-Use, Susan Dumais etc, 26th ACM SIGIR conference on Research and development in informaion retrieval
61. When experts agree: Using non-affiliated experts to rank popular topics, Krishna Bharat, George A. Mihaila, 10th WWW
62. The stochastic approach for link-structure analysis (salsa) and the tkc effect, R. Lempel, S. Moran, 9th WWW
63. What is this Page Known for?
Computing Web Page Reputations, Davood Rafiei, Alberto Mendelzon , 9th WWW
64. PicASHOW: Pictorial Authority Search by Hyperlinks on the
Web, R. Lempel, A. Soffer, 10th WWW
65. Web Search via Hub Synthesis, Dimitris Achlioptas, Amos Fiat,
Anna Karlin, Frank McSherry,
42nd IEEE Symposium on Foundations of Computer Science
66. Approximating
Aggregate Queries about Web Pages via Random Walks, Ziv Bar-Yossef etc, VLDB 2000
Questions: What are the key technology for building high performance and scalable Web Servers ?
1. Measuring the Capacity of a Web Server Gaurav Banga and Peter Druschel, Proceedings of the 1997 USENIX Symposium on
Internet Technologies and Systems,
2. Internet Web Servers: Workload Characterization and Performance Implications Arlitt and Williamson, ACM/IEEE Transactions on Networking, 5(5):631-645, Oct. 1997. A short version titled "Web Server Workloa d Characterization: The Search for Invariants", appeared in ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, May 1996.
3. Locating Nearby Copies of Replicated Internet Servers, James D. Guyton and Michael F. Schwartz. ACM SIGCOMM, 1995.
4. HACC: An Architecture for
Cluster-Based Web Servers Xiaolan
Zhang, Michael Barrientos, J. Bradley Chen, Margo
Seltzer (
5. Trace-Driven Simulation of Document Caching Strategies for Internet Web Servers Martin F. Arlitt and Carey L. Williamson, Simulation, Special Issue: Modeling and Simulation of Computer Systems and Networks. Vol. 68, No. 1, January, 1997.
6. Performance Characteristics of Mirror Servers on the Internet Andy Myers, Peter Dinda, Hui Zhang. INFOCOM'98.
7. TCP Behavior of a Busy Internet Server: Analysis and Improvements Hari Balakrishnan, Venkata Padmanabhan, Srini Seshan, Mark Stemm and Randy H. Katz, INFOCOM'98.
8. The Content and Access Dynamics of a Busy Web Site: Findings and Implications V. N. Padmanabhan and L. Qiu. Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, August 2000. . (An earlier version appeared as Microsoft Research Technical Report MSR-TR-2000-13, February 2000 )
9. A Performance Monitoring and Capacity Planning Methodology for Web Servers, Rodney B. Wallace and Tyrone E. McKoy, Jr. (NCR Corporation)
10. A Self-Scaling and Self-Configuring Benchmark for Web Servers, Stephen Manley (Network Appliance), Michael Courage (Microsoft Co.), and Mar go Seltzer (Harvard)
11. Connection Scheduling in Web Servers M. E. Crovella, R. Frangioso, and M. Harchol-Balter, Proceedings of the 1999 USENIX Symposium on Internet Technologies.
12. Dynamic Server Selection in the Internet Mark E. Crovella and Robert L. Carter, Computer Science Department, Boston University.
13. Dynamic Server Selection Using Bandwidth Probing in Wide-Area Networks, R. Carter and M. Crovella, INFOCOM, 1997. extended version (TR-96-007).
14. NCSA's World Wide Web Server: Design and Performance Tomas T. Kwan, Robert E. McGrath, and Daniel A. Reed, IEEE Computer, Vol. 28, No. 11, pp. 68-74, November 1995. An earlier version titled: User Access Patterns to NCSA's World Wide Web Server. (Recent Pablo Project)
15. A Scalable and Highly Available Web Server, MukherjeeTewari. In Proceedings of the IEEE Computer Conference (COMPCON), Santa Clara, March, 1996.
16. A Scalable HTTP Server: The NCSA Prototype, R. McGrath. Proc. of the 1st Intl. World-Wide Web Conference, May 1994. (HTML)
17. The Power of Two Choices in Randomized Load Balancing, M. Mitzenmacher, PhD. Thesis, 1996.
18. Flash: An Efficient and Portable Web Server Vivek Pai, Peter Druschel and Willy Zwaenepoel,
Proceedings of 1999 USENIX Conference,
19. The AFS File System in Distributed Computing Environments:White Paper, Mnsarc Corporation, May 1996.
20. Apache Server (Apache HTTP Server V1.3 - API notes)
Questions: How do we coordinate the activities of a geographically distributed application?
1. World Wide Web Proxies Ari Luotonen (CERN) and Kevin Altis (Intel) (html)
4. Main Memory Caching of Web Documents, vangelos P. Markatos. In Proceedings of the Fifth WWW Conference, 1996.
5. Design Considerations for Integrated Proxy Servers S. Sahu, P. Shenoy, D. Towsley. y Proc. IEEE NOSSDAV'99 (Basking Ridge, NJ, June 1999).
12. Intelligent Caching for World-Wide Web Objects
Duane Wessels (
13. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol L. Fan, P. Cao, J. Almeida, and A.Z. Broder, SIGCOMM, 1998, pp 254-265.
17. An Analysis of Geographical Push Caching J. Gwertzman and M. Seltzer.
23. Squid Internet Object Cache; Squid Web Proxy Cache
26. Propagation, Replication and Caching from the W3C
30. A Survey of Proxy Cache Evaluation Techniques Brian D. Davison
31. A Tutorial for Network Caching
Question: How much can Prefetching alleviate the latency and bandwidth problems in Web access?
1. Using Predictive Prefetching to Improve World Wide Web Latency, Padmanabhan and Mogul, SIGCOMM, 1996.
2. Alleviating the Latency and Bandwidth Problems in WWW Browsing, Loon and Bharghavan, Usenix Symposium on Internet Technologies and Systems (USITS) 1997.
3. Determining WWW User's Next Access and Its Application to Pre-fetching, Carlos R. Cunha and Carlos F.B. Jaccoud, Proceedings of ISCC'97: The Second IEEE Symposium on Computers and Communications. Alexandria, Egypt, 1-3 July 1997.
4.
Potential and Limits of Web Prefetching Between
Low-Bandwidth Clients and Proxies Li Fan, Quinn Jacobson and
5. Optimal Prefetching via Data Compression, Vitter and Krishnan, FOCS, 1991.
6. The Network Effects of Prefetching, Crovella and Barford, INFOCOM, 1998.
Questions: What are the main causes of World Wide Web traffic? How do we find idle resources if they exist?
1. Web Facts and Fantasy, Stephen Manley (Network Appliance), Margo Seltzer (Harvard University), Proceedings of the 1997 USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December 1997.
2. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, Mark E. Crovella and Azer Bestavros IEEE/ACM Transactions on Networking, 5(6):835--846, December 1997.
3. Measuring Web Performance in the Wide Area, P. Barford and M. E. Crovella, in Performance Evaluation Review, August, 1999.
4. Changes in Web Client Access Patterns: Characteristics and Caching Implications, P. Barford, A. Bestavros, A. Bradley, and M. E. Crovella, in World Wide Web, Special Issue on Characterization and Performance Evaluation, Vol. 2, pp. 15-28, 1999.
5. Characterizing Browsing Strategies in the World-Wide Web, L. Catledge and J. Pitkow, Journal of Computer Networks and ISDN Systems, vol. 27, no. 6, 1995, p. 1065.
6.
Measuring the Web, Tim Bray (Open Text
Corporation), Fifth International World Wide Web Conference, May 1996,
7. Generating Representative Web Workloads for Network and Server Performance Evaluation, Barford and Crovella, SIGMETRICS, 1998, pp. 151-160.
8. Characterizing Reference Locality in the WWW, Almeida, Bestavros, Crovella, and de Oliveira, International Conference on Parallel and Distributed Information Systems (ICPDIS), 1996. (The OCEANS Project)
9.
Web Traffic Characterization: An Assessment of the Impact of
Caching Documents from NCSA's Web Server H. Braun and K. Claffy; Second International Conference on the WWW,
10. Open Market's The Internet Index Home Page
11. System Design Issues for Internet Middleware Services: Deductions from a Large Client Trace, Gribble and Brewer, Usenix Symposium on Internet Technologies and Systems (USITS) 1997.
Questions: How do we build a scalable Internet service located at a single site? Should we replicate to get end-to-end availability? What abstractions should we provide to support scalability to millions of users, and continuous operations 24 hours per day and 7 days per week?
1. Availability and Latency of World Wide Web Information Servers, Charles L. Viles and James C. French (University of Virginia), USENIX, Computing Systems; vol. 8, no. 1; Winter 1995.
2. A Quantitative Study of Differentiated Services
3. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast S. Kasera, J. Kurose, D. Towsley. Proc. IEEE Infocom'98 (San Francisco, CA, April 1998). A longer version is available as UMass CMPSCI Technical Report 97-69.
4. A Comparison of Sender-Initiated and Receiver-Initiated Reliable Multicast Protocols D. Towsley, J. Kurose, S. Pingali. IEEE Journal on Selected Areas in Communications (JSAC) (April 1997)
5. Exploiting Internetwork Multicast Services Nortel White Paper.
6. "Server-initiated Document Dissemination for the WWW" Azer Bestavros and Carlos Cunha,IEEE Data Engineering Bulletin, September 1996.
7, Middleware Support for Data Mining and Knowledge Discovery in Large-scale Distributed Information Systems., Azer Bestavros, In Proceedings of ACM SIGMOD'96 Data Mining Workshop, Montreal, Canada, June 1996.
8. "Speculative
Data Dissemination and Service to Reduce Server Load, Network Traffic and
Service Time for Distributed Information Systems" ,
Azer Bestavros, Proceedings of ICDE'96: The 1996
International Conference on Data Engineering,
9. Using
speculation to reduce server load and service time on the WWW, Azer Bestavros, in Proceedings of CIKM'95: The Fourth ACM
International Conference on Information and Knowledge Management,
10. "Demand-based document dissemination to reduce traffic and balance load in distributed information systems" Azer Bestavros, in Proceedings of the 1995 Seventh IEEE Symposium on Parallel and Distributed Processing, San Antonio, Texas. October 1995.
11. Demand-based
Data Dissemination for Distributed Multimedia Applications, Azer Bestavros, in Proceedings of
the ACM/ISMM/IASTED International Conference on Distributed
Multimedia Systems and Applications, Stanford, CA. August 1995.
12. "Information Dissemination and
Speculative Service: Two candidate functionalities for the middleware
infrastructure" Azer Bestavros, in Proceedings
of SIGCOMM'95 Workshop on Middleware.
13. Personalized
Information Environments: An Architecture for Customizable Access to Distributed Digital Libraries,
James C. French and Charles L. Viles, D-Lib Magazine,
June 1999, Volume 5 Number 6
14. Continuous Profiling: Where Have All the Cycles Gone? Jennifer M. Anderson, Lance M. Berc, Jeffrey Dean, Sanjay Ghemawat, Monika R. Henzinger, Shun-Tak A. Leung, Richard L. Sites, Mark T. Vandevoorde, Carl A. Waldspurger, and William E. Weihl. SOSP'97.
15. System Support for Automated
Profiling and Optimization, Aolan Zhang, Zheng Wang, Nicholas Gloy, J.
Bradley Chen, and Michael D. Smith, SOSP'97.
16. Cluster-Based Scalable
Network Services. Fox, Gribble, Chawathe, and Brewer,
Proceedings of SOSP, 1997.
17. A Case for Networks of Workstations:
NOW, T. Anderson, D. Culler, D. Patterson, IEEE Micro Feb. 1995. (The
18. Free Transactions with Rio Vista, David
E. Lowell and Peter M. Chen, Proceedings of the 1997 Symposium on Operating
Systems Principles (SOSP), October 1997. (The
19. The Case for Application-Specific
Benchmarking, Margo Seltzer, David Krinsky,
Keith Smith, Xiaolan Zhang.
20. Frangipani: A Scalable
Distributed File System, C. Thekkath, T. Mann and
E. Lee, Proceedings of the 1997 Symposium on Operating Systems Principles (SOSP), October 1997.
21. Serverless Network File Systems,
22. A Note on Distributed
Computing, Jim Waldo, Geoff Wyant, Ann Wollrath, and Sam Kendall, Sun Microsystems Laboratories Technical
Report TR-94-29 (November 1994).
23. Application-Level
Document Caching in the Internet Azer Bestavros et.al, Proceedings of
SDNE'95: The second International Workshop on Services in Distributed and
Network Environments. Whistler,
24. WWW Media Distribution
via Hopwise Reliable Multicast, James E. (Jed) Donnelley Lawrence
25. Scalable Reliable Multicast Using
Multiple Multicast Channels, S. Kasera, G. Hjalmtysson, D. Towsley, J.
Kurose, To appear in IEEE/ACM Transactions on Networking, 2000.
26. Scalable fair reliable multicast using active
services, S.K. Kasera, S. Bhattacharyya, M.
Keaton, D. Kiwior, J. Kurose, D. Towsley,
S. Zabel. IEEE Networks Magazine.
27. An
Internet Multicast System for the Stock Market, N.F. Maxemchuk
and D. H. Shur (AT&T Labs - Research)
29. Real-time Applications
of the Internet, N. F. Maxemchuk,
30. Operational
Information Systems - An example from the Airline Industry, Van Oleson, Greg Eisenhaur, Calton Pu, Karsten
Schwan, Beth Plale and Dick
Amin. Sept., 2000.
31. Disconnected Operations in
the Coda File System, J. Kistler and M. Satyanarayanan, ACM Transcations
on Computing Systems, Vol 10, No 1, Pages 3-25, February
1992.
32. Information Monitoring on the Web: A
Scalable Solution. Ling Liu, Wei Tang, David Buttler, and Calton Pu. World Wide Web Journal(by
Kluwer Academic Publishers), Volume 5, No. 4.
33. InfoFilter:
Supporting Quality of Service for Fresh Information Delivery, Ling Liu, Calton Pu, Karsten
Schwan, Jon Walpole. New Generation
Computing Journal (Vol.18, No.4),
34. Continual
Queries for Internet Scale Event-Driven Information Delivery , Ling Liu, Calton Pu, Wei Tang. n: Special
issue on Web Technologies, IEEE Transactions on Knowledge and Data Engineering,
Vol.11, No.4, July/Aug. 1999. pp610-628.
35. Methodical Restructuring of Complex Workflow
Activities, Ling Liu and Calton Pu. IEEE 14th International Conference on Data egineering, February 23-27, 1998,
36. Support
for Data-intensive Applications in Large-scale Systems, Mike Dahlin,
38. "Web content adaptation
to improve server overload behavior", T.Abdelzaher
and N.Bhatti, International World Wide Web conference,
39. "Web
server QoS management by adaptive content delivery", T.Abdelzaher and N.Bhatti, International
Workshop on Quality of
Service,
40. "Digestor:
Device-independent Access to the World Wide Web", T. Bickmore and B. Schilit, The
Sixth International World Wide Web Conference, April 1997.
41. "Adapting
the Web: An Adaptive Web Browser",K. Henricksen and J. Indulska, User
Interface Conference, 2001
42. "HTTP Remote Variant
Selection Algorithm --RVSA/1.0", K. Holtman
and A. Mutz, RFC2296.
43. Reducing WWW Latency and
Bandwidth Requirements by Real-Time Distillation. A. Fox and E. Brewer. Fifth International World Wide Web Conference (Paris, May 1996).
44. "Adaptive Delivery of HTML
Contents", Y. Yang, J. Chen, and H. Zhang, 9th International World
Wide Web Conference,
45. "Network-Adaptive
Control With TCP-Friendly Protocol for Multiple Video Objects",
Q.Zhang, Wenwu Zhu, and Y.Q.Zhang, ICME 2000.
46. Gardmon: A Java-based
Monitoring Tool for Gardens Non-dedicated Cluster Computing. R. Buyya, B. Koshy, and R. Mudlapur. In Proceedings of Workshop on Cluster Computing
Technologies, Environments, and Applications, PDPTA 99, Monte Carlo Resort, Las
Vegas, Nevada, USA, 1999.
47. The Condor Distributed Processing
System. M. Livny, Dr Dobbs Journal, Feb 1995 pp
40-48.
48. Project Ganglia: Distributed Monitoring and Execution
System.
49. PARMON: A Comprehensive Cluster Monitoring
System. Rajkumar et al., Proceedings of the Fifth
International Conference on Parallel and Distributed Processing Techniques and
Applications (PDPTA'98), Las Vegas, Nevada, USA, CSREA Press, 1998.
50. Building a Resources
Monitoring System for SMILE Beowulf Cluster. P. Uthayopas,
S. Phaisithbenchapol, and K. Chongbarirux.,
Proceeding of the Third International Conference/Exhibition on High Performance
Computing in Asia-Pacific Region (HPC ASIA'99), Singapore, 1998
3.1 Collaborative
Filtering (top^)
1. Empirical
Analysis of Predictive Algorithms for Collaborative Filtering. John S.
Breese, David Heckerman, and Carl Kadie,
2. Collaborative Filtering by
Personality Diagnosis: A Hybrid Memory- and Model-Based Approach, David Pennock, Eric Horvitz, Steve Lawrence, and C. Lee Giles,
Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence,
UAI 2000.
3. Memory-Based Weighted-Majority Prediction
For Recommender Systems, Joaquin Delgado and Naohiro Ishii, In Proceedings of the ACM SIGIR'99 Workshop
on Recommender Systems: Algorithms and Evaluation, UC
4. Clustering
for collaborative filtering applications. Arnd Kohrs
and Bernard Merialdo, In Proceedings of CIMCA'99.
IOS Press, 1999.
4. System Level Issues
(top^)
Questions: What is the right model for
supporting Internet Applications of the future?
1.
WebOS: Operating System Support for Wide Area Applications,
Vahdat,
2. Operating
System Directions for the Next Millennium, Bolosky, Draves, Fitzgerald, Fraser, Jones, Knoblock, and Rashid.
3.
The Architectural Design of Globe: A Wide-Area Distributed
System, M. van Steen, P. Homburg, and A.S. Tanenbaum, Technical
Report IR-422, Dept. of Computer Science,
4.
A Network Architecture for Heterogeneous Mobile Computing
E. A. Brewer, R. H. Katz et al. IEEE Personal Communications Magazine, October
1998.
5. IO-Lite:
A Unified I/O Buffering and Caching System, Peter Druschel, Vivek S. Pai and Willy Zwaenepoel. To appear in
the Proceedings of the Third Symposium on Operating Systems Design and
Implementation (OSDI'99), New Orleans, LA, February 1999.
6.
The x-Kernel: An Architecture for
Implementing Network Protocols,
7. Making Paths Explicit in the Scout Operating System, Mosberger and Peterson, OSDI, 1996.
8.
Server Operating Systems, Kaashoek, Engler,
Gagner, and Wallach, European SOSP Workshop, 1996.
9.
Application Performance and Flexibility on Exokernel
Systems, Kaashoek, Engler, Ganger, Briceno, Hunt, Mazieres,
Pinckney, Grimm, Jonnotti, Mackenzie, SOSP, 1997.
10.
Server Operating Systems: A Comparative
Cost-of-Ownership Analysis, Cahners In-Stat Group
White Paper, 1997.
Questions: How should we translate from
virtual name to physical addresses? How do we find objects or services or users
in the Internet if they migrate?
1. Locating Objects in Wide-Area Systems, M. van Steen, F.J. Hauck, P. Homburg, and A.S. Tanenbaum, IEEE
Communications Magazine, January 1998.
2. Scalable Naming in Global Middleware, G. Ballintijn, M. van Steen, A.S. Tanenbaum. Proc. 13th Int'l
Conf. on Parallel and Distributed Computing Systems (PDCS-2000), Las Vegas,
August 8-10, 2000.
3. Development
of the Domain Name System, P.
Mockapetris and K. Dunlap SIGCOMM 1988, Computer Communications Review Vol 18
No 4 Aug. 1988 pp. 123-133. Dynamic DNS: rfc 2136 and rfc 2137
4. Resolution of Uniform Resource Identifiers
using the Domain Name System, Ron Daniel
and Michael Mealling. Internet Draft, September 1996.
5. Engineering a Global Resolution Service, Edward Slottow, Nov. 1996.
6.
Host Anycasting Service, C. Partridge, T.
Mendez, and W. Milliken, http://andrew2.andrew.cmu.edu/rfc/rfc1546.html
7.
A Directory Service for Configuring High-Performance
Distributed Computations, S. Fitzgerald, I. Foster, C.
Kesselman, G. von Laszewski, W. Smith, and S. Tuecke, Proc. 6th IEEE Symp. on High-Performance Distributed Computing 1997.
8. Active Naming: Programmable Location and
Transport of Wide-Area Resources,
Vahdat,
9.
Using Smart Clients to Build Scalable Services,
Questions: How can we build secure
Internet Applications?
1.
Extensible Security Architectures for Java,
D S. Wallach, D. Balfanz, D. Dean and E W. Felten, Proceedings of the sixteenth
ACM symposium on Operating systems principles (SOSP'97), Saint-Malo, France,
Pages 116-128, December 1997.
2.
The CRISIS Wide Area Security Architecture, E.
Belani, A. Vahdat, T. Anderson, and M. Dahlin, In Proceedings of USENIX
Security Symposium, San Antonio, TX, January 1998.
3.
Authentication in Distributed Systems: Theory and Practise,
B. Lampson, M. Abadi, M. Burrows and E. Wobber, Proceedings of the thirteenth
ACM symposium on Operating systems principles (SOSP'91), Pacific Grove, CA,
pages 165-182, October, 1991.
4. Kerberos:
An Authentication Service for Open Network Systems, J. G. Steiner, B. Clifford Neuman, and J.I. Schiller, Proceedings of the USENIX
Winter Conference, pages 191-202, 1988.
5. Kerberos:
An Authentication Service for Computer Networks B. Clifford Neuman and Theodore Ts'o, IEEE Communications Magazine,
Volume 32, Number 9, pages 33-38, September 1994. ( Kerberos
Home, About Kerberos, Kerberos Reference Page, Kerberos for UNIX)
6.
Java Security: From HotJava to Netscape and Beyond
D. Dean, E. W. Felten, and D S. Wallach, Proceedings of 1996 IEEE Symposium on
Security and Privacy, May 1996.
7. Cryptography and the Internet, S.
Bellovin, Proceedings of CRYPTO '98,
August 1998, pp. 46-55.
8.
Toward Acceptable Metrics of Authentication, M. Reiter and
S. Stubblebine,IEEE Symposium on Security and Privacy,
1996.
9.
Timing attacks on Implementations of Diffie-Hellman, RSA,
DSS and Other Systems, P. Kocher,Advances
in Cryptology - CRYPTO 96, pp 104-113, 1996
10. Vulnerabilities and Security Threats in Structured Overlay
Networks. M. Srivatsa, L. Liu, Proc
of 20th IEEE Annual Computer Security Applications Conf ACSAC,
2004.
11. FARSITE: Federated, Available, and Reliable Storage for an
Incompletely Trusted Environment. A. Adya, W. J. Bolosky, M.
Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M.
Theimer, R. P. Wattenhofer, Proc of 5th OSDI,
2002.
12. Secure routing for Structured Peer-to-Peer Overlay
Networks. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. S.
Wallach, Proc of 5th OSDI,
2002.
13. The Sybil Attack. J. Douceur, Proc of 2nd Annual IPTPS Workshop, 2002.
14. Security Considerations for Peer-to-Peer Distributed Hash
Tables. E. Sit, J. Morris, Proc
of 2nd Annual IPTPS Workshop, 2002.
15. SOS: An Architecture For
Mitigating DDoS Attacks. A. D. Keromytis, V.
Misra, D. Rubenstein, Proc of IEEE Journal on
Selected Areas in Communication, Vol 21, 2003.
16. Countering Targeted File Attacks using Location Keys.
M. Srivatsa and L. Liu, Proc of USENIX
Security Symposium, 2005.
17. Securing Publish-Subscribe Overlay Services With EventGuard . M. Srivatsa and L. Liu, Proc of ACM Conference on Computer and Communication
Security (CCS) ,
2005.
1. A Privacy-Preserving Index for Range Queries,
Bijit Hore, Sharad Mehrotra, Gene Tsudik, VLDB
2004
2. Auditing Compliance with a Hippocratic Database,
Rakesh Agrawal Roberto Bayardo Christos Faloutsos Jerry Kiernan Ralf Rantzau
Ramakrishnan Srikant, VLDB
2004
3. Privacy-preserving data mining. R. Agrawal
and S. Ramakrishnan. In Proceedings
of of the 2000 ACM SIGMOD International Conference on Management of Data, pp.
439--450, 2000.
4. On the design and quantification of privacy preserving data
mining algorithms. D. Agrawal and C. C. Aggarwal, In Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART
Symposium on Principles of Database Systems, Santa Barbara,
California, USA, May 21-23 2001. ACM.
5. Privacy
Preserving Indexing of Documents on the Network, Mayank Bawa, Roberto Bayardo Jr., and Rakesh Agrawal. In
VLDB, 2003
6. Topk Queries
Across Multiple Private Databases, L. Xiong, S. Chitti, L. Liu. In Proc of Intl
Conf of Distributed Computing Systems ICDCS, 2005
7. Information Hiding -- A Survey, F. A. P.
Petitcolas, R. J. Anderson, M. G. Kuhn. In Proc
of IEEE Special Issue on Protection of MultiMedia Content 87(7):1062-1078,
July 1999
8. Location Privacy in Pervasive Computing, A. R. Beresford, F. Stajano. In Proc of IEEE Pervasive Computing 46-55, March 2003
1. PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities. L. Xiong and L. Liu, To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE), 2004.
2. TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. A. Singh and L. Liu, In the proceedings of the third IEEE International Conference on Peer-to-Peer Computing, September 2003.
3. Reputation Systems. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, Comm. ACM, vol. 43, no. 12, 2000.
4. The Digitization of Word-of-Mouth: Promise and Challenges of Online Reputation Mechanism. C. Dellarocas, Management Science, vol. 49, no. 10, 2003.
5. Managing Trust in a Peer-to-Peer Information System, K. Aberer and Z. Despotovic, Proc. ACM Conf. Information and Knowledge Management (CIKM), 2001.
6. Choosing Reputable Servents in a P2P Network,
F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P.Samarati, Proc.11th Int.l World Wide Web Conf., 2002.
7. The EigenTrust Algorithm for Reputation Management in P2P
Networks, S. Kamvar, M. Scholsser, and H. Garcia-Molina, Proc. 12th Int.l World Wide Web Conf., 2003.
8. Combating
Web Spam with TrustRank. Zoltan Gy�ngyi, Hector
Garcia-Molina, Jan Pedersen, VLDB 2004:
576-587
9. Propagation of Trust and Distrust. R. Guha,
R. Kumar, P. Raghavan, A. Tomkins, Proc of
13th Intl World Wide Web Conf, 2004.
10. Trust Management for the Semantic Web. M.
Richardson, R. Agarawal, P. Domingos, Proc of
Intl Semantic Web Conf, 2003.
11. TrustGuard: Countering Vulnerabilities in Reputation
Management for Decentralized Overlay Networks .
M. Srivatsa, L. Xiong and L. Liu Proc of 14th
World Wide Web Conference ,
2005.
1. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. Bugra Gedik and Ling Liu., IEEE Transactions on Mobile Computing. A short version appeared as A Customizable k-Anonymity Model for Protecting Location Privacy. B. Gedik, L. Liu, Proc of Intl Conf of Distributed Computing Systems ICDCS, 2005.
2. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. M. gruteser, D. GrunwaldProc of
ACM/USENIX MobiSys, 2003.
3. Location Privacy in Pervasive Computing. A. Beresford and F. Stajano. IEEE
Pervasive Computing, 2003
4.Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid by Bhuvan Bamba, Ling Liu, Peter Pesti and Ting Wang, Proceedings of 17th International World Wide Web Conference (WWW'08).
5. The New Casper: Query Processing for Location Services
without Compromising Privacy. Mohamed F. Mokbel, Chi-Yin Chow, and
Walid G. Aref., In Proceedings of the International Conference on Very Large
Data Bases, VLDB, pages 763–774, Seoul, Korea, September 2006.
6. PRIVE: Anonymous Location based Queries in Distributed Mobile Systems.
Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. In
Proceedings of International Conference on World Wide Web, WWW, pages
1–10, 2007.
7. Onion routing for anonymous and private internet
connections. D. Goldberg, M. Reed and P. Syverson. CACM 1999.
8. Framework for Security and Privacy in Automotive
Telematics. S. Duri, M. gruteser, X. Liu, P. Moskowitz, R.
Perez, M. Sing, J. M. Tang Proc of Intl
Workshop on Mobile Commerce WMC, 2002.
9. Preserving Privacy in Environments with Location-Based
Applications. G. Myles, A. Friday, and N. Davies. IEEE Pervasive
Computing, 2(1):56–64, 2003.
10. Concepts for Personal Location Privacy Policies.
Einar Snekkenes. In Proceedings of the ACM Conference on Electronic Commerce,
pages 48–57, 2001.
11. Secure
Verification of Location Claims. Naveen Sastry, Umesh Shankar,
and David Wagner. WiSE 2003.
12. Privacy for Profitable Location Based Services.
Tobias
K¨olsch, Lothar Fritsch, Markulf Kohlweiss, and Dogan Kesdogan. ,In Proceeding of the International
Conference on Security in Pervasive Computing, SPC, pages 164–178, 2005.
13. Mobility Changes Anonymity: Mobile Ad Hoc Networks Need
Efficient Anonymous Routing. Jiejun Kong, Xiaoyan Hong, M. Y.
Sanadidi, and Mario Gerla. , In Proceedings of the IEEE Symposium on Computers
and Communications, ISCC, pages 57–62, 2005.
14. Privacy by design – principles of privacy aware
ubiquitous systems. Marc Langheinrich. Ubicom 2001 LNCS 2201. 2001 Springer.
15. Protecting Privacy when Disclosing Information: k-Anonymity
and its Enforcement Through Generalization and Specialization.
P. Samarati, L. Sweeney, TechReport
SRI-CSL-98-04, SRI Intl., 1998.
16. Framework for security and privacy in automotive
telematics. S. Duri,
M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.M. Tang. ,
International Workshop on
17. The Geometry of Uncertainty in Moving Objects Databases.
Goce Trajcevski, Ouri Wolfson, Fengli Zhang, and Sam Chamberlain. , In
Proceedings of the International Conference on Extending Database Technology,
EDBT, pages 233–250,
18.
19.
20. Stalked
by Satellite. John Voelcker. , IEEE Spectrum, 43(7):15–16,
2006.
21. The active badge location system. Roy Want,
Andy Hopper, Veronica Falco and Jonathan Gibbons. ACM transactions
on Information Systems (TOIS), 10(1), 1992.
22. They Know Where You Are . Jay Warrior, Eric
McHenry, and Kenneth McGee. IEEE
Spectrum, 40(7):20–25, 2003.
23. People, Not Places: A Policy Framework for Analyzing Location
Privacy Issues. James C. White. Master’s thesis, Terry
Sanford Institute of Public Policy, Duke University, Durham, NC, 2006.
24. Preserving Mobile Customer Privacy: An Access Control System
for Moving Objects and Customer Profiles. Mahmoud
Youssef, Vijayalakshmi Atluri, and Nabil R. Adam., In Proceedings of the
International Conference on Mobile Data Management, MDM, pages 67–76,
2005.
25. MOBIHIDE: A Mobile Peer-to-Peer System for Anonymous
Location-Based Queries. Gabriel Ghinita, Panos Kalnis, and
Spiros Skiadopoulos. , In Proceedings of the International Symposium on
Advances in Spatial and Temporal Databases, SSTD, 2007.
1. Web Spam Taxonomy, Zoltan
Gyongyi and Hector Garcia-Molina, - AIRWeb 2005
2. Combating Web Spam with TrustRank, Zoltan Gyongyi, Hector
Garcia-Molina, and Jan Pedersen. - VLDB 2004
3. Link Spam Alliances, Zoltan
Gyongyi and Hector Garcia-Molina., - Stanford
Technical Report 2005 (also published in VLDB 2005)
4. Link Spam Detection Based on Mass Estimation
, Zoltan Gyongyi, Pavel Berkhin, Hector
Garcia-Molina, and Jan Pedersen, Stanford Technical Report 2006 (also published
in VLDB 2006)
5.
``A Parameterized Approach to Spam-Resilient Link Analysis of
the Web", James Caverlee and Ling
Liu.
IEEE Transactions on Parallel and Distributed Systems (TPDS).
6. Countering Web Spam with Credibility-Based Link Analysis,
James Caverlee, Ling Liu. PODC 2007
7. Spam-resilient Web Rankings via Influence Throttling,
James Caverlee, Steve Webb, and Ling Liu. - IPDPS 2007
8. ``SocialTrust: Tamper-Resilient Trust Establishment in Online
Communities", James Caverlee,
Ling Liu, Steve Webb,
Proceedings of the International Joint Conference on Digital
Libraries (JDL 2008), June 16-20, 2008 -
9. Spam, Damn Spam, and Statistics: Using Statistical Analysis
to Locate Spam Web Pages, Dennis Fetterly,
Mark Manasse, and Marc Najork.- WebDB 2004
10. Detecting Phrase-level Duplication on the World Wide Web,
Dennis Fetterly, Mark Manasse,
and Marc Najork.- SIGIR 2005
11. Thwarting the Nigritude Ultramarine: Learning to Identify
Link Spam, Isabel Drost and Tobias Scheffer. - ECML 2005
12. Introducing the Webb Spam Corpus: Using Email Spam to
Identify Web Spam Automatically, Steve Webb, James Caverlee, and Calton Pu - CEAS 2006
13. Know Your Neighbors: Web Spam Detection Using the Web Topology,
Carlos Castillo et al. - SIGIR 2007
14. Detecting Spam Web Pages through Content Analysis,
Alexandros Ntoulas, Marc Najork, Mark Manasse, and Dennis Fetterly. - WWW 2006
15. Web spam Identification Through
Content and Hyperlinks -, Jacob Abernethy, Olivier Chapelle, and Carlos Castillo. AIRWeb
2008
16. Characterizing Web Spam Using Content and HTTP Session
Analysis, Steve Webb, James Caverlee,
and Calton Pu. - CEAS 2007
17. Predicting Web Spam with HTTP Session Information
-, Steve Webb, James Caverlee, and Calton Pu. CIKM 2008,
18. Blog
Spam: A Review, Adam Thomason. - CEAS 2007
19. Blocking
Blog Spam with Language Model Disagreement - Gilad
Mishne, David Carmel, and Ronny Lempel., AIRWeb
2005
20. Automatic Vandalism Detection in Wikipedia: Towards a
Machine Learning Approach, Martin Potthast,
Benno Stein, and Robert Gerling.
- AAAI 2008
21. Creating, Destroying, and Restoring Value in Wikipedia,
Reid Priedhorsky,
1.
Analysis of the Evolution of Peer-to-Peer Systems.
David Liben-Nowell, Hari Balakrishnan, and David Karger, ACM
Conf. on Principles of Distributed Computing (PODC), Monterey, CA, July
2002.
2.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet
Applications. Ion Stoica, Robert
Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, Hari Balakrishnan, IEEE/ACM
Transactions on Networking
3.
Storage management and caching in PAST, a large-scale,
persistent peer-to-peer storage utility A. Rowstron
and P. Druschel,18th ACM SOSP'01, Lake Louise, Alberta, Canada, October 2001.
4. SCAN: A Dynamic, Scalable, and Efficient Content Distribution
Network, Yan
Chen, Randy H. Katz, and John D. Kubatowicz in Proceedings
of the International Conference on Pervasive Computing, August 2002.
5.
PeerCQ: A Decentralized and Self-Configuring Peer-to-Peer
Information Monitoring System.Bugra Gedik and Ling Liu. The 23rd International
Conference on Distributed Computing Systems. (ICDCS 2003)
6.
Search and replication in unstructured peer-to-peer
networks, Qin Lv, Pei Cao, Edith
Cohen, Kai Li, and Scott Shenker. In the Proceedings
of the 16th international conference on Supercomputing, June 2002 ,
7.
"Freenet: A Distributed Anonymous Information Storage and
Retrieval System" Ian Clarke, Oskar Sandberg, Brandon
Wiley, and Theodore W. Hong, in Designing Privacy Enhancing
Technologies: International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, ed. by Hannes Federrath. Springer:
8.
"Pastry: Scalable, distributed object location and routing
for large-scale peer-to-peer systems". A. Rowstron and P. Druschel,
IFIP/ACM International Conference on Distributed Systems Platforms
(Middleware),
9.
“Anonymous Publish/Subscribe in P2P Networks”,A. K. Datta, M. Gradinariu, M. Raynal and G.
Simon, IPDPS 2003.
10.
"SCRIBE: A large-scale and decentralised application-level
multicast infrastructure",M.
Castro, P. Druschel, A-M. Kermarrec
and A. Rowstron, IEEE Journal on Selected
Areas in Communications (JSAC) (Special issue on Network Support for Multicast
Communications). 2002.
11. Scalable
application layer multicast. S. Banerjee, B. Bhattacharjee, and
C. Kommareddy, In Proceedings of the 2002 ACM
SIGCOMM Conference, 2002.
12. Enabling Conferencing Applications on the Internet using an
Overlay Multicast Architecture.Yang-hua
13. A Scalable Content Addressable Network. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. In Proceedings of the ACM SIGCOMM
Conference, 2001.
14. Gnutella RFC
15. Making Gnutella-like P2P Systems Scalable.
Y. Chawathe, S. Ratnasamy,
L. Breslau, N. Lanham, and S. Shenker. In
Proceedings of the ACM SIGCOMM, 2003.
16. Phenix: Supporting Resilient Low-diameter Peer-to-Peer
Topologies. R. H. Wouhaybi and A. T.
Campbell. In Proceedings of IEEE INFOCOM 2004.
17. Improving Search in Peer-to-Peer Systems.
Beverly Yang, Hector Garcia-Molina, In Proceedings of the 22nd
International Conference on Distributed Computing Systems (ICDCS), 2002
18. "Designing a Super-peer Network."
Beverly Yang, Hector Garcia-Molina, In Proceedings of the 19th
International Conference on Data Engineering (ICDE),
19. "Routing Indices For Peer-to-Peer
Systems." Arturo Crespo, Hector
Garcia-Molina. Proceedings of the International Conference on
Distributed Computing Systems (ICDCS). July 2002.
20. Turning Heterogeneity into an Advantage in Overlay Routing.
Z. Xu, M. Mahalingam, and
M. Karlsson. In Proceedings of INFOCOM, 2003.
21.
“Apoidea: A Decentralized Peer-to-Peer Architecture for
Crawling the World Wide Web”,A. Singh, M. Srivatsa, L. Liu and T. Miller, In the proceedings of the SIGIR
workshop on distributed information retrieval, August 2003. Also in Lecture
notes of computer science (LNCS) series, Springer Verlag.
22. Tracing a large-scale Peer to Peer System: an hour in the
life of Gnutella, Evangelos P. Markatos, 2nd IEEE/ACM International Symposium on Cluster
Computing and the Grid, 2002.
23. Mapping the gnutella network. M. Ripeanu, I. Foster, and A. Iamnitchi.
IEEE Internet Computing Journal, 6(1), 2002.
24. Scaling Unstructured Peer-to-Peer Networks with
Heterogeneity-Aware Topology and Routing. M. Srivatsa
and L. Liu. in the Proceedings of IEEE Transactions on Parallel and Distributed
Systems.
25. Contructing a Proximity-aware Power Law Overlay Network . J. Zhang, L. Liu and C. Pu. In the Proceedings of IEEE Global Telecommunications
Conference GLOBECOM, 2005.
26. An Analysis of Internet Content Delivery Systems.
Stefan Saroiu,
27. On the Feasibility of Peer-to-Peer Web Indexing and Search,
Jinyang Li, Boon Thau, Loo Joseph, M. Hellerstein, M. Frans Kaashoek, LECTURE NOTES IN
COMPUTER SCIENCE – 2003, ISSU 2735, pages 207-215.
28. P2P Content Search: Give the Web Back to the People,
Matthias Bender, Sebastian Michel, Peter Triantafillou, GerhardWeikum,
Christian Zimmer, Proceedings of the 5th International Workshop on Peer-to-Peer
Systems, 2006
30. Routing indices for peer-to-peer systems, A Crespo, H Garcia-Molina, In Proceedings of Distributed
Computing Systems, 2002.
31.An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol, S.A. Baset and H.G. Schulzrinne, Infocom 2006, April 2006.
32. An Experimental Study of the Skype Peer-to-Peer VoIP System, Saikat Guha, Neil Daswani, Ravi Jain, IPTPSÂ’06, February 2006.
33. Characterizing and Detecting Skype-Relayed Traffic, K. Suh, D. R. Figueiredo, J. Kurose, D. Towsley, Infocom 2006, April 2006.
34. Rarest First and Choke Algorithms are Enough, Arnaud Legout, G. Urvoy-Keller, P. Michiardi, IMC 2006>
35. The Bittorrent P2P File-sharing System: Measurements and Analysis, J.A Pouwelse, P. Garbacki, D.H.J Epema, H.J. Sips, IPTPS 05, February 2005.
36. Incentives Build Robustness in BitTorrent, Bram Cohen, First Workshop on Economics of Peer-to-peer Systems, June 2003.
Some P2P Links
- SETI@Home
2.
"Multi-Fidelity Algorithms for Interactive Mobile
Applications", Satyanarayanan, M., Narayanan, D. Proceedings of the
3rd International Workshop on Discrete Algorithms and Methods for Mobile
Computing and Communications, August 1999,
4.
"Energy-aware adaptation for mobile applications", Flinn J., Satyanarayanan, M.,
Proceedings of the 17th ACM Symposium on Operating Systems Principles,
December, 1999, Kiawah Island Resort, SC.
6.
System Support for Mobile, Adaptive Applications,
Noble, Brian, IEEE Personal Communications, Vol. 7, No. 1, February, 2000
8.
Agile Application-Aware Adaptation for Mobility,
Noble, B., Satyanarayanan, M., Narayanan, D., Tilton,
J.E., Flinn, J., Walker, K. Proceedings of the 16th
ACM Symposium on Operating System Principles, October 1997, St. Malo, France
9.
A Research Status Report on Adaptation for Mobile Data
Access , Noble, B., Satyanarayanan, M.
SIGMOD Record, Vol. 24, No. 4, December 1995
10.
A Programming Interface for Application-Aware Adaptation in
Mobile Computing , Noble, B., Price, M., Satyanarayanan,
M., Proceedings of the Second USENIX Symposium on Mobile & Location-Independent
Computing, Apr. 1995, Ann Arbor, MI
11. Application-Aware
Adaptation for Mobile Computing , Satyanarayanan, M., Noble, B., Kumar, P.,
Price, M. Proceedings of the 6th ACM SIGOPS European
Workshop, Sep. 1994,
12. Mobile
Information Access, Satyanarayanan,
M. , IEEE Personal Communications, Vol. 3, No. 1,
February 1996
13. Indexing
Techniques for Power Management in Multi-Attribute Data Broadcast Qinglong Hu,
Wang-Chien Lee, and Dik Lun Lee,
14. Power
conserving And access Efficient Indexes For Wireless
Computing Dik Lun Lee, and Qinglong
Hu,
15. Power
Conservative Multi-Attribute Queries on Data Broadcast, Qinglong Hu,
Wang-Chien Lee, and Dik Lun Lee, ICDE 2000.
16.
"Effects of power conservation, wireless coverage and cooperation
on data dissemination among mobile devices", Maria Papadopouli and Henning Schulzrinne,
ACM SIGMOBILE Symposium on Mobile Ad Hoc Networking &
Computing (MobiHoc) 2001, October 4-5, 2001, Long
Beach, California. (Extension of the Sarnoff paper.)
17. Energy-aware
Web Caching for Mobile Terminals.
Francoise Sailhan, Valarie Issarny.
In Proceedings of the ICDCS Workshop on Web Caching Systems. July 2002,
18. Power-Controlled Data Prefetching/Caching in Wireless Packet
Networks, Savvas Gitzenis and Nicholas Bambos,
IEEE Infocom 2002, New York.
19.
Sleepers and Workaholics: Caching Strategies in Mobile
Environments. Daniel Barbara, Tomasz Imielinski,VLDB
Journal 4(4): 567-602(1995).
20.
Indexing techniques for data broadcast on wireless channels.
D.L. Lee, Q. Hu, and W. C. Lee,Proceedings
of the Fifth International Conference on Foundations of Data Organization (FODO
'98), Kobe, Japan, Nov 11-12, 1998, 175-182.
21.
Indexing Techniques for Wireless Data Broadcast Under Data
Clustering and Scheduling,Qinglong Hu,
Wang-Chien Lee, and Dik Lun Lee, in Proceedings of ACM International Conference
on Information and Knowledge Management (CIKM99), Kansas City, Missouri,
Nov. 1999, pp. 351-358.
22.
MobiEyes: Distributed Processing of Continuously Moving
Queries on Moving Objects in a Mobile System, Bugra Gedik, Ling
Liu. The 9th International Conference on Extending DataBase
Technology (EDBT 2004) or Bugra Gedik and Ling Liu. MobiEyes: A
Distributed Location Monitoring Service Using Moving Location Queries. IEEE
Transactions on
23. Processing Moving Queries over Moving Objects Using Motion
Adaptive Indexes, Bugra Gedik, Kun-Lung Wu, Philip Yu, and Ling Liu, To appear in
IEEE Transactions on Knowledge and Data Engineering (TKDE).,
24. Bugra Gedik, Ling Liu, Kun-Lung Wu,
Philip S. Yu. " Lira: Lightweight, Region-aware Load Shedding in Mobile CQ
Systems". IEEE 23rd International Conference on Data
Engineering.
25. Bugra Gedik, Kun-Lung Wu, Philip S.
Yu, and Ling Liu. "GrubJoin: An Adaptive Multi-Way Windowed Stream Join with
Time Correlation-Aware CPU Load Shedding". IEEE 23rd
International Conference on Data Engineering.
26. Jianjun Zhang, Gong Zhang, Ling Liu. ``GeoGrid: A Scalable Location Service Network".
Proceedings of 27th IEEE International Conference on Distributed Computing
Systems (ICDCS 2007).
27. Kipp Jones and Ling Liu. "Improving Wireless Positioning with Look-ahead Map-Matching
", to appear in Proceedings of the 4th Annual International Conference on
28. Anand Murugappan
and Ling Liu. ``A SpatioTemporal Placement Model for Caching Location
Dependent Queries", Proceedings of the 4th Annual International
Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
(Mobiquitous 2007). August 6-10, 2007,
29. Mudhakar Srivatsa, Arun Iyengar, Jian
Yin and Ling Liu. ``A Scalable Access Control in Location-based Broadca st Services",
Proceedings of The 27th IEEE International Conference
on Computer Communications (INFOCOM 2008), to be held in
1.
Continuous Queries over Data Streams
John S. Breese, David Heckerman, and Carl Kadie, S. Babu and J. Widom.In
SIGMOD Record, September 2001 .
2.
Towards Sensor Database Systems. Philippe Bonnet, J.
E. Gehrke, and Praveen Seshadri.
In Proceedings of the Second International Conference on
3.
Querying the Physical World. Philippe Bonnet,
J. E. Gehrke, and Praveen Seshadri.IEEE
Personal Communications, Vol. 7, No. 5, October 2000, pages 10-15. Special Issue
on Smart Spaces and Environments.
4.
Fjording the Stream: An Architecture for Queries over
Streaming Sensor Data, Sam Madden and Michael J. Franklin,ICDE
Conference, February, 2002, San Jose.
5.
Streaming Queries over Streaming Data Sirish Chandrasekaran, Michael J.
Franklin, VLDB Conference, August 2002,
6.
Monitoring Streams: A New Class of Data Management
Applications.D. Carney, U. Cetintemel,
M. Cherniack, C. Convey, S. Lee, G. Seidman, M. Stonebraker, N. Tatbul, S. Zdonik. In proceedings
of the 28th International Conference on Very Large Data Bases (VLDB'02),
August 20-23, Hong Kong, China.
7. Quality-Aware Distributed Data Delivery for Continuous
Query Services, by Bugra Gedik and Ling Liu. ACM 2006 International Conference on
Management of Data (ACM SIGMOD),
8. GrubJoin: An Adaptive Multi-Way Windowed Stream Join with
Time Correlation-Aware CPU Load Shedding. By Bugra
Gedik, Kun-Lung Wu, Philip S. Yu, and Ling Liu. IEEE
23rd International Conference on Data Engineering. Istanbul,
9. CPU Load Shedding for Binary Stream Joins.
Springer Knowledge and Information Systems. By Bugra Gedik, Kun-Lung Wu, Philip S. Yu, and Ling Liu. DOI
10.1007/s10115-006-0044-4, September 21, 2006. (will appear in print, ISSN
0219-1377)
10. CACM Special Issue on Sensor Networks, June 2004 (Online
available at ACM digital library, use GT library website to access it)
1. R-trees: a dynamic index structure for spatial searching. Antonin Guttman , Proceedings of the 1984 ACM SIGMOD international conference on Management of data, June 18-21, 1984, Boston, Massachusetts
2. Indexing the positions of continuously moving
objects. S. Saltenis, C. S. Jensen, S. T. Leutenegger, and
M. A.Lopez. In SIGMOD b00: Proceedings of the 2000 ACM SIGMOD international
conference on Management of data, pages 331b^S342,
3. Voronoi Diagram, Franz Aurenhammer, Rolf Klein1
4. Spatial Databases: Accomplishments and Research Needs, S. Shekhar, S. Chawla, S. Ravada, A. Fetterer, X. Liu and C.T. Liu, IEEE Transactions on Knowledge and Data Engineering, Jan.-Feb. 1999.
5. Discovering Spatial Co-location Patterns: a Summary of
Results, S. Shekhar and Y. Huang, In Proc. of 7th International
Symposium on
Spatial and Temporal Databases (SSTD01), July 2001.
6. Detecting Graph-based Spatial Outliers: Algorithms and Applications, S. Shekhar, C.T. Lu, P. Zhang, the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2001.
7. Extending Data Mining for Spatial Applications: A
Case Study in Predicting Nest Locations, S. Chawla, S.
Shekhar, W. Wu and U. Ozesmi, Proc. Int. Confi. on 2000 ACM SIGMOD
Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD 2000),
8. Modeling Spatial Dependencies for Mining Geospatial Data, S. Chawla, S. Shekhar, W. Wu and U. Ozesmi, First SIAM International Conference on Data Mining, 2001.
9. Spatial Contextual Classification and Prediction Models for Mining Geospatial
Data, S. Shekhar, P.R.
Schrater, R. R. Vatsavai, W. Wu, and
10. The Quadtree and Related Hierarchical Data Structures. Finkel and Bentley, ACM Comput. Surv.1974
11. An introductory tutorial on kd-trees, A. Moore
12. Building of Trapezoidal Map from a set of non-intersecting lines, Jukka Kaartinen
13. Spatial data structures for version management of
engineering drawings in cad database. Y. Nakamura and H.
Dekihara. In ICIAP b03: Proceedings of the 12th International
Conference on Image Analysis and Processing, page 219,
1. The Google file system.
Sanjay Ghemawat, Howard Gobioff
and Shun-Tak Leung, 19th ACM Symposium on Operating
Systems Principles, Lake George, NY, October, 2003.
2. MapReduce: Simplified Data Processing on Large Clusters,
Jeffrey Dean and Sanjay Ghemawat, In Proceedings of
OSDI 2004,
3. Bigtable: A Distributed Storage System for Structured Data,
Fay
Chang, Jeffrey Dean, etc, roceedings of OSDI 2006,
4. Hadoop Project,
http://hadoop.apache.org/core/
5. Hadoop Distributed File System,
6. GPFS: A Shared File System For Large Computing Cluster,
Frank Schmuck, Roger Haskin, In Proceedings of the 2002 Conference on File and
Storage Technologies (FAST)
7. Dynamo: Amazon’s Highly Available Key-value Store,
Giuseppe DeCandia, Deniz Hastorun,etc, SOSP '07
8. Frangipani: A Scalable Distributed File System,
Chandramohan A. Thekkath,
Timothy Mann, Edward K. Lee, In Proceedings of the 16th ACM Symposium on
Operating Systems Principles
9. The Chubby lock service for loose-coupled distributed
systems, Mike Burrows, 7th USENIX Symposium on Operating Systems
Design and Implementation (OSDI), 2006.
10. Sinfonia: A New Paradigm for Building Scalable Distributed
Systems, Marcos K. Aguilera, Arif Merchant, Mehul Shah,
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems
principles
11. PVFS: A Parallel File System for Linux Clusters,
Philip H. Carns, Walter B. Ligon
Iii, Robert B. Ross, Rajeev Thakur, In Proceedings of
the 4th Annual Linux Showcase and Conference
12. Red Hat Global File System, Red Hat
Company
1.
UT Austin - CS 395T: Web Operating Systems
Instructor: Mike Dahlin
2. UCSD - CS 491 Hardware and Software Architecture for Parallel
Servers Instructor: Andrew Chien
3.
4. Berkeley - CS 268: Graduate Computer Networking , Instructors:Dr. Kevin Fall and Dr. Mike Luby
5. Harvard - CS261: Research Topics in
Operating Systems Instructor: Margo Seltzer
6.
Cornell - CS614 Advanced Systems Instructor:
Fred B. Schneider
7. CS262
- Advanced Topics in Operating Systems Instructor:
Eric Brewer
8.
Stanford -
EE384c: - Wireless Local Area Networks, Instructor: Nick McKeown
9.
UC Bolder - (CSCI 7135) Internet Systems,
Instructor: Benjamin Zorn
10.
UMASS - CMPSCI 791D: System Support for Next Generation Applications ,Instructor: Prashant Shenoy
11.
CS6210 - Advanced Operating Systems Instructor: Karsten
Schwan