Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Exploiting Social Interactions in Mobile Systems

    The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic of this new environment – user mobility....

    Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Chan in UbiComp 2007: Ubiquitous Computing (2007)

  2. No Access

    Article

    Measuring and analyzing the characteristics of Napster and Gnutella hosts

    The popularity of peer-to-peer multimedia file sharing applications such as Gnutella and Napster has created a flurry of recent research activity into peer-to-peer architectures. We believe that the proper eva...

    Stefan Saroiu, Krishna P. Gummadi, Steven D. Gribble in Multimedia Systems (2003)

  3. No Access

    Chapter and Conference Paper

    Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS

    Despite the existence of many peer-to-peer systems, some of their design choices and implications are not well understood. This paper compares several distributed and peer-to-peer systems by evaluating a key s...

    Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble in Peer-to-Peer Systems (2002)

  4. No Access

    Chapter and Conference Paper

    Dynamically Fault-Tolerant Content Addressable Networks

    We describe a content addressable network which is robust in the face of massive adversarial attacks and in a highly dynamic environment. Our network is robust in the sense that at any time, an arbitrarily lar...

    Jared Saia, Amos Fiat, Steve Gribble, Anna R. Karlin, Stefan Saroiu in Peer-to-Peer Systems (2002)