Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices
暂无分享,去创建一个
David Powell | Marc-Olivier Killijian | Ludovic Courtès | Ludovic Courtès | D. Powell | M. Killijian
[1] Mahmoud Naghshineh,et al. Bluetooth: vision, goals, and architecture , 1998, MOCO.
[2] Andrew V. Goldberg,et al. Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.
[3] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[4] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[5] Henning Schulzrinne,et al. A Performance Analysis of : A Peer-to-Peer Data Dissemination and Prefetching Tool for Mobile Users , 2003 .
[6] A. Chervenak,et al. Protecting File Systems : A Survey of Backup Techniques , 1998 .
[7] W. Kent Fuchs,et al. Message logging in mobile computing , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).
[8] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[9] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[10] Cornelia Kappler,et al. Enabling Mobile Peer-to-Peer Networking , 2004, EuroNGI Workshop.
[11] Gil Utard,et al. Data distribution in a peer to peer storage system , 2005, CCGRID.
[12] Henning Schulzrinne,et al. Seven degrees of separation in mobile ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[13] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[14] Walter F. Tichy,et al. An Empirical Study of Delta Algorithms , 1996, SCM.
[15] Mario Kolberg,et al. Tools for Peer-to-Peer Network Simulation , 2006 .
[16] Sean Quinlan,et al. Venti: A New Approach to Archival Storage , 2002, FAST.
[17] Mark Lillibridge,et al. Peer-to-peer Cooperative Backup System , 2001 .
[18] Pekka Nikander. Fault Tolerance in Decentralized and Loosely Coupled Systems , 2000 .
[19] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[21] Roger Dingledine,et al. The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .
[22] Peter A. Dinda,et al. Wayback: A User-level Versioning File System for Linux (Awarded Best Paper!) , 2004, USENIX Annual Technical Conference, FREENIX Track.
[23] Gerd Kortuem,et al. When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[24] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[25] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[26] ABS : The Apportioned Backup System , 2004 .
[27] Jonathan S. Shapiro,et al. CPCMS: A Configuration Management System Based on Cryptographic Names , 2002, USENIX Annual Technical Conference, FREENIX Track.
[28] Jason Flinn,et al. Energy-Efficiency and Storage Flexibility in the Blue File System , 2004, OSDI.
[29] Antony I. T. Rowstron,et al. PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[30] Felix C. Freiling,et al. Using Smart Cards for Fair Exchange , 2001, WELCOM.
[31] Dhiraj K. Pradhan,et al. Recoverable mobile environment: design and trade-off analysis , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.
[32] Cheng Huang,et al. STAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures , 2005, IEEE Transactions on Computers.
[33] Peter L. Reiher,et al. Roam: a scalable replication system for mobile computing , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.
[34] Brian D. Noble,et al. Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.
[35] Stefan Savage,et al. The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe , 2003, HotOS.
[36] Jean-Yves Le Boudec,et al. The Selfish Node: Increasing Routing Security for Mobile Ad Hoc Networks , 2001 .
[37] Markus Jakobsson,et al. A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.
[38] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[39] Michael Isard,et al. A Cooperative Backup System , 2003 .
[40] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[41] L. Floridi,et al. The tragedy of the digital commons , 2004, Ethics and Information Technology.
[42] Roy D. Yates,et al. The Infostations challenge: balancing cost and ubiquity in delivering wireless data , 2000, IEEE Wirel. Commun..
[43] Michael Mitzenmacher,et al. Accessing multiple mirror sites in parallel: using Tornado codes to speed up downloads , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[44] Xiaoyu Ruan,et al. S-code: new distance-3 MDS array codes , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[45] Valérie Issarny,et al. A Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability , 2003, Middleware.
[46] Randy H. Katz,et al. Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices (Special Issue on Mobile Computing) , 1997 .
[47] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[48] Masayuki Terada,et al. An Optimistic Fair Exchange Protocol for Trading Electronic Rights , 2004, CARDIS.
[49] Ion Stoica,et al. Incentives for Cooperation in Peer-to-Peer Networks , 2003 .
[50] Pietro Michiardi,et al. Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .
[51] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[52] Stefan Savage,et al. Total Recall: System Support for Automated Availability Management , 2004, NSDI.
[53] Daniel A. Spielman,et al. Efficient erasure correcting codes , 2001, IEEE Trans. Inf. Theory.
[54] Jean Arlat,et al. SURF-2: A program for dependability evaluation of complex hardware and software systems , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[55] Dan Suciu,et al. XMill: an efficient compressor for XML data , 2000, SIGMOD '00.
[56] Emil Sit,et al. A DHT-based Backup System , 2003 .
[57] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[58] Matthieu Roy,et al. Sauvegarde coopérative entre pairs pour dispositifs mobiles , 2005, UbiMob '05.
[59] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[60] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[61] Christian Grothoff,et al. An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks , 2005 .
[62] Kwong-Sak Leung,et al. Operation-based Update Propagation in a Mobile File System , 1999, USENIX Annual Technical Conference, General Track.
[63] David Mazières,et al. A low-bandwidth network file system , 2001, SOSP.
[64] G. Hardin,et al. The Tragedy of the Commons , 1968, Green Planet Blues.
[65] Antoine Vernois,et al. Data durability in peer to peer storage systems , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[66] Valérie Issarny,et al. AdHocFS: sharing files in WLANs , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[67] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[68] Jehoshua Bruck,et al. Low density MDS codes and factors of complete graphs , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[69] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[70] Michel Banâtre,et al. Ambient computing applications: an experience with the SPREAD approach , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[71] Michael Mitzenmacher,et al. Digital fountains: a survey and look forward , 2004, Information Theory Workshop.
[72] Serge Abiteboul,et al. Detecting changes in XML documents , 2002, Proceedings 18th International Conference on Data Engineering.
[73] SatyanarayananMahadev. Scalable, Secure, and Highly Available Distributed File Access , 1990 .
[74] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[75] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[76] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[77] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[78] Gaetano Borriello,et al. Peer-To-Peer Backup for Personal Area Networks , 2003 .
[79] Randal Burns,et al. Ext3cow: The Design, Implementation, and Analysis of Metadata for a Time-Shifting File System , 2003 .
[80] Christopher Batten,et al. pStore: A Secure Peer-to-Peer Backup System∗ , 2007 .
[81] Val Henson,et al. An Analysis of Compare-by-hash , 2003, HotOS.
[82] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[83] Jeff Mellen,et al. DIBS : Distributed Backup for Local Area Networks , .
[84] Ahmed Helmy. Efficient Resource Discovery in Wireless AdHoc Networks: Contacts Do Help , 2005 .
[85] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[86] Ethan L. Miller,et al. Long-Term file activity patterns in a UNIX workstation environment , 1998 .
[87] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[88] Fred Douglis,et al. Redundancy Elimination Within Large Collections of Files , 2004, USENIX Annual Technical Conference, General Track.
[89] Darrell D. E. Long,et al. Deep Store: an archival storage system architecture , 2005, 21st International Conference on Data Engineering (ICDE'05).
[90] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[91] Christian Grothoff,et al. Efficient Sharing of Encrypted Data , 2002, ACISP.
[92] Vladimiro Sassone,et al. A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[93] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[94] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[95] Ralph Deters,et al. 3LS - a peer-to-peer network simulator , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[96] Oliver P. Waldhorst,et al. A special-purpose peer-to-peer file sharing system for mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[97] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[98] Paul Mackerras,et al. The rsync algorithm , 1996 .
[99] Norman C. Hutchinson,et al. Deciding when to forget in the Elephant file system , 1999, SOSP.
[100] Tyson Condie,et al. Simulating A File-Sharing P2P Network , 2003 .
[101] Philipp Obreiter,et al. A Taxonomy of Incentive Patterns - The Design Space of Incentives for Cooperation , 2003, AP2PC.
[102] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[103] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[104] Gerd Kortuem,et al. Disseminating trust information in wearable communities , 2006, Personal Technologies.
[105] D. M. Chiu,et al. Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..
[106] Edward Grochowski,et al. Emerging Trends in Data Storage on Magnetic Hard Disk Drives , 1999 .
[107] Christian Grothoff,et al. An Encoding for Censorship-Resistant Sharing , 2005 .
[108] Kian-Lee Tan,et al. PeerStore: better performance by relaxing in peer-to-peer backup , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..
[109] Hector Garcia-Molina,et al. Bidding for storage space in a peer-to-peer data preservation system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[110] L. Buttyán,et al. Toward a Formal Model of Fair Exchange - a Game Theoretic Approach , 2000 .
[111] Heon Young Yeom,et al. An efficient recovery scheme for mobile computing environments , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.
[112] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[113] Kavitha Ranganathan,et al. Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[114] Udi Manber,et al. Finding Similar Files in a Large File System , 1994, USENIX Winter.
[115] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[116] Hein Meling,et al. Anthill: a framework for the development of agent-based peer-to-peer systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[117] Mahadev Satyanarayanan,et al. Opportunistic Use of Content Addressable Storage for Distributed File Systems , 2003, USENIX Annual Technical Conference, General Track.
[118] Krithi Ramamritham,et al. Support for Recovery in Mobile Systems , 2002, IEEE Trans. Computers.
[119] Mukesh Singhal,et al. Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..
[120] Scott Shenker,et al. Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.
[121] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[122] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[123] Michel Banâtre,et al. Collaborative backup for dependable mobile applications , 2004, MPAC '04.
[124] Fabrice Guillemin,et al. Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks , 2004, Eur. Trans. Telecommun..
[125] References , 1971 .
[126] Lihao Xu,et al. Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.
[127] Mukesh Singhal,et al. Mutable checkpoints: a new checkpointing approach for mobile computing systems , 1999, PODC '99.
[128] Dennis Kügler,et al. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks , 2003, Privacy Enhancing Technologies.