CS8803 Advanced Internet Application Development

Instructor: Professor Ling Liu

Course Readings

Attention: The information contained in this page is subject to changes.


| Requirement | Required Readings | General/Recommended Readings | Reading Summary Posting |


Reading Summary Requirement

There will be several background readings assigned each week. The readings will either be handed out a week before or listed on the Web page for required readings. You may also access this information from course schedule.

Homework/Assignment:

You are expected to read the material each week and write 2-3 paragraphs per reading giving your impressions and thoughts. The summaries should be informal and brief, and should consist of your own comments on the readings, NOT a rehash of the content.

You should email your summaries to TA:Gong Zhang and Myungcheol Doo ({gzhang3, myungcheol }@cc.gatech.edu), preferably before each class but no later than 11:59pm of Friday each week (unless there is no reading assignments for the week). Late assignment will NOT be accepted unless approved in advance by the instructor.

Reading Summary Guidelines:

The summary for each reading assignment is expected to consist of 1 paragraph on each of the following three aspects: (1) the positive aspect of the paper; (2) the negative aspect of the paper; and (3) a brief discussion on how the idea or method proposed or used in evaluation may be applied to your own project for the course.

You may want to keep these guidelines in mind when reading papers.

  • Problem Statement
    • What is the problem area with which the paper is concerned? What are the concrete problems that the authors are trying to solve?
  • Contributions/New Ideas
    • Summarize the authors' arguments. What the authors are proposing, new architecture, algorithm, methodology? Are you convinced? Why or Why not?
  • Evaluation
    • How did authors evaluate their new proposals? Did they build a system? run a simulation, collect traces from existing systems? or prove theorems? How their data collection was done? Do you agree with their conclusion? their analysis?
  • Weakness
    • Comparing with the state of art research in the probem area or according to the related work section in the paper, was the idea proposed new? Was the approach novel? What, in your opinion, should be evaluated to validate their new proposal, but are missing in their evaluation? Is there any alternative ways to conduct evaluation?

You may find the following short article helpful:

Efficient Reading of Papers in Science and Technology By Michael J. Hanson and updated by D. McNamee


Areas of Readings

1. Search Engine Issues

2. Web Servers

3. Application Server Issues

4. System Level Issues

5. Advanced Internet System Reading

6. Web2.0/Web3.0 and Social Networks

7. Cloud Computing

 


Required Readings and Dates

You are expected to read papers in the required reading list, but only write summary for one paper selected from the list of 2-3 required readings associated with each lecture. Please use the Summary Template to write the reading summaries and follows the summary submission suggestions to submit your summaries.


General/Recommended Course Reading List

1. Search Engine Issues (top^)

Questions: How to build a search engine that scales up as the Web grows?

1.     Google, The Anatomy of a Large-scale Hypertextual Web Search Engine. Sergey Brin and Lawrence Page. In 7th Int. Conf. WWW, Brisbane, Australia, April 1998.

2.      Inktomi: An Investigation of Documents from the World Wide Web Allison Woodruff, Paul M. Aoki, Eric Brewer, Paul Gauthier, and Lawrence A. Rowe  

3.      Harvest: Scalable Internet Resource Discovery: Research Problems and Approaches C. Mic Bowman (Tranarc Corp.), Peter Danzig (Univ. Southern California), Udi Manber (Univ. of Arizona), and Michael Schwartz (Univ. Colorado), Appeared in CACM 1994 (Download Harvest Indexer) (Harvest Papers)

4.      Harvest: The Harvest Information Discovery and Access System C. Mic Bowman, Peter B. Danzig, Darren R. Hardy, Udi Manber and Michael F. Schwartz, Computer Networks and ISDN Systems, 28 (1995) pp. 119-125

5.      Harvest: A Scalable,Customizable Discovery and Access System C. Mic Bowman, Peter B. Danzig, Darren R. Hardy, Udi Manber, Michael F. Schwartz, and Duane P. Wessels, Technical Report CU-CS-732-94, Department of Computer Science, University of Colorado,Boulder, August 1994 (revised March 1995).

6.      Customized Information Extraction as a Basis for Resource Discovery Darren R. Hardy and Michael F. Schwartz, ACM Transactions on Computer Systems.

7.      Indie: Distributed Indexing of autonomous Internet Services Peter Danzig, Shih-Hao Li, Katia Obraczka. Journam of Computer Systems, 5(4), 1992. Original description of Indie in 1991 ACM SIGIR

8.      Internet resource discovery services Katia Obraczka, Peter Danzig, and Shih-Hao Li, IEEE Computer, Sept. 1993.

9.      Research Problems for Scalable Internet Resource Discovery , C. Mic Bowman, Peter B. Danzig, and Michael F. Schwartz, 1993 IEEE Computer.

10.  GLIMPSE: A Tool to Search Through Entire File Systems Udi Manber and Sun Wu (Univ. of Arizona), Technical Report TR 93-34, Department of Computer Science, University of Arizona, October, 1993. (Glimpse Home Page)

11.  WebGlimpse--Combining Browsing and Searching Udi Manber, Mike Smith, and Burra Gopal (Univ. of Arizona), to appear in the Proceedings of the 1997 Usenix Technical Conference, January 1997.(WebGlimpse Home Page) (WebGLIMPSE Publications)

12.  Mercator: A Scalable, Extensible Web Crawler Allan Heydon and Marc Najork, Compaq Systems Research Center  (Mercator Project) (html)

13.  A technique for measuring the relative size and overlap of public Web search engines Krishna Bharat and Andrei Broder (DIGITAL, Systems Research Center).

14.  The Connectivity Server: fast access to linkage information on the Web Krishna Bharata, Andrei Brodera, Monika Henzingera, Puneet Kumara, and Suresh Venkatasubramanian, Proceedings of the 7th International World Wide Web Conference, Brisbane, Australia, pages 469-477. Elsevier Science, April 1998.

15.  Efficient Crawling through URL Ordering Junghoo Cho, Hector Garcia-Molina, and Lawrence Page, Proceedings of the 7thInternational World Wide Web Conference, pages 161-172, April 1998

16.  Crawling towards Eternity: Building an Archive of the World Wide Web Mike Burner, Web Techniques Magazine, 2(5), May 1997

17.  The Truth about the Web: Crawling towards Eternity Z. Smith, Web Techniques Magazine, 2(5), May 1997

18.  Measuring Index Quality using Random Walks on the Web Monika Henzinger, Allan Heydon, Michael Mitzenmacher, and Marc A. Najork, Proceedings of the 8th International World Wide Web Conference, pages 213-225, May 1999

19.  Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery Soumen Chakrabarti, Martin van den Berg, Byron Dom, Proceedings of the 8thInternational World Wide Web Conference, May 1999

20.  Finding What People Want: Experiences with the WebCrawler Brian Pinkerton, Proceedings of the 8th International World Wide Web Conference, 1994

21.  SPHINX: A Framework for Creating Personal, Site-specific Web Creawlers Robert C. Miller and Krishna Bharat, Proceedings of the 7th International World Wide Web Conference, pages 119-130, April 1998

22.  Information Retrieval on the World Wide Web Venkat N. Gudivada, Vijay V. Raghavan, William I. Grosky, and Rajesh Kasangottu, IEEE Internet Computing, vol. 1, number 5, September/October, 1997.

23.  GENVL and WWW: Tools for Taming the Web, Oliver McBryan, Proceedings of the First Int'l World Wide Web Conference, CERN, Geneva, May 1994.

24.  A World Wide Web Resource Discovery System Budi Yuwon, Savio L. Y. Lam, Jerry H. Ying, Dik L. Lee Proceedings of the 4th World Wide Web Conference, 1998.

25.  A Survey of Information Retrieval and Filtering Methods Christos Faloutos and Douglas Oard (Univ. of Maryland).

26.  Guidelines for Robot Writers, Martijn Koster, 1993

27.  Robots in the Web: threat or treat? Martijn Koster, NEXOR, April 1995, [1997: Updated links and addresses];  A Standard for Robot Exclusion Martijn Koster.

28.  Authoritative Sources in a Hyperlinked Environment, J. Kleinberg. Proc. 9th ACM-SIAM Symposium on Discrete Algorithms, 1998. Extended version in Journal of the ACM 46(1999). Also appears as IBM Research Report RJ 10076, May 1997. ( IBM Clever Searching Project)

29.  How Search Engines Rank Web Pages Danny Courtois and Sullivan.

30.  Evaluation of Web search engines and the search for better ranking algorithms. Mildrid Ljosland e-mail: Mildrid.Ljosland@idi.ntnu.no Norwegian University of Science and Technology. the SIGIR99 Workshop on Evaluation of Web Retrieval, August 19, 1999

31.  Automatic Resource Compilation by Analyzing Hyperlink Structure and Associated Text. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, P. Raghavan, and S. Rajagopalan. Proceedings of the 7th World-Wide Web conference, 1998. Copyright owned by Elsevier Sciences, Amsterdam.

32.  Inferring Web Communities from Link Topologies. D. Gibson, J. Kleinberg, and P. Raghavan. Proceedings of The Ninth ACM Conference on Hypertext and Hypermedia, 1998. Copyright owned by ACM.

33.  Scalable feature selection, classification and signature generation for organizing large text databases into hierarchical topic taxonomies. S. Chakrabarti, B. Dom, R. Agrawal, P. Raghavan. VLDB Journal, 1998 (invited).

34.  Enhanced hypertext categorization using hyperlinks.S. Chakrabarti, B. Dom and P. Indyk. Proceedings of ACM SIGMOD 1998.

35.  Hypersearching the web. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan and A. Tomkins. Scientific American, June, 1999.

36.  Mining the link structure of the World Wide Web. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan and A. Tomkins. IEEE Computer.

37.  Trawling the Web for emerging cyber-communities. S.R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Eighth World Wide Web conference, Toronto, Canada, May 1999.

38.  Focused crawling: a new approach to topic specific resource discovery. S. Chakrabarti, M. Van den Berg, B. Dom Eighth World Wide Web conference, Toronto, 1999.

39.  The web as a graph: Measurements, models and methods. J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Proceedings of the International Conference on Combinatorics and Computing, 1999; invited paper.

40.  Extracting large scale knowledge bases from the web. S.R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. IEEE International conference on Very Large Databases (VLDB), Edinburgh, Scotland.

41.  Clustering categorical data: an approach based on dynamical systems. D. Gibson, J. Kleinberg and P. Raghavan. Proceedings of the VLDB conference, 1998.

42.  Search and Ranking Algorithms for Locating Resources on the World Wide Web B. Yuwono and D. Lee. IEEE conference on Data Engineering, 1996 (pp391-400).

43.  A Machine Learning Architecture for Optimizing Web Search Engines,  J. Boyan, D. Freitag, and T. Joachims. AAAI Workshop on Internet-based Information Systems, 1996.

44.  SIBRIS: the Sandwich Interactive Browsing and Ranking Information System S. Wade, P. Willett, and D. Bawden. Journal of Information Science, 15, 1989, pp249-260

45.  Estimating the Usefulness of Search Engines W. Meng, K. Liu, C. Yu, W. Wu and N. Rishe. ICDE 1999. (more details)

46.  The effectiveness of GlOSS for the Text Database Discovery Problem L. Gravano, H. Garcia-Molina, A. Tomasic. SIGMOD 1994. (GlOSS)

47. Adaptive methods for the computation of PageRank, Sepandar Kamvar1, Taher Haveliwala2, Gene Golub, Technical Report,, Standford University, 2003

48. Building a Distributed Full-Text Index for the Web, Melnik, Sergey and Raghavan, Sriram and Yang, Beverly and Garcia-Molina, Hector, ACM Transactions on Information Systems 2003

49. Parallel Crawlers, Junghoo Cho, Hector Garcia-Molina, 11th WWW

50  An adaptive model for optimizing performance of an incremental web crawler , Edwards, J., McCurley, K. S., and Tomlin, J. A., In Proceedings of the Tenth Conference on World Wide Web (2001)

51. Focused crawling using context graphs, 26th International Conference on Very Large Databases

52. Effective page refresh policies for web crawlers. Junghoo Cho, Hector Garcia-Molina, ACM Transactions on Database Systems

53. Self-similarity in the web. Stephen Dill etc. ACM Transactions on Internet Technology (TOIT) archive (August 2002)

54. Finding replicated web collections. Junghoo Cho, N. Shivakumar, and Hector Garcia-Molina, ACM SIGMOD Record  (June 2000)

55. Hilltop: A search engine based on expert documents. K. Bharat and G. A. Mihaila, 9th WWW Conference (Poster), 2000.

56. TopicSensitive PageRank, In Proceedings of the Eleventh International World Wide Web Conference

57. Generalizing PageRank: Damping functions for link-based ranking algorithms, Ricardo BaezaYates etc, In Proceedings of SIGIR2002

58. Site Level Noise Removal for Search Engines, Carvalho, Paul - Alexandru Chirita, Edleno Silva de Moura, etc, In 15th WWW

59. Efficient crawling through URL ordering, Junghoo Cho etc , Computer Networks and ISDN Systems archive 1998,

60. Stuff I’ve Seen: A System for Personal Information Retrieval and Re-Use, Susan Dumais etc, 26th ACM SIGIR conference on Research and development in informaion retrieval

61. When experts agree: Using non-affiliated experts to rank popular topics, Krishna Bharat, George A. Mihaila, 10th WWW

62. The stochastic approach for link-structure analysis (salsa) and the tkc effect, R. Lempel, S. Moran, 9th WWW

63. What is this Page Known for? Computing Web Page Reputations,  Davood Rafiei, Alberto Mendelzon , 9th WWW

64. PicASHOW: Pictorial Authority Search by Hyperlinks on the Web, R. Lempel, A. Soffer, 10th WWW

65. Web Search via Hub Synthesis, Dimitris Achlioptas, Amos Fiat, Anna Karlin, Frank McSherry, 42nd IEEE Symposium on  Foundations of Computer Science

66. Approximating Aggregate Queries about Web Pages via Random Walks, Ziv Bar-Yossef etc, VLDB 2000

 


2. Web Servers

2.1 Web Server Issues (top^)

Questions: What are the key technology for building high performance and scalable Web Servers ? 

1.  Measuring the Capacity of a Web Server Gaurav Banga and Peter Druschel, Proceedings of the 1997 USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December 1997. 

2.  Internet Web Servers: Workload Characterization and Performance Implications Arlitt and Williamson, ACM/IEEE Transactions on Networking, 5(5):631-645, Oct. 1997. A short version titled "Web Server Workloa d Characterization: The Search for Invariants", appeared in ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, May 1996.

3.  Locating Nearby Copies of Replicated Internet Servers, James D. Guyton and Michael F. Schwartz. ACM SIGCOMM, 1995. 

4.  HACC: An Architecture for Cluster-Based Web Servers Xiaolan Zhang, Michael Barrientos, J. Bradley Chen, Margo Seltzer (Harvard University). In the Proceedings of the 3rd USENIX Windows NT Symposium, July 1999, Seattle, WA, 155-164.

5.  Trace-Driven Simulation of Document Caching Strategies for Internet Web Servers Martin F. Arlitt and Carey L. Williamson, Simulation, Special Issue: Modeling and Simulation of Computer Systems and Networks. Vol. 68, No. 1, January, 1997. 

6.  Performance Characteristics of Mirror Servers on the Internet Andy Myers, Peter Dinda, Hui Zhang. INFOCOM'98.

7.  TCP Behavior of a Busy Internet Server: Analysis and Improvements Hari Balakrishnan, Venkata Padmanabhan, Srini Seshan, Mark Stemm and Randy H. Katz, INFOCOM'98.

8.  The Content and Access Dynamics of a Busy Web Site: Findings and Implications V. N. Padmanabhan and L. Qiu. Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, August 2000. . (An earlier version appeared as Microsoft Research Technical Report MSR-TR-2000-13, February 2000 )

9.   A Performance Monitoring and Capacity Planning Methodology for Web Servers, Rodney B. Wallace and Tyrone E. McKoy, Jr. (NCR Corporation)

10.  A Self-Scaling and Self-Configuring Benchmark for Web Servers, Stephen Manley (Network Appliance), Michael Courage (Microsoft Co.), and Mar go Seltzer (Harvard)

11.  Connection Scheduling in Web Servers M. E. Crovella, R. Frangioso, and M. Harchol-Balter, Proceedings of the 1999 USENIX Symposium on Internet Technologies.

12.  Dynamic Server Selection in the Internet Mark E. Crovella and Robert L. Carter, Computer Science Department, Boston University.

13.  Dynamic Server Selection Using Bandwidth Probing in Wide-Area Networks, R. Carter and M. Crovella, INFOCOM, 1997. extended version (TR-96-007).

14.  NCSA's World Wide Web Server: Design and Performance Tomas T. Kwan, Robert E. McGrath, and Daniel A. Reed, IEEE Computer, Vol. 28, No. 11, pp. 68-74, November 1995. An earlier version titled: User Access Patterns to NCSA's World Wide Web Server. (Recent Pablo Project)

15.  A Scalable and Highly Available Web Server, D.M. Dias, W. Kish, R. Mukherjee, R. Tewari. In Proceedings of the IEEE Computer Conference (COMPCON), Santa Clara, March, 1996.

16.  A Scalable HTTP Server: The NCSA Prototype, R. McGrath. Proc. of the 1st Intl. World-Wide Web Conference, May 1994. (HTML)

17.  The Power of Two Choices in Randomized Load Balancing, M. Mitzenmacher, PhD. Thesis, 1996.

18.  Flash: An Efficient and Portable Web Server Vivek Pai, Peter Druschel and Willy Zwaenepoel, Proceedings of 1999 USENIX Conference, Monterey, CA, June 1999.

19.  The AFS File System in Distributed Computing Environments:White Paper, Mnsarc Corporation, May 1996.

20.  Apache Server (Apache HTTP Server V1.3 - API notes)

2.2 Web Proxies and Web Caching (top^)

Questions: How do we coordinate the activities of a geographically distributed application?

1.  World Wide Web Proxies Ari Luotonen (CERN) and Kevin Altis (Intel) (html)

2.  A Hierarchical Internet Object Cache Anawat Chankhunthod, Peter B. Danzig, Chuck Neerdaels (University of Southern California), Michael F. Schwartz, Kurt J. Worrell (University of Colorado, Boulder) (An Implementation of the hierarchical Object Cache at netapp)

3.  Beyond Hierarchies: Design Principles for Distributed Caching on the Internet, R. Tewari, M. Dahlin, H. Vin, and J. Kay, Technical report TR98-04, Dept. of Computer Sciences, Univ. of Texas, 1998.

4.  Main Memory Caching of Web Documents, vangelos P. Markatos. In Proceedings of the Fifth WWW Conference, 1996. 

5.  Design Considerations for Integrated Proxy Servers S. Sahu, P. Shenoy, D. Towsley. y Proc. IEEE NOSSDAV'99 (Basking Ridge, NJ, June 1999).

6.  Performance Issues of Enterprise Level Web Proxies C. Maltzahn and K. Richardson and D. Grunwald, Proceedings of ACM SIGMETRICS'97, Seattle, WA, Pages 13-23, June 1997.

7.  World Wide Web Cache Consistency, James Gwertzman and Margo Seltzer, Proceedings of the 1996 USENIX Technical Conference, San Diego, CA, Jan 1996.

8.  Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System D. Terry, M. Theimer, K. Petersen, A. Demers and M. Spreitzer, and C. Hauser, In Proceedings of the fifteenth ACM Symposium on Operating Systems Principles (SOSP'97), Copper Mountain Resort, CO, December, 1995.

9.  Volume Leases for Consistency in Large-scale Systems, J. Yin, L. Alvisi, M. Dahlin and C. Lin, IEEE Transactions on Knowledge and Data Engineering Special issue on Web Technologies, Jan 1999 .

10.  Web proxy caching: the devil is in the details Ramon Caceres, Fred Douglis, Anja Feldmann, Gideon Glass, Michael Rabinovich, Workshop on Internet Server Performance held with Sigmetrics'98.

11.  Making World Wide Web Caching Servers Cooperate Radhika Malpani, Jacob Lorch, David Berger. Proceedings of the 4th WWW, 1998.

12.  Intelligent Caching for World-Wide Web Objects Duane Wessels (University of Colorado), Proceedings of INET'95, May 1995.

13.  Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol L. Fan, P. Cao, J. Almeida, and A.Z. Broder, SIGCOMM, 1998, pp 254-265.

14.  Improving End-to-End Performance of the Web Using Server Volumes and Proxy Filters Edith Cohen, Balachander Krishnamurthy, Jennifer Rexford, SIGCOMM, 1998.

15.  Internet Cache Protocol (ICP), version 2 D. Wessels, K. Claffy, RFC 2186, May 1997. (ICP Working Group Home Page )

16.  Adaptive Web Caching S. Floyd, V. Jacobson and L. Zhang, Procedings of the Web Caching Workshop 1997.

17.  An Analysis of Geographical Push Caching J. Gwertzman and M. Seltzer.

18.  A Caching Relay for the World Wide Web Steven Glassman, First International World-Wide Web Conference, pp 69-76, May 1994.

19.  Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes Mark Crovella and Azer Bestavros, Proceedings of SIGMETRICS '96.

20.  Intelligent Caching for World-Wide Web Objects Duane Wessels (University of Colorado), Proceedings of INET'95, May 1995.

21.  The Rio File Cache: Surviving Operating System Crashes Peter M. Chen, Wee Teck Ng, Subhachandra Chandra, Christopher Aycock, Gurushankar Rajamani, and David Lowell, Proceedings of the 1996 International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), October 1996.

22.  Operating System Support for High-Speed Networking, P. Druschel, Communications of the ACM, Vol. 39, No. 9, Pages 41-51, September 1996.

23.  Squid Internet Object Cache; Squid Web Proxy Cache

24.  Performance of Web Proxy Caches, Feldmann, Caceres, Douglis, Glass, and Robinovitch, Workshop on Internet Server Performance (WISP), 1998.

25.  Enhancing the Web's Infrastructure: From Caching to Replication Michael Baentsch, Lothar Baum, Georg Molter, Steffen Rothkugel, and Peter Sturm, IEEE Internet Computing, vol. 1, no. 2, pages 18-27, April 1997 (class handout).

26.  Propagation, Replication and Caching from the W3C

27.  Caching Proxies: Limitations and Potentials Marc Abrams, Charles R. Standridge, Ghaleb Abdulla, Stephen Williams, Edward A. Fox, Proceedings of the Fourth International World Wide Web Conference, pages 119-133, Boston, MA, December 1995.

28.  Improving End to End Performance of the Web using Server Volumes and Proxy Filters, E. Cohen, B. Krishnamurthy and J. Rexford, In Proceedings of ACM SIGCOMM'98, Vancouver, Canada, Pages 241-253, September 1998.

29.  The Measured Access Characteristics of World-Wide-Web Client Proxy Caches, B M. Duska, D. Marwood, and M J. Feeley, In Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December, 1997

30.  A Survey of Proxy Cache Evaluation Techniques Brian D. Davison

31.  A Tutorial for Network Caching

2.3 Web Prefetching (top^)

Question: How much can Prefetching alleviate the latency and bandwidth problems in Web access?

1.  Using Predictive Prefetching to Improve World Wide Web Latency,  Padmanabhan and Mogul, SIGCOMM, 1996.

2.  Alleviating the Latency and Bandwidth Problems in WWW Browsing, Loon and Bharghavan, Usenix Symposium on Internet Technologies and Systems (USITS) 1997.

3.    Determining WWW User's Next Access and Its Application to Pre-fetching, Carlos R. Cunha and Carlos F.B. Jaccoud, Proceedings of ISCC'97: The Second IEEE Symposium on Computers and Communications. Alexandria, Egypt, 1-3 July 1997.

4.    Potential and Limits of Web Prefetching Between Low-Bandwidth Clients and Proxies Li Fan, Quinn Jacobson and Pei Cao. To appear in SIGMETRICS'99.

5.    Optimal Prefetching via Data Compression, Vitter and Krishnan, FOCS, 1991.

6.    The Network Effects of Prefetching, Crovella and Barford, INFOCOM, 1998.

2.4 WWW Workloads (top^)

Questions: What are the main causes of World Wide Web traffic? How do we find idle resources if they exist?

1.    Web Facts and Fantasy, Stephen Manley (Network Appliance), Margo Seltzer (Harvard University), Proceedings of the 1997 USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December 1997.

2.    Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, Mark E. Crovella and Azer Bestavros IEEE/ACM Transactions on Networking, 5(6):835--846, December 1997.

3.    Measuring Web Performance in the Wide Area, P. Barford and M. E. Crovella, in Performance Evaluation Review, August, 1999.

4.    Changes in Web Client Access Patterns: Characteristics and Caching Implications, P. Barford, A. Bestavros, A. Bradley, and M. E. Crovella, in World Wide Web, Special Issue on Characterization and Performance Evaluation, Vol. 2, pp. 15-28, 1999.

5.    Characterizing Browsing Strategies in the World-Wide Web, L. Catledge and J. Pitkow, Journal of Computer Networks and ISDN Systems, vol. 27, no. 6, 1995, p. 1065.

6.    Measuring the Web, Tim Bray (Open Text Corporation), Fifth International World Wide Web Conference, May 1996, Paris, France.

7.    Generating Representative Web Workloads for Network and Server Performance Evaluation, Barford and Crovella, SIGMETRICS, 1998, pp. 151-160. 

8.    Characterizing Reference Locality in the WWW, Almeida, Bestavros, Crovella, and de Oliveira, International Conference on Parallel and Distributed Information Systems (ICPDIS), 1996. (The OCEANS Project)

9.    Web Traffic Characterization: An Assessment of the Impact of Caching Documents from NCSA's Web Server H. Braun and K. Claffy; Second International Conference on the WWW, Chicago, IL, Oct. 1994, pages 1007-1027.

10.    Open Market's The Internet Index Home Page

11.    System Design Issues for Internet Middleware Services: Deductions from a Large Client Trace, Gribble and Brewer, Usenix Symposium on Internet Technologies and Systems (USITS) 1997.


3. Application Server Issues (top^)

Questions: How do we build a scalable Internet service located at a single site? Should we replicate to get end-to-end availability? What abstractions should we provide to support scalability to millions of users, and continuous operations 24 hours per day and 7 days per week?

1.    Availability and Latency of World Wide Web Information Servers, Charles L. Viles and James C. French (University of Virginia), USENIX, Computing Systems; vol. 8, no. 1; Winter 1995.

 

2.     A Quantitative Study of Differentiated Services S. Sahu, D. Towsley, J. Kurose. Proc. IEEE Global Internet'99 (Rio de Janeiro, Brazil, December 1999). A longer version is available as UMass CMPSCI Technical Report 99-09.

 

3.    A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast S. Kasera, J. Kurose, D. Towsley. Proc. IEEE Infocom'98 (San Francisco, CA, April 1998). A longer version is available as UMass CMPSCI Technical Report 97-69.

 

4.    A Comparison of Sender-Initiated and Receiver-Initiated Reliable Multicast Protocols D. Towsley, J. Kurose, S. Pingali. IEEE Journal on Selected Areas in Communications (JSAC) (April 1997)

 

5.    Exploiting Internetwork Multicast Services Nortel White Paper.

 

6.    "Server-initiated Document Dissemination for the WWW" Azer Bestavros and Carlos Cunha,IEEE Data Engineering Bulletin, September 1996.

 

7, Middleware Support for Data Mining and Knowledge Discovery in Large-scale Distributed Information Systems., Azer Bestavros, In Proceedings of ACM SIGMOD'96 Data Mining Workshop, Montreal, Canada, June 1996.

 

8.    "Speculative Data Dissemination and Service to Reduce Server Load, Network Traffic and Service Time for Distributed Information Systems" , Azer Bestavros, Proceedings of ICDE'96: The 1996 International Conference on Data Engineering, New Orleans, Louisiana. March 1996.

 

9. Using speculation to reduce server load and service time on the WWW, Azer Bestavros, in Proceedings of CIKM'95: The Fourth ACM International Conference on Information and Knowledge Management, Baltimore, Maryland. November 1995.

 

10. "Demand-based document dissemination to reduce traffic and balance load in distributed information systems" Azer Bestavros, in Proceedings of the 1995 Seventh IEEE Symposium on Parallel and Distributed Processing, San Antonio, Texas. October 1995.

 

11. Demand-based Data Dissemination for Distributed Multimedia Applications, Azer Bestavros, in Proceedings of the   ACM/ISMM/IASTED International Conference on  Distributed Multimedia Systems and Applications, Stanford, CA. August 1995.

 

12. "Information Dissemination and Speculative Service: Two candidate  functionalities for the middleware infrastructure" Azer  Bestavros, in Proceedings of SIGCOMM'95 Workshop on Middleware. Cambridge, MA, August 1995.

 

13. Personalized Information Environments: An Architecture for Customizable Access  to Distributed Digital Libraries, James C. French and Charles L. Viles, D-Lib Magazine, June 1999, Volume 5 Number 6

 

14.    Continuous Profiling: Where Have All the Cycles Gone? Jennifer M. Anderson, Lance M. Berc, Jeffrey Dean, Sanjay Ghemawat, Monika R. Henzinger, Shun-Tak A. Leung, Richard L. Sites, Mark T. Vandevoorde, Carl A. Waldspurger, and William E. Weihl. SOSP'97.

 

15.    System Support for Automated Profiling and Optimization, Aolan Zhang, Zheng Wang, Nicholas Gloy, J. Bradley Chen, and Michael D. Smith, SOSP'97.

 

16.    Cluster-Based Scalable Network Services. Fox, Gribble, Chawathe, and Brewer, Proceedings of SOSP, 1997.

17.    A Case for Networks of Workstations: NOW, T. Anderson, D. Culler, D. Patterson, IEEE Micro Feb. 1995. (The Berkeley NOW Project

18.    Free Transactions with Rio Vista, David E. Lowell and Peter M. Chen, Proceedings of the 1997 Symposium on Operating Systems Principles (SOSP), October 1997. (The Rio project).

 

19.    The Case for Application-Specific Benchmarking, Margo Seltzer, David  Krinsky, Keith Smith, Xiaolan Zhang.

 

20.    Frangipani: A Scalable Distributed File System, C. Thekkath, T. Mann and E. Lee, Proceedings of the 1997 Symposium on Operating Systems Principles  (SOSP), October 1997.

21.    Serverless Network File Systems, Anderson, Dahlin, Neefe, Patterson, Roselli and Wang, SOSP, 1995.

22.    A Note on Distributed Computing, Jim Waldo, Geoff Wyant, Ann Wollrath, and Sam Kendall, Sun Microsystems Laboratories Technical Report TR-94-29 (November 1994).

23.    Application-Level Document Caching in the Internet Azer Bestavros et.al, Proceedings of SDNE'95: The second International Workshop on Services in Distributed and Network Environments. Whistler, Canada, June 1995.

24.    WWW Media Distribution via Hopwise Reliable Multicast, James E. (Jed) Donnelley Lawrence Livermore National Laboratory, Livermore, California, USA. WWW'95.

25.    Scalable Reliable Multicast Using Multiple Multicast Channels, S. Kasera, G. Hjalmtysson, D. Towsley, J. Kurose, To appear in IEEE/ACM Transactions on Networking, 2000.

26.    Scalable fair reliable multicast using active services, S.K. Kasera, S. Bhattacharyya, M. Keaton, D. Kiwior, J. Kurose, D. Towsley, S. Zabel. IEEE Networks Magazine.

27.    An Internet Multicast System for the Stock Market, N.F. Maxemchuk and D. H. Shur (AT&T Labs - Research)

28.    Cooperative Reliable Multicast Protocol with Local Recovery, Young-mi Ohk, Steven H. Low

29.    Real-time Applications of the Internet, N. F. Maxemchuk, Johns Hopkins  University, April 8, 1999.

30.    Operational Information Systems - An example from the Airline Industry, Van Oleson, Greg Eisenhaur, Calton Pu, Karsten Schwan, Beth Plale and Dick Amin. Sept., 2000.

31.    Disconnected Operations in the Coda File System, J. Kistler and M. Satyanarayanan, ACM Transcations on Computing Systems, Vol 10, No 1, Pages 3-25, February 1992.

32.    Information Monitoring on the Web: A Scalable Solution. Ling Liu, Wei Tang, David Buttler, and Calton Pu. World Wide Web Journal(by Kluwer Academic Publishers), Volume 5, No. 4.

33.    InfoFilter: Supporting Quality of Service for Fresh Information Delivery, Ling Liu, Calton Pu, Karsten Schwan, Jon Walpole. New Generation Computing Journal (Vol.18, No.4),

34.    Continual Queries for Internet Scale Event-Driven Information Delivery , Ling Liu, Calton Pu, Wei Tang. n: Special issue on Web Technologies, IEEE Transactions on Knowledge and Data Engineering, Vol.11, No.4, July/Aug. 1999. pp610-628.

35.    Methodical Restructuring of Complex Workflow Activities, Ling Liu and Calton Pu. IEEE 14th International Conference on Data egineering, February 23-27, 1998, Orlando, Florida, USA. pp342-350.

36.    Support for Data-intensive Applications in Large-scale Systems, Mike Dahlin, University of Texas at Austin  E-Commerce White Paper Series

38.    "Web content adaptation to improve server overload behavior", T.Abdelzaher and N.Bhatti, International World Wide Web conference,Toronto, Canada, May 1999.

39.    "Web server QoS management by adaptive content delivery", T.Abdelzaher and N.Bhatti, International Workshop on Quality of  Service, London, UK, June 1999.

40.    "Digestor: Device-independent Access to the World Wide Web", T. Bickmore and B. Schilit, The Sixth International World Wide Web Conference, April 1997.

41.    "Adapting the Web: An Adaptive Web Browser",K. Henricksen and J. Indulska, User Interface Conference, 2001

42.    "HTTP Remote Variant Selection Algorithm --RVSA/1.0", K. Holtman and A. Mutz, RFC2296.

43.    Reducing WWW Latency and Bandwidth Requirements by Real-Time Distillation. A. Fox and E. Brewer. Fifth International World Wide Web Conference (Paris, May 1996).

44.    "Adaptive Delivery of HTML Contents", Y. Yang, J. Chen, and H. Zhang, 9th International World Wide Web Conference, Amsterdam, May 2000.

45.    "Network-Adaptive Control With TCP-Friendly Protocol for Multiple Video Objects", Q.Zhang, Wenwu Zhu, and Y.Q.Zhang, ICME 2000.

46.    Gardmon: A Java-based Monitoring Tool for Gardens Non-dedicated Cluster Computing. R. Buyya, B. Koshy, and R. Mudlapur. In Proceedings of Workshop on Cluster Computing Technologies, Environments, and Applications, PDPTA 99, Monte Carlo Resort, Las Vegas, Nevada, USA, 1999.

47.    The Condor Distributed Processing System. M. Livny, Dr Dobbs Journal, Feb 1995 pp 40-48.

48.    Project Ganglia: Distributed Monitoring and Execution System.

49.     PARMON: A Comprehensive Cluster Monitoring System. Rajkumar et al., Proceedings of the Fifth International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, Nevada, USA, CSREA Press, 1998.

50.    Building a Resources Monitoring System for SMILE Beowulf Cluster. P. Uthayopas, S. Phaisithbenchapol, and K. Chongbarirux., Proceeding of the Third International Conference/Exhibition on High Performance Computing in Asia-Pacific Region (HPC ASIA'99), Singapore, 1998

 

3.1 Collaborative Filtering (top^)

1.    Empirical Analysis of Predictive Algorithms for Collaborative Filtering. John S. Breese, David Heckerman, and Carl Kadie,

2.    Collaborative Filtering by Personality Diagnosis: A Hybrid Memory- and  Model-Based Approach, David Pennock, Eric Horvitz, Steve Lawrence, and C. Lee Giles, Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence, UAI 2000.

3.    Memory-Based Weighted-Majority Prediction For Recommender Systems, Joaquin Delgado and Naohiro Ishii, In Proceedings of the ACM SIGIR'99 Workshop on Recommender Systems: Algorithms and Evaluation, UC Berkeley, CA, USA, August 1999.

4.    Clustering for collaborative filtering applications. Arnd Kohrs and Bernard Merialdo, In Proceedings of CIMCA'99. IOS Press, 1999.

 

 

 


 

 

 

4. System Level Issues (top^)

 

4.1 System Support for Internet Applications (top^)

Questions: What is the right model for supporting Internet Applications of the future?

1.    WebOS: Operating System Support for Wide Area Applications, Vahdat, Anderson, Dahlin, Bellani, Culler, Eastham, and Yoshikawa, HPDC, 1998.

2.    Operating System Directions for the Next Millennium, Bolosky, Draves, Fitzgerald, Fraser, Jones, Knoblock, and Rashid.

3.    The Architectural Design of Globe: A Wide-Area Distributed System, M. van Steen, P. Homburg, and A.S. Tanenbaum, Technical Report IR-422, Dept. of Computer Science, Vrije University, March 1997. Appeared in IEEE Concurrency.

4.    A Network Architecture for Heterogeneous Mobile Computing E. A. Brewer, R. H. Katz et al. IEEE Personal Communications Magazine, October 1998.

5.    IO-Lite: A Unified I/O Buffering and Caching System, Peter Druschel, Vivek S. Pai and Willy Zwaenepoel. To appear in the Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI'99), New Orleans, LA, February 1999.

6.    The x-Kernel: An Architecture for Implementing Network Protocols, Hutchinson and Peterson

7.    Making Paths Explicit in the Scout Operating System, Mosberger and Peterson, OSDI, 1996.

8.    Server Operating Systems, Kaashoek, Engler, Gagner, and Wallach, European SOSP Workshop, 1996.

9.    Application Performance and Flexibility on Exokernel Systems, Kaashoek, Engler, Ganger, Briceno, Hunt, Mazieres, Pinckney, Grimm, Jonnotti, Mackenzie, SOSP, 1997.

10.    Server Operating Systems: A Comparative Cost-of-Ownership Analysis, Cahners In-Stat Group White Paper, 1997.

4.2 Naming Issues (top^)

Questions: How should we translate from virtual name to physical addresses? How do we find objects or services or users in the Internet if they migrate?

1.    Locating Objects in Wide-Area Systems, M. van Steen, F.J. Hauck, P. Homburg, and A.S. Tanenbaum, IEEE Communications Magazine, January 1998.

2.   Scalable Naming in Global Middleware, G. Ballintijn, M. van Steen, A.S. Tanenbaum. Proc. 13th Int'l Conf. on Parallel and Distributed Computing Systems (PDCS-2000), Las Vegas, August 8-10, 2000.

3.   Development of the Domain Name System, P. Mockapetris and K. Dunlap SIGCOMM 1988, Computer Communications Review Vol 18 No 4 Aug. 1988 pp. 123-133. Dynamic DNS: rfc 2136 and rfc 2137

4.  Resolution of Uniform Resource Identifiers using the Domain Name System, Ron Daniel and Michael Mealling. Internet Draft, September 1996.

5.    Engineering a Global Resolution Service, Edward Slottow, Nov. 1996.

6.    Host Anycasting Service, C. Partridge, T. Mendez, and W. Milliken, http://andrew2.andrew.cmu.edu/rfc/rfc1546.html

7.    A Directory Service for Configuring High-Performance Distributed Computations, S. Fitzgerald, I. Foster, C. Kesselman, G. von Laszewski, W. Smith, and S. Tuecke, Proc. 6th IEEE Symp. on High-Performance Distributed Computing 1997.

8.    Active Naming: Programmable Location and Transport of Wide-Area Resources, Vahdat, Anderson and Dahlin SITS??, 1997?

9.    Using Smart Clients to Build Scalable Services, Chad Yoshikawa, Brent Chun, Paul Eastham, Amin Vahdat, Thomas Anderson, and David Culler. Proceedings of USENIX '97, January 1997.

4.3 Security for Internet Applications (top^)

Questions: How can we build secure Internet Applications?

1.    Extensible Security Architectures for Java, D S. Wallach, D. Balfanz, D. Dean and E W. Felten, Proceedings of the sixteenth ACM symposium on Operating systems principles (SOSP'97), Saint-Malo, France, Pages 116-128, December 1997.

2.    The CRISIS Wide Area Security Architecture, E. Belani, A. Vahdat, T. Anderson, and M. Dahlin, In Proceedings of USENIX Security Symposium, San Antonio, TX, January 1998.

3.    Authentication in Distributed Systems: Theory and Practise, B. Lampson, M. Abadi, M. Burrows and E. Wobber, Proceedings of the thirteenth ACM symposium on Operating systems principles (SOSP'91), Pacific Grove, CA, pages 165-182, October, 1991.

4.    Kerberos: An Authentication Service for Open Network Systems, J. G. Steiner, B. Clifford Neuman, and J.I. Schiller, Proceedings of the USENIX Winter Conference, pages 191-202, 1988.

5.    Kerberos: An Authentication Service for Computer Networks B. Clifford Neuman and Theodore Ts'o, IEEE Communications Magazine, Volume 32, Number 9, pages 33-38, September 1994. ( Kerberos Home, About Kerberos, Kerberos Reference Page, Kerberos for UNIX)

6.    Java Security: From HotJava to Netscape and Beyond D. Dean, E. W. Felten, and D S. Wallach, Proceedings of 1996 IEEE Symposium on Security and Privacy, May 1996.

7.   Cryptography and the Internet, S. Bellovin, Proceedings of CRYPTO '98, August 1998, pp. 46-55.

8.    Toward Acceptable Metrics of Authentication, M. Reiter and S. Stubblebine,IEEE Symposium on Security and Privacy, 1996.

9.    Timing attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems, P. Kocher,Advances in Cryptology - CRYPTO 96, pp 104-113, 1996

10. Vulnerabilities and Security Threats in Structured Overlay Networks. M. Srivatsa, L. Liu, Proc of 20th IEEE Annual Computer Security Applications Conf ACSAC, 2004.

11. FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, R. P. Wattenhofer, Proc of 5th OSDI, 2002.

12. Secure routing for Structured Peer-to-Peer Overlay Networks. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. S. Wallach, Proc of 5th OSDI, 2002.

13. The Sybil Attack. J. Douceur, Proc of 2nd Annual IPTPS Workshop, 2002.

14. Security Considerations for Peer-to-Peer Distributed Hash Tables. E. Sit, J. Morris, Proc of 2nd Annual IPTPS Workshop, 2002.

15. SOS: An Architecture For Mitigating DDoS Attacks. A. D. Keromytis, V. Misra, D. Rubenstein, Proc of IEEE Journal on Selected Areas in Communication, Vol 21, 2003.

16. Countering Targeted File Attacks using Location Keys. M. Srivatsa and L. Liu, Proc of USENIX Security Symposium, 2005.

17. Securing Publish-Subscribe Overlay Services With EventGuard . M. Srivatsa and L. Liu, Proc of ACM Conference on Computer and Communication Security (CCS) , 2005.

4.3.1 Privacy (top^)

1. A Privacy-Preserving Index for Range Queries, Bijit Hore, Sharad Mehrotra, Gene Tsudik, VLDB 2004

2. Auditing Compliance with a Hippocratic Database, Rakesh Agrawal Roberto Bayardo Christos Faloutsos Jerry Kiernan Ralf Rantzau Ramakrishnan Srikant, VLDB 2004

3. Privacy-preserving data mining. R. Agrawal and S. Ramakrishnan. In Proceedings of of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 439--450, 2000.

4. On the design and quantification of privacy preserving data mining algorithms. D. Agrawal and C. C. Aggarwal, In Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, California, USA, May 21-23 2001. ACM.

5.  Privacy Preserving Indexing of Documents on the Network, Mayank Bawa, Roberto Bayardo Jr., and Rakesh Agrawal. In VLDB, 2003

6.  Topk Queries Across Multiple Private Databases, L. Xiong, S. Chitti, L. Liu. In Proc of Intl Conf of Distributed Computing Systems ICDCS, 2005

7.  Information Hiding -- A Survey, F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. In Proc of IEEE Special Issue on Protection of MultiMedia Content 87(7):1062-1078, July 1999

8. Location Privacy in Pervasive Computing, A. R. Beresford, F. Stajano. In Proc of IEEE Pervasive Computing 46-55, March 2003

4.3.2 Trust (top^)

1.    PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities. L. Xiong and L. Liu, To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE), 2004.

 

2. TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. A. Singh and L. Liu, In the proceedings of the third IEEE International Conference on Peer-to-Peer Computing, September 2003.

 

3. Reputation Systems. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, Comm. ACM, vol. 43, no. 12, 2000.

 

4.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Reputation Mechanism. C. Dellarocas, Management Science, vol. 49, no. 10, 2003.

 

5. Managing Trust in a Peer-to-Peer Information System, K. Aberer and Z. Despotovic, Proc. ACM Conf. Information and Knowledge Management (CIKM), 2001.

 

6.  Choosing Reputable Servents in a P2P Network, F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P.Samarati, Proc.11th Int.l World Wide Web Conf., 2002.

7.  The EigenTrust Algorithm for Reputation Management in P2P Networks, S. Kamvar, M. Scholsser, and H. Garcia-Molina, Proc. 12th Int.l World Wide Web Conf., 2003.

8. Combating Web Spam with TrustRank. Zoltan Gy�ngyi, Hector Garcia-Molina, Jan Pedersen, VLDB 2004: 576-587

9. Propagation of Trust and Distrust. R. Guha, R. Kumar, P. Raghavan, A. Tomkins, Proc of 13th Intl World Wide Web Conf, 2004.

10. Trust Management for the Semantic Web. M. Richardson, R. Agarawal, P. Domingos, Proc of Intl Semantic Web Conf, 2003.

11. TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks . M. Srivatsa, L. Xiong and L. Liu Proc of 14th World Wide Web Conference , 2005.

 

 

 

4.3.3 Location Privacy  (top^)

1. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms.  Bugra Gedik and Ling Liu., IEEE Transactions on Mobile Computing. A short version appeared as A Customizable k-Anonymity Model for Protecting Location Privacy. B. Gedik, L. Liu, Proc of Intl Conf of Distributed Computing Systems ICDCS, 2005.

2. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. M. gruteser, D. GrunwaldProc of ACM/USENIX MobiSys, 2003.

3. Location Privacy in Pervasive Computing. A. Beresford and F. Stajano.  IEEE Pervasive Computing, 2003

4.Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid by Bhuvan Bamba, Ling Liu, Peter Pesti and Ting Wang, Proceedings of 17th International World Wide Web Conference (WWW'08).

5. The New Casper: Query Processing for Location Services without Compromising Privacy.  Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref., In Proceedings of the International Conference on Very Large Data Bases, VLDB, pages 763–774, Seoul, Korea, September 2006.

6. PRIVE: Anonymous Location based Queries in Distributed Mobile Systems. Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. In Proceedings of International Conference on World Wide Web, WWW, pages 1–10, 2007.

7. Onion routing for anonymous and private internet connections. D. Goldberg, M. Reed and P. Syverson. CACM 1999.

8. Framework for Security and Privacy in Automotive Telematics. S. Duri, M. gruteser, X. Liu, P. Moskowitz, R. Perez, M. Sing, J. M. Tang Proc of Intl Workshop on Mobile Commerce WMC, 2002.

9. Preserving Privacy in Environments with Location-Based Applications. G. Myles, A. Friday, and N. Davies. IEEE Pervasive Computing, 2(1):56–64, 2003.

10. Concepts for Personal Location Privacy Policies. Einar Snekkenes. In Proceedings of the ACM Conference on Electronic Commerce, pages 48–57, 2001.

11.  Secure Verification of Location Claims. Naveen Sastry, Umesh Shankar, and David Wagner. WiSE 2003.

12. Privacy for Profitable Location Based Services. Tobias K¨olsch, Lothar Fritsch, Markulf Kohlweiss, and Dogan Kesdogan. ,In Proceeding of the International Conference on Security in Pervasive Computing, SPC, pages 164–178, 2005.

13. Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, and Mario Gerla. , In Proceedings of the IEEE Symposium on Computers and Communications, ISCC, pages 57–62, 2005.

14. Privacy by design – principles of privacy aware ubiquitous systems. Marc Langheinrich. Ubicom 2001 LNCS 2201. 2001 Springer.

15. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement Through Generalization and Specialization. P. Samarati, L. Sweeney, TechReport SRI-CSL-98-04, SRI Intl., 1998.

16. Framework for security and privacy in automotive telematics.  S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.M. Tang. , International Workshop on Mobile Commerce, 2002.

17. The Geometry of Uncertainty in Moving Objects Databases. Goce Trajcevski, Ouri Wolfson, Fengli Zhang, and Sam Chamberlain. , In Proceedings of the International Conference on Extending Database Technology, EDBT, pages 233–250, Prague, Czech Republic, March 2002.

18. U.S. Geological Survey (USGS). Digital line graph data. http://edc.usgs.gov/geodata/, oct. 2002

19. U.S. Geological Survey (USGS). Spatial data transfer standard. http://mcmcweb.er.usgs.gov/sdts., 1995.

20. Stalked by Satellite. John Voelcker. , IEEE Spectrum, 43(7):15–16, 2006.

21. The active badge location system. Roy Want, Andy Hopper, Veronica Falco and Jonathan Gibbons. ACM transactions on Information Systems (TOIS), 10(1), 1992.

22. They Know Where You Are . Jay Warrior, Eric McHenry, and Kenneth McGee.  IEEE Spectrum, 40(7):20–25, 2003.

23. People, Not Places: A Policy Framework for Analyzing Location Privacy Issues. James C. White. Master’s thesis, Terry Sanford Institute of Public Policy, Duke University, Durham, NC, 2006.

24. Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Customer Profiles. Mahmoud Youssef, Vijayalakshmi Atluri, and Nabil R. Adam., In Proceedings of the International Conference on Mobile Data Management, MDM, pages 67–76, 2005.

25. MOBIHIDE: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries. Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. , In Proceedings of the International Symposium on Advances in Spatial and Temporal Databases, SSTD, 2007.

4.4 Web Spam and Denial of Service Attacks (top^)

1. Web Spam Taxonomy, Zoltan Gyongyi and Hector Garcia-Molina, - AIRWeb 2005

 

2. Combating Web Spam with TrustRank, Zoltan Gyongyi, Hector Garcia-Molina, and Jan Pedersen. - VLDB 2004

 

3. Link Spam Alliances, Zoltan Gyongyi and Hector Garcia-Molina., - Stanford Technical Report 2005 (also published in VLDB 2005)

 

4. Link Spam Detection Based on Mass Estimation , Zoltan Gyongyi, Pavel Berkhin, Hector Garcia-Molina, and Jan Pedersen, Stanford Technical Report 2006 (also published in VLDB 2006)

 

5. ``A Parameterized Approach to Spam-Resilient Link Analysis of the Web", James Caverlee and Ling Liu. IEEE Transactions on Parallel and Distributed Systems (TPDS).

 

6. Countering Web Spam with Credibility-Based Link Analysis, James Caverlee, Ling Liu. PODC 2007

 

7. Spam-resilient Web Rankings via Influence Throttling, James Caverlee, Steve Webb, and Ling Liu.  - IPDPS 2007

 

8. ``SocialTrust: Tamper-Resilient Trust Establishment in Online Communities", James Caverlee, Ling Liu, Steve Webb,  Proceedings of the International Joint Conference on Digital Libraries (JDL 2008), June 16-20, 2008 - Pittsburgh, Pennsylvania.

 

9. Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages, Dennis Fetterly, Mark Manasse, and Marc Najork.- WebDB 2004

 

10. Detecting Phrase-level Duplication on the World Wide Web, Dennis Fetterly, Mark Manasse, and Marc Najork.- SIGIR 2005

 

11. Thwarting the Nigritude Ultramarine: Learning to Identify Link Spam, Isabel Drost and Tobias Scheffer. - ECML 2005

 

12. Introducing the Webb Spam Corpus: Using Email Spam to Identify Web Spam Automatically, Steve Webb, James Caverlee, and Calton Pu - CEAS 2006

 

13. Know Your Neighbors: Web Spam Detection Using the Web Topology, Carlos Castillo et al. - SIGIR 2007

 

14. Detecting Spam Web Pages through Content Analysis, Alexandros Ntoulas, Marc Najork, Mark Manasse, and Dennis Fetterly. - WWW 2006

 

15. Web spam Identification Through Content and Hyperlinks -, Jacob Abernethy, Olivier Chapelle, and Carlos Castillo. AIRWeb 2008

 

16. Characterizing Web Spam Using Content and HTTP Session Analysis, Steve Webb, James Caverlee, and Calton Pu. - CEAS 2007

 

17. Predicting Web Spam with HTTP Session Information -, Steve Webb, James Caverlee, and Calton Pu. CIKM 2008,

 

18. Blog Spam: A Review, Adam Thomason. - CEAS 2007

 

19. Blocking Blog Spam with Language Model Disagreement - Gilad Mishne, David Carmel, and Ronny Lempel.,  AIRWeb 2005

 

20. Automatic Vandalism Detection in Wikipedia: Towards a Machine Learning Approach, Martin Potthast, Benno Stein, and Robert Gerling. - AAAI 2008

 

21. Creating, Destroying, and Restoring Value in Wikipedia, Reid Priedhorsky, Jilin Chen, Shyong (Tony) K. Lam,Katherine Panciera, Loren Terveen, and John Riedl. , GROUP 2007

 

 

 

 

5. Advanced Internet System Reading

5.1 Peer-to-Peer Computing (top^)

1.    Analysis of the Evolution of Peer-to-Peer Systems. David Liben-Nowell, Hari Balakrishnan, and David Karger, ACM Conf. on Principles of Distributed Computing (PODC), Monterey, CA, July 2002.

2.     Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications. Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, Hari Balakrishnan, IEEE/ACM Transactions on Networking

3.    Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility A. Rowstron and P. Druschel,18th ACM SOSP'01, Lake Louise, Alberta, Canada, October 2001.

4.    SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network,  Yan Chen, Randy H. Katz, and John D. Kubatowicz in Proceedings of the International Conference on Pervasive Computing, August 2002.

5.    PeerCQ: A Decentralized and Self-Configuring Peer-to-Peer Information Monitoring System.Bugra Gedik and Ling Liu. The 23rd International Conference on Distributed Computing Systems. (ICDCS 2003)

6.    Search and replication in unstructured peer-to-peer networks, Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott Shenker. In the Proceedings of the 16th international conference on Supercomputing, June 2002 , New York, USA.

7.    "Freenet: A Distributed Anonymous Information Storage and Retrieval System" Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong, in Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, ed. by Hannes Federrath. Springer: New York (2001).

8.    "Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems". A. Rowstron and P. Druschel, IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), Heidelberg, Germany, pages 329-350, November, 2001.

9.    Anonymous Publish/Subscribe in P2P Networks,A. K. Datta, M. Gradinariu, M. Raynal and G. Simon, IPDPS 2003.

10.    "SCRIBE: A large-scale and decentralised application-level multicast infrastructure",M. Castro, P. Druschel, A-M. Kermarrec and A. Rowstron, IEEE Journal on Selected Areas in Communications (JSAC) (Special issue on Network Support for Multicast Communications). 2002.

11.    Scalable application layer multicast. S. Banerjee, B. Bhattacharjee, and C. Kommareddy, In Proceedings of the 2002 ACM SIGCOMM Conference, 2002.

12.    Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture.Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan and Hui Zhang, In Proceedings of ACM SIGCOMM 2001.

13.    A Scalable Content Addressable Network. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. In Proceedings of the ACM SIGCOMM Conference, 2001.

14.    Gnutella RFC

15.    Making Gnutella-like P2P Systems Scalable. Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker. In Proceedings of the ACM SIGCOMM, 2003.

16.    Phenix: Supporting Resilient Low-diameter Peer-to-Peer Topologies. R. H. Wouhaybi and A. T. Campbell. In Proceedings of IEEE INFOCOM 2004.

17.   Improving Search in Peer-to-Peer Systems. Beverly Yang, Hector Garcia-Molina, In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), 2002

18.  "Designing a Super-peer Network." Beverly Yang, Hector Garcia-Molina, In Proceedings of the 19th International Conference on Data Engineering (ICDE), Bangalore, India, March 2003

19.  "Routing Indices For Peer-to-Peer Systems." Arturo Crespo, Hector Garcia-Molina. Proceedings of the International Conference on Distributed Computing Systems (ICDCS). July 2002.

20.  Turning Heterogeneity into an Advantage in Overlay Routing. Z. Xu, M. Mahalingam, and M. Karlsson. In Proceedings of INFOCOM, 2003.

21.    Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web”,A. Singh, M. Srivatsa, L. Liu and T. Miller, In the proceedings of the SIGIR workshop on distributed information retrieval, August 2003. Also in Lecture notes of computer science (LNCS) series, Springer Verlag.

22. Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella, Evangelos P. Markatos, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002.

23. Mapping the gnutella network. M. Ripeanu, I. Foster, and A. Iamnitchi. IEEE Internet Computing Journal, 6(1), 2002.

24. Scaling Unstructured Peer-to-Peer Networks with Heterogeneity-Aware Topology and Routing. M. Srivatsa and L. Liu. in the Proceedings of IEEE Transactions on Parallel and Distributed Systems.

25. Contructing a Proximity-aware Power Law Overlay Network . J. Zhang, L. Liu and C. Pu. In the Proceedings of IEEE Global Telecommunications Conference GLOBECOM, 2005.

26. An Analysis of Internet Content Delivery Systems. Stefan Saroiu, Krishna P. Gummadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy. Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 2002), December 2002.

27. On the Feasibility of Peer-to-Peer Web Indexing and Search, Jinyang Li, Boon Thau, Loo Joseph, M. Hellerstein, M. Frans Kaashoek, LECTURE NOTES IN COMPUTER SCIENCE – 2003, ISSU 2735, pages 207-215.

28. P2P Content Search: Give the Web Back to the People, Matthias Bender, Sebastian Michel, Peter Triantafillou, GerhardWeikum, Christian Zimmer, Proceedings of the 5th International Workshop on Peer-to-Peer Systems, 2006

29. MINERVA∞ A scalable efficient peer-to-peer search engine, S Michel, P Triantafillou, G Weikum - LECTURE NOTES IN  COMPUTER SCIENCE, 2005.

30. Routing indices for peer-to-peer systems, A Crespo, H Garcia-Molina, In Proceedings of Distributed Computing Systems, 2002.    

31.An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol, S.A. Baset and H.G. Schulzrinne, Infocom 2006, April 2006.

32. An Experimental Study of the Skype Peer-to-Peer VoIP System, Saikat Guha, Neil Daswani, Ravi Jain, IPTPSÂ’06, February 2006.

33. Characterizing and Detecting Skype-Relayed Traffic, K. Suh, D. R. Figueiredo, J. Kurose, D. Towsley, Infocom 2006, April 2006.

34. Rarest First and Choke Algorithms are Enough, Arnaud Legout, G. Urvoy-Keller, P. Michiardi, IMC 2006>

35. The Bittorrent P2P File-sharing System: Measurements and Analysis, J.A Pouwelse, P. Garbacki, D.H.J Epema, H.J. Sips, IPTPS 05, February 2005.

36. Incentives Build Robustness in BitTorrent, Bram Cohen, First Workshop on Economics of Peer-to-peer Systems, June 2003.

 

Some P2P Links


5.2 Mobile Computing (top^)

1.    Fundamental Challenges in Mobile Computing, Satyanarayanan, M., Fifteenth ACM Symposium on Principles of Distributed Computing ,   May 1996, Philadelphia, PA, Revised version appeared as: "Mobile Computing: Where's the Tofu?",  Proceedings of the ACM Sigmobile, April 1997, Vol. 1, No. 1.

2.    "Multi-Fidelity Algorithms for Interactive Mobile Applications",  Satyanarayanan, M., Narayanan, D. Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, August 1999, Seattle, WA

3.    "Mobile Data Access", Noble, B.School of Computer Science, Carnegie Mellon University, May 1998, CMU-CS-98-118

4.    "Energy-aware adaptation for mobile applications", Flinn J., Satyanarayanan, M., Proceedings of the 17th ACM Symposium on Operating Systems Principles, December, 1999, Kiawah Island Resort, SC.

5.    "PowerScope: A Tool for Profiling the Energy Usage of Mobile Applications", Flinn J., Satyanarayanan, M., Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, February, 1999, New Orleans, LA  

6.    System Support for Mobile, Adaptive Applications, Noble, Brian, IEEE Personal Communications, Vol. 7, No. 1, February, 2000

7.    Experience with adaptive mobile applications in Odyssey , Noble, B.D. and Satyanarayanan, M., Mobile Networks and Applications, Vol. 4, 1999

8.    Agile Application-Aware Adaptation for Mobility, Noble, B., Satyanarayanan, M., Narayanan, D., Tilton, J.E., Flinn, J., Walker, K. Proceedings of the 16th ACM Symposium on Operating System Principles, October 1997, St. Malo, France

9.    A Research Status Report on Adaptation for Mobile Data Access , Noble, B., Satyanarayanan, M. SIGMOD Record, Vol. 24, No. 4, December 1995

10.    A Programming Interface for Application-Aware Adaptation in Mobile Computing , Noble, B., Price, M., Satyanarayanan, M., Proceedings of the Second USENIX Symposium on Mobile & Location-Independent Computing, Apr. 1995, Ann Arbor, MI

11.    Application-Aware Adaptation for Mobile Computing , Satyanarayanan, M., Noble, B., Kumar, P., Price, M.     Proceedings of the 6th ACM SIGOPS European Workshop,  Sep. 1994, Dagstuhl, Germany.

12.    Mobile Information Access, Satyanarayanan, M. , IEEE Personal Communications, Vol. 3, No. 1, February 1996

13.    Indexing Techniques for Power Management in Multi-Attribute Data Broadcast Qinglong Hu, Wang-Chien Lee, and Dik Lun Lee,

14.    Power conserving And access Efficient Indexes For Wireless Computing Dik Lun Lee, and Qinglong Hu,

15.    Power Conservative Multi-Attribute Queries on Data BroadcastQinglong Hu, Wang-Chien Lee, and Dik Lun Lee, ICDE 2000.

16.    "Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices", Maria Papadopouli and Henning Schulzrinne, ACM  SIGMOBILE Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc) 2001, October 4-5, 2001, Long Beach, California. (Extension of the Sarnoff paper.)

17.    Energy-aware Web Caching for Mobile Terminals. Francoise Sailhan, Valarie Issarny. In Proceedings of the ICDCS Workshop on Web Caching Systems. July 2002, Vienna, Austria.

18.    Power-Controlled Data Prefetching/Caching in Wireless Packet Networks, Savvas Gitzenis and Nicholas Bambos, IEEE Infocom 2002, New York.

19.    Sleepers and Workaholics: Caching Strategies in Mobile Environments. Daniel Barbara, Tomasz Imielinski,VLDB Journal 4(4): 567-602(1995).

20.    Indexing techniques for data broadcast on wireless channels. D.L. Lee, Q. Hu, and W. C. Lee,Proceedings of the Fifth International Conference on Foundations of Data Organization (FODO '98), Kobe, Japan, Nov 11-12, 1998, 175-182.

21.    Indexing Techniques for Wireless Data Broadcast Under Data Clustering and Scheduling,Qinglong Hu, Wang-Chien Lee, and Dik Lun Lee, in Proceedings of ACM International Conference on Information and Knowledge Management (CIKM99), Kansas City, Missouri, Nov. 1999, pp. 351-358.

22.    MobiEyes: Distributed Processing of Continuously Moving Queries on Moving Objects in a Mobile System, Bugra Gedik, Ling Liu. The 9th International Conference on Extending DataBase Technology (EDBT 2004)  or Bugra Gedik and Ling Liu. MobiEyes: A Distributed Location Monitoring Service Using Moving Location Queries. IEEE Transactions on Mobile Computing. Vol. 5, No. 10, October 2006. pp1-19.

23. Processing Moving Queries over Moving Objects Using Motion Adaptive Indexes, Bugra Gedik, Kun-Lung Wu, Philip Yu, and Ling Liu, To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE).,

24. Bugra Gedik, Ling Liu, Kun-Lung Wu, Philip S. Yu. " Lira: Lightweight, Region-aware Load Shedding in Mobile CQ Systems". IEEE 23rd International Conference on Data Engineering. Istanbul, Turkey; April 17-20, 2007.

25. Bugra Gedik, Kun-Lung Wu, Philip S. Yu, and Ling Liu. "GrubJoin: An Adaptive Multi-Way Windowed Stream Join with Time Correlation-Aware CPU Load Shedding". IEEE 23rd International Conference on Data Engineering. Istanbul, Turkey; April 17-20, 2007.

26. Jianjun Zhang, Gong Zhang, Ling Liu. ``GeoGrid: A Scalable Location Service Network". Proceedings of 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007).

27. Kipp Jones and Ling Liu. "Improving Wireless Positioning with Look-ahead Map-Matching ", to appear in Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous 2007). August 6-10, 2007, Philadelphia, PA.

28. Anand Murugappan and Ling Liu. ``A SpatioTemporal Placement Model for Caching Location Dependent Queries", Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous 2007). August 6-10, 2007, Philadelphia, PA.

29. Mudhakar Srivatsa, Arun Iyengar, Jian Yin and Ling Liu. ``A Scalable Access Control in Location-based Broadca st Services", Proceedings of The 27th IEEE International Conference on Computer Communications (INFOCOM 2008), to be held in Phoenix, Arizona.

5.3 Sensor, Stream, and Continual Query (top^)

1.    Continuous Queries over Data Streams   John S. Breese, David Heckerman, and Carl Kadie, S. Babu and J. Widom.In SIGMOD Record, September 2001 .

2.    Towards Sensor Database Systems. Philippe Bonnet, J. E. Gehrke, and Praveen Seshadri. In Proceedings of the Second International Conference on Mobile Data Management. Hong Kong, January 2001. 

3.    Querying the Physical World. Philippe Bonnet, J. E. Gehrke, and Praveen Seshadri.IEEE Personal Communications, Vol. 7, No. 5, October 2000, pages 10-15. Special Issue on Smart Spaces and Environments.

4.    Fjording the Stream: An Architecture for Queries over Streaming Sensor Data, Sam Madden and Michael J. Franklin,ICDE Conference, February, 2002, San Jose.

5.    Streaming Queries over Streaming Data Sirish Chandrasekaran, Michael J. Franklin, VLDB Conference, August 2002, Hong Kong.

6.    Monitoring Streams: A New Class of Data Management Applications.D. Carney, U. Cetintemel, M. Cherniack, C. Convey, S. Lee, G. Seidman, M. Stonebraker, N. Tatbul, S. Zdonik. In proceedings of the 28th International Conference on Very Large Data Bases (VLDB'02), August 20-23, Hong Kong, China.

7.   Quality-Aware Distributed Data Delivery for Continuous Query Services, by Bugra Gedik and Ling Liu. ACM 2006 International Conference on Management of Data (ACM SIGMOD), Chicago, June 26-29, 2006. AR: 13% (58 out of 446).

8.   GrubJoin: An Adaptive Multi-Way Windowed Stream Join with Time Correlation-Aware CPU Load Shedding. By Bugra Gedik, Kun-Lung Wu, Philip S. Yu, and Ling Liu. IEEE 23rd International Conference on Data Engineering. Istanbul, Turkey; April 17-20, 2007.

9.   CPU Load Shedding for Binary Stream Joins. Springer Knowledge and Information Systems. By Bugra Gedik, Kun-Lung Wu, Philip S. Yu, and Ling Liu. DOI 10.1007/s10115-006-0044-4, September 21, 2006. (will appear in print, ISSN 0219-1377)

10.  CACM Special Issue on Sensor Networks, June 2004 (Online available at ACM digital library, use GT library website to access it)

5.4 RFID (top^)

  1. Security and Privacy Issues in ePassport, Ari Juels, David Molnar and David Wagner, In Proceedings of Advances in Cryptology, 2005.
  2. Privacy and Security Issues in Library RFID Issues, Practices, and Architectures, David Molnar and David Wagner, In Proceedings of ACM CCS, 2004.
  3. High Power Proxies for Enhancing RFID Privacy and Utility, In Proceedings of PET, 2005.
  4. RFID Security and Privacy: A Research Survey, Ari Juels, In Proceedings of IEEE Journal on Selected Areas in Communication, 2006.

5.5 Geo-Location Based Services and Applications (top^)

  1. The Cricket location support system. N. Priyantha, A. Chakraborty and Hari Balakrishnan. ACM MobiCom 2000.                                                
  2. The active badge location system. Roy Want, Andy Hopper, Veronica Falco and Jonathan Gibbons, ACM transactions on Information Systems (TOIS), 10(1), 1992.
  3. "Geographic Location Tags on Digital Images." Toyama, Kentaro, et al., International Multimedia Conference, Berkeley, CA: 156 - 166, 2003.

 

  1. Automatic Organization for Digital Photographs with Geographic Coordinates.” Naaman, Mor, et al., International Conference on Digital Libraries, Tuscon, AZ: 53-62, June 2004

 

  1. "Hybrid spatio-temporal structuring and browsing of an image collection acquired from a personal camera phone." Pigeau, A. and M. Gelon, International Symposium on Image and Video communications over Fixed and Mobile Networks XXII: 53-58, 2004.

 

  1. "Sharing, Discovering and Browsing Geotagged Pictures on the Web." Torniai , Carlo, Steve Battle, and Steve Cayzer., hpl.hp.com, May 2007.

 

  1. "The Big Picture: Exploring Cities through Georeferenced Images and RDF Shared Metadata". Torniai , Carlo, Steve Battle, and Steve Cayzer. Chi Conference, 2007

 

  1. "Project Lachesis: Parsing and Modeling Location Histories". Hariharan, Ramaswamy and Kentaro Toyama. GIScience, 2004.

 

  1.  Context data in geo-referenced digital photo collections.” Naaman, Mor, et al. International Multimedia Conference, New York, NY: 196-203, October 2004.

 

  1. "Eyes on the World." Invisible Computing: Naaman, Mor, et al. 108-111, October 2006.

 

  1. Flickr.

 

  1. Picasa.

 

  1. Evermore GT-800BT Bluetooth GPS EverPhoto.

 

 

 

 


5.6. Spatial Indexing and Spatial Mining Techniques


1.      R-trees: a dynamic index structure for spatial searching. Antonin Guttman , Proceedings of the 1984 ACM SIGMOD international conference on Management of data, June 18-21, 1984, Boston, Massachusetts

2.      Indexing the positions of continuously moving objects. S. Saltenis, C. S. Jensen, S. T. Leutenegger, and M. A.Lopez. In SIGMOD b00: Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pages 331b^S342, New York, NY, USA, 2000. ACM Press.

3.      Voronoi Diagram, Franz Aurenhammer, Rolf Klein1

4.      Spatial Databases: Accomplishments and Research Needs, S. Shekhar, S. Chawla, S. Ravada, A. Fetterer, X. Liu and C.T. Liu, IEEE Transactions on Knowledge and Data Engineering, Jan.-Feb. 1999.

5.     Discovering Spatial Co-location Patterns: a Summary of Results, S. Shekhar and Y. Huang, In Proc. of 7th International
Symposium on Spatial and Temporal Databases (SSTD01), July 2001.

6.      Detecting Graph-based Spatial Outliers: Algorithms and Applications, S. Shekhar, C.T. Lu, P. Zhang, the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2001.

7.      Extending Data Mining for Spatial Applications: A Case Study in Predicting Nest Locations, S. Chawla, S. Shekhar, W. Wu and U. Ozesmi, Proc. Int. Confi. on 2000 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD 2000), Dallas, TX, May 14, 2000.

8.      Modeling Spatial Dependencies for Mining Geospatial Data, S. Chawla, S. Shekhar, W. Wu and U. Ozesmi, First SIAM International Conference on Data Mining, 2001.

9.      Spatial Contextual Classification and Prediction Models for Mining Geospatial Data, S. Shekhar, P.R. Schrater, R. R. Vatsavai, W. Wu, and S. Chawla, IEEE Transactions on Multimedia, 2001.

10.   The Quadtree and Related Hierarchical Data Structures. Finkel and Bentley, ACM Comput. Surv.1974

11.  An introductory tutorial on kd-trees, A. Moore

12.  Building of Trapezoidal Map from a set of non-intersecting lines, Jukka Kaartinen

13.  Spatial data structures for version management of engineering drawings in cad database. Y. Nakamura and H. Dekihara. In ICIAP b03: Proceedings of the 12th International Conference on Image Analysis and Processing, page 219, Washington, DC, USA, 2003. IEEE Computer Society.


 

6. Web2.0/Web3.0 and Social Networks (top^)

  1.  Seeking Stable Clusters in the Blogosphere.” Bansal, F. Chiang, N. Koudas, and F. Wm. Tompa. VLDB 2007.
  2. Improved Annotation of the Blogosphere via Autotagging and Hierarchical Clustering.” C. Brooks and N. Montanez.,WWW 2006.
  3. J. Zhang, M. Ackerman, and L. Adamic. “Expertise Networks in Online  Communities: Structure and Algorithms.” WWW 2007.
  4. L. Backstrom et al. “Group Formation in Large Social Networks: Membership, Growth, and Evolution.” KDD 2006.
  5. X. Wu, L. Zhang, and Y. Yu. “Exploring Social Annotations for the Semantic Web.” WWW 2006.
  6. DeRose, W. Shen, F. Chen, A. Doan, R. Ramakrishnan. “Building Structured Web Community Portals: A Top-Down, Compositional, and Incremental Approach.” VLDB 2007.
  7. S. Abiteboul and N. Polyzotis. “The Data Ring: Community Content Sharing.” CIDR 2007.
  8. M. Dubinko et al. Visualizing Tags Over Time.” WWW 2006.
  9. K. Lawrence and M.C. Shraefel. “Bringing Communities to the Semantic Web and the Semantic Web to Communities.” WWW 2006.
  10. Mei, C. Liu, and H. Su. “A Probabilistic Approach to Spatiotemporal Theme Pattern Mining on Weblogs.” WWW 2006.
  11. B. Aleman-Meza et al. Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection.” WWW 2006
  12. Y. Matsuo, J. Mori, and M. Hamasaki. “POLYPHONET: An Advanced Social  Network Extraction System from the Web.” WWW 2006.
  13. Li et al. “Towards Effective Browsing of Large Scale Social Annotations.” WWW 2007.
  14. X. Ni et al. “Exploring in the Weblog Space by Detecting Informative and Affective Articles.” WWW 2007.
  15. Q. Mei et al. “Topic Sentiment Mixture: Modeling Facets and Opinions in Weblogs.” WWW 2007.
  16. H. Halpin, V. Robu, and H. Shepherd. “The Complex Dynamics of Collaborative Tagging.” WWW 2007.
  17. P.-A. Chirita et al. P-TAG: Large Scale Automatic Generation of  Personalized Annotations TAGs for the Web.” WWW 2007.
  18. S. Bao et al. “Optimizing Web Search Using Social Annotations.” WWW  2007.
  19. L. Backstrom, C. Dwork, and J. Kleinberg. “Wherefore Art Thou R3579X?  Anonymized Social Networks, Hidden Patterns, and Structural  Steganography.” WWW 2007.
  20. Chi et al. “Structural and temporal analysis of the blogosphere through community factorization.” KDD 2007.
  21. Tantipathananandh et al. “A Framework For Community Identification in  Dynamic Social Networks.” KDD 2007.
  22. Y. Liu et al. “ARSA: A Sentiment-Aware Model for Predicting Sales  Performance Using Blogs.” SIGIR 2007.
  23. IEEE Data Engineering Bulletin: Special Issue on Data Management Issues in Social Sciences
  24. Golder and B. Huberman. “The Structure of Collaborative Tagging  Systems.”
  25. J. Freyne et al. “Collecting Community Wisdom: Integrating Social  Search and Social Navigation.” IUI 2007.
  26. A. Sahuguet, R. Hull, D. F. Lieuwen, and M. Xiong. Enter once, share everywhere: User profile management in converged networks. International Conference on Innovative Data Systems Research, 2003.
  27. James Caverlee and Ling Liu. Tamper Resilient Trust Establishment in Online Social Networks. Technical Report, Georgia Institute of Technology, School of Computer Science. July 2007.
  28. James Caverlee. Tamper-Resilient Methods for Intelligent Information Systems. PhD Dissertation, June 2007, Georgia Institute of Technology.

 

 


 

7. Cloud Computing (top^)

1. The Google file system. Sanjay Ghemawat, Howard Gobioff and Shun-Tak Leung, 19th ACM Symposium on Operating Systems Principles, Lake George, NY, October, 2003.

2. MapReduce: Simplified Data Processing on Large Clusters, Jeffrey Dean and Sanjay Ghemawat, In Proceedings of OSDI 2004, San Francisco, CA, 2004.

3. Bigtable: A Distributed Storage System for Structured Data, Fay Chang, Jeffrey Dean, etc, roceedings of OSDI 2006, Seattle, WA, 2004.

4. Hadoop Project, http://hadoop.apache.org/core/

5. Hadoop Distributed File System, 

6. GPFS: A Shared File System For Large Computing Cluster, Frank Schmuck, Roger Haskin, In Proceedings of the 2002 Conference on File and Storage Technologies (FAST)

7. Dynamo: Amazon’s Highly Available Key-value Store, Giuseppe DeCandia, Deniz Hastorun,etc, SOSP '07

8. Frangipani: A Scalable Distributed File System, Chandramohan A. Thekkath, Timothy Mann, Edward K. Lee, In Proceedings of the 16th ACM Symposium on Operating Systems Principles

9. The Chubby lock service for loose-coupled distributed systems, Mike Burrows, 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2006.

10. Sinfonia: A New Paradigm for Building Scalable Distributed Systems, Marcos K. Aguilera, Arif Merchant, Mehul Shah, Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles

11. PVFS: A Parallel File System for Linux Clusters, Philip H. Carns, Walter B. Ligon Iii, Robert B. Ross, Rajeev Thakur, In Proceedings of the 4th Annual Linux Showcase and Conference

12. Red Hat Global File System, Red Hat Company

 


Related Courses at other Universities (top^)

1.      UT Austin - CS 395T: Web Operating Systems  Instructor: Mike Dahlin

2.   UCSD - CS 491 Hardware and Software Architecture for Parallel Servers Instructor: Andrew Chien

3.      University of Waterloo - CS756: High-Performance Internet Systems and Applications

4.   Berkeley - CS 268: Graduate Computer Networking , Instructors:Dr. Kevin Fall and Dr. Mike Luby

5.      Harvard - CS261: Research Topics in Operating Systems Instructor: Margo Seltzer

6.      Cornell - CS614 Advanced Systems Instructor: Fred B. Schneider

7.      CS262 - Advanced Topics in Operating Systems Instructor: Eric Brewer

8.      Stanford - EE384c: - Wireless Local Area Networks, Instructor: Nick McKeown

9.      UC Bolder - (CSCI 7135) Internet Systems, Instructor: Benjamin Zorn

10.      UMASS - CMPSCI 791D: System Support for Next Generation Applications  ,Instructor: Prashant Shenoy

11.      CS6210 - Advanced Operating Systems Instructor: Karsten Schwan