Attention: The information contained in this page is subject to changes.
You are expected to read the material each week and write 2-3 paragraphs per reading giving your impressions and thoughts. The summaries should be informal and brief, and should consist of your own comments on the readings, NOT a rehash of the content.
You should submit your summaries on T-Square. Late assignment will NOT be accepted unless approved in advance by the instructor.
The summary for each reading assignment is expected to consist of 1 paragraph on each of the following three aspects: (1) the positive aspect of the paper; (2) the negative aspect of the paper; and (3) a brief discussion on how the idea or method proposed or used in evaluation may be applied to your own project for the course.
You may want to keep these guidelines in mind when reading papers.
You may find the following short article helpful:
Efficient Reading of Papers in Science and Technology. By Michael J. Hanson and updated by D. McNamee.
You are expected to read papers in the required reading list, but only write summary for one paper selected from the list associated with each lecture. Please use the Summary Template to write the reading summaries and follow the summary submission suggestions to submit your summaries.
Questions: How to build a search engine that scales up as the Web grows?
1. Google, The Anatomy of a Large-scale Hypertextual Web Search Engine. Sergey Brin and
2. Inktomi: An Investigation of Documents from the World Wide Web Allison Woodruff, Paul M. Aoki, Eric Brewer, Paul Gauthier, and Lawrence A. Rowe
3. Harvest: Scalable Internet Resource Discovery: Research Problems and Approaches C. Mic Bowman (Tranarc Corp.), Peter Danzig (Univ. Southern California), Udi Manber (Univ. of Arizona), and Michael Schwartz (Univ. Colorado), Appeared in CACM 1994 (Download Harvest Indexer) (Harvest Papers)
4. Harvest: The Harvest Information Discovery and Access System C. Mic Bowman, Peter B. Danzig, Darren R. Hardy, Udi Manber and Michael F. Schwartz, Computer Networks and ISDN Systems, 28 (1995) pp. 119-125
Harvest: A Scalable,Customizable Discovery and
Access System C. Mic Bowman, Peter B.
Danzig, Darren R. Hardy, Udi Manber,
Michael F. Schwartz, and Duane P. Wessels, Technical
Report CU-CS-732-94, Department of Computer Science,
6. Customized Information Extraction as a Basis for Resource Discovery Darren R. Hardy and Michael F. Schwartz, ACM Transactions on Computer Systems.
7. Indie: Distributed Indexing of autonomous Internet Services Peter Danzig, Shih-Hao Li, Katia Obraczka. Journam of Computer Systems, 5(4), 1992. Original description of Indie in 1991 ACM SIGIR
8. Internet resource discovery services Katia Obraczka, Peter Danzig, and Shih-Hao Li, IEEE Computer, Sept. 1993.
9. Research Problems for Scalable Internet Resource Discovery , C. Mic Bowman, Peter B. Danzig, and Michael F. Schwartz, 1993 IEEE Computer.
10. GLIMPSE: A Tool to Search Through Entire File Systems
Udi Manber and Sun Wu (
Browsing and Searching Udi Manber,
Mike Smith, and Burra Gopal
13. A technique for measuring the relative size and overlap of
public Web search engines Krishna Bharat and Andrei Broder (DIGITAL,
14. The Connectivity Server: fast access to linkage information
on the Web Krishna Bharata, Andrei Brodera, Monika Henzingera, Puneet Kumara, and Suresh Venkatasubramanian,
Proceedings of the 7th International World Wide Web Conference,
15. Efficient Crawling through URL Ordering Junghoo Cho, Hector Garcia-Molina, and Lawrence Page, Proceedings of the 7thInternational World Wide Web Conference, pages 161-172, April 1998
16. Crawling towards Eternity: Building an Archive of the World Wide Web Mike Burner, Web Techniques Magazine, 2(5), May 1997
17. The Truth about the Web: Crawling towards Eternity Z. Smith, Web Techniques Magazine, 2(5), May 1997
18. Measuring Index Quality using Random Walks on the Web Monika Henzinger, Allan Heydon, Michael Mitzenmacher, and Marc A. Najork, Proceedings of the 8th International World Wide Web Conference, pages 213-225, May 1999
19. Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery Soumen Chakrabarti, Martin van den Berg, Byron Dom, Proceedings of the 8thInternational World Wide Web Conference, May 1999
20. Finding What People Want: Experiences with the WebCrawler Brian Pinkerton, Proceedings of the 8th International World Wide Web Conference, 1994
21. SPHINX: A Framework for Creating Personal, Site-specific Web Creawlers Robert C. Miller and Krishna Bharat, Proceedings of the 7th International World Wide Web Conference, pages 119-130, April 1998
22. Information Retrieval on the World Wide Web Venkat N. Gudivada, Vijay V. Raghavan, William I. Grosky, and Rajesh Kasangottu, IEEE Internet Computing, vol. 1, number 5, September/October, 1997.
23. GENVL and WWW: Tools for Taming the Web, Oliver McBryan, Proceedings of the First Int'l World Wide Web Conference, CERN, Geneva, May 1994.
24. A World Wide Web Resource Discovery System Budi Yuwon, Savio L. Y. Lam, Jerry H. Ying, Dik L. Lee Proceedings of the 4th World Wide Web Conference, 1998.
25. A Survey of Information Retrieval and Filtering Methods
Christos Faloutos and Douglas Oard
26. Guidelines for Robot Writers, Martijn Koster, 1993
28. Authoritative Sources in a Hyperlinked Environment, J. Kleinberg. Proc. 9th ACM-SIAM Symposium on Discrete Algorithms, 1998. Extended version in Journal of the ACM 46(1999). Also appears as IBM Research Report RJ 10076, May 1997. ( IBM Clever Searching Project)
29. How Search Engines Rank Web Pages Danny Courtois and Sullivan.
30. Evaluation of Web search engines and the search for better ranking algorithms. Mildrid Ljosland e-mail: Mildrid.Ljosland@idi.ntnu.no Norwegian University of Science and Technology. the SIGIR99 Workshop on Evaluation of Web Retrieval, August 19, 1999
31. Automatic Resource Compilation by Analyzing Hyperlink
Structure and Associated Text. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg,
P. Raghavan, and S. Rajagopalan. Proceedings of the 7th
World-Wide Web conference, 1998. Copyright owned by Elsevier Sciences,
32. Inferring Web Communities from Link Topologies. D. Gibson, J. Kleinberg, and P. Raghavan. Proceedings of The Ninth ACM Conference on Hypertext and Hypermedia, 1998. Copyright owned by ACM.
33. Scalable feature selection, classification and signature generation for organizing large text databases into hierarchical topic taxonomies. S. Chakrabarti, B. Dom, R. Agrawal, P. Raghavan. VLDB Journal, 1998 (invited).
34. Enhanced hypertext categorization using hyperlinks.S. Chakrabarti, B. Dom and P. Indyk. Proceedings of ACM SIGMOD 1998.
35. Hypersearching the web. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan and A. Tomkins. Scientific American, June, 1999.
36. Mining the link structure of the World Wide Web. S. Chakrabarti, B. Dom, D. Gibson, J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan and A. Tomkins. IEEE Computer.
37. Trawling the Web for emerging cyber-communities. S.R.
Kumar, P. Raghavan, S. Rajagopalan,
and A. Tomkins. Eighth World Wide Web conference,
38. Focused crawling: a new approach to topic specific resource discovery. S. Chakrabarti, M. Van den Berg, B. Dom Eighth World Wide Web conference, Toronto, 1999.
39. The web as a graph: Measurements, models and methods. J. Kleinberg, S.R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Proceedings of the International Conference on Combinatorics and Computing, 1999; invited paper.
40. Extracting large scale knowledge bases from the web.
S.R. Kumar, P. Raghavan, S. Rajagopalan,
and A. Tomkins. IEEE International conference on Very Large Databases (VLDB),
41. Clustering categorical data: an approach based on dynamical systems. D. Gibson, J. Kleinberg and P. Raghavan. Proceedings of the VLDB conference, 1998.
42. Search and Ranking Algorithms for Locating Resources on the World Wide Web B. Yuwono and D. Lee. IEEE conference on Data Engineering, 1996 (pp391-400).
43. A Machine Learning Architecture for Optimizing Web Search Engines. Boyan, D. Freitag, and T. Joachims. AAAI Workshop on Internet-based Information Systems, 1996.
44. SIBRIS: the Sandwich Interactive Browsing and Ranking Information System S. Wade, P. Willett, and D. Bawden. Journal of Information Science, 15, 1989, pp249-260
45. Estimating the Usefulness of Search Engines
46. The effectiveness of GlOSS for the Text Database Discovery Problem L. Gravano, H. Garcia-Molina, A. Tomasic. SIGMOD 1994. (GlOSS)
47. Adaptive methods for the computation of PageRank, Sepandar Kamvar1, Taher Haveliwala2, Gene Golub, Technical Report,, Standford University, 2003
48. Building a Distributed Full-Text Index for the Web,
Melnik, Sergey and Raghavan,
Sriram and Yang,
49. Parallel Crawlers, Junghoo Cho, Hector Garcia-Molina, 11th WWW
50 An adaptive model for optimizing performance of an incremental web crawler , Edwards, J., McCurley, K. S., and Tomlin, J. A., In Proceedings of the Tenth Conference on World Wide Web (2001)
51. Focused crawling using context graphs, 26th International Conference on Very Large Databases
53. Self-similarity in the web. Stephen Dill etc. ACM Transactions on Internet Technology (TOIT) archive (August 2002)
54. Finding replicated web collections. Junghoo Cho,
55. Hilltop: A search engine based on expert documents. K. Bharat and G. A. Mihaila, 9th WWW Conference (Poster), 2000.
56. TopicSensitive PageRank, In Proceedings of the Eleventh International World Wide Web Conference
57. Generalizing PageRank: Damping functions for link-based ranking algorithms, Ricardo BaezaYates etc, In Proceedings of SIGIR2002
60. Stuff I've Seen: A System for Personal Information Retrieval and Re-Use, Susan Dumais etc, 26th ACM SIGIR conference on Research and development in informaion retrieval
61. When experts agree: Using non-affiliated experts to rank popular topics, Krishna Bharat, George A. Mihaila, 10th WWW
62. The stochastic approach for link-structure analysis (salsa) and the tkc effect, R. Lempel, S. Moran, 9th WWW
63. What is this Page Known for? Computing Web Page Reputations, Davood Rafiei, Alberto Mendelzon , 9th WWW
64. PicASHOW: Pictorial Authority Search by Hyperlinks on the Web, R. Lempel, A. Soffer, 10th WWW
65. Web Search via Hub Synthesis, Dimitris Achlioptas, Amos Fiat, Anna Karlin, Frank McSherry, 42nd IEEE Symposium on Foundations of Computer Science
66. Approximating Aggregate Queries about Web Pages via Random Walks, Ziv Bar-Yossef etc, VLDB 2000
Questions: What are the key technology for building high performance and scalable Web Servers?
1. Measuring the Capacity of a Web Server Gaurav Banga and Peter Druschel, Proceedings of the 1997 USENIX Symposium on
Internet Technologies and Systems,
2. Internet Web Servers: Workload Characterization and Performance Implications Arlitt and Williamson, ACM/IEEE Transactions on Networking, 5(5):631-645, Oct. 1997. A short version titled "Web Server Workloa d Characterization: The Search for Invariants", appeared in ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, May 1996.
3. Locating Nearby Copies of Replicated Internet Servers, James D. Guyton and Michael F. Schwartz. ACM SIGCOMM, 1995.
4. HACC: An Architecture for
Cluster-Based Web Servers Xiaolan
Zhang, Michael Barrientos, J. Bradley Chen, Margo
5. Trace-Driven Simulation of Document Caching Strategies for Internet Web Servers Martin F. Arlitt and Carey L. Williamson, Simulation, Special Issue: Modeling and Simulation of Computer Systems and Networks. Vol. 68, No. 1, January, 1997.
6. Performance Characteristics of Mirror Servers on the Internet Andy Myers, Peter Dinda, Hui Zhang. INFOCOM'98.
7. TCP Behavior of a Busy Internet Server: Analysis and Improvements Hari Balakrishnan, Venkata Padmanabhan, Srini Seshan, Mark Stemm and Randy H. Katz, INFOCOM'98.
8. The Content and Access Dynamics of a Busy Web Site: Findings and Implications V. N. Padmanabhan and L. Qiu. Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, August 2000. . (An earlier version appeared as Microsoft Research Technical Report MSR-TR-2000-13, February 2000 )
9. A Performance Monitoring and Capacity Planning Methodology for Web Servers, Rodney B. Wallace and Tyrone E. McKoy, Jr. (NCR Corporation)
10. A Self-Scaling and Self-Configuring Benchmark for Web Servers, Stephen Manley (Network Appliance), Michael Courage (Microsoft Co.), and Mar go Seltzer (Harvard)
11. Connection Scheduling in Web Servers M. E. Crovella, R. Frangioso, and M. Harchol-Balter, Proceedings of the 1999 USENIX Symposium on Internet Technologies.
12. Dynamic Server Selection in the Internet Mark E. Crovella and Robert L. Carter, Computer Science Department, Boston University.
13. Dynamic Server Selection Using Bandwidth Probing in Wide-Area Networks, R. Carter and M. Crovella, INFOCOM, 1997. extended version (TR-96-007).
14. NCSA's World Wide Web Server: Design and Performance Tomas T. Kwan, Robert E. McGrath, and Daniel A. Reed, IEEE Computer, Vol. 28, No. 11, pp. 68-74, November 1995. An earlier version titled: User Access Patterns to NCSA's World Wide Web Server. (Recent Pablo Project)
15. A Scalable and Highly Available Web Server, MukherjeeTewari. In Proceedings of the IEEE Computer Conference (COMPCON), Santa Clara, March, 1996.
16. A Scalable HTTP Server: The NCSA Prototype, R. McGrath. Proc. of the 1st Intl. World-Wide Web Conference, May 1994. (HTML)
17. The Power of Two Choices in Randomized Load Balancing, M. Mitzenmacher, PhD. Thesis, 1996.
18. Flash: An Efficient and Portable Web Server Vivek Pai, Peter Druschel and Willy Zwaenepoel,
Proceedings of 1999 USENIX Conference,
19. The AFS File System in Distributed Computing Environments:White Paper, Mnsarc Corporation, May 1996.
Questions: How do we coordinate the activities of a geographically distributed application?
A Hierarchical Internet Object Cache Anawat Chankhunthod, Peter B. Danzig, Chuck Neerdaels (University of Southern California), Michael F. Schwartz, Kurt J. Worrell (University of Colorado, Boulder) (An Implementation of the hierarchical Object Cache at netapp)
4. Main Memory Caching of Web Documents, vangelos P. Markatos. In Proceedings of the Fifth WWW Conference, 1996.
5. Design Considerations for Integrated Proxy Servers S. Sahu, P. Shenoy, D. Towsley. y Proc. IEEE NOSSDAV'99 (Basking Ridge, NJ, June 1999).
Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System D. Terry, M. Theimer, K. Petersen, A. Demers and M. Spreitzer, and C. Hauser, In Proceedings of the fifteenth ACM Symposium on Operating Systems Principles (SOSP'97), Copper Mountain Resort, CO, December, 1995.
12. Intelligent Caching for World-Wide Web Objects
Duane Wessels (
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol L. Fan, P. Cao, J. Almeida, and A.Z. Broder, SIGCOMM, 1998, pp 254-265.
21. The Rio File Cache: Surviving Operating System Crashes Peter M. Chen, Wee Teck Ng, Subhachandra Chandra, Christopher Aycock, Gurushankar Rajamani, and David Lowell, Proceedings of the 1996 International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), October 1996.
Enhancing the Web's Infrastructure: From Caching to Replication Michael Baentsch, Lothar Baum, Georg Molter, Steffen Rothkugel, and Peter Sturm, IEEE Internet Computing, vol. 1, no. 2, pages 18-27, April 1997 (class handout).
Caching Proxies: Limitations and Potentials Marc Abrams, Charles R. Standridge, Ghaleb Abdulla, Stephen Williams, Edward A. Fox, Proceedings of the Fourth International World Wide Web Conference, pages 119-133, Boston, MA, December 1995.
Improving End to End Performance of the Web using Server Volumes and Proxy Filters, E. Cohen, B. Krishnamurthy and J. Rexford, In Proceedings of ACM SIGCOMM'98, Vancouver, Canada, Pages 241-253, September 1998.
The Measured Access Characteristics of World-Wide-Web Client Proxy Caches, B M. Duska, D. Marwood, and M J. Feeley, In Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December, 1997
Question: How much can Prefetching alleviate the latency and bandwidth problems in Web access?
1. Using Predictive Prefetching to Improve World Wide Web Latency, Padmanabhan and Mogul, SIGCOMM, 1996.
2. Alleviating the Latency and Bandwidth Problems in WWW Browsing, Loon and Bharghavan, Usenix Symposium on Internet Technologies and Systems (USITS) 1997.
3. Determining WWW User's Next Access and Its Application to Pre-fetching, Carlos R. Cunha and Carlos F.B. Jaccoud, Proceedings of ISCC'97: The Second IEEE Symposium on Computers and Communications. Alexandria, Egypt, 1-3 July 1997.
Potential and Limits of Web Prefetching Between
Low-Bandwidth Clients and Proxies Li Fan, Quinn Jacobson and
5. Optimal Prefetching via Data Compression, Vitter and Krishnan, FOCS, 1991.
6. The Network Effects of Prefetching, Crovella and Barford, INFOCOM, 1998.
Questions: What are the main causes of World Wide Web traffic? How do we find idle resources if they exist?
1. Web Facts and Fantasy, Stephen Manley (Network Appliance), Margo Seltzer (Harvard University), Proceedings of the 1997 USENIX Symposium on Internet Technologies and Systems, Monterey, CA, December 1997.
2. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, Mark E. Crovella and Azer Bestavros IEEE/ACM Transactions on Networking, 5(6):835--846, December 1997.
3. Measuring Web Performance in the Wide Area, P. Barford and M. E. Crovella, in Performance Evaluation Review, August, 1999.
4. Changes in Web Client Access Patterns: Characteristics and Caching Implications, P. Barford, A. Bestavros, A. Bradley, and M. E. Crovella, in World Wide Web, Special Issue on Characterization and Performance Evaluation, Vol. 2, pp. 15-28, 1999.
5. Characterizing Browsing Strategies in the World-Wide Web, L. Catledge and J. Pitkow, Journal of Computer Networks and ISDN Systems, vol. 27, no. 6, 1995, p. 1065.
Measuring the Web, Tim Bray (Open Text
Corporation), Fifth International World Wide Web Conference, May 1996,
7. Generating Representative Web Workloads for Network and Server Performance Evaluation, Barford and Crovella, SIGMETRICS, 1998, pp. 151-160.
8. Characterizing Reference Locality in the WWW, Almeida, Bestavros, Crovella, and de Oliveira, International Conference on Parallel and Distributed Information Systems (ICPDIS), 1996. (The OCEANS Project)
Web Traffic Characterization: An Assessment of the Impact of
Caching Documents from NCSA's Web Server H. Braun and K. Claffy; Second International Conference on the WWW,
11. System Design Issues for Internet Middleware Services: Deductions from a Large Client Trace, Gribble and Brewer, Usenix Symposium on Internet Technologies and Systems (USITS) 1997.
Questions: How do we build a scalable Internet service located at a single site? Should we replicate to get end-to-end availability? What abstractions should we provide to support scalability to millions of users, and continuous operations 24 hours per day and 7 days per week?
1. Availability and Latency of World Wide Web Information Servers, Charles L. Viles and James C. French (University of Virginia), USENIX, Computing Systems; vol. 8, no. 1; Winter 1995.
2. A Quantitative Study of Differentiated Services
3. A Comparison of Server-Based and Receiver-Based Local Recovery Approaches for Scalable Reliable Multicast S. Kasera, J. Kurose, D. Towsley. Proc. IEEE Infocom'98 (San Francisco, CA, April 1998). A longer version is available as UMass CMPSCI Technical Report 97-69.
4. A Comparison of Sender-Initiated and Receiver-Initiated Reliable Multicast Protocols D. Towsley, J. Kurose, S. Pingali. IEEE Journal on Selected Areas in Communications (JSAC) (April 1997)
5. Exploiting Internetwork Multicast Services Nortel White Paper.
6. "Server-initiated Document Dissemination for the WWW" Azer Bestavros and Carlos Cunha,IEEE Data Engineering Bulletin, September 1996.
7, Middleware Support for Data Mining and Knowledge Discovery in Large-scale Distributed Information Systems., Azer Bestavros, In Proceedings of ACM SIGMOD'96 Data Mining Workshop, Montreal, Canada, June 1996.
Data Dissemination and Service to Reduce Server Load, Network Traffic and
Service Time for Distributed Information Systems" ,
Azer Bestavros, Proceedings of ICDE'96: The 1996
International Conference on Data Engineering,
speculation to reduce server load and service time on the WWW, Azer Bestavros, in Proceedings of CIKM'95: The Fourth ACM
International Conference on Information and Knowledge Management,
10. "Demand-based document dissemination to reduce traffic and balance load in distributed information systems" Azer Bestavros, in Proceedings of the 1995 Seventh IEEE Symposium on Parallel and Distributed Processing, San Antonio, Texas. October 1995.
11. Demand-based Data Dissemination for Distributed Multimedia Applications, Azer Bestavros, in Proceedings of the ACM/ISMM/IASTED International Conference on Distributed Multimedia Systems and Applications, Stanford, CA. August 1995.
12. "Information Dissemination and
Speculative Service: Two candidate functionalities for the middleware
infrastructure" Azer Bestavros, in Proceedings
of SIGCOMM'95 Workshop on Middleware.
13. Personalized Information Environments: An Architecture for Customizable Access to Distributed Digital Libraries, James C. French and Charles L. Viles, D-Lib Magazine, June 1999, Volume 5 Number 6
14. Continuous Profiling: Where Have All the Cycles Gone? Jennifer M. Anderson, Lance M. Berc, Jeffrey Dean, Sanjay Ghemawat, Monika R. Henzinger, Shun-Tak A. Leung, Richard L. Sites, Mark T. Vandevoorde, Carl A. Waldspurger, and William E. Weihl. SOSP'97.
15. System Support for Automated Profiling and Optimization, Aolan Zhang, Zheng Wang, Nicholas Gloy, J. Bradley Chen, and Michael D. Smith, SOSP'97.
16. Cluster-Based Scalable Network Services. Fox, Gribble, Chawathe, and Brewer, Proceedings of SOSP, 1997.
17. A Case for Networks of Workstations:
NOW, T. Anderson, D. Culler, D. Patterson, IEEE Micro Feb. 1995. (The
18. Free Transactions with Rio Vista, David
E. Lowell and Peter M. Chen, Proceedings of the 1997 Symposium on Operating
Systems Principles (SOSP), October 1997. (The
19. The Case for Application-Specific Benchmarking, Margo Seltzer, David Krinsky, Keith Smith, Xiaolan Zhang.
20. Frangipani: A Scalable Distributed File System, C. Thekkath, T. Mann and E. Lee, Proceedings of the 1997 Symposium on Operating Systems Principles (SOSP), October 1997.
21. Serverless Network File Systems,
22. A Note on Distributed Computing, Jim Waldo, Geoff Wyant, Ann Wollrath, and Sam Kendall, Sun Microsystems Laboratories Technical Report TR-94-29 (November 1994).
Document Caching in the Internet Azer Bestavros et.al, Proceedings of
SDNE'95: The second International Workshop on Services in Distributed and
Network Environments. Whistler,
24. WWW Media Distribution
via Hopwise Reliable Multicast, James E. (Jed) Donnelley Lawrence
25. Scalable Reliable Multicast Using Multiple Multicast Channels, S. Kasera, G. Hjalmtysson, D. Towsley, J. Kurose, To appear in IEEE/ACM Transactions on Networking, 2000.
26. Scalable fair reliable multicast using active services, S.K. Kasera, S. Bhattacharyya, M. Keaton, D. Kiwior, J. Kurose, D. Towsley, S. Zabel. IEEE Networks Magazine.
27. An Internet Multicast System for the Stock Market, N.F. Maxemchuk and D. H. Shur (AT&T Labs - Research)
29. Real-time Applications
of the Internet, N. F. Maxemchuk,
30. Operational Information Systems - An example from the Airline Industry, Van Oleson, Greg Eisenhaur, Calton Pu, Karsten Schwan, Beth Plale and Dick Amin. Sept., 2000.
31. Disconnected Operations in the Coda File System, J. Kistler and M. Satyanarayanan, ACM Transcations on Computing Systems, Vol 10, No 1, Pages 3-25, February 1992.
32. Information Monitoring on the Web: A Scalable Solution. Ling Liu, Wei Tang, David Buttler, and Calton Pu. World Wide Web Journal(by Kluwer Academic Publishers), Volume 5, No. 4.
33. InfoFilter: Supporting Quality of Service for Fresh Information Delivery, Ling Liu, Calton Pu, Karsten Schwan, Jon Walpole. New Generation Computing Journal (Vol.18, No.4),
34. Continual Queries for Internet Scale Event-Driven Information Delivery , Ling Liu, Calton Pu, Wei Tang. n: Special issue on Web Technologies, IEEE Transactions on Knowledge and Data Engineering, Vol.11, No.4, July/Aug. 1999. pp610-628.
35. Methodical Restructuring of Complex Workflow
Activities, Ling Liu and Calton Pu. IEEE 14th International Conference on Data egineering, February 23-27, 1998,
for Data-intensive Applications in Large-scale Systems, Mike Dahlin,
38. "Web content adaptation
to improve server overload behavior", T.Abdelzaher
and N.Bhatti, International World Wide Web conference,
server QoS management by adaptive content delivery", T.Abdelzaher and N.Bhatti, International
Workshop on Quality of
40. "Digestor: Device-independent Access to the World Wide Web", T. Bickmore and B. Schilit, The Sixth International World Wide Web Conference, April 1997.
41. "Adapting the Web: An Adaptive Web Browser",K. Henricksen and J. Indulska, User Interface Conference, 2001
42. "HTTP Remote Variant Selection Algorithm --RVSA/1.0", K. Holtman and A. Mutz, RFC2296.
44. "Adaptive Delivery of HTML
Contents", Y. Yang, J. Chen, and H. Zhang, 9th International World
Wide Web Conference,
45. "Network-Adaptive Control With TCP-Friendly Protocol for Multiple Video Objects", Q.Zhang, Wenwu Zhu, and Y.Q.Zhang, ICME 2000.
46. Gardmon: A Java-based Monitoring Tool for Gardens Non-dedicated Cluster Computing. R. Buyya, B. Koshy, and R. Mudlapur. In Proceedings of Workshop on Cluster Computing Technologies, Environments, and Applications, PDPTA 99, Monte Carlo Resort, Las Vegas, Nevada, USA, 1999.
47. The Condor Distributed Processing System. M. Livny, Dr Dobbs Journal, Feb 1995 pp 40-48.
49. PARMON: A Comprehensive Cluster Monitoring System. Rajkumar et al., Proceedings of the Fifth International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, Nevada, USA, CSREA Press, 1998.
50. Building a Resources Monitoring System for SMILE Beowulf Cluster. P. Uthayopas, S. Phaisithbenchapol, and K. Chongbarirux., Proceeding of the Third International Conference/Exhibition on High Performance Computing in Asia-Pacific Region (HPC ASIA'99), Singapore, 1998
Questions: What is the right model for supporting Internet Applications of the future?
WebOS: Operating System Support for Wide Area Applications,
2. Operating System Directions for the Next Millennium, Bolosky, Draves, Fitzgerald, Fraser, Jones, Knoblock, and Rashid.
The Architectural Design of Globe: A Wide-Area Distributed
System, M. van Steen, P. Homburg, and A.S. Tanenbaum, Technical
Report IR-422, Dept. of Computer Science,
4. A Network Architecture for Heterogeneous Mobile Computing E. A. Brewer, R. H. Katz et al. IEEE Personal Communications Magazine, October 1998.
5. IO-Lite: A Unified I/O Buffering and Caching System, Peter Druschel, Vivek S. Pai and Willy Zwaenepoel. To appear in the Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI'99), New Orleans, LA, February 1999.
The x-Kernel: An Architecture for
Implementing Network Protocols,
7. Making Paths Explicit in the Scout Operating System, Mosberger and Peterson, OSDI, 1996.
8. Server Operating Systems, Kaashoek, Engler, Gagner, and Wallach, European SOSP Workshop, 1996.
9. Application Performance and Flexibility on Exokernel Systems, Kaashoek, Engler, Ganger, Briceno, Hunt, Mazieres, Pinckney, Grimm, Jonnotti, Mackenzie, SOSP, 1997.
10. Server Operating Systems: A Comparative Cost-of-Ownership Analysis, Cahners In-Stat Group White Paper, 1997.
Questions: How should we translate from virtual name to physical addresses? How do we find objects or services or users in the Internet if they migrate?
1. Locating Objects in Wide-Area Systems, M. van Steen, F.J. Hauck, P. Homburg, and A.S. Tanenbaum, IEEE Communications Magazine, January 1998.
2. Scalable Naming in Global Middleware, G. Ballintijn, M. van Steen, A.S. Tanenbaum. Proc. 13th Int'l Conf. on Parallel and Distributed Computing Systems (PDCS-2000), Las Vegas, August 8-10, 2000.
3. Development of the Domain Name System, P. Mockapetris and K. Dunlap SIGCOMM 1988, Computer Communications Review Vol 18 No 4 Aug. 1988 pp. 123-133. Dynamic DNS: rfc 2136 and rfc 2137
4. Resolution of Uniform Resource Identifiers using the Domain Name System, Ron Daniel and Michael Mealling. Internet Draft, September 1996.
5. Engineering a Global Resolution Service, Edward Slottow, Nov. 1996.
6. Host Anycasting Service, C. Partridge, T. Mendez, and W. Milliken, http://andrew2.andrew.cmu.edu/rfc/rfc1546.html
7. A Directory Service for Configuring High-Performance Distributed Computations, S. Fitzgerald, I. Foster, C. Kesselman, G. von Laszewski, W. Smith, and S. Tuecke, Proc. 6th IEEE Symp. on High-Performance Distributed Computing 1997.
8. Active Naming: Programmable Location and
Transport of Wide-Area Resources,
Using Smart Clients to Build Scalable Services,
1. Analysis of the Evolution of Peer-to-Peer Systems. David Liben-Nowell, Hari Balakrishnan, and David Karger, ACM Conf. on Principles of Distributed Computing (PODC), Monterey, CA, July 2002.
2. Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications. Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, Hari Balakrishnan, IEEE/ACM Transactions on Networking
3. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility A. Rowstron and P. Druschel,18th ACM SOSP'01, Lake Louise, Alberta, Canada, October 2001.
4. SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network, Yan Chen, Randy H. Katz, and John D. Kubatowicz in Proceedings of the International Conference on Pervasive Computing, August 2002.
5. PeerCQ: A Decentralized and Self-Configuring Peer-to-Peer Information Monitoring System.Bugra Gedik and Ling Liu. The 23rd International Conference on Distributed Computing Systems. (ICDCS 2003)
Search and replication in unstructured peer-to-peer
networks, Qin Lv, Pei Cao, Edith
Cohen, Kai Li, and Scott Shenker. In the Proceedings
of the 16th international conference on Supercomputing, June 2002 ,
"Freenet: A Distributed Anonymous Information Storage and
Retrieval System" Ian Clarke, Oskar Sandberg, Brandon
Wiley, and Theodore W. Hong, in Designing Privacy Enhancing
Technologies: International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, ed. by Hannes Federrath. Springer:
"Pastry: Scalable, distributed object location and routing
for large-scale peer-to-peer systems". A. Rowstron and P. Druschel,
IFIP/ACM International Conference on Distributed Systems Platforms
9. Anonymous Publish/Subscribe in P2P Networks,A. K. Datta, M. Gradinariu, M. Raynal and G. Simon, IPDPS 2003.
10. "SCRIBE: A large-scale and decentralised application-level multicast infrastructure",M. Castro, P. Druschel, A-M. Kermarrec and A. Rowstron, IEEE Journal on Selected Areas in Communications (JSAC) (Special issue on Network Support for Multicast Communications). 2002.
11. Scalable application layer multicast. S. Banerjee, B. Bhattacharjee, and C. Kommareddy, In Proceedings of the 2002 ACM SIGCOMM Conference, 2002.
12. Enabling Conferencing Applications on the Internet using an
Overlay Multicast Architecture.Yang-hua
13. A Scalable Content Addressable Network. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. In Proceedings of the ACM SIGCOMM Conference, 2001.
14. Gnutella RFC
15. Making Gnutella-like P2P Systems Scalable. Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker. In Proceedings of the ACM SIGCOMM, 2003.
16. Phenix: Supporting Resilient Low-diameter Peer-to-Peer Topologies. R. H. Wouhaybi and A. T. Campbell. In Proceedings of IEEE INFOCOM 2004.
17. Improving Search in Peer-to-Peer Systems. Beverly Yang, Hector Garcia-Molina, In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), 2002
18. "Designing a Super-peer Network."
Beverly Yang, Hector Garcia-Molina, In Proceedings of the 19th
International Conference on Data Engineering (ICDE),
19. "Routing Indices For Peer-to-Peer Systems." Arturo Crespo, Hector Garcia-Molina. Proceedings of the International Conference on Distributed Computing Systems (ICDCS). July 2002.
20. Turning Heterogeneity into an Advantage in Overlay Routing. Z. Xu, M. Mahalingam, and M. Karlsson. In Proceedings of INFOCOM, 2003.
21. Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web,A. Singh, M. Srivatsa, L. Liu and T. Miller, In the proceedings of the SIGIR workshop on distributed information retrieval, August 2003. Also in Lecture notes of computer science (LNCS) series, Springer Verlag.
22. Tracing a large-scale Peer to Peer System: an hour in the life of Gnutella, Evangelos P. Markatos, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002.
23. Mapping the gnutella network. M. Ripeanu, I. Foster, and A. Iamnitchi. IEEE Internet Computing Journal, 6(1), 2002.
24. Scaling Unstructured Peer-to-Peer Networks with Heterogeneity-Aware Topology and Routing. M. Srivatsa and L. Liu. in the Proceedings of IEEE Transactions on Parallel and Distributed Systems.
25. Contructing a Proximity-aware Power Law Overlay Network . J. Zhang, L. Liu and C. Pu. In the Proceedings of IEEE Global Telecommunications Conference GLOBECOM, 2005.
26. An Analysis of Internet Content Delivery Systems.
27. On the Feasibility of Peer-to-Peer Web Indexing and Search, Jinyang Li, Boon Thau, Loo Joseph, M. Hellerstein, M. Frans Kaashoek, LECTURE NOTES IN COMPUTER SCIENCE 2003, ISSU 2735, pages 207-215.
28. P2P Content Search: Give the Web Back to the People, Matthias Bender, Sebastian Michel, Peter Triantafillou, GerhardWeikum, Christian Zimmer, Proceedings of the 5th International Workshop on Peer-to-Peer Systems, 2006
30. Routing indices for peer-to-peer systems, A Crespo, H Garcia-Molina, In Proceedings of Distributed Computing Systems, 2002.
31.An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol, S.A. Baset and H.G. Schulzrinne, Infocom 2006, April 2006.
32. An Experimental Study of the Skype Peer-to-Peer VoIP System, Saikat Guha, Neil Daswani, Ravi Jain, IPTPS 06, February 2006.
33. Characterizing and Detecting Skype-Relayed Traffic, K. Suh, D. R. Figueiredo, J. Kurose, D. Towsley, Infocom 2006, April 2006.
34. Rarest First and Choke Algorithms are Enough, Arnaud Legout, G. Urvoy-Keller, P. Michiardi, IMC 2006>
35. The Bittorrent P2P File-sharing System: Measurements and Analysis, J.A Pouwelse, P. Garbacki, D.H.J Epema, H.J. Sips, IPTPS 05, February 2005.
36. Incentives Build Robustness in BitTorrent, Bram Cohen, First Workshop on Economics of Peer-to-peer Systems, June 2003.
Some P2P Links
1. Fundamental Challenges in Mobile Computing, Satyanarayanan, M., Fifteenth ACM Symposium on Principles of Distributed Computing , May 1996, Philadelphia, PA, Revised version appeared as: "Mobile Computing: Where's the Tofu?", Proceedings of the ACM Sigmobile, April 1997, Vol. 1, No. 1.
"Multi-Fidelity Algorithms for Interactive Mobile
Applications", Satyanarayanan, M., Narayanan, D. Proceedings of the
3rd International Workshop on Discrete Algorithms and Methods for Mobile
Computing and Communications, August 1999,
4. "Energy-aware adaptation for mobile applications", Flinn J., Satyanarayanan, M., Proceedings of the 17th ACM Symposium on Operating Systems Principles, December, 1999, Kiawah Island Resort, SC.
5. "PowerScope: A Tool for Profiling the Energy Usage of Mobile Applications", Flinn J., Satyanarayanan, M., Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, February, 1999, New Orleans, LA
6. System Support for Mobile, Adaptive Applications, Noble, Brian, IEEE Personal Communications, Vol. 7, No. 1, February, 2000
8. Agile Application-Aware Adaptation for Mobility, Noble, B., Satyanarayanan, M., Narayanan, D., Tilton, J.E., Flinn, J., Walker, K. Proceedings of the 16th ACM Symposium on Operating System Principles, October 1997, St. Malo, France
9. A Research Status Report on Adaptation for Mobile Data Access , Noble, B., Satyanarayanan, M. SIGMOD Record, Vol. 24, No. 4, December 1995
10. A Programming Interface for Application-Aware Adaptation in Mobile Computing , Noble, B., Price, M., Satyanarayanan, M., Proceedings of the Second USENIX Symposium on Mobile & Location-Independent Computing, Apr. 1995, Ann Arbor, MI
Adaptation for Mobile Computing , Satyanarayanan, M., Noble, B., Kumar, P.,
Price, M. Proceedings of the 6th ACM SIGOPS European
Workshop, Sep. 1994,
12. Mobile Information Access, Satyanarayanan, M. , IEEE Personal Communications, Vol. 3, No. 1, February 1996
13. Indexing Techniques for Power Management in Multi-Attribute Data Broadcast Qinglong Hu, Wang-Chien Lee, and Dik Lun Lee,
14. Power conserving And access Efficient Indexes For Wireless Computing Dik Lun Lee, and Qinglong Hu,
15. Power Conservative Multi-Attribute Queries on Data Broadcast, Qinglong Hu, Wang-Chien Lee, and Dik Lun Lee, ICDE 2000.
16. "Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices", Maria Papadopouli and Henning Schulzrinne, ACM SIGMOBILE Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc) 2001, October 4-5, 2001, Long Beach, California. (Extension of the Sarnoff paper.)
Web Caching for Mobile Terminals.
Francoise Sailhan, Valarie Issarny.
In Proceedings of the ICDCS Workshop on Web Caching Systems. July 2002,
18. Power-Controlled Data Prefetching/Caching in Wireless Packet Networks, Savvas Gitzenis and Nicholas Bambos, IEEE Infocom 2002, New York.
19. Sleepers and Workaholics: Caching Strategies in Mobile Environments. Daniel Barbara, Tomasz Imielinski,VLDB Journal 4(4): 567-602(1995).
20. Indexing techniques for data broadcast on wireless channels. D.L. Lee, Q. Hu, and W. C. Lee,Proceedings of the Fifth International Conference on Foundations of Data Organization (FODO '98), Kobe, Japan, Nov 11-12, 1998, 175-182.
21. Indexing Techniques for Wireless Data Broadcast Under Data Clustering and Scheduling,Qinglong Hu, Wang-Chien Lee, and Dik Lun Lee, in Proceedings of ACM International Conference on Information and Knowledge Management (CIKM99), Kansas City, Missouri, Nov. 1999, pp. 351-358.
MobiEyes: Distributed Processing of Continuously Moving
Queries on Moving Objects in a Mobile System, Bugra Gedik, Ling
Liu. The 9th International Conference on Extending DataBase
Technology (EDBT 2004) or Bugra Gedik and Ling Liu. MobiEyes: A
Distributed Location Monitoring Service Using Moving Location Queries. IEEE
23. Processing Moving Queries over Moving Objects Using Motion Adaptive Indexes, Bugra Gedik, Kun-Lung Wu, Philip Yu, and Ling Liu, To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE).,
24. Bugra Gedik, Ling Liu, Kun-Lung Wu,
Philip S. Yu. " Lira: Lightweight, Region-aware Load Shedding in Mobile CQ
Systems". IEEE 23rd International Conference on Data
25. Bugra Gedik, Kun-Lung Wu, Philip S.
Yu, and Ling Liu. "GrubJoin: An Adaptive Multi-Way Windowed Stream Join with
Time Correlation-Aware CPU Load Shedding". IEEE 23rd
International Conference on Data Engineering.
26. Jianjun Zhang, Gong Zhang, Ling Liu. ``GeoGrid: A Scalable Location Service Network". Proceedings of 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007).
27. Kipp Jones and Ling Liu. "Improving Wireless Positioning with Look-ahead Map-Matching
", to appear in Proceedings of the 4th Annual International Conference on
28. Anand Murugappan
and Ling Liu. ``A SpatioTemporal Placement Model for Caching Location
Dependent Queries", Proceedings of the 4th Annual International
Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
(Mobiquitous 2007). August 6-10, 2007,
29. Mudhakar Srivatsa, Arun Iyengar, Jian
Yin and Ling Liu. ``A Scalable Access Control in Location-based Broadca st Services",
Proceedings of The 27th IEEE International Conference
on Computer Communications (INFOCOM 2008), to be held in
30. Peter Pesti, Ling Liu, Bhuvan Bamba, Arun Iyengar, Matt Weber. "RoadTrack: Scaling Location Updates for Mobiles on Road Networks with Query Awareness",
Proceedings of the 36th International Conference on Very Large Data Bases,
31. Bhuvan Bamba, Ling Liu, Philip S. Yu, Gong Zhang and Myungcheol Doo. "Scalable Processing of Spatial Alarms",
Proceedings of the 15th Annual IEEE International Conference on High Performance Computing (HiPC 2008),
32. Bhuvan Bamba, Ling Liu, Philip Yu, Arun Iyengar. "Distributed Processing of Spatial Alarms: A Safe Region-based Approach",
Proceedings of IEEE Int. Conf. on Distributed Computing (ICDCS 2009),
33. A. Murugappan and L. Liu. " Energy-efficient processing of spatial alarms on mobile clients. ", In Proc. ICSDE, 2008.
34. P. Pesti, B. Bamba, M. Doo, L. Liu, B. Palanisamy, and M. Weber. " Gtmobisim: A mobile trace generator for road networks. , Technical report, 2009.
1. Continuous Queries over Data Streams John S. Breese, David Heckerman, and Carl Kadie, S. Babu and J. Widom.In SIGMOD Record, September 2001 .
Towards Sensor Database Systems. Philippe Bonnet, J.
E. Gehrke, and Praveen Seshadri.
In Proceedings of the Second International Conference on
3. Querying the Physical World. Philippe Bonnet, J. E. Gehrke, and Praveen Seshadri.IEEE Personal Communications, Vol. 7, No. 5, October 2000, pages 10-15. Special Issue on Smart Spaces and Environments.
4. Fjording the Stream: An Architecture for Queries over Streaming Sensor Data, Sam Madden and Michael J. Franklin,ICDE Conference, February, 2002, San Jose.
Streaming Queries over Streaming Data Sirish Chandrasekaran, Michael J.
Franklin, VLDB Conference, August 2002,
6. Monitoring Streams: A New Class of Data Management Applications.D. Carney, U. Cetintemel, M. Cherniack, C. Convey, S. Lee, G. Seidman, M. Stonebraker, N. Tatbul, S. Zdonik. In proceedings of the 28th International Conference on Very Large Data Bases (VLDB'02), August 20-23, Hong Kong, China.
7. Quality-Aware Distributed Data Delivery for Continuous
Query Services, by Bugra Gedik and Ling Liu. ACM 2006 International Conference on
Management of Data (ACM SIGMOD),
8. GrubJoin: An Adaptive Multi-Way Windowed Stream Join with
Time Correlation-Aware CPU Load Shedding. By Bugra
Gedik, Kun-Lung Wu, Philip S. Yu, and Ling Liu. IEEE
23rd International Conference on Data Engineering. Istanbul,
9. CPU Load Shedding for Binary Stream Joins. Springer Knowledge and Information Systems. By Bugra Gedik, Kun-Lung Wu, Philip S. Yu, and Ling Liu. DOI 10.1007/s10115-006-0044-4, September 21, 2006. (will appear in print, ISSN 0219-1377)
10. CACM Special Issue on Sensor Networks, June 2004 (Online available at ACM digital library, use GT library website to access it)
1. R-trees: a dynamic index structure for spatial searching. Antonin Guttman , Proceedings of the 1984 ACM SIGMOD international conference on Management of data, June 18-21, 1984, Boston, Massachusetts
2. S. Saltenis, C. S. Jensen, S. T. Leutenegger, and
M. A.Lopez. In SIGMOD b00: Proceedings of the 2000 ACM SIGMOD international
conference on Management of data, pages 331b^S342,
3. ranz Aurenhammer, Rolf Klein1
4. , S. Shekhar, S. Chawla, S. Ravada, A. Fetterer, X. Liu and C.T. Liu, IEEE Transactions on Knowledge and Data Engineering, Jan.-Feb. 1999.
5. , S. Shekhar and Y. Huang, In Proc. of 7th International
Symposium on Spatial and Temporal Databases (SSTD01), July 2001.
6. Detecting Graph-based Spatial Outliers: Algorithms and Applications, S. Shekhar, C.T. Lu, P. Zhang, the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2001.
7. Extending Data Mining for Spatial Applications: A
Case Study in Predicting Nest Locations, S. Chawla, S.
Shekhar, W. Wu and U. Ozesmi, Proc. Int. Confi. on 2000 ACM SIGMOD
Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD 2000),
8. Modeling Spatial Dependencies for Mining Geospatial Data, S. Chawla, S. Shekhar, W. Wu and U. Ozesmi, First SIAM International Conference on Data Mining, 2001.
9. Spatial Contextual Classification and Prediction Models for Mining Geospatial
Data, S. Shekhar, P.R.
Schrater, R. R. Vatsavai, W. Wu, and
10. Finkel and Bentley, ACM Comput. Surv.1974
11. A. Moore
12. Jukka Kaartinen
13. Spatial data structures for version management of
engineering drawings in cad database. Y. Nakamura and H.
Dekihara. In ICIAP b03: Proceedings of the 12th International
Conference on Image Analysis and Processing, page 219,
14. S. Prabhakar, Y. Xia, D. V. Kalashnikov, W. G. Aref, and S. E. Hambrusch. " Query indexing and velocity constrained indexing: Scalable techniques for continuous queries on moving objects. , In IEEE Transactions on Computers, 2002.
15. B. Seeger and H. P. Kriegel. " Techniques for design and implementation of efficient spatial access methods., In VLDB, 1988.
Questions: How can we build secure Internet Applications?
1. Extensible Security Architectures for Java, D S. Wallach, D. Balfanz, D. Dean and E W. Felten, Proceedings of the sixteenth ACM symposium on Operating systems principles (SOSP'97), Saint-Malo, France, Pages 116-128, December 1997.
2. The CRISIS Wide Area Security Architecture, E. Belani, A. Vahdat, T. Anderson, and M. Dahlin, In Proceedings of USENIX Security Symposium, San Antonio, TX, January 1998.
3. Authentication in Distributed Systems: Theory and Practise, B. Lampson, M. Abadi, M. Burrows and E. Wobber, Proceedings of the thirteenth ACM symposium on Operating systems principles (SOSP'91), Pacific Grove, CA, pages 165-182, October, 1991.
4. Kerberos: An Authentication Service for Open Network Systems, J. G. Steiner, B. Clifford Neuman, and J.I. Schiller, Proceedings of the USENIX Winter Conference, pages 191-202, 1988.
5. Kerberos: An Authentication Service for Computer Networks B. Clifford Neuman and Theodore Ts'o, IEEE Communications Magazine, Volume 32, Number 9, pages 33-38, September 1994. ( Kerberos Home, About Kerberos, Kerberos Reference Page, Kerberos for UNIX)
6. Java Security: From HotJava to Netscape and Beyond D. Dean, E. W. Felten, and D S. Wallach, Proceedings of 1996 IEEE Symposium on Security and Privacy, May 1996.
7. Cryptography and the Internet, S. Bellovin, Proceedings of CRYPTO '98, August 1998, pp. 46-55.
8. Toward Acceptable Metrics of Authentication, M. Reiter and S. Stubblebine,IEEE Symposium on Security and Privacy, 1996.
9. Timing attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems, P. Kocher,Advances in Cryptology - CRYPTO 96, pp 104-113, 1996
10. Vulnerabilities and Security Threats in Structured Overlay Networks. M. Srivatsa, L. Liu, Proc of 20th IEEE Annual Computer Security Applications Conf ACSAC, 2004.
11. FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, R. P. Wattenhofer, Proc of 5th OSDI, 2002.
12. Secure routing for Structured Peer-to-Peer Overlay Networks. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. S. Wallach, Proc of 5th OSDI, 2002.
13. The Sybil Attack. J. Douceur, Proc of 2nd Annual IPTPS Workshop, 2002.
14. Security Considerations for Peer-to-Peer Distributed Hash Tables. E. Sit, J. Morris, Proc of 2nd Annual IPTPS Workshop, 2002.
15. SOS: An Architecture For Mitigating DDoS Attacks. A. D. Keromytis, V. Misra, D. Rubenstein, Proc of IEEE Journal on Selected Areas in Communication, Vol 21, 2003.
16. Countering Targeted File Attacks using Location Keys. M. Srivatsa and L. Liu, Proc of USENIX Security Symposium, 2005.
17. Securing Publish-Subscribe Overlay Services With EventGuard . M. Srivatsa and L. Liu, Proc of ACM Conference on Computer and Communication Security (CCS) , 2005.
1. A Privacy-Preserving Index for Range Queries, Bijit Hore, Sharad Mehrotra, Gene Tsudik, VLDB 2004
2. Auditing Compliance with a Hippocratic Database, Rakesh Agrawal Roberto Bayardo Christos Faloutsos Jerry Kiernan Ralf Rantzau Ramakrishnan Srikant, VLDB 2004
3. Privacy-preserving data mining. R. Agrawal and S. Ramakrishnan. In Proceedings of of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 439--450, 2000.
4. On the design and quantification of privacy preserving data mining algorithms. D. Agrawal and C. C. Aggarwal, In Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, California, USA, May 21-23 2001. ACM.
5. Privacy Preserving Indexing of Documents on the Network, Mayank Bawa, Roberto Bayardo Jr., and Rakesh Agrawal. In VLDB, 2003
6. Topk Queries Across Multiple Private Databases, L. Xiong, S. Chitti, L. Liu. In Proc of Intl Conf of Distributed Computing Systems ICDCS, 2005
7. Information Hiding -- A Survey, F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. In Proc of IEEE Special Issue on Protection of MultiMedia Content 87(7):1062-1078, July 1999
8. Location Privacy in Pervasive Computing, A. R. Beresford, F. Stajano. In Proc of IEEE Pervasive Computing 46-55, March 2003
1. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. Bugra Gedik and Ling Liu., IEEE Transactions on Mobile Computing. A short version appeared as A Customizable k-Anonymity Model for Protecting Location Privacy. B. Gedik, L. Liu, Proc of Intl Conf of Distributed Computing Systems ICDCS, 2005.
2. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. M. gruteser, D. GrunwaldProc of ACM/USENIX MobiSys, 2003.
3. Location Privacy in Pervasive Computing. A. Beresford and F. Stajano. IEEE Pervasive Computing, 2003
4.Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid by Bhuvan Bamba, Ling Liu, Peter Pesti and Ting Wang, Proceedings of 17th International World Wide Web Conference (WWW'08).
5. The New Casper: Query Processing for Location Services without Compromising Privacy. Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref., In Proceedings of the International Conference on Very Large Data Bases, VLDB, pages 763774, Seoul, Korea, September 2006.
6. PRIVE: Anonymous Location based Queries in Distributed Mobile Systems. Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. In Proceedings of International Conference on World Wide Web, WWW, pages 110, 2007.
7. Onion routing for anonymous and private internet connections. D. Goldberg, M. Reed and P. Syverson. CACM 1999.
8. Framework for Security and Privacy in Automotive Telematics. S. Duri, M. gruteser, X. Liu, P. Moskowitz, R. Perez, M. Sing, J. M. Tang Proc of Intl Workshop on Mobile Commerce WMC, 2002.
9. Preserving Privacy in Environments with Location-Based Applications. G. Myles, A. Friday, and N. Davies. IEEE Pervasive Computing, 2(1):5664, 2003.
10. Concepts for Personal Location Privacy Policies. Einar Snekkenes. In Proceedings of the ACM Conference on Electronic Commerce, pages 4857, 2001.
11. Secure Verification of Location Claims. Naveen Sastry, Umesh Shankar, and David Wagner. WiSE 2003.
12. Privacy for Profitable Location Based Services. Tobias K¨olsch, Lothar Fritsch, Markulf Kohlweiss, and Dogan Kesdogan. ,In Proceeding of the International Conference on Security in Pervasive Computing, SPC, pages 164178, 2005.
13. Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, and Mario Gerla. , In Proceedings of the IEEE Symposium on Computers and Communications, ISCC, pages 5762, 2005.
14. Privacy by design principles of privacy aware ubiquitous systems. Marc Langheinrich. Ubicom 2001 LNCS 2201. 2001 Springer.
15. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement Through Generalization and Specialization. P. Samarati, L. Sweeney, TechReport SRI-CSL-98-04, SRI Intl., 1998.
16. Framework for security and privacy in automotive
telematics. S. Duri,
M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.M. Tang. ,
International Workshop on
17. The Geometry of Uncertainty in Moving Objects Databases.
Goce Trajcevski, Ouri Wolfson, Fengli Zhang, and Sam Chamberlain. , In
Proceedings of the International Conference on Extending Database Technology,
EDBT, pages 233-250,
20. Stalked by Satellite. John Voelcker. , IEEE Spectrum, 43(7):15-16, 2006.
21. The active badge location system. Roy Want, Andy Hopper, Veronica Falco and Jonathan Gibbons. ACM transactions on Information Systems (TOIS), 10(1), 1992.
22. They Know Where You Are . Jay Warrior, Eric McHenry, and Kenneth McGee. IEEE Spectrum, 40(7):2025, 2003.
23. People, Not Places: A Policy Framework for Analyzing Location Privacy Issues. James C. White. Master's thesis, Terry Sanford Institute of Public Policy, Duke University, Durham, NC, 2006.
24. Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Customer Profiles. Mahmoud Youssef, Vijayalakshmi Atluri, and Nabil R. Adam., In Proceedings of the International Conference on Mobile Data Management, MDM, pages 6776, 2005.
25. MOBIHIDE: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries. Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. , In Proceedings of the International Symposium on Advances in Spatial and Temporal Databases, SSTD, 2007.
1. PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities. L. Xiong and L. Liu, To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE), 2004.
2. TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. A. Singh and L. Liu, In the proceedings of the third IEEE International Conference on Peer-to-Peer Computing, September 2003.
3. Reputation Systems. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, Comm. ACM, vol. 43, no. 12, 2000.
4. The Digitization of Word-of-Mouth: Promise and Challenges of Online Reputation Mechanism. C. Dellarocas, Management Science, vol. 49, no. 10, 2003.
5. Managing Trust in a Peer-to-Peer Information System, K. Aberer and Z. Despotovic, Proc. ACM Conf. Information and Knowledge Management (CIKM), 2001.
6. Choosing Reputable Servents in a P2P Network, F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P.Samarati, Proc.11th Int.l World Wide Web Conf., 2002.
7. The EigenTrust Algorithm for Reputation Management in P2P Networks, S. Kamvar, M. Scholsser, and H. Garcia-Molina, Proc. 12th Int.l World Wide Web Conf., 2003.
8. Combating Web Spam with TrustRank. Zoltan Gy�ngyi, Hector Garcia-Molina, Jan Pedersen, VLDB 2004: 576-587
9. Propagation of Trust and Distrust. R. Guha, R. Kumar, P. Raghavan, A. Tomkins, Proc of 13th Intl World Wide Web Conf, 2004.
10. Trust Management for the Semantic Web. M. Richardson, R. Agarawal, P. Domingos, Proc of Intl Semantic Web Conf, 2003.
11. TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks . M. Srivatsa, L. Xiong and L. Liu Proc of 14th World Wide Web Conference , 2005.
2. Combating Web Spam with TrustRank, Zoltan Gyongyi, Hector Garcia-Molina, and Jan Pedersen. - VLDB 2004
3. Link Spam Alliances, Zoltan Gyongyi and Hector Garcia-Molina., - Stanford Technical Report 2005 (also published in VLDB 2005)
4. Link Spam Detection Based on Mass Estimation , Zoltan Gyongyi, Pavel Berkhin, Hector Garcia-Molina, and Jan Pedersen, Stanford Technical Report 2006 (also published in VLDB 2006)
5. ``A Parameterized Approach to Spam-Resilient Link Analysis of the Web", James Caverlee and Ling Liu. IEEE Transactions on Parallel and Distributed Systems (TPDS).
6. Countering Web Spam with Credibility-Based Link Analysis, James Caverlee, Ling Liu. PODC 2007
7. Spam-resilient Web Rankings via Influence Throttling, James Caverlee, Steve Webb, and Ling Liu. - IPDPS 2007
8. ``SocialTrust: Tamper-Resilient Trust Establishment in Online
Communities", James Caverlee,
Ling Liu, Steve Webb,
Proceedings of the International Joint Conference on Digital
Libraries (JDL 2008), June 16-20, 2008 -
9. Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages, Dennis Fetterly, Mark Manasse, and Marc Najork.- WebDB 2004
10. Detecting Phrase-level Duplication on the World Wide Web, Dennis Fetterly, Mark Manasse, and Marc Najork.- SIGIR 2005
11. Thwarting the Nigritude Ultramarine: Learning to Identify Link Spam, Isabel Drost and Tobias Scheffer. - ECML 2005
12. Introducing the Webb Spam Corpus: Using Email Spam to Identify Web Spam Automatically, Steve Webb, James Caverlee, and Calton Pu - CEAS 2006
13. Know Your Neighbors: Web Spam Detection Using the Web Topology, Carlos Castillo et al. - SIGIR 2007
14. Detecting Spam Web Pages through Content Analysis, Alexandros Ntoulas, Marc Najork, Mark Manasse, and Dennis Fetterly. - WWW 2006
15. Web spam Identification Through Content and Hyperlinks -, Jacob Abernethy, Olivier Chapelle, and Carlos Castillo. AIRWeb 2008
16. Characterizing Web Spam Using Content and HTTP Session Analysis, Steve Webb, James Caverlee, and Calton Pu. - CEAS 2007
17. Predicting Web Spam with HTTP Session Information -, Steve Webb, James Caverlee, and Calton Pu. CIKM 2008,
18. Blog Spam: A Review, Adam Thomason. - CEAS 2007
19. Blocking Blog Spam with Language Model Disagreement - Gilad Mishne, David Carmel, and Ronny Lempel., AIRWeb 2005
20. Automatic Vandalism Detection in Wikipedia: Towards a Machine Learning Approach, Martin Potthast, Benno Stein, and Robert Gerling. - AAAI 2008
21. Creating, Destroying, and Restoring Value in Wikipedia,