Epidemic algorithms for replicated database maintenance
PODC '87 Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
Disconnected operation in the Coda file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Managing update conflicts in Bayou, a weakly connected replicated storage system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Space-efficiency for routing schemes of stretch factor three
Journal of Parallel and Distributed Computing
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Looking up data in P2P systems
Communications of the ACM
JXTA: A Network Programming Environment
IEEE Internet Computing
Internet indirection infrastructure
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication
ER '98 Proceedings of the Workshops on Data Warehousing and Data Mining: Advances in Database Technologies
The Roma personal metadata service
WMCSA '00 Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00)
Updates in Highly Unreliable, Replicated Peer-to-Peer Systems
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Making gnutella-like P2P systems scalable
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
The design and implementation of a next generation name service for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Ivy: a read/write peer-to-peer file system
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Peer-to-peer communication across network address translators
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Non-transitive connectivity and DHTs
WORLDS'05 Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
SPROUT: P2P routing with social networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
A data-oriented (and beyond) network architecture
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
An end-middle-end approach to connection establishment
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Alpaca: extensible authorization for distributed services
Proceedings of the 14th ACM conference on Computer and communications security
A P2P SOA enabling group collaboration through service composition
Proceedings of the 5th international conference on Pervasive services
Perspective: semantic data management for the home
FAST '09 Proccedings of the 7th conference on File and storage technologies
Point&Connect: intention-based device pairing for mobile phone users
Proceedings of the 7th international conference on Mobile systems, applications, and services
PAN-on-Demand: leveraging multiple radios to build self-organizing, energy-efficient pans
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Policy-based access control for weakly consistent replication
Proceedings of the 5th European conference on Computer systems
P2P social networking for the rest of US
Pervasive and Mobile Computing
Dexferizer: a service for data transfer optimization
Proceedings of the Nineteenth International Workshop on Quality of Service
Combining mobile and cloud storage for providing ubiquitous data access
Euro-Par'11 Proceedings of the 17th international conference on Parallel processing - Volume Part I
Faunus: a flexible middleware for specifying and managing multimodal, multiparty collaborations
Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference
Hi-index | 0.00 |
The Unmanaged Internet Architecture (UIA) provides zero-configuration connectivity among mobile devices through personal names. Users assign personal names through an ad hoc device introduction process requiring no central allocation. Once assigned, names bind securely to the global identities of their target devices independent of network location. Each user manages one namespace, shared among all the user's devices and always available on each device. Users can also name other users to share resources with trusted acquaintances. Devices with naming relationships automatically arrange connectivity when possible, both in ad hoc networks and using global infrastructure when available. A UIA prototype demonstrates these capabilities using optimistic replication for name resolution and group management and a routing algorithm exploiting the user's social network for connectivity.