A survey on content-centric technologies for the current Internet: CDN and P2P solutions

A Passarella - Computer Communications, 2012 - Elsevier
One of the most striking properties of the Internet is its flexibility to accommodate features it
was not conceived for. Among the most significant examples, in this survey we consider the …

Tapestry: A resilient global-scale overlay for service deployment

BY Zhao, L Huang, J Stribling, SC Rhea… - IEEE Journal on …, 2004 - ieeexplore.ieee.org
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable,
location-independent routing of messages directly to nearby copies of an object or service …

Securing distributed storage: challenges, techniques, and systems

V Kher, Y Kim - Proceedings of the 2005 ACM workshop on Storage …, 2005 - dl.acm.org
The rapid increase of sensitive data and the growing number of government regulations that
require longterm data retention and protection have forced enterprises to pay serious …

[HTML][HTML] Handling churn in a DHT

S Rhea, D Geels, T Roscoe, J Kubiatowicz - Proceedings of the USENIX …, 2004 - usenix.org
This paper addresses the problem of churn--the continuous process of node arrival and
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …

[BOOK][B] Distributed computing: principles, algorithms, and systems

AD Kshemkalyani, M Singhal - 2011 - books.google.com
Designing distributed computing systems is a complex process requiring a solid
understanding of the design problems and the theoretical and practical aspects of their …

Looking up data in P2P systems

H Balakrishnan, MF Kaashoek, D Karger… - Communications of the …, 2003 - dl.acm.org
The main challenge in P2P computing is to design and implement a robust and scalable
distributed system composed of inexpensive, individually unreliable computers in unrelated …

Internet indirection infrastructure

I Stoica, D Adkins, S Zhuang, S Shenker… - Proceedings of the 2002 …, 2002 - dl.acm.org
Attempts to generalize the Internet's point-to-point communication abstraction to provide
services like multicast, anycast, and mobility have faced challenging technical problems and …

Koorde: A simple degree-optimal distributed hash table

MF Kaashoek, DR Karger - Peer-to-Peer Systems II: Second International …, 2003 - Springer
Koorde is a new distributed hash table (DHT) based on Chord 15 and the de Bruijn graphs
2. While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O …

[BOOK][B] Handbook of approximation algorithms and metaheuristics

TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …

Pond: The {OceanStore} Prototype

S Rhea, P Eaton, D Geels, H Weatherspoon… - … USENIX Conference on …, 2003 - usenix.org
OceanStore is an Internet-scale, persistent data store designed for incremental scalability,
secure sharing, and long-term durability. Pond is the OceanStore prototype; it contains many …