Random sampling with a reservoir
ACM Transactions on Mathematical Software (TOMS)
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
How many random questions are necessary to identify n distinct objects?
Journal of Combinatorial Theory Series A
The art of computer programming, volume 3: (2nd ed.) sorting and searching
The art of computer programming, volume 3: (2nd ed.) sorting and searching
The end-to-end effects of Internet path selection
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Min-wise independent permutations
Journal of Computer and System Sciences - 30th annual ACM symposium on theory of computing
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Dynamic parallel access to replicated content in the internet
IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
Informed content delivery across adaptive overlay networks
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
Heights in Generalized Tries and PATRICIA Tries
LATIN '00 Proceedings of the 4th Latin American Symposium on Theoretical Informatics
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Scalable on-demand media streaming with packet loss recovery
IEEE/ACM Transactions on Networking (TON)
Resilient multicast using overlays
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
On the Resemblance and Containment of Documents
SEQUENCES '97 Proceedings of the Compression and Complexity of Sequences 1997
Efficient Reconciliation of Unordered Databases
Efficient Reconciliation of Unordered Databases
Bullet: high bandwidth data dissemination using an overlay mesh
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
SplitStream: high-bandwidth multicast in cooperative environments
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Overcast: reliable multicasting with on overlay network
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Efficient erasure correcting codes
IEEE Transactions on Information Theory
Set reconciliation with nearly optimal communication complexity
IEEE Transactions on Information Theory
A case for end system multicast
IEEE Journal on Selected Areas in Communications
A digital fountain approach to asynchronous reliable multicast
IEEE Journal on Selected Areas in Communications
Sensor network software update management: a survey
International Journal of Network Management
QoS Driven Parallelization of Resources to Reduce File Download Delay
IEEE Transactions on Parallel and Distributed Systems
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Distributed Selfish Replication
IEEE Transactions on Parallel and Distributed Systems
p2pDating: Real life inspired semantic overlay networks for Web search
Information Processing and Management: an International Journal
Mistreatment-resilient distributed caching
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE Transactions on Parallel and Distributed Systems
AIKED'08 Proceedings of the 7th WSEAS International Conference on Artificial intelligence, knowledge engineering and data bases
A performance evaluation of scalable live video streaming with nano data centers
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Efficient Index Dissemination in Unstructured Peer-to-Peer Networks
IEICE - Transactions on Information and Systems
Combating Index Poisoning in P2P File Sharing
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Securing bulk content almost for free
Computer Communications
Distribllted throughput maximization in P2P VoD applications
IEEE Transactions on Multimedia - Special section on communities and media computing
FoG: Fighting the Achilles' Heel of Gossip Protocols with Fountain Codes
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
SIP-based protocol for P2P large-scale multiparty VoIP (MVoIP) conference support
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Fast track article: Connectivity monitoring in wireless sensor networks
Pervasive and Mobile Computing
Fast and scalable classification of structured data in the network
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Video Streaming with Network Coding
Journal of Signal Processing Systems
Cardinality estimation and dynamic length adaptation for Bloom filters
Distributed and Parallel Databases
Bounded vector signatures and their applications
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Interest-Intended Piece Selection in BitTorrent-like peer-to-peer file sharing systems
Journal of Parallel and Distributed Computing
Low complexity set reconciliation using Bloom filters
FOMC '11 Proceedings of the 7th ACM ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing
The context of coordinating groups in dynamic mobile networks
COORDINATION'11 Proceedings of the 13th international conference on Coordination models and languages
Mobile service clouds: a self-managing infrastructure for autonomic mobile computing services
SelfMan'06 Proceedings of the Second IEEE international conference on Self-Managed Networks, Systems, and Services
IQN routing: integrating quality and novelty in P2P querying and ranking
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
A feedback control approach to mitigating mistreatment in distributed caching groups
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
L-priorities bloom filter: A new member of the bloom filter family
International Journal of Automation and Computing
Slice embedding solutions for distributed service architectures
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Overlay networks have emerged as a powerful and highly flexible method for delivering content. We study how to optimize throughput of large transfers across richly connected, adaptive overlay networks, focusing on the potential of collaborative transfers between peers to supplement ongoing downloads. First, we make the case for an erasure-resilient encoding of the content. Using the digital fountain encoding approach, end hosts can efficiently reconstruct the original content of size n from a subset of any n symbols drawn from a large universe of encoding symbols. Such an approach affords reliability and a substantial degree of application-level flexibility, as it seamlessly accommodates connection migration and parallel transfers while providing resilience to packet loss. However, since the sets of encoding symbols acquired by peers during downloads may overlap substantially, care must be taken to enable them to collaborate effectively. Our main contribution is a collection of useful algorithmic tools for efficient summarization and approximate reconciliation of sets of symbols between pairs of collaborating peers, all of which keep message complexity and computation to a minimum. Through simulations and experiments on a prototype implementation, we demonstrate the performance benefits of our informed content-delivery mechanisms and how they complement existing overlay network architectures.