10 research outputs found

    Understanding the Network and User-Targeting Properties of Web Advertising Networks

    Full text link

    Performance evaluation and benchmarking of the JXTA peer-to-peer platform

    Get PDF
    Peer-to-peer (P2P) systems are a relatively new addition to the large area of distributed computer systems. The emphasis on sharing resources, self-organization and use of discovery mechanisms sets the P2P systems apart from other forms of distributed computing. Project JXTA is the first P2P application development platform, consisting of standard protocols, programming tools and multi-language implementations. A JXTA peer network is a complex overlay, constructed on top of the physical network, with its own identification scheme and routing. This thesis investigates the performance of JXTA using benchmarking. The presented work includes the development of the JXTA Performance Model and Benchmark Suite, as well as the collection and analysis of the performance results. By evaluating three major versions of the protocol implementations in a variety of configurations, the performance characteristics, limitations, bottlenecks and trade-offs are observed and discussed. It is shown that the complexity of JXTA allows many factors to affect its performance and that several JXTA components exhibit unintuitive and unexpected behavior. However, the results also reveal the ways to maximize the performance of the deployed and newly designed systems. The evolution of JXTA through several versions shows some notable improvements, especially in search and discovery models and added messaging components, which make JXTA a promising member of the future generation of computer systems

    Reorganization in network regions for optimality and fairness

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.Includes bibliographical references (p. 92-95).(cont.) down implicit assumptions of altruism while showing the resulting negative impact on utility. From a selfish equilibrium, with much lower global utility, we show the ability of our algorithm to reorganize and restore the utility of individual nodes, and the system as a whole, to similar levels as realized in the SuperPeer network. Simulation of our algorithm shows that it reaches the predicted optimal utility while providing fairness not realized in other systems. Further analysis includes an epsilon equilibrium model where we attempt to more accurately represent the actual reward function of nodes. We find that by employing such a model, over 60% of the nodes are connected. In addition, this model converges to a utility 34% greater than achieved in the SuperPeer network while making no assumptions on the benevolence of nodes or centralized organization.This thesis proposes a reorganization algorithm, based on the region abstraction, to exploit the natural structure in overlays that stems from common interests. Nodes selfishly adapt their connectivity within the overlay in a distributed fashion such that the topology evolves to clusters of users with shared interests. Our architecture leverages the inherent heterogeneity of users and places within the system their incentives and ability to affect the network. As such, it is not dependent on the altruism of any other nodes in the system. Of particular interest is the optimality and fairness of our design. We rigorously define ideal and fair networks and develop a continuum of optimality measures by which to evaluate our algorithm. Further, to evaluate our algorithm within a realistic context, validate assumptions and make design decisions, we capture data from a portion of a live file-sharing network. More importantly, we discover, name, quantify and solve several previously unrecognized subtle problems in a content-based self-organizing network as a direct result of simulations using the trace data. We motivate our design by examining the dependence of existing systems on benevolent Super-Peers. Through simulation we find that the current architecture is highly dependent on the filtering capability and the willingness of the SuperPeer network to absorb the majority of the query burden. The remainder of the thesis is devoted to a world in which SuperPeers no longer exist or are untenable. In our evaluation, we introduce four reasons for utility suboptimal self-reorganizing networks: anarchy (selfish behavior), indifference, myopia and ordering. We simulate the level of utility and happiness achieved in existing architectures. Then we systematically tearby Robert E. Beverly, IV.S.M

    Analyzing and Enhancing Routing Protocols for Friend-to-Friend Overlays

    Get PDF
    The threat of surveillance by governmental and industrial parties is more eminent than ever. As communication moves into the digital domain, the advances in automatic assessment and interpretation of enormous amounts of data enable tracking of millions of people, recording and monitoring their private life with an unprecedented accurateness. The knowledge of such an all-encompassing loss of privacy affects the behavior of individuals, inducing various degrees of (self-)censorship and anxiety. Furthermore, the monopoly of a few large-scale organizations on digital communication enables global censorship and manipulation of public opinion. Thus, the current situation undermines the freedom of speech to a detrimental degree and threatens the foundations of modern society. Anonymous and censorship-resistant communication systems are hence of utmost importance to circumvent constant surveillance. However, existing systems are highly vulnerable to infiltration and sabotage. In particular, Sybil attacks, i.e., powerful parties inserting a large number of fake identities into the system, enable malicious parties to observe and possibly manipulate a large fraction of the communication within the system. Friend-to-friend (F2F) overlays, which restrict direct communication to parties sharing a real-world trust relationship, are a promising countermeasure to Sybil attacks, since the requirement of establishing real-world trust increases the cost of infiltration drastically. Yet, existing F2F overlays suffer from a low performance, are vulnerable to denial-of-service attacks, or fail to provide anonymity. Our first contribution in this thesis is concerned with an in-depth analysis of the concepts underlying the design of state-of-the-art F2F overlays. In the course of this analysis, we first extend the existing evaluation methods considerably, hence providing tools for both our and future research in the area of F2F overlays and distributed systems in general. Based on the novel methodology, we prove that existing approaches are inherently unable to offer acceptable delays without either requiring exhaustive maintenance costs or enabling denial-of-service attacks and de-anonymization. Consequentially, our second contribution lies in the design and evaluation of a novel concept for F2F overlays based on insights of the prior in-depth analysis. Our previous analysis has revealed that greedy embeddings allow highly efficient communication in arbitrary connectivity-restricted overlays by addressing participants through coordinates and adapting these coordinates to the overlay structure. However, greedy embeddings in their original form reveal the identity of the communicating parties and fail to provide the necessary resilience in the presence of dynamic and possibly malicious users. Therefore, we present a privacy-preserving communication protocol for greedy embeddings based on anonymous return addresses rather than identifying node coordinates. Furthermore, we enhance the communication’s robustness and attack-resistance by using multiple parallel embeddings and alternative algorithms for message delivery. We show that our approach achieves a low communication complexity. By replacing the coordinates with anonymous addresses, we furthermore provably achieve anonymity in the form of plausible deniability against an internal local adversary. Complementary, our simulation study on real-world data indicates that our approach is highly efficient and effectively mitigates the impact of failures as well as powerful denial-of-service attacks. Our fundamental results open new possibilities for anonymous and censorship-resistant applications.Die Bedrohung der Überwachung durch staatliche oder kommerzielle Stellen ist ein drängendes Problem der modernen Gesellschaft. Heutzutage findet Kommunikation vermehrt über digitale Kanäle statt. Die so verfügbaren Daten über das Kommunikationsverhalten eines Großteils der Bevölkerung in Kombination mit den Möglichkeiten im Bereich der automatisierten Verarbeitung solcher Daten erlauben das großflächige Tracking von Millionen an Personen, deren Privatleben mit noch nie da gewesener Genauigkeit aufgezeichnet und beobachtet werden kann. Das Wissen über diese allumfassende Überwachung verändert das individuelle Verhalten und führt so zu (Selbst-)zensur sowie Ängsten. Des weiteren ermöglicht die Monopolstellung einiger weniger Internetkonzernen globale Zensur und Manipulation der öffentlichen Meinung. Deshalb stellt die momentane Situation eine drastische Einschränkung der Meinungsfreiheit dar und bedroht die Grundfesten der modernen Gesellschaft. Systeme zur anonymen und zensurresistenten Kommunikation sind daher von ungemeiner Wichtigkeit. Jedoch sind die momentanen System anfällig gegen Sabotage. Insbesondere ermöglichen es Sybil-Angriffe, bei denen ein Angreifer eine große Anzahl an gefälschten Teilnehmern in ein System einschleust und so einen großen Teil der Kommunikation kontrolliert, Kommunikation innerhalb eines solchen Systems zu beobachten und zu manipulieren. F2F Overlays dagegen erlauben nur direkte Kommunikation zwischen Teilnehmern, die eine Vertrauensbeziehung in der realen Welt teilen. Dadurch erschweren F2F Overlays das Eindringen von Angreifern in das System entscheidend und verringern so den Einfluss von Sybil-Angriffen. Allerdings leiden die existierenden F2F Overlays an geringer Leistungsfähigkeit, Anfälligkeit gegen Denial-of-Service Angriffe oder fehlender Anonymität. Der erste Beitrag dieser Arbeit liegt daher in der fokussierten Analyse der Konzepte, die in den momentanen F2F Overlays zum Einsatz kommen. Im Zuge dieser Arbeit erweitern wir zunächst die existierenden Evaluationsmethoden entscheidend und erarbeiten so Methoden, die Grundlagen für unsere sowie zukünftige Forschung in diesem Bereich bilden. Basierend auf diesen neuen Evaluationsmethoden zeigen wir, dass die existierenden Ansätze grundlegend nicht fähig sind, akzeptable Antwortzeiten bereitzustellen ohne im Zuge dessen enorme Instandhaltungskosten oder Anfälligkeiten gegen Angriffe in Kauf zu nehmen. Folglich besteht unser zweiter Beitrag in der Entwicklung und Evaluierung eines neuen Konzeptes für F2F Overlays, basierenden auf den Erkenntnissen der vorangehenden Analyse. Insbesondere ergab sich in der vorangehenden Evaluation, dass Greedy Embeddings hoch-effiziente Kommunikation erlauben indem sie Teilnehmer durch Koordinaten adressieren und diese an die Struktur des Overlays anpassen. Jedoch sind Greedy Embeddings in ihrer ursprünglichen Form nicht auf anonyme Kommunikation mit einer dynamischen Teilnehmermengen und potentiellen Angreifern ausgelegt. Daher präsentieren wir ein Privätssphäre-schützenden Kommunikationsprotokoll für F2F Overlays, in dem die identifizierenden Koordinaten durch anonyme Adressen ersetzt werden. Des weiteren erhöhen wir die Resistenz der Kommunikation durch den Einsatz mehrerer Embeddings und alternativer Algorithmen zum Finden von Routen. Wir beweisen, dass unser Ansatz eine geringe Kommunikationskomplexität im Bezug auf die eigentliche Kommunikation sowie die Instandhaltung des Embeddings aufweist. Ferner zeigt unsere Simulationstudie, dass der Ansatz effiziente Kommunikation mit kurzen Antwortszeiten und geringer Instandhaltungskosten erreicht sowie den Einfluss von Ausfälle und Angriffe erfolgreich abschwächt. Unsere grundlegenden Ergebnisse eröffnen neue Möglichkeiten in der Entwicklung anonymer und zensurresistenter Anwendungen

    Cheating Prevention in Peer-to-Peer-based Massively Multiuser Virtual Environments

    Get PDF
    Massively multiuser virtual environments (MMVEs) have become an increasingly popular Internet application in recent years. Until now, they are all based on client/server technology. Due to its inherent lack of scalability, realizing MMVEs based on peer-to-peer technology has received a lot of interest. From the perspective of the operator, using peer-to-peer technology raises additional challenges: the lack of trust in peers and their unreliability. The simulation of the virtual environment is governed by certain rules specified by the operator. These rules state what actions can be taken by users in the virtual environment and how the state of the environment changes based on these actions. Since MMVEs are very often competitive environments, some people will cheat and try to break the rules to get an unfair advantage over others. Using a central server performing the simulation of the virtual environment, the operator can ensure only allowed actions can be performed and the state of the environment evolves according to the rules. In a peer-to-peer setting, the operator has no control over the peers so they might not behave as implemented by the operator. Furthermore, a central server is inherently more reliable than a peer which could fail at any time so data might be lost. This thesis presents the design of a storage performing a distributed simulation of a virtual environment. It uses a deterministic event-based simulation to calculate the state of the virtual environment only based on the actions of its users. There are multiple replicated simulations using a voting mechanism to overcome the influence of malicious peers trying to tamper with the state of the environment as long as the number of malicious peers does not reach a critical threshold. Replication of data also ensures data is not lost when peers fail. The storage is based on a peer-to-peer overlay allowing peers to exchange messages to store and retrieve data. It creates a Delaunay graph structure matching the way the data in the virtual environment is distributed among the peers. A self-stabilizing algorithm keeps the structure intact as peers join and leave the network. Additional routing tables allow peers to retrieve stored replicas independently on short, disjoint paths reducing the influence of malicious peers on the retrieval of data. A redundant filling algorithm prevents malicious peers from tampering with these routing tables to get more messages routed their way

    An Overview of Search Strategies in Distributed Environments

    Full text link
    [EN] Distributed systems are populated by a large number of heterogeneous entities that join and leave the systems dynamically. These entities act as clients and providers and interact with each other in order to get a resource or to achieve a goal. To facilitate the collaboration between entities the system should provide mechanisms to manage the information about which entities or resources are available in the system at a certain moment, as well as how to locate them in an e cient way. However, this is not an easy task in open and dynamic environments where there are changes in the available resources and global information is not always available. In this paper, we present a comprehensive vision of search in distributed environments. This review does not only considers the approaches of the Peer-to-Peer area, but also the approaches from three more areas: Service-Oriented Environments, Multi-Agent Systems, and Complex Networks. In these areas, the search for resources, services, or entities plays a key role for the proper performance of the systems built on them. The aim of this analysis is to compare approaches from these areas taking into account the underlying system structure and the algorithms or strategies that participate in the search process.Work partially supported by the Spanish Ministry of Science and Innovation through grants TIN2009-13839-C03-01, CSD2007-0022 (CONSOLIDER-INGENIO 2010), PROMETEO 2008/051, PAID-06-11-2048, and FPU grant AP-2008-00601 awarded to E. del Val.Del Val Noguera, E.; Rebollo Pedruelo, M.; Botti, V. (2013). An Overview of Search Strategies in Distributed Environments. Knowledge Engineering Review. 1-33. https://doi.org/10.1017/S0269888913000143S133Sigdel K. , Bertels K. , Pourebrahimi B. , Vassiliadis S. , Shuai L. 2005. A framework for adaptive matchmaking in distributed computing. In Proceedings of GRID Workshop.Prabhu S. 2007. Towards distributed dynamic web service composition. In ISADS '07: Proceedings of the 8th International Symposium on Autonomous Decentralized Systems. IEEE Computer Society, 25–32.Meshkova, E., Riihijärvi, J., Petrova, M., & Mähönen, P. (2008). A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks. Computer Networks, 52(11), 2097-2128. doi:10.1016/j.comnet.2008.03.006Martin D. , Paolucci M. , Wagner M. 2007. Towards semantic annotations of web services: Owl-s from the sawsdl perspective. In Proceedings of Workshop OWL-S: Experiences and Directions at 4th European Semantic Web Conference, Innsbruck, Austria.Ogston E. , Vassiliadis S. 2001b. Matchmaking among minimal agents without a facilitator. In Proceedings of the 5th International Conference on Autonomous Agents, Bologna, Italy, 608–615.Martin D. , Burstein M. , Hobbs J. , Lassila O. , McDermott D. , McIlraith S. , Narayanan S. , Paolucci M. , Parsia B. , Payne T. , Sirin E. , Srinivasan N. , Sycara K. 2004. Owl-s: Semantic Markup for Web Services. http://www.w3.org/Submission/OWL-S/Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., & Lim, S. (2005). A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials, 7(2), 72-93. doi:10.1109/comst.2005.1610546Liang J. , Kumar R. , Ross K. 2005. Understanding kazaa. In Proceedings of the 5th New York Metro Area Networking Workshop (NYMAN), New York, USA.Ko, S. Y., Gupta, I., & Jo, Y. (2008). A new class of nature-inspired algorithms for self-adaptive peer-to-peer computing. ACM Transactions on Autonomous and Adaptive Systems, 3(3), 1-34. doi:10.1145/1380422.1380426Kleinberg J. 2001. Small-world phenomena and the dynamics of information. In Advances in Neural Information Processing Systems (NIPS), Dietterich, T. G., Becker, S. & Ghahramani, Z. (eds). MIT Press, 431–438.Jha S. , Chalasani P. , Shehory O. , Sycara K. 1998. A formal treatment of distributed matchmaking. In Proceedings of the 2nd International Conference on Autonomous Agents, Sycara, K. P. & Wooldridge, M. (eds). ACM, 457–458.Huhns, M. N. (2002). Agents as Web services. IEEE Internet Computing, 6(4), 93-95. doi:10.1109/mic.2002.1020332He Q. , Yan J. , Yang Y. , Kowalczyk R. , Jin H. 2008. Chord4s: A p2p-based decentralised service discovery approach. In IEEE International Conference on Services Computing, Honolulu, Hawaii, USA, 1, 221–228.Lv Q. , Cao P. , Cohen E. , Li K. , Shenker S. 2002. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th International Conference on Supercomputing, ICS '02. ACM, 84–95.Maymounkov P. , Mazieres D. 2002. Kademlia: a peer-to-peer information system based on the xor metric. Proceedings of the 1st International Workshop on Peer-to Peer Systems (IPTPS02), Cambridge, MA, USA.Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., & Balakrishnan, H. (2001). Chord. ACM SIGCOMM Computer Communication Review, 31(4), 149-160. doi:10.1145/964723.383071Fernández A. , Ossowski S. , Vasirani M. 2008. General Architecture. CASCOM: Intelligent Service Coordination in the Semantic Web. Whitestein Series in Software Agent Technologies and Autonomic Computing, 143–160.Ding D. , Liu L. , Schmeck H. 2010. Service discovery in self-organizing service-oriented environments. In Proceedings of the 2010 IEEE Asia-Pacific Services Computing Conference. IEEE Computer Society, 717–724.Crespo A. , Garcia-Molina H. 2004. Semantic overlay networks for p2p systems. In Proceedings of the 3rd International Workshop on Agents and Peer-to-Peer Computing, Lecture Notes in Computer Science, 3601, 1–13. Springer.Rao J. , Su X. 2004. A survey of automated web service composition methods. In Proceedings of the 1st International Workshop on Semantic Web Services and Web Process Composition, SWSWPC 2004, San Diego, CA, USA, 43–54.Constantinescu I. , Faltings B. 2003. Efficient matchmaking and directory services. In Web Intelligence. IEEE Computer Society, 75–81.Cong Z. , Fernández A. 2010. Behavioral matchmaking of semantic web services. In Proceedings of the 4th International Joint Workshop on Service Matchmaking and Resource Retrieval in the Semantic Web (SMR2), Karlsruhe, Germany, 667, 131–140.Cholvi V. , Rodero-Merino L. 2007. Using random walks to find resources in unstructured self-organized p2p networks. In Proceedings of the IEEE Workshop on Dependable Application Support in Self-Organizing Networks, Edinburgh, UK, 51–56.Vázquez-Salceda J. , Vasconcelos W. W. , Padget J. , Dignum F. , Clarke S. , Roig M. P. 2010. Alive: an agent-based framework for dynamic and robust service-oriented applications. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1, AAMAS '10, International Foundation for Autonomous Agents and Multiagent Systems, 1637–1638.Liu L. , Schmeck H. 2010. Enabling self-organising service level management with automated negotiation. In Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT '10, Huang, J. X., Ghorbani, A. A., Hacid, M.-S. & Yamaguchi, T. (eds). IEEE Computer Society, 42–45.Campo C. , Martin A. , Garcia C. , Breuer P. 2002. Service discovery in pervasive multi-agent systems. In AAMAS Workshop on Ubiquitous Agents on Embedded, Wearable, and Mobile Agents, Bologna, Italy.Brazier, F. M. T., Kephart, J. O., Parunak, H. V. D., & Huhns, M. N. (2009). Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda. IEEE Internet Computing, 13(3), 82-87. doi:10.1109/mic.2009.51Bisnik N. , Abouzeid A. 2005. Modeling and analysis of random walk search algorithms in p2p networks. In Proceedings of the 2nd International Workshop on Hot Topics in Peer-to-Peer Systems, Anglano, C. & Mancini, L. V. (eds). IEEE Computer Society, 95–103.Huhns, M. N., Singh, M. P., Burstein, M., Decker, K., Durfee, E., Finin, T., … Zavala, L. (2005). Research Directions for Service-Oriented Multiagent Systems. IEEE Internet Computing, 9(6), 65-70. doi:10.1109/mic.2005.132Ben-Ami D. , Shehory O. 2005. A comparative evaluation of agent location mechanisms in large scale mas. In Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS '05, Pechoucek, M., Steiner, D. & Thompson, S. (eds). ACM, 339–346.Basters U. , Klusch M. 2006. Rs2d: Fast adaptive search for semantic web services in unstructured p2p networks. In International Semantic Web Conference, Lecture Notes in Computer Science 4273, 87–100. Springer.Barabási, A.-L., & Albert, R. (1999). Emergence of Scaling in Random Networks. Science, 286(5439), 509-512. doi:10.1126/science.286.5439.509Liu G. , Wang Y. , Orgun M. 2010. Optimal social trust path selection in complex social networks. In Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI). AAAI Press, 1391–1398.Adamic, L., & Adar, E. (2005). How to search a social network. Social Networks, 27(3), 187-203. doi:10.1016/j.socnet.2005.01.007Kalogeraki V. , Gunopulos D. , Zeinalipour-Yazti D. 2002. A local search mechanism for peer-to-peer networks. In Proceedings of the Eleventh International Conference on Information and Knowledge Management (CIKM '02). ACM, 300–307.Babaoglu O. , Meling H. , Montresor A. 2002. Anthill: a framework for the development of agent-based peer-to-peer systems. In Proceedings of the 22nd International Conference on Distributed Computing Systems, Vienna, Austria, 15–22.Yang B. , Garcia-Molina H. 2002. Efficient search in peer-to-peer networks. In Proceedings of the International Conference on Distributed Computing Systems (ICDCS).Mokhtar S. , Kaul A. , Georgantas N. , Issarny V. 2006. Towards efficient matching of semantic web service capabilities. In Proceedings of International Workshop on Web Services – Modeling and Testing, Palermo, Italy.Fernández A. , Vasirani M. , Cáceres C. , Ossowski S. 2006. Role-based service description and discovery. In AAMAS-06 Workshop on Service-Oriented Computing and Agent-Based Engineering, 1–14.Bailey J. 2006. Fast discovery of interesting collections of web services. In WI '06: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE Computer Society, 152–160.Rowstron A. I. T. , Druschel P. 2001. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Middleware '01, Sventek, J. & Coulson, G. (eds). Springer-Verlag, 329–350.Kleinberg J. 2006. Complex networks and decentralized search algorithms. In Proceedings of the International Congress of Mathematicians (ICM), Madrid, Spain.Bachlechner D. , Siorpaes K. , Fensel D. , Toma I. 2006. Web service discovery – a reality check. In Proceedings of the 3rd European Semantic Web Conference, Seoul, South Korea.Lopes, A. L., & Botelho, L. M. (2008). Improving Multi-Agent Based Resource Coordination in Peer-to-Peer Networks. Journal of Networks, 3(2). doi:10.4304/jnw.3.2.38-47Klusch M. , Fries B. , Sycara K. 2006. Automated semantic web service discovery with owls-mx. In Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS '06, Nakashima, H., Wellman, M. P., Weiss, G. & Stone, P. (eds). ACM, 915–922.Ogston E. , Vassiliadis S. 2001a. Local distributed agent matchmaking. In Proceedings of the 9th International Conference on Cooperative Information Systems, Trento, Italy.Nguyen V. , Martel C. 2005. Analyzing and characterizing small-world graphs. In SODA '05: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics.Amaral, L. A. N., & Ottino, J. M. (2004). Complex networks. The European Physical Journal B - Condensed Matter, 38(2), 147-162. doi:10.1140/epjb/e2004-00110-5Crespo A. , Garcia-Molina H. 2002. Routing Indices For Peer-to-Peer Systems. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). IEEE Computer Society, 23.Manku G. S. , Bawa M. , Raghavan P. , Inc V. 2003. Symphony: Distributed hashing in a small world. In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, Seattle, USA, 127–140.Chawathe Y. , Ratnasamy S. , Breslau L. , Lanham N. , Shenker S. 2003. Making gnutella-like p2p systems scalable. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '03, Feldmann, A., Zitterbart, M., Crowcroft, J. & Wetherall, D. (eds). ACM, 407–418.Yu S. , Liu J. , Le J. 2004. Decentralized web service organization combining semantic web and peer to peer computing. In ECOWS, Lecture Notes in Computer Science 3250, 116–127. Springer.Chaari S. , Badr Y. , Biennier F. 2008. Enhancing web service selection by qos-based ontology and ws-policy. In Proceedings of the 2008 ACM Symposium on Applied Computing, SAC '08, Wainwright, R. L. & Haddad, H. (eds). ACM, 2426–2431.Michlmayr E. 2006. Ant algorithms for search in unstructured peer-to-peer networks. In Proceedings of the 22nd International Conference on Data Engineering (ICDE), Atlanta, GA, USA.Perryea C. , Chung S. 2006. Community-based service discovery. In Proceedings of the International Conference on Web Services, Chicago, IL, USA, 903–906.Upadrashta Y. , Vassileva J. , Grassmann W. 2005. Social networks in peer-to-peer systems. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences, Big Island, Hawaii, USA.Satyanarayanan, M. (2001). Pervasive computing: vision and challenges. IEEE Personal Communications, 8(4), 10-17. doi:10.1109/98.943998Kota R. , Gibbins N. , Jennings N. R 2009. Self-organising agent organisations. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems – Volume 2, AAMAS '09. International Foundation for Autonomous Agents and Multiagent Systems, 797–804.Kleinberg, J. M. (2000). Navigation in a small world. Nature, 406(6798), 845-845. doi:10.1038/35022643Watts, D. J. (2004). The «New» Science of Networks. Annual Review of Sociology, 30(1), 243-270. doi:10.1146/annurev.soc.30.020404.104342Risson, J., & Moors, T. (2006). Survey of research towards robust peer-to-peer networks: Search methods. Computer Networks, 50(17), 3485-3521. doi:10.1016/j.comnet.2006.02.001PAPAZOGLOU, M. P., TRAVERSO, P., DUSTDAR, S., & LEYMANN, F. (2008). SERVICE-ORIENTED COMPUTING: A RESEARCH ROADMAP. International Journal of Cooperative Information Systems, 17(02), 223-255. doi:10.1142/s0218843008001816Shvaiko P. , Euzenat J. 2008. Ten challenges for ontology matching. In On the Move to Meaningful Internet Systems: OTM 2008, Meersman, R. & Tari, Z. (eds), Lecture Notes in Computer Science 5332, 1164–1182. Springer.BOCCALETTI, S., LATORA, V., MORENO, Y., CHAVEZ, M., & HWANG, D. (2006). Complex networks: Structure and dynamics. Physics Reports, 424(4-5), 175-308. doi:10.1016/j.physrep.2005.10.009Bianchini D. , Antonellis V. D. , Melchiori M. 2009. Service-based semantic search in p2p systems. In Proceedings of the 2009 Seventh IEEE European Conference on Web Services, ECOWS '09, Eshuis, R., Grefen, P. & Papadopoulos, G. A. (eds). IEEE Computer Society, 7–16.Bromuri S. , Urovi V. , Morge M. , Stathis K. , Toni F. 2009. A multi-agent system for service discovery, selection and negotiation. In Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems, Sierra, C. & Castelfranchi, C. (eds). International Foundation for Autonomous Agents and Multiagent Systems, 1395–1396.Gummadi, P. K., Saroiu, S., & Gribble, S. D. (2002). A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. ACM SIGCOMM Computer Communication Review, 32(1), 82. doi:10.1145/510726.510756Tsoumakos D. , Roussopoulos N. 2003. Adaptive probabilistic search for peer-to-peer networks. In Peer-to-Peer Computing, Linköping, Sweeden, 102–109.Schmidt, C., & Parashar, M. (2004). A Peer-to-Peer Approach to Web Service Discovery. World Wide Web, 7(2), 211-229. doi:10.1023/b:wwwj.0000017210.55153.3dDimakopoulos V. V. , Pitoura E. 2003. A peer-to-peer approach to resource discovery in multi-agent systems. In Proceedings of Cooperative Information Agents, Lecture Notes in Computer Science 2782, 62–77. Springer.Skoutas D. , Sacharidis D. , Kantere V. , Sellis T. 2008. Efficient semantic web service discovery in centralized and p2p environments. In The Semantic Web – ISWC 2008, Sheth, A., Staab, S., Dean, M., Paolucci, M., Maynard, D., Finin, T. & Thirunarayan, K. (eds), Lecture Notes in Computer Science 5318, 583–598. Springer-Verlag.Val E. D. , Rebollo M. 2007. Service Discovery and Composition in Multiagent Systems. In Proceedings of 5th European Workshop On Multi-Agent Systems (EUMAS 2007). Association Tunisienne D'Intelligence Artificielle, 197–212.Srinivasan N. , Paolucci M. , Sycara K. 2004. Adding owl-s to uddi, implementation and throughput. In First International Workshop on Semantic Web Services and Web Process Composition (SWSWPC 2004), San Diego, CA, USA.Thadakamalla, H. P., Albert, R., & Kumara, S. R. T. (2007). Search in spatial scale-free networks. New Journal of Physics, 9(6), 190-190. doi:10.1088/1367-2630/9/6/190Papazoglou, M. P., Traverso, P., Dustdar, S., & Leymann, F. (2007). Service-Oriented Computing: State of the Art and Research Challenges. Computer, 40(11), 38-45. doi:10.1109/mc.2007.400Travers, J., & Milgram, S. (1969). An Experimental Study of the Small World Problem. Sociometry, 32(4), 425. doi:10.2307/2786545Val E. D. , Rebollo M. , Botti V. 2011. Introducing homophily to improve semantic service search in a self-adaptive system. In Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems, Taipei, Taiwan.Xiao Fan Wang, & Guanrong Chen. (2003). Complex networks: Small-world, scale-free and beyond. IEEE Circuits and Systems Magazine, 3(1), 6-20. doi:10.1109/mcas.2003.1228503Argente, E., Botti, V., Carrascosa, C., Giret, A., Julian, V., & Rebollo, M. (2010). An abstract architecture for virtual organizations: The THOMAS approach. Knowledge and Information Systems, 29(2), 379-403. doi:10.1007/s10115-010-0349-1Watts, D. J. (2002). Identity and Search in Social Networks. Science, 296(5571), 1302-1305. doi:10.1126/science.1070120Simsek Ö. , Jensen D. 2005. Decentralized search in networks using homophily and degree disparity. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), Edinburgh, UK, 304–310.Vanthournout, K., Deconinck, G., & Belmans, R. (2005). A taxonomy for resource discovery. Personal and Ubiquitous Computing, 9(2), 81-89. doi:10.1007/s00779-004-0312-9Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of ‘small-world’ networks. Nature, 393(6684), 440-442. doi:10.1038/30918Wei, Y., & Blake, M. B. (2010). Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. IEEE Internet Computing, 14(6), 72-75. doi:10.1109/mic.2010.147Weyns, D., & Georgeff, M. (2010). Self-Adaptation Using Multiagent Systems. IEEE Software, 27(1), 86-91. doi:10.1109/ms.2010.18Pirró G. , Trunfio P. , Talia D. , Missier P. , Goble C. 2010. Ergot: a semantic-based system for service discovery in distributed infrastructures. In Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid), Melbourne, Australia, 263–272.Yang B. , Garcia-Molina H. 2003. Designing a super-peer network. International Conference on Data Engineering, Bangalore, India, 49.Zhang H. , Croft W. B. , Levine B. , Lesser V. 2004a. A multi-agent approach for peer-to-peer based information retrieval system. In Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems – Volume 1, AAMAS '04. IEEE Computer Society, 456–463.Zhang, H., Goel, A., & Govindan, R. (2004). Using the small-world model to improve Freenet performance. Computer Networks, 46(4), 555-574. doi:10.1016/j.comnet.2004.05.004Sycara, K., Paolucci, M., Soudry, J., & Srinivasan, N. (2004). Dynamic discovery and coordination of agent-based semantic web services. IEEE Internet Computing, 8(3), 66-73. doi:10.1109/mic.2004.1297276Dell'Amico M. 2006. Highly clustered networks with preferential attachment to close nodes. In Proceedings of the European Conference on Complex Systems 2006, Oxford, UK.Mullender, S. J., & Vitányi, P. M. B. (1988). Distributed match-making. Algorithmica, 3(1-4), 367-391. doi:10.1007/bf01762123McIlraith, S. A., Son, T. C., & Honglei Zeng. (2001). Semantic Web services. IEEE Intelligent Systems, 16(2), 46-53. doi:10.1109/5254.920599Gkantsidis, C., Mihail, M., & Saberi, A. (2006). Random walks in peer-to-peer networks: Algorithms and evaluation. Performance Evaluation, 63(3), 241-263. doi:10.1016/j.peva.2005.01.002Zhong M. 2006. Popularity-biased random walks for peer-to-peer search under the square-root principle. In Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CA, USA.Cao J. , Yao Y. , Zheng X. , Liu B. 2010. Semantic-based self-organizing mechanism for service registry and discovery. In Proceedings of the 14th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Shanghai, China, 345–350.Ratnasamy S. , Francis P. , Handley M. , Karp R. , Shenker S. 2001. A scalable content-addressable network. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '01), Cruz, R. & Varghese, G. (eds). ACM.Ouksel A. , Babad Y. , Tesch T. 2004. Matchmaking software agents in b2b markets. In Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04), Big Island, Hawaii, USA.Slivkins A. 2005. Distance estimation and object
    corecore