gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...
Date: Tue, 08 Apr 2003 07:39:23 -0400

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/04/08 07:39:22

Modified files:
        Documentation/misc/hemppah-progradu: masterthesis.tex 
                                             progradu.bib 

Log message:
        Continue Tommi's comments

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/masterthesis.tex.diff?tr1=1.201&tr2=1.202&r1=text&r2=text
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/progradu.bib.diff?tr1=1.117&tr2=1.118&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/masterthesis.tex
diff -u gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.201 
gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.202
--- gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.201      Tue Apr 
 8 05:25:03 2003
+++ gzz/Documentation/misc/hemppah-progradu/masterthesis.tex    Tue Apr  8 
07:39:22 2003
@@ -296,7 +296,7 @@
 approach the overlay is constructed deterministically, which all participating 
peers have to follow; the topology of the
 overlay and the placement of services is controlled tightly.
 
-\subsection{Definition}
+\subsection{Sketch of definition}
 
 In this subsection, we try to introduce a \emph{sketch} of formal definition 
of the tightly structured overlay, such as 
 identifiers, identifier space and the mapping function.
@@ -369,7 +369,7 @@
 \ref{fig:kademlia_lookup} shows the process of Kademlia's
 data lookup. Viceroy \cite{malkhi02viceroy} maintains a butterfly data 
structure (e.g., \cite{226658}), 
 which requires only a constant number of neighbor peers while providing 
$O(\log{n})$ data lookup
-efficiency. Koorde \cite{kaashoek03koorde}, a recent modification of Chord, 
uses de Bruijn graphs 
+efficiency, where $n$ is the number of peers in the system. Koorde 
\cite{kaashoek03koorde}, a recent modification of Chord, uses de Bruijn graphs 
 \cite{debruijn46graph} to maintain local routing tables. It requires 
 each peer to have only about two links to other peers to provide $O(\log{n})$ 
performance.
 
@@ -471,7 +471,8 @@
 which has initially published services into the overlay.
 
 PeerNet \cite{eriksson03peernet} differs from other tightly structured 
overlays in that it operates
-at the \emph{network} layer instead of application layer. This property would 
provide a common interface
+at the \emph{network} layer instead of application layer (see the ISO-OSI 
reference model, e.g., \cite{800902}). 
+This property would provide a common interface
 to all Peer-to-Peer systems using PeerNet. PeerNet makes an explicit 
distinction 
 between peer identity and address, which is not supported by standard
 TCP/IP-protocols. PeerNet has the same performance properties as other tightly 
structured 
@@ -542,7 +543,7 @@
 \endfirsthead
 
 \multicolumn{3}{c}%
-{{\tablename\ \thetable{} -- continued from previous page}} \\
+{{\tablename\ \thetable{} -- continued from the previous page}} \\
 \hline 
 \multicolumn{1}{|c|}{\textbf{Property}} &
 \multicolumn{1}{c|}{\textbf{Loosely structured}} &
@@ -609,9 +610,9 @@
 Table \ref{table_Peer-to-Peer_algorithms} lists proposed Peer-to-Peer 
algorithms 
 and their key properties with regard to performance and scalability. The list 
 includes algorithms from both loosely and tightly structured approaches. The 
list doesn't 
-include \emph{all} proposed Peer-to-Peer algorithms. Only the ones which 
already have 
+include \emph{all} proposed Peer-to-Peer algorithms; only the ones which 
already have 
 been widely deployed, or the ones which may be promising in the future 
-Peer-to-Peer systems are included in this thesis.
+Peer-to-Peer systems are included.
  
 We decided to follow the guidelines from \cite{kaashoek03koorde} in measuring
 the properties of different Peer-to-Peer systems. However, we dropped
@@ -641,7 +642,7 @@
 \endfirsthead
 
 \multicolumn{6}{c}%
-{{\tablename\ \thetable{} -- continued from previous page}} \\
+{{\tablename\ \thetable{} -- continued from the previous page}} \\
 \hline 
 \multicolumn{1}{|c|}{\textbf{Algorithm}} &
 \multicolumn{1}{c|}{\textbf{Insert/Delete}} &
@@ -659,15 +660,15 @@
 \parbox{37pt}{$O$($d$)} &
 \parbox{37pt}{$O(dn^{\frac{1}{d}})$} &
 \parbox{85pt}{2$d$} &
-\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly. $d$ is the dimension of virtual key 
space}
+\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly. $d$ is the dimension of virtual key 
space.}
 \\ \hline
 
 \parbox{37pt}{Chord \cite{stoica01chord}} &
 \parbox{37pt}{$O(\log^2{n})$} &
-\parbox{37pt}{$O(\log{n}$} &
+\parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{85pt}{2$(\log{n})$} &
-\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly}
+\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly.}
 \\ \hline
 
 
@@ -675,8 +676,8 @@
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(n)$} &
-\parbox{85pt}{Typical configuration e.g., {4--150}} &
-\parbox{85pt}{Average lookup performance is $O(\log{n})$ with tens of 
thousands concurrent users, beyond that, the performance is $O(n)$}
+\parbox{85pt}{Typical configuration e.g., {4--150}.} &
+\parbox{85pt}{Average lookup performance is $O(\log{n})$ with tens of 
thousands concurrent users; beyond that, the performance is $O(n)$.}
 \\ \hline
 
 
@@ -684,8 +685,8 @@
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(n)$} &
-\parbox{85pt}{Typical configuration is 5 connections (2*5=10 total), however, 
this depends on implementation} &
-\parbox{85pt}{Number of messages can grow as fast as $O(n^{2})$}
+\parbox{85pt}{Typical configuration is 5 connections (2*5=10 total), however, 
this depends on implementation.} &
+\parbox{85pt}{Number of messages can grow as fast as $O(n^{2})$.}
 \\ \hline
 
 
@@ -694,7 +695,7 @@
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{85pt}{$2(\log{n})$} &
-\parbox{85pt}{There is no action required when peers leave the system}
+\parbox{85pt}{There is no action required when peers leave the system.}
 \\ \hline
 
 
@@ -702,8 +703,8 @@
 \parbox{37pt}{$O(2(\sqrt{n}*(log^2{n})) + (\sqrt{n} + (log^3{n})))$} &
 \parbox{37pt}{$O$($\sqrt{n}$)} &
 \parbox{37pt}{$O(1)$} &
-\parbox{85pt}{$\frac{n}{\sqrt{n}} + c*(\sqrt{n}-1) + \frac{Totalnumber of 
files}{\sqrt{n}}$, where n is the number of peers and c the number of 
contacts/foreign affinity group} &
-\parbox{85pt}{Insert/delete overhead is constant and performed in the 
background, system performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly}
+\parbox{85pt}{$\frac{n}{\sqrt{n}} + c*(\sqrt{n}-1) + \frac{Totalnumber of 
files}{\sqrt{n}}$, where n is the number of peers and c the number of 
contacts/foreign affinity group.} &
+\parbox{85pt}{Insert/delete overhead is constant and performed in the 
background. System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly.}
 \\ \hline
 
 \parbox{37pt}{Koorde \cite{kaashoek03koorde}} &
@@ -711,7 +712,7 @@
 \parbox{37pt}{$O(1)$ or $O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$ or $O(\frac{\log{n}}{\log{}\log{n}})$} &
 \parbox{85pt}{$2(\log{n})$} &
-\parbox{85pt}{Based on Chord algorithm, uses de Bruijn graphs for better 
efficiency and fault tolerance}
+\parbox{85pt}{Based on Chord algorithm, uses de Bruijn graphs for better 
efficiency and fault tolerance.}
 \\ \hline
 
 \parbox{37pt}{ODHDHT \cite{naor03simpledht}} &
@@ -727,8 +728,8 @@
 \parbox{37pt}{$O(\log^2{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
-\parbox{85pt}{$(2^{b - 1})\frac{\log{n}}{b}$, where $b$ is a configurable 
parameter for tuning digit-fixing properties (routing table)} &
-\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly, based on Plaxton's algorithm}
+\parbox{85pt}{$(2^{b - 1})\frac{\log{n}}{b}$, where $b$ is a configurable 
parameter for tuning digit-fixing properties (routing table).} &
+\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly; based on Plaxton's algorithm.}
 \\ \hline
 
 
@@ -737,7 +738,7 @@
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{85pt}{$O(\log{n})$} &
-\parbox{85pt}{Operates at network layer}
+\parbox{85pt}{Operates at network level layer.}
 \\ \hline
 
 \parbox{37pt}{Plaxton \cite{plaxton97accessingnearby}} &
@@ -745,15 +746,15 @@
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{85pt}{$O(\log{n})$} &
-\parbox{85pt}{Plaxton's algorithm is designed to operate in static environment 
(e.g., web cache)}
+\parbox{85pt}{Plaxton's algorithm is designed to operate in static environment 
(e.g., web cache).}
 \\ \hline
 
 \parbox{37pt}{Skip Graphs \cite{AspnesS2003}} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
-\parbox{85pt}{$4r(\log{n}) + (\log{n})$, where r=number of resources 
provided)} &
-\parbox{85pt}{In this approach peer is treated as ''named resource''}
+\parbox{85pt}{$4r(\log{n}) + O(\log{n})$, where r=number of resources 
provided.} &
+\parbox{85pt}{In this approach peer is treated as ''named resource''.}
 \\ \hline
 
 \parbox{37pt}{SkipNet \cite{harvey03skipnet2}} &
@@ -761,31 +762,31 @@
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{85pt}{$2(\log{n})$} &
-\parbox{85pt}{Partially supports underlying network's locality properties} 
+\parbox{85pt}{Partially supports underlying network's locality properties.} 
 \\ \hline
 
 \parbox{37pt}{Social \cite{alpineurl}} &
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(n)$} &
-\parbox{85pt}{Can be 1-10000 connections (as known as ''social'' connections, 
connections are permanent)} &
-\parbox{85pt}{Number of connections number depends on peer's memory/network 
capabilities}
+\parbox{85pt}{Can be 1-10000 connections (as known as ''social'' connections, 
connections are permanent).} &
+\parbox{85pt}{Number of connections depends on peer's memory/network 
capabilities.}
 \\ \hline
 
 \parbox{37pt}{Symphony \cite{gurmeet03symphony}} &
 \parbox{37pt}{$O(\log^2{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
-\parbox{85pt}{$2k+2+f$, where k = long range connections, 2 = peer's 
neighbors, f = fault tolerance connections)} &
-\parbox{85pt}{Space can also be $O(1)$. Additional space of can be used as a 
lookahead list for better performance}
+\parbox{85pt}{$2k+2+f$, where k = long range connections, 2 = peer's 
neighbors, f = fault tolerance connections).} &
+\parbox{85pt}{Space can also be $O(1)$. Additional space of can be used as a 
lookahead list for better performance.}
 \\ \hline
 
 \parbox{37pt}{SWAN \cite{bonsma02swan}} &
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(\log^2{n})$} &
-\parbox{85pt}{$r(2b+2s+2l)$ (where r=number of resources provided, b=boot 
connections, s=short range connections, l=long range connections), typical 
connection configuration: 2*(6+7+8)=36} &
-\parbox{85pt}{In this approach, peer is treated as ''named resource''}
+\parbox{85pt}{$r(2b+2s+2l)$ (where r=number of resources provided, b=boot 
connections, s=short range connections, l=long range connections), typical 
connection configuration: 2*(6+7+8)=36.} &
+\parbox{85pt}{In this approach, peer is treated as ''named resource''.}
 \\ \hline
 
 
@@ -793,8 +794,8 @@
 \parbox{37pt}{$O(\log^2{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{37pt}{$O(\log{n})$} &
-\parbox{85pt}{$(2^{b - 1})\frac{\log{n}}{b}$, where $b$ is a configurable 
parameter for tuning digit-fixing properties (routing table)} &
-\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly, based on Plaxton's algorithm}
+\parbox{85pt}{$(2^{b - 1})\frac{\log{n}}{b}$, where $b$ is a configurable 
parameter for tuning digit-fixing properties (routing table).} &
+\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly, based on Plaxton's algorithm.}
 \\ \hline
 
 \parbox{37pt}{Viceroy \cite{malkhi02viceroy}} &
@@ -802,7 +803,7 @@
 \parbox{37pt}{$O(1)$} &
 \parbox{37pt}{$O(\log{n})$} &
 \parbox{85pt}{11} &
-\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly, not necessarily fault-tolerant 
because of constant degree of neighbors}
+\parbox{85pt}{System performance may decrease if peers are not homogeneous and 
peers join and leave the system constantly, not necessarily fault-tolerant 
because of constant degree of neighbors.}
 \\ \hline
 
 
@@ -829,8 +830,8 @@
 open problems to be solved. Also, many techniques developed for traditional 
distributed
 systems may no longer apply with Peer-to-Peer systems, e.g., load balancing 
techiques \cite{byers03dhtbalancing}. 
 
-Different problems apply to both the loosely structured and the tightly 
structured approach have their own specific problems. 
-Since the introduction of Gnutella \cite{gnutellaurl}, the main concern has 
been the scalability problem of loosely structured 
+Different problems apply to both the loosely structured and the tightly 
structured approach. 
+For instance, since the introduction of Gnutella \cite{gnutellaurl}, the main 
concern has been the scalability problem of loosely structured 
 systems. However, the scalability problem of the loosely structured is often 
misunderstood; 
 \emph{the network overlay} of loosely structured systems is scalable, but the 
\emph{data lookup model} is not as
 the data lookup process creates lot of extra network traffic (e.g., 
\cite{yang02improvingsearch}). 
@@ -881,23 +882,23 @@
 Naor et al. \cite{naor03simpledht} have proposed a partial solution against 
Spam attack in a \emph{faulty} peer environment (not hostile).
 
 Overloading of targeted peers is a form of Distributed Denial of Service 
attack (DDoS) (see, e.g., \cite{372148}). For instance, 
-a hostile entity can attempt to burden targeted peers with garbage network 
packets. As a consequence, peers may act incorrectly or 
+a hostile entity can attempt to burden specific peers with garbage network 
packets. As a consequence, peers may act incorrectly or 
 stop working. Daswani et al. \cite{daswani02queryflooddos} suggest efficient 
load balancing 
 policies for Peer-to-Peer system in order to prevent massive system failures. 
They suggest a traffic model 
 that can be used to understand the effects of DDoS attacks. Sit et al. 
\cite{sit02securitycons} 
 suggest that identifier assignment algorithm for peers would assign identifier 
with respect to network topology 
-and that replicas should be located physically to different locations.
+and that replicas of data should be located physically to different locations.
 
 
 \subsection{Trust management, data authenticity and integrity}
 
 According to \cite{aberer01trust}, mutual trust ''...allows agents to 
cooperate in a game-theoretic situation that corresponds 
 to the repeated prisoners dilemma and leads in the long term to an increased 
aggregated utility for the participating agents''. 
-The authors of \cite{aberer01trust} define \emph{trust management} as a 
mechanism that allows to establish mutual trust. Furthermore, \emph{reputation} 
is a measure
+The authors of \cite{aberer01trust} define \emph{trust management} as a 
mechanism that allows one to establish mutual trust. Furthermore, 
\emph{reputation} is a measure
 that is derived from knowledge on interactions in the past 
\cite{aberer01trust}. In this subsection, we discuss mechanisms to maintain
 trust in Peer-to-Peer systems.
 
-Trust in Peer-to-Peer systems is based on \emph{reputation}. Little research 
has been done on reputation models in Peer-to-Peer 
+Trust in Peer-to-Peer systems is based on \emph{reputation}. Little research 
has been done on the reputation models in Peer-to-Peer 
 systems, such as \cite{aberer01trust}, \cite{cornelli02reputableservents}. In 
\cite{aberer01trust}, authors present a scalable
 trust management model, which can be used in Peer-to-Peer enviroment. Authors 
in \cite{cornelli02reputableservents}
 suggest techniques to keep track and share information about the reputation of 
a peer with others peers. 
@@ -905,8 +906,7 @@
 Quite recently, widely used Public Key Infrastructure (PKI) has been deployed 
in distributed
 systems \cite{rivest96sdsi}, \cite{spkiworkinggroup}. PKI is a reliable 
technology for securing
 data in computing systems, such as the Internet. However, in Peer-to-Peer 
-networks, the problem of key-based security mechanism may be the maintenance 
of keys as participating
-peers constantly join and leave the system, i.e., the revocation of keys and 
the 
+networks, the problem of key-based security mechanism may be the revocation of 
keys and the 
 distribution of new keys in a hostile environment \cite{KohMau99}.
 
 ConChord \cite{ajmani02conchord} is the first Peer-to-Peer system which has a 
support for PKI based
@@ -948,7 +948,7 @@
 
 Even if many existing Peer-to-Peer systems are able to provide some of the 
types of anonymity, there is no
 such system which is able to provide complete anonymity in all levels (see 
above). Specifically, the conflicts
-between anonymity and other properties of Peer-to-Peer system require more 
research work.
+between anonymity and other properties of Peer-to-Peer systems require more 
research work.
 
 
 \subsection{Access control}
@@ -1006,7 +1006,7 @@
 $h$ is the number of hops in the overlay. Sit and Morris 
\cite{sit02securitycons} discuss the possibility of 
 allowing the query originator to observe lookup progress and cross-check 
routing tables using random queries to achieve
 secure routing in tightly structured overlay. However, their
-approach is not very efficient, since this method creates lot of additional 
network traffic when
+approach is not very efficient, since this method creates a lot of additional 
network traffic when
 in function i.e., it is unknown if this technique is realizable in an 
efficient way.
 Lynch et al. \cite{lynch02atomicdataaccess} propose a solution for secure 
routing table 
 maintenance, but their solution seems to have two major problems according to 
\cite{castro02securitystructured}. 
@@ -1047,7 +1047,7 @@
 \endfirsthead
 
 \multicolumn{4}{c}%
-{{\tablename\ \thetable{} -- continued from previous page}} \\
+{{\tablename\ \thetable{} -- continued from the previous page}} \\
 \hline \multicolumn{1}{|c|}{\textbf{Problem}} &
 \multicolumn{1}{c|}{\textbf{Problem description}} &
 \multicolumn{1}{c|}{\textbf{Solutions}} &
@@ -1061,86 +1061,86 @@
 
 \parbox{90pt}{Query routing \cite{sit02securitycons, aspnes02faultrouting, 
castro02securerouting, ratnasamy02routing, gavoille01routing,
 lynch02atomicdataaccess, fiat02censorship, saia02dynamicfaultcontentnetwork, 
datar02butterflies}} &                    
-\parbox{110pt}{Incorrect forwarding (hostile), incorrect routing (hostile)} &
-\parbox{110pt}{Query monitoring, cross check routing tables, verify routing 
tables, create routing table invariants} &
-\parbox{110pt}{Increases system complexity} 
+\parbox{110pt}{Incorrect forwarding (hostile), incorrect routing (hostile).} &
+\parbox{110pt}{Query monitoring, cross check routing tables, verify routing 
tables, create routing table invariants.} &
+\parbox{110pt}{Increases system complexity.} 
 \\ \hline
 
 
 \parbox{90pt}{DoS attack \cite{sit02securitycons, 
saia02dynamicfaultcontentnetwork, datar02butterflies, daswani02queryflooddos, 
juels99clientpuzzles}} &
-\parbox{110pt}{Distributed, controlled burden against specific computer(s)} &
-\parbox{110pt}{Client puzzles, load balancing, traffic measurements, traffic 
models, replication} &
-\parbox{110pt}{Only partial solutions, traffic models most effective}
+\parbox{110pt}{Distributed, controlled burden against specific computer(s).} &
+\parbox{110pt}{Client puzzles, load balancing, traffic measurements, traffic 
models, replication.} &
+\parbox{110pt}{Only partial solutions, traffic models most effective.}
 \\ \hline 
 
 
 \parbox{90pt}{Sybil attack \cite{douceur02sybil, castro02securerouting}} &
-\parbox{110pt}{Single hostile entity presents multiple entities} &
-\parbox{110pt}{Identify all peers simultaneously across the system, collect 
pool of peers which are validated, distributed peer ID creation} &
-\parbox{110pt}{Not practically realizable, research focused on persistence, 
not on identity distinction}
+\parbox{110pt}{Single hostile entity presents multiple entities.} &
+\parbox{110pt}{Identify all peers simultaneously across the system, collect 
pool of peers which are validated, distributed peer ID creation.} &
+\parbox{110pt}{Not practically realizable, research focused on persistence, 
not on identity distinction.}
 \\ \hline 
 
 
 \parbox{90pt}{Spam attack \cite{naor03simpledht}} &
-\parbox{110pt}{Hostile entity creates false versions of data, or gives wrong 
information about the data which entity is responsible for/knows about} &
-\parbox{110pt}{Do not trust to single entity, get information from multiple 
entities, trust on majority's opinion} &
-\parbox{110pt}{Easy to implement, creates more network traffic} 
+\parbox{110pt}{Hostile entity creates false versions of data, or gives wrong 
information about the data which entity is responsible for/knows about.} &
+\parbox{110pt}{Do not trust to single entity, get information from multiple 
entities, trust on majority's opinion.} &
+\parbox{110pt}{Easy to implement, creates more network traffic.} 
 \\ \hline
 
 
 \parbox{90pt}{Entity identification \cite{ajmani02conchord}, 
\cite{douceur02sybil}} &
-\parbox{110pt}{Identify participating entities reliably and efficiently        
} &
-\parbox{110pt}{Digital signatures, key infrastructure} &
-\parbox{110pt}{Not practically realizable}
+\parbox{110pt}{Identify participating entities reliably and efficiently.} &
+\parbox{110pt}{Digital signatures, key infrastructure.} &
+\parbox{110pt}{Not practically realizable.}
 \\ \hline
 
 
 \parbox{90pt}{Data integrity/authenticity \cite{fips-sha-1}, 
\cite{rivest96sdsi}, \cite{spkiworkinggroup}} &
-\parbox{110pt}{Integrity/originality of data is unknown} &
-\parbox{110pt}{Cryptographic content hashes, key architectures} &
-\parbox{110pt}{For data integrity, there are working solutions, but for data 
authenticity, some of the solutions are partial, which may be practically 
realizable}
+\parbox{110pt}{Integrity/originality of data is unknown.} &
+\parbox{110pt}{Cryptographic content hashes, key architectures.} &
+\parbox{110pt}{For data integrity, there are working solutions, but for data 
authenticity, some of the solutions are partial, which may be practically 
realizable.}
 \\ \hline
 
 
 \parbox{90pt}{Anonymity \cite{dingledine00free, tarzan:ccs9, pub00, 
clarke00freenet, reiter98crowds, 352607, 502002}} &
-\parbox{110pt}{Anonymity cannot be provided in all cases} &
-\parbox{110pt}{Remailers, pre-routing} &
-\parbox{110pt}{Total anonymity cannot be provided yet}
+\parbox{110pt}{Anonymity cannot be provided in all cases.} &
+\parbox{110pt}{Remailers, pre-routing.} &
+\parbox{110pt}{Total anonymity cannot be provided yet.}
 \\ \hline
 
 
 \parbox{90pt}{Malicious peers \cite{sit02securitycons, castro02securerouting}} 
&
 \parbox{110pt}{How to identify malicious peers in the system ?} &
-\parbox{110pt}{Create invariants for peer behavior, verify invariants, 
self-certifying data} &
-\parbox{110pt}{Partial solutions, self-certifying data most reliable}
+\parbox{110pt}{Create invariants for peer behavior, verify invariants, 
self-certifying data.} &
+\parbox{110pt}{Partial solutions, self-certifying data most reliable.}
 \\ \hline
 
 
 \parbox{90pt}{Access Control \cite{nejdl03accesscontrol, 
daswani03openproblems}} &
 \parbox{110pt}{Can we define access control levels in Peer-to-Peer network ?} &
-\parbox{110pt}{Schema-based rules} &
-\parbox{110pt}{Some initial experiences, needs more research}
+\parbox{110pt}{Schema-based rules.} &
+\parbox{110pt}{Some initial experiences, needs more research.}
 \\ \hline
 
 
 \parbox{90pt}{Inconsistent behavior \cite{sit02securitycons}} &
-\parbox{110pt}{Hostile peer could act correctly with its neighbors, but 
incorrectly with others} &
-\parbox{110pt}{Public keys, digital signatures} &
-\parbox{110pt}{Not practical approach/working proposal created yet}
+\parbox{110pt}{Hostile peer could act correctly with its neighbors, but 
incorrectly with others.} &
+\parbox{110pt}{Public keys, digital signatures.} &
+\parbox{110pt}{Not practical approach/working proposal created yet.}
 \\ \hline
 
 
 \parbox{90pt}{Hostile groups \cite{castro02securerouting}} &
-\parbox{110pt}{Joining peer may join parallel network, formed a group of 
hostile peers, hostile peer(s) controls the construction of the network} &
-\parbox{110pt}{Use trusted peers, based on history information, cryptography, 
key infrastructure} &
-\parbox{110pt}{Not 100\% sure if Central Authority (CA) is missing, not 
practical approach/working proposal created yet}
+\parbox{110pt}{Joining peer may join parallel network, formed a group of 
hostile peers, hostile peer(s) controls the construction of the network.} &
+\parbox{110pt}{Use trusted peers, based on history information, cryptography, 
key infrastructure.} &
+\parbox{110pt}{Not 100\% sure if Central Authority (CA) is missing, not 
practical approach/working proposal created yet.}
 \\ \hline
 
 
 \parbox{90pt}{External security threats \cite{grahamp2psecurity}} &
-\parbox{110pt}{Viruses, trojans, sniffers} &
-\parbox{110pt}{Data integrity/authenticity, distributed anti virus software} &
-\parbox{110pt}{Not much research has been done on this area}
+\parbox{110pt}{Viruses, trojans, sniffers.} &
+\parbox{110pt}{Data integrity/authenticity, distributed anti virus software.} &
+\parbox{110pt}{Not much research has been done on this area.}
 \\ \hline
 
 \caption{Security problems in Peer-to-Peer.} 
@@ -1237,7 +1237,7 @@
 is designed for the CAN system \cite{ratnasamy01can}.
 
 Recent study has been focused on the feasibility of Peer-to-Peer Web-like 
indexing and searching 
-on top of tightly structured overlays \cite{li03feasibility}. Authors argue, 
that it is possible to implement 
+on top of tightly structured overlays \cite{li03feasibility}. Authors argue 
that it is possible to implement 
 Peer-to-Peer Web-like search with certain compromises. First, Peer-to-Peer 
search engine may need to 
 decrease the result quality in order to make searching more efficient. Second, 
Peer-to-Peer systems must 
 consult the properties of underlying network for better performance.
@@ -1336,7 +1336,7 @@
 \endfirsthead
 
 \multicolumn{4}{c}%
-{{\tablename\ \thetable{} -- continued from previous page}} \\
+{{\tablename\ \thetable{} -- continued from the previous page}} \\
 \hline \multicolumn{1}{|c|}{\textbf{Problem}} &
 \multicolumn{1}{c|}{\textbf{Problem description}} &
 \multicolumn{1}{c|}{\textbf{Solutions}} &
@@ -1348,9 +1348,9 @@
                
 \parbox{90pt}{Web indexing and searching \cite{li03feasibility, 
Bhattacharjee03resultcache, 362692, CuencaAcuna2002DSIWorkshop, 
 rhea02probabilistic, joseph02neurogrid, crespo02semanticoverlay, 
joseph02p2players, chord:om_p-meng, wittengigabytes, 338634}} &
-\parbox{110pt}{Perform Web like searches in Peer-to-Peer network} &
-\parbox{110pt}{Data compression, view trees, bloom filters and its variations, 
gap compression, index intersection optimizations, clustering} &
-\parbox{110pt}{Effective but complex solutions, some compromises have to be 
done (decrease result quality, modify overlay's structure), more research 
needed}
+\parbox{110pt}{Perform Web like searches in Peer-to-Peer network.} &
+\parbox{110pt}{Data compression, view trees, bloom filters and its variations, 
gap compression, index intersection optimizations, clustering.} &
+\parbox{110pt}{Effective but complex solutions, some compromises have to be 
done (decrease result quality, modify overlay's structure), more research 
needed.}
 \\ \hline
 
 
@@ -1359,90 +1359,90 @@
 ramanathan02goodpeers, kleinberg99small, nips02-Kleinberg, zhang02using, 
watts00dynamics, karger02findingnearest, 
 brinkmann02compactplacement, rhea02probabilistic, castro02networkproximity, 
ng02predicting, pias03lighthouse, waterhouse02searchp2p, botros01jxtasearch, 
 ganesan02yappers}} &
-\parbox{110pt}{Find resource efficiently, if resource exists (loosely 
structured)} &
-\parbox{110pt}{Super peers, peer clusters, caching techniques} &
-\parbox{110pt}{More efficient, less network traffic, not comparable to the 
efficiency of tightly structured systems}
+\parbox{110pt}{Find resource efficiently, if resource exists (loosely 
structured).} &
+\parbox{110pt}{Super peers, peer clusters, caching techniques.} &
+\parbox{110pt}{More efficient, less network traffic, not comparable to the 
efficiency of tightly structured systems.}
 \\ \hline
 
 
 \parbox{90pt}{Richness of queries \cite{harren02complex, 
ansaryefficientbroadcast03, andrzejak02rangequeries}} &
-\parbox{110pt}{Query languages should be more powerful in tightly structured 
overlays} &
-\parbox{110pt}{SQL-like queries} &
-\parbox{110pt}{Hard to implement, increases system complexity, not much 
research has been done}
+\parbox{110pt}{Query languages should be more powerful in tightly structured 
overlays.} &
+\parbox{110pt}{SQL-like queries.} &
+\parbox{110pt}{Hard to implement, increases system complexity, not much 
research has been done.}
 \\ \hline
 
 
 \parbox{90pt}{Robustness \cite{datar02butterflies, 
saia02dynamicfaultcontentnetwork, fiat02censorship, aspnes02faultrouting, 
albert-00-tolerance, libennowell01observations}} &
 \parbox{110pt}{How well system performs under hostile attacks/in the case of 
severe failure ?} &
-\parbox{110pt}{Self-tuning, backup links, use diverse routing paths, power-law 
networks/properties} &
-\parbox{110pt}{Working solutions}
+\parbox{110pt}{Self-tuning, backup links, use diverse routing paths, power-law 
networks/properties.} &
+\parbox{110pt}{Partially working solutions.}
 \\ \hline
 
 
 \parbox{90pt}{Quality of Service} &
-\parbox{110pt}{The system can only provide (at most) best effort services} &
-\parbox{110pt}{Use network proximity for better network performance 
(bandwidth, latency, jitter, packet loss)} &
-\parbox{110pt}{Increases system complexity, some initial experiences, need 
more research}
+\parbox{110pt}{The system can only provide (at most) best effort services.} &
+\parbox{110pt}{Use network proximity for better network performance 
(bandwidth, latency, jitter, packet loss).} &
+\parbox{110pt}{Increases system complexity, some initial experiences, need 
more research.}
 \\ \hline
 
 
 \parbox{90pt}{Data availability/persistence \cite{bhagwan03availability}} &
-\parbox{110pt}{Data might be temporarily unavailable, or lost permanently} &
-\parbox{110pt}{Data caching, data replication} &
-\parbox{110pt}{Working solutions, but creates more traffic and overhead per 
peer}
+\parbox{110pt}{Data might be temporarily unavailable, or lost permanently.} &
+\parbox{110pt}{Data caching, data replication.} &
+\parbox{110pt}{Working solutions, but creates more traffic and overhead per 
peer.}
 \\ \hline
 
 
 \parbox{90pt}{Network proximity \cite{pias03lighthouse, ng02predicting, 
ratnasamy02ght, eriksson03peernet, castro02networkproximity}} &
 \parbox{110pt}{Can we take into account the underlying network's properties 
better when forming overlay network (network-awareness for performance) ?} &
-\parbox{110pt}{Global network positioning, lighthouse technique, triangulated 
heuristics} &
-\parbox{110pt}{Increases system complexity, no real world experience in a wide 
scale, proposed solutions are susceptible to single point of failure}
+\parbox{110pt}{Global network positioning, lighthouse technique, triangulated 
heuristics.} &
+\parbox{110pt}{Increases system complexity, no real world experience in a wide 
scale, proposed solutions are susceptible to single point of failure.}
 \\ \hline
 
 
 \parbox{90pt}{Locality \cite{keleher-02-p2p, hildrum02distributedobject, 
freedman02trie, sloppy:iptps03, plaxton97accessingnearby, 
karger02findingnearest}} &
 \parbox{110pt}{Could tightly structured systems exploit locality properties 
better ?} &
-\parbox{110pt}{Constrained Load Balancing, using network properties for 
nearest neighbor selection, self-organizing clusters} &
-\parbox{110pt}{Working solutions}
+\parbox{110pt}{Constrained Load Balancing, using network properties for 
nearest neighbor selection, self-organizing clusters.} &
+\parbox{110pt}{Partially working solutions.}
 \\ \hline
 
 
 \parbox{90pt}{Hot spots \cite{258660, sloppy:iptps03, 
maymounkov03ratelesscodes}} &
 \parbox{110pt}{What will happen if some resource is extremely popular and only 
one peer is hosting it ?} &
-\parbox{110pt}{Caching, multisource downloads, replication, load balancing, 
sloppy hashing} &
-\parbox{110pt}{For query hot spots, caching and multisource downloads 
efficiently reduce hot spots, for routing hot spots, benefits are smaller}
+\parbox{110pt}{Caching, multisource downloads, replication, load balancing, 
sloppy hashing.} &
+\parbox{110pt}{For query hot spots, caching and multisource downloads 
efficiently reduce hot spots, for routing hot spots, benefits are smaller.}
 \\ \hline
 
 
 \parbox{90pt}{Load balancing \cite{rao03loadbalancing, ledlie02selfp2p, 
byers03dhtbalancing}} &
-\parbox{110pt}{Random (but uniformly distributed) identifier selection could 
cause system inbalance among participants with different capabilities} &
-\parbox{110pt}{Caching, virtual server transfers} &
-\parbox{110pt}{Effective, more research required in fully dynamic environment}
+\parbox{110pt}{Random (but uniformly distributed) identifier selection could 
cause system inbalance among participants with different capabilities.} &
+\parbox{110pt}{Caching, virtual server transfers.} &
+\parbox{110pt}{Effective, more research required in fully dynamic environment.}
 \\ \hline
 
 \parbox{90pt}{System in flux \cite{libennowell01observations, 571863, 
ledlie02selfp2p, albert-02-statistical}} &
 \parbox{110pt}{Peers join and leave system constantly. What about load 
balancing and performance ?} &
-\parbox{110pt}{Half-life phenomenon (for analysis), simple overlay maintenance 
and construction algorithm} &
-\parbox{110pt}{Initial theoretical analysis have been created, but not 
comprehensive model for analyzing different system states and its variations 
(e.g. complex usage patterns)}
+\parbox{110pt}{Half-life phenomenon (for analysis), simple overlay maintenance 
and construction algorithm.} &
+\parbox{110pt}{Initial theoretical analysis have been created, but not 
comprehensive model for analyzing different system states and its variations 
(e.g. complex usage patterns).}
 \\ \hline
 
 \parbox{90pt}{Sudden network partition \cite{harvey03skipnet1, 
harvey03skipnet2, rowston03controlloingreliability}} &
-\parbox{110pt}{Sub network is isolated from other network because of network 
disconnection} &
-\parbox{110pt}{Self-tuning, environment observation, localized network 
connection for minimum latency (backup connections)} &
-\parbox{110pt}{Creates more overhead/space requirements per peer}
+\parbox{110pt}{Sub network is isolated from other network because of network 
disconnection.} &
+\parbox{110pt}{Self-tuning, environment observation, localized network 
connection for minimum latency (backup connections).} &
+\parbox{110pt}{Creates more overhead/space requirements per peer.}
 \\ \hline
 
 \parbox{90pt}{Fail Stop \cite{rowston03controlloingreliability, zhang03somo}} &
-\parbox{110pt}{A faulty peer stops working} &
-\parbox{110pt}{Failure detectors, informing algorithms} &
-\parbox{110pt}{Creates more network traffic, peer's information can be 
outdated, failure detectors not reliable}
+\parbox{110pt}{A faulty peer stops working.} &
+\parbox{110pt}{Failure detectors, informing algorithms.} &
+\parbox{110pt}{Creates more network traffic, peer's information can be 
outdated, failure detectors not reliable.}
 \\ \hline
 
 
 \parbox{90pt}{Byzantine faults \cite{296824}} &
-\parbox{110pt}{Faulty peers may behave arbitrarily} &
-\parbox{110pt}{Byzantine replication algorithms, get information from multiple 
entities, trust majority's opinion} &
-\parbox{110pt}{Much research has been done on this field, practical solutions, 
decreases system performance slightly}
+\parbox{110pt}{Faulty peers may behave arbitrarily.} &
+\parbox{110pt}{Byzantine replication algorithms, get information from multiple 
entities, trust majority's opinion.} &
+\parbox{110pt}{Much research has been done on this field, practical solutions, 
decreases system performance slightly.}
 \\ \hline
 
 \caption{Performance and usability problems in Peer-to-Peer.} 
@@ -1525,7 +1525,7 @@
 \endfirsthead
 
 \multicolumn{4}{c}%
-{{\tablename\ \thetable{} -- continued from previous page}} \\
+{{\tablename\ \thetable{} -- continued from the previous page}} \\
 \hline \multicolumn{1}{|c|}{\textbf{Problem}} &
 \multicolumn{1}{c|}{\textbf{Problem description}} &
 \multicolumn{1}{c|}{\textbf{Solutions}} &
@@ -1537,50 +1537,50 @@
 
 
 \parbox{90pt}{Mutual distrust \cite{cornelli02reputableservents, 
aberer01trust}} &
-\parbox{110pt}{Nobody trusts anybody} &
-\parbox{110pt}{Reputation methods, key infrastructures} &
-\parbox{110pt}{Resource demanding, not practical to implement/not working 
solutions, no real world experience in a wide scale}
+\parbox{110pt}{Nobody trusts anybody.} &
+\parbox{110pt}{Reputation methods, key infrastructures.} &
+\parbox{110pt}{Resource demanding, not practical to implement/not working 
solutions, no real world experience in a wide scale.}
 \\ \hline
 
 
 \parbox{90pt}{Lack of motivation to cooperate \cite{golle01incentivesp2p, 
ngan03enforcefile, shneidman03rationality}} &
-\parbox{110pt}{All participants do not behave like they should be, instead 
they go for own profit} &
-\parbox{110pt}{Different reputation methods} &
-\parbox{110pt}{No real world experience in a wide scale}
+\parbox{110pt}{All participants do not behave like they should be, instead 
they go for own profit.} &
+\parbox{110pt}{Different reputation methods.} &
+\parbox{110pt}{No real world experience in a wide scale.}
 \\ \hline
 
 
 \parbox{90pt}{Heterogeneity \cite{saroiu02measurementstudyp2p, 
brinkmann02compactplacement, zhao02brocade, gurmeet03symphony, 
rowston03controlloingreliability}} &
-\parbox{110pt}{There are different kind of peers in the system, in light of 
bandwidth and computing power} &
-\parbox{110pt}{Super peers (loosely structured), clusters (loosely structured) 
additional layer upon tighty structured systems, structure itself is simple 
(tightly structured)} &
-\parbox{110pt}{Working solutions, increases system complexity (additional 
layer)}
+\parbox{110pt}{There are different kind of peers in the system, in light of 
bandwidth and computing power.} &
+\parbox{110pt}{Super peers (loosely structured), clusters (loosely structured) 
additional layer upon tighty structured systems, structure itself is simple 
(tightly structured).} &
+\parbox{110pt}{Working solutions, increases system complexity (additional 
layer).}
 \\ \hline
 
 
 \parbox{90pt}{Programming guidelines \cite{zhao03api, frise02p2pframework, 
babaoglu02anthill, rhea03benchmarks, garciamolina03sil, 
balakrishnan03semanticfree}} &
-\parbox{110pt}{Set of programming guidelines/frameworks is needed for better 
interoperability between different systems} &
-\parbox{110pt}{Common frameworks and APIs} &
-\parbox{110pt}{Common framework/API is still missing, a few proposals have 
been made (tightly structured)}
+\parbox{110pt}{Set of programming guidelines/frameworks is needed for better 
interoperability between different systems.} &
+\parbox{110pt}{Common frameworks and APIs.} &
+\parbox{110pt}{Common framework/API is still missing, a few proposals have 
been made (tightly structured).}
 \\ \hline
 
 
 \parbox{90pt}{Comprehensive simulations or analysis of Peer-to-Peer system} &
 \parbox{110pt}{Ability to simulate whole Peer-to-Peer network's usage 
patterns, network traffics, flux state etc.} &
-\parbox{110pt}{Use same techniques as simulating/analyzing the Internet} &
-\parbox{110pt}{Only small subsets of Peer-to-Peer networks has been analysed, 
because of ad hoc properties of network, more powerful solutions needed}
+\parbox{110pt}{Use same techniques as simulating/analyzing the Internet.} &
+\parbox{110pt}{Only small subsets of Peer-to-Peer networks has been analysed, 
because of ad hoc properties of network, more powerful solutions needed.}
 \\ \hline
 
 
 \parbox{90pt}{Overlay management and health monitoring \cite{zhang03somo}} &
-\parbox{110pt}{System is self-capable to monitor it is status and health for 
better performance} &
-\parbox{110pt}{Build a meta data overlay atop of structured overlay (such as 
SOMO for structured overlays), make local decisions about overlay (loosely 
structured)} &
-\parbox{110pt}{For tightly structured overlays, efficient and simple to 
implement, fault tolerance unknown, for the loosely structured approach not 
necessarily efficient because decisions are based on local knowledge}
+\parbox{110pt}{System is self-capable to monitor it is status and health for 
better performance.} &
+\parbox{110pt}{Build a meta data overlay atop of structured overlay (such as 
SOMO for structured overlays), make local decisions about overlay (loosely 
structured).} &
+\parbox{110pt}{For tightly structured overlays, efficient and simple to 
implement, fault tolerance unknown, for the loosely structured approach not 
necessarily efficient because decisions are based on local knowledge.}
 \\ \hline
 
 \parbox{90pt}{Locating Peer-to-Peer network} &
-\parbox{110pt}{How old peers or new peers are able to locate Peer-to-Peer 
network, if it exists} &
-\parbox{110pt}{Servers maintaining online peers (e.g. gnutellahosts.com), 
peer's history information} &
-\parbox{110pt}{Depends on implementation and purpose of the system, for a 
desktop system there are working solutions}
+\parbox{110pt}{How old peers or new peers are able to locate Peer-to-Peer 
network, if it exists.} &
+\parbox{110pt}{Servers maintaining online peers (e.g. gnutellahosts.com), 
peer's history information.} &
+\parbox{110pt}{Depends on implementation and purpose of the system, for a 
desktop system there are working solutions.}
 \\ \hline
 
 \caption{Miscellaneous problems in Peer-to-Peer.} 
@@ -1600,10 +1600,10 @@
 
 The Fenfire project \cite{fenfireurl} is an effort to build a location 
transparent, hyperstructured desktop 
 environment. By location transparent, we mean hiding the heterogeneous and 
distributed nature of the system
-so that it appears to the end user like one system and by hyperstructured 
system
+so that it appears to the end user like one system, and by hyperstructured 
system
 a system in which data can be associated with other data arbitrarily. Fenfire 
uses xanalogical storage model 
 \cite{ted-xu-model} as a basis for hyperstructured media. Each data item in 
the Fenfire system has a globally unique 
-identifier. This property should allow making references between \emph{any} 
+identifier. This property allows making references between \emph{any} 
 data easier and more seamlessly interoperating than in other systems. For 
location transparency in the Fenfire system, 
 we are currently analysing the applicability of Peer-to-Peer infrastructure. 
 
@@ -1629,8 +1629,8 @@
 \section{Xanalogical storage model}
 
 Xanalogical storage model \cite{nelson99xanalogicalneeded} is a different kind 
of model for 
-presenting data and relationships between data, e.g., while in the World Wide 
Web links are
-between documents, in the xanalogical storage model links are between 
individual 
+presenting data and relationships between data. For example, in the World Wide 
Web links are
+between documents, while in the xanalogical storage model links are between 
individual 
 characters\footnote{Xanalogical storage model
 is not limited to text. It can support arbitrary data, e.g., pixels of picture 
or 
 frames of video.}. \emph{Enfilade} is a mutable ''virtual file'' (or part of 
one), which is a list 
@@ -1666,8 +1666,7 @@
 \section{Storm}
 
 In this section, we will give a brief overview of Storm design. More 
information can be found
-from recent publications. For general discussion about Fenfire in Peer-to-Peer 
environment, 
-see \cite{lukka02freenetguids}, and for detailed Storm design, see 
\cite{fallenstein03storm}.
+from recent publications. For detailed Storm design, see 
\cite{fallenstein03storm}.
 
 Storm (for \emph{STORage Module}) stores all data as \emph{blocks}, which
 are immutable byte sequences. Storm \emph{assigns} a globally unique 
identifier to each
@@ -1713,7 +1712,7 @@
 \centering
 \includegraphics[width=10cm, height=10cm]{storm_uml.eps}
 \caption{Implementation of the xanalogical storage model on Storm. Storm 
storage model is based on
-fluid media units, i.e., fluid media units are smallest units of data. 
Currently, Storm provides a support
+fluid media units, which represent the smallest units of data. Currently, 
Storm provides a support
 for textual fluid media units (characters) only, but a support for arbitrary 
data (e.g., video or music) is 
 planned in future versions of Storm.}
 \label{fig:storm_model}
@@ -1834,8 +1833,8 @@
 within a small group of working people.
 
 For better fault tolerance and self-monitoring for Fenfire, we propose 
techniques
-presented by Rowston et al. \cite{rowston03controlloingreliability}.  With 
these 
-techniques, we can ensure the performance of the Fenfire system in a highly 
adverse conditions, such
+presented by Rowston et al. \cite{rowston03controlloingreliability}.  With 
their methods, 
+we can ensure the performance of the Fenfire system in a highly adverse 
conditions, such
 as sudden network partition, or highly dynamic and heterogeneous environment.
 
 Additionally, for more efficient data transfer, we can use variable techniques 
for this purpose.
@@ -1866,7 +1865,9 @@
 Also, we don't respond to the security issues related to Peer-to-Peer systems, 
since there is no working solution
 available yet. We either assume that Fenfire has a reliable technique for 
identifying individual entities, or
 there are no hostile entities among participating peers, i.e.,  Storm blocks 
can be identified correctly (e.g., when
-performing searches). In the next subsection, we discuss security problems in 
more detail. 
+performing searches). In the next subsection, we discuss security problems in 
more detail.
+
+Next, we present methods for locating Storm data blocks using the DOLR 
abstraction. 
 
 
 \begin{itemize}
Index: gzz/Documentation/misc/hemppah-progradu/progradu.bib
diff -u gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.117 
gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.118
--- gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.117  Tue Apr  8 
05:25:03 2003
+++ gzz/Documentation/misc/hemppah-progradu/progradu.bib        Tue Apr  8 
07:39:22 2003
@@ -14,8 +14,8 @@
        P2P systems. We describe the issues involved and
        outline our research plan and current status.}, 
        year = {2002},
-       location = {Cambridge, USA},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/191.pdf}
+       location = {Cambridge, USA}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/191.pdf}
 }
   
 %Open questions related DHTs
@@ -23,8 +23,8 @@
        author = {Sylvia Ratnasamy and Scott Shenker and Ion Stoica},   
        title = {Routing Algorithms for {DHTs}: Some Open Questions},
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
-       year = {2002},  
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/174.pdf}
+       year = {2002}   
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/174.pdf}
 }
 
 %Tapestry p2p system
@@ -33,8 +33,8 @@
        title = {Tapestry: An Infrastructure for Fault-tolerant Wide-area 
Location and Routing},
        number = {UCB/CSD-01-1141},
        institution = {Computer Science Division, U. C. Berkeley},      
-       year = {2001},
-       url = {http://www.cs.berkeley.edu/~ravenben/ 
publications/CSD-01-1141.pdf}        
+       year = {2001}
+       %url = {http://www.cs.berkeley.edu/~ravenben/ 
publications/CSD-01-1141.pdf}       
 }
 
 %Pastry p2p system
@@ -44,8 +44,8 @@
        booktitle= {IFIP/ACM International Conference on Distributed Systems 
Platforms (Middleware)},
         year     = {2001},        
        pages    = {329-350},
-        location = {Heidelberg, Germany},
-       url = {http://www.cs.cornell.edu/People/egs/615/pastry.pdf}
+        location = {Heidelberg, Germany}
+       %url = {http://www.cs.cornell.edu/People/egs/615/pastry.pdf}
 }
 
 %Chord p2p system
@@ -54,11 +54,11 @@
        title = {Chord: A scalable peer-to-peer lookup service for internet 
applications},
        booktitle = {Proceedings of the 2001 conference on applications, 
technologies, architectures, and protocols for computer communications},
        year = {2001},
-       isbn = {1-58113-411-8},
+       %isbn = {1-58113-411-8},
        pages = {149--160},
        location = {San Diego, California, United States},
-       url = {http://www.pdos.lcs.mit.edu/papers/chord:sigcomm01/ 
chord_sigcomm.pdf},
-       publisher = {ACM Press},
+       %url = {http://www.pdos.lcs.mit.edu/papers/chord:sigcomm01/ 
chord_sigcomm.pdf},
+       publisher = {ACM Press}
  }
 
 %Distributed filesystem CFS (CFS is built on Chord)
@@ -67,11 +67,11 @@
         title = {Wide-area cooperative storage with {CFS}},
         booktitle = {Proceedings of the eighteenth ACM symposium on Operating 
systems principles},
         year = {2001},
-        isbn = {1-58113-389-8},
+        %isbn = {1-58113-389-8},
         pages = {202--215},
         location = {Banff, Alberta, Canada},
-        url = {http://www.pdos.lcs.mit.edu/papers/cfs:sosp01/cfs_sosp.pdf},
-        publisher = {ACM Press},
+        %url = {http://www.pdos.lcs.mit.edu/papers/cfs:sosp01/cfs_sosp.pdf},
+        publisher = {ACM Press}
 }
 
 %CAN p2p system
@@ -80,11 +80,11 @@
        title = {A scalable content-addressable network},
        booktitle = {Proceedings of the 2001 conference on applications, 
technologies, architectures, and protocols for computer communications },
        year = {2001},
-       isbn = {1-58113-411-8},
+       %isbn = {1-58113-411-8},
        pages = {161--172},
        location = {San Diego, California, United States},      
-       publisher = {ACM Press},
-       url = {http://robotics.eecs.berkeley.edu/~wlr/ 
228a/Projects/Ratnasamy2.pdf}
+       publisher = {ACM Press}
+       %url = {http://robotics.eecs.berkeley.edu/~wlr/ 
228a/Projects/Ratnasamy2.pdf}
 }
 
 %DHT structure, overnet and ed2k uses this method
@@ -93,8 +93,8 @@
        title = {{Kademlia: A Peer-to-peer Information System Based on the XOR 
metric}},
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},      
        year = {2002},
-       location ={Cambridge, USA},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/109.pdf} 
+       location ={Cambridge, USA}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/109.pdf} 
 }
 
 %Freenet p2p system
@@ -103,8 +103,8 @@
        title = {Freenet: {A} Distributed Anonymous Information Storage and 
Retrieval System},
        booktitle = {ICSI Workshop on Design Issues in Anonymity and 
Unobservability},  
        year = {2000},
-       location = {Berkeley, CA},
-       url = {http://freenetproject.org/twiki/Main/Papers/icsi-revised.pdf}
+       location = {Berkeley, CA}
+       %url = {http://freenetproject.org/twiki/Main/Papers/icsi-revised.pdf}
 }
 
 %Methods for finding resources in p2p environment
@@ -113,11 +113,11 @@
        title = {Distributed object location in a dynamic network},
        booktitle = {Proceedings of the fourteenth annual ACM symposium on 
Parallel algorithms and architectures},
        year = {2002},
-       isbn = {1-58113-529-7},
+       %isbn = {1-58113-529-7},
        pages = {41--52},
        location = {Winnipeg, Manitoba, Canada},
-       url = 
{http://oceanstore.cs.berkeley.edu/publications/papers/pdf/SPAA02.pdf},
-       publisher = {ACM Press},
+       %url = 
{http://oceanstore.cs.berkeley.edu/publications/papers/pdf/SPAA02.pdf},
+       publisher = {ACM Press}
 }
 
 %The book with the same title
@@ -136,8 +136,8 @@
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        address = {Cambridge, MA},
        month = {March},        
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/167.pdf}
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/167.pdf}
 }
 
 %Distributed Sloppy Hash Table
@@ -166,8 +166,8 @@
        into existing systems for immediate impact.},
        month = {July},
        year = {2002},
-       location = {Vienna, Austria},
-       url = {http://hake.stanford.edu/~byang/pubs/p2psearch.pdf}
+       location = {Vienna, Austria}
+       %url = {http://hake.stanford.edu/~byang/pubs/p2psearch.pdf}
 }
 
 %Mixed Gnutella and DHTs
@@ -175,8 +175,8 @@
        author = {Prasanna Ganesan and Qixiang Sun and Hector Garcia-Molina},
        title = {{YAPPERS}: A Peer-to-Peer Lookup Service Over Arbitrary 
Topology},     
        booktitle = {Proceedings of {IEEE} Infocom},    
-       year = {2003},
-       url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-24&format=pdf&compression=}
+       year = {2003}
+       %url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-24&format=pdf&compression=}
 }
 
 %Problems related to p2p systems
@@ -194,8 +194,8 @@
        systems -- search and security -- and suggest several open and 
important research 
        problems for the community to address.},
        month = {January},
-       year = {2003},
-       url = {http://dbpubs.stanford.edu:8090/pub/2003-1}
+       year = {2003}
+       %url = {http://dbpubs.stanford.edu:8090/pub/2003-1}
 }
 
 @misc{gnutellaurl,
@@ -278,7 +278,7 @@
        year = {2002},
        month = {October},
        institution = {Sun Microsystems, Inc.},
-       url = {http://www.jxta.org/project/www/docs/jxtaview_01nov02.pdf}
+       %url = {http://www.jxta.org/project/www/docs/jxtaview_01nov02.pdf}
 }
 
 %Method which e.g. Pastry and Tapestry are build on
@@ -287,11 +287,11 @@
         title = {Accessing nearby copies of replicated objects in a 
distributed environment},
         booktitle = {Proceedings of the ninth annual ACM symposium on Parallel 
algorithms and architectures},
         year = {1997},
-        isbn = {0-89791-890-8},
+        %isbn = {0-89791-890-8},
         pages = {311--320},
         location = {Newport, Rhode Island, United States},
-        url = {http://www.cs.utexas.edu/users/plaxton/ps/1999/tocs.ps},
-        publisher = {ACM Press},
+        %url = {http://www.cs.utexas.edu/users/plaxton/ps/1999/tocs.ps},
+        publisher = {ACM Press}
 }
 
 %Seucurity issues related to DHTs
@@ -301,8 +301,8 @@
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        year = {2002},
        month = {March},
-       address = {Cambridge, MA},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/173.pdf}
+       address = {Cambridge, MA}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/173.pdf}
 }
 
 %Analysis about search and replication in p2p environment
@@ -311,11 +311,11 @@
        title = {Search and replication in unstructured peer-to-peer networks},
        booktitle = {Proceedings of the 16th international conference on 
Supercomputing},
        year = {2002},
-       isbn = {1-58113-483-5},
+       %isbn = {1-58113-483-5},
        pages = {84--95},
        location = {New York, New York, USA},
-       url = {http://www.cs.princeton.edu/~qlv/download/searchp2p_full.pdf},
-       publisher = {ACM Press},
+       %url = {http://www.cs.princeton.edu/~qlv/download/searchp2p_full.pdf},
+       publisher = {ACM Press}
  }
 
 %Oceanstore distributed persistant storage system
@@ -324,11 +324,11 @@
        title = {OceanStore: an architecture for global-scale persistent 
storage},
        booktitle = {Proceedings of the ninth international conference on 
Architectural support for programming languages and operating systems},
        year = {2000},
-       isbn = {1-58113-317-0},
+       %isbn = {1-58113-317-0},
        pages = {190--201},
        location = {Cambridge, Massachusetts, United States},
-       url = {http://oceanstore.cs.berkeley.edu/publications/ 
papers/pdf/asplos00.pdf},
-       publisher = {ACM Press},
+       %url = {http://oceanstore.cs.berkeley.edu/publications/ 
papers/pdf/asplos00.pdf},
+       publisher = {ACM Press}
 }
 
 
@@ -336,8 +336,8 @@
        title = {Observations on the Dynamic Evolution of Peer-to-Peer 
Networks},
        author = {David {Liben-Nowell} and Hari Balakrishnan and David Karger},
        year = {2002},
-       booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
-       url = {http://www.pdos.lcs.mit.edu/chord/papers/iptps-evol.pdf}
+       booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})}
+       %url = {http://www.pdos.lcs.mit.edu/chord/papers/iptps-evol.pdf}
 }
 
 % ?
@@ -346,11 +346,11 @@
        title = {Viceroy: a scalable and dynamic emulation of the butterfly},
        booktitle = {Proceedings of the twenty-first annual symposium on 
Principles of distributed computing},
        year = {2002},
-       isbn = {1-58113-485-1},
+       %isbn = {1-58113-485-1},
        pages = {183--192},
        location = {Monterey, California},
-       url = {http://www.wisdom.weizmann.ac.il/~naor/PAPERS/viceroy.pdf},
-       publisher = {ACM Press},
+       %url = {http://www.wisdom.weizmann.ac.il/~naor/PAPERS/viceroy.pdf},
+       publisher = {ACM Press}
  }
 
 % ?
@@ -359,11 +359,11 @@
         title = {Early measurements of a cluster-based architecture for P2P 
systems},
         booktitle = {Proceedings of the First ACM SIGCOMM Workshop on Internet 
Measurement Workshop},
         year = {2001},
-        isbn = {1-58113-435-5},
+        %isbn = {1-58113-435-5},
         pages = {105--109},
         location = {San Francisco, California, USA},
-        url = {http://www.icir.org/vern/imw-2001/imw2001-papers/29.pdf},
-        publisher = {ACM Press},
+        %url = {http://www.icir.org/vern/imw-2001/imw2001-papers/29.pdf},
+        publisher = {ACM Press}
 }
 
 % Routing methhods to be used in p2p env.
@@ -372,11 +372,11 @@
        title = {Fault-tolerant routing in peer-to-peer systems},
        booktitle = {Proceedings of the twenty-first annual symposium on 
Principles of distributed computing},
        year = {2002},
-       isbn = {1-58113-485-1},
+       %isbn = {1-58113-485-1},
        pages = {223--232},
        location = {Monterey, California},
-       url = {http://cs-www.cs.yale.edu/homes/shah/html/pubs/p2p-podc02.pdf},
-       publisher = {ACM Press},
+       %url = {http://cs-www.cs.yale.edu/homes/shah/html/pubs/p2p-podc02.pdf},
+       publisher = {ACM Press}
  }
 
 %Free riding problem in p2p networks
@@ -385,11 +385,11 @@
        title = {Incentives for sharing in peer-to-peer networks},
        booktitle = {Proceedings of the 3rd ACM conference on Electronic 
Commerce},
        year = {2001},
-       isbn = {1-58113-387-1},
+       %isbn = {1-58113-387-1},
        pages = {264--267},
        location = {Tampa, Florida, USA},
-       url = {http://robotics.stanford.edu/~kevinlb/welcom01.pdf},
-       publisher = {ACM Press},
+       %url = {http://robotics.stanford.edu/~kevinlb/welcom01.pdf},
+       publisher = {ACM Press}
  }
 
 %Distributed web cache
@@ -398,11 +398,11 @@
        title = {Squirrel: a decentralized peer-to-peer web cache},
        booktitle = {Proceedings of the twenty-first annual symposium on 
Principles of distributed computing},
        year = {2002},
-       isbn = {1-58113-485-1},
+       %isbn = {1-58113-485-1},
        pages = {213--222},
        location = {Monterey, California},
-       url = {http://citeseer.nj.nec.com/iyer02squirrel.html},
-       publisher = {ACM Press},
+       %url = {http://citeseer.nj.nec.com/iyer02squirrel.html},
+       publisher = {ACM Press}
  }
 
 %Circle p2p system
@@ -418,11 +418,11 @@
        title = {Finding nearest neighbors in growth-restricted metrics},
        booktitle = {Proceedings of the thiry-fourth annual ACM symposium on 
Theory of computing},
        year = {2002},
-       isbn = {1-58113-495-9},
+       %isbn = {1-58113-495-9},
        pages = {741--750},
        location = {Montreal, Quebec, Canada},
-       url = {http://www.pdos.lcs.mit.edu/chord/papers/2002-stoc.pdf},
-       publisher = {ACM Press},
+       %url = {http://www.pdos.lcs.mit.edu/chord/papers/2002-stoc.pdf},
+       publisher = {ACM Press}
  }
 
 %Methods for better search efficiency
@@ -435,8 +435,8 @@
         year = {2002},
         issn = {0146-4833},
         pages = {80--80},
-        url = 
{http://detache.cmcl.cs.cmu.edu/~kunwadee/research/papers/ccrabstract.pdf},
-        publisher = {ACM Press},
+        %url = 
{http://detache.cmcl.cs.cmu.edu/~kunwadee/research/papers/ccrabstract.pdf},
+        publisher = {ACM Press}
 }
 
 %Agent techniques in p2p systems
@@ -445,11 +445,11 @@
         title = {Agent-based transactions into decentralised P2P},
         booktitle = {Proceedings of the first international joint conference 
on Autonomous agents and multiagent systems},
         year = {2002},
-        isbn = {1-58113-480-0},
+        %isbn = {1-58113-480-0},
         pages = {1288--1289},
         location = {Bologna, Italy},
-        url = {http://doi.acm.org/10.1145/545056.545118},
-        publisher = {ACM Press},
+        %url = {http://doi.acm.org/10.1145/545056.545118},
+        publisher = {ACM Press}
 }
 
 %Security issues, reputation in p2p networks
@@ -458,11 +458,11 @@
        title = {Choosing reputable servents in a {P2P} network},
        booktitle = {Proceedings of the eleventh international conference on 
World Wide Web},
        year = {2002},
-       isbn = {1-58113-449-5},
+       %isbn = {1-58113-449-5},
        pages = {376--386},
        location = {Honolulu, Hawaii, USA},
-       url = {http://doi.acm.org/10.1145/511446.511496},
-       publisher = {ACM Press},
+       %url = {http://doi.acm.org/10.1145/511446.511496},
+       publisher = {ACM Press}
  }
 
 %GISP p2p systems, which is built on JXTA framework
@@ -472,8 +472,8 @@
        booktitle = {Proceedings of 2nd International Conference on 
Peer-to-Peer Computing (P2P'02)},
        year = {2002},
        pages = {65--73},
-       location = { Linkoping, Sweden  },
-       url = {http://www.stanford.edu/~daishi/papers/gisp2002.pdf} 
+       location = {Linkoping, Sweden},
+       %url = {http://www.stanford.edu/~daishi/papers/gisp2002.pdf} 
 }
 
 %Security issues related to p2p systems
@@ -482,11 +482,11 @@
        title = {Managing trust in a Peer-to-Peer information system},
        booktitle = {Proceedings of the tenth international conference on 
Information and knowledge management},
        year = {2001},
-       isbn = {1-58113-436-3},
+       %isbn = {1-58113-436-3},
        pages = {310--317},
        location = {Atlanta, Georgia, USA},
-       url = {http://www.p-grid.org/Papers/CIKM2001.pdf},
-       publisher = {ACM Press},
+       %url = {http://www.p-grid.org/Papers/CIKM2001.pdf},
+       publisher = {ACM Press}
 }
 
 %Own publication: initial p2p and gzz
@@ -495,11 +495,11 @@
         title = {Freenet-like {GUIDs} for implementing xanalogical hypertext},
         booktitle = {Proceedings of the thirteenth conference on Hypertext and 
hypermedia},
         year = {2002},
-        isbn = {1-58113-477-0},
+        %isbn = {1-58113-477-0},
         pages = {194--195},
         location = {College Park, Maryland, USA},
-        doi = {http://doi.acm.org/10.1145/513338.513386},
-        publisher = {ACM Press},
+        %doi = {http://doi.acm.org/10.1145/513338.513386},
+        publisher = {ACM Press}
 }
 
 %Xanalogical structures
@@ -512,8 +512,8 @@
         year = {1999},
         issn = {0360-0300},
         pages = {33},
-        doi = {http://doi.acm.org/10.1145/345966.346033},
-        publisher = {ACM Press},
+        %doi = {http://doi.acm.org/10.1145/345966.346033},
+        publisher = {ACM Press}
 }
 
 %Groove p2p system
@@ -524,8 +524,8 @@
        year = {2001},
        location = {Orlando, Florida},
        pages = {399 -- 404},
-       isbn = {980--07--7541--2},      
-       url = {http://erwin.dstc.edu.au/Herring/GrooveAnalysis-SCI2001.pdf}
+       %isbn = {980--07--7541--2}      
+       %url = {http://erwin.dstc.edu.au/Herring/GrooveAnalysis-SCI2001.pdf}
 }
 
 %Hypermedia in p2p networks
@@ -534,11 +534,11 @@
        title = {Hypermedia by coincidence},
        booktitle = {Proceedings of the twelfth ACM conference on Hypertext and 
Hypermedia},
        year = {2001},
-       isbn = {1-59113-420-7},
+       %isbn = {1-59113-420-7},
        pages = {129--130},
        location = {Arhus, Denmark},
-       url = 
{http://eprints.ecs.soton.ac.uk/archive/00005901/01/ht01-coincidence.pdf},
-       publisher = {ACM Press},
+       %url = 
{http://eprints.ecs.soton.ac.uk/archive/00005901/01/ht01-coincidence.pdf},
+       publisher = {ACM Press}
  }
 
 %Search methods in p2p networks
@@ -547,8 +547,8 @@
        title = {Local Search in Unstructured Networks},
        booktitle = {Review chapter to appear in: 'Handbook of Graphs and 
Networks: From the Genome to the Internet},   
        year = {2002},
-       location = {Berlin, Germany},
-       url = {http://www.hpl.hp.com/shl/papers/review/reviewchap.pdf}
+       location = {Berlin, Germany}
+       %url = {http://www.hpl.hp.com/shl/papers/review/reviewchap.pdf}
 
 }
 
@@ -559,8 +559,8 @@
        journal = {Physical Review E},
        volume = {64},
        number = {046135},      
-       year = {2001},  
-       url = {http://www.hpl.hp.com/shl/papers/plsearch/PRE46135.pdf}
+       year = {2001}   
+       %url = {http://www.hpl.hp.com/shl/papers/plsearch/PRE46135.pdf}
 }
 
 %Analysis about routing in p2p networks
@@ -569,8 +569,8 @@
        title = {Scalability Issues for Query Routing Service Discovery},
        booktitle = {Proceedings of the Second Workshop on Infrastructure for 
Agents, MAS and Scalable MAS at the Fourth International Conference on 
Autonomous Agents (ICMAS2001)},
        pages = {209-217},
-       year = {2001},
-       url = 
{http://www.cs.cf.ac.uk/User/O.F.Rana/agents2001/papers/13_gibbins_hall.pdf}    
  
+       year = {2001}
+       %url = 
{http://www.cs.cf.ac.uk/User/O.F.Rana/agents2001/papers/13_gibbins_hall.pdf}    
 
 }
 
 %Analysis about p2p systems
@@ -579,8 +579,8 @@
        title = {A Measurement Study of Peer-to-Peer File Sharing Systems},
        booktitle = {Proceedings of Multimedia Computing and Networking 2002 
(MMCN '02)},
        year = {2002},
-       location = {San Jose, CA, USA},
-       url = {http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf}
+       location = {San Jose, CA, USA}
+       %url = {http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf}
 }
 
 
@@ -590,11 +590,11 @@
        title = {Resource discovery in distributed networks},
        booktitle = {Proceedings of the eighteenth annual ACM symposium on 
Principles of distributed computing},
        year = {1999},
-       isbn = {1-58113-099-6},
+       %isbn = {1-58113-099-6},
        pages = {229--237},
        location = {Atlanta, Georgia, United States},
-       url = 
{http://www.cs.ucsd.edu/~savage/cse291/papers/Harchol-Balter99.pdf},
-       publisher = {ACM Press},
+       %url = 
{http://www.cs.ucsd.edu/~savage/cse291/papers/Harchol-Balter99.pdf},
+       publisher = {ACM Press}
  }
 
 
@@ -616,8 +616,8 @@
        Volume = {6},
        Number = {1},
        Month =  {Jan./Feb.},
-        Year = {2002},        
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/128.pdf}
+        Year = {2002}        
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/128.pdf}
 }
 
 
@@ -627,8 +627,8 @@
        title = {Peer-to-peer Architecture Case Study: Gnutella Network},
        booktitle = {Proceedings of International Conference on Peer-to-peer 
Computing},
        year = {2001},
-       month = {August},
-       url = {http://www.cs.uchicago.edu/~matei/PAPERS/gnutella-rc.pdf }
+       month = {August}
+       %url = {http://www.cs.uchicago.edu/~matei/PAPERS/gnutella-rc.pdf }
 }
 
 %Search engine built on Freenet p2p system
@@ -637,8 +637,8 @@
        title = {{FASD}: A Fault-tolerant, Adaptive, Scalable, Distributed 
Search Engine},
        school = {Princeton University},
        month = {May},          
-       year = {2002},
-       url = 
{http://freenetproject.org/twiki/Main/FASD/kronfol_final_thesis.pdf}
+       year = {2002}
+       %url = 
{http://freenetproject.org/twiki/Main/FASD/kronfol_final_thesis.pdf}
 }
 
 
@@ -648,8 +648,8 @@
        title = {Search in {JXTA} and Other Distributed Networks},
        booktitle = {First International Conference on Peer-to-Peer Computing 
(P2P'01)}, 
        year = {2001},
-       location = {Lingkoping, Sweden},
-       url = 
{http://ieeexplore.ieee.org/iel5/7771/21356/00990421.pdf?isNumber=21356&prod=CNF&arnumber=990421&arSt=30&ared=35&arAuthor=Botros%2C+S.%3B+Waterhouse%2C+S.}
+       location = {Lingkoping, Sweden}
+       %url = 
{http://ieeexplore.ieee.org/iel5/7771/21356/00990421.pdf?isNumber=21356&prod=CNF&arnumber=990421&arSt=30&ared=35&arAuthor=Botros%2C+S.%3B+Waterhouse%2C+S.}
 }
 
 
@@ -659,11 +659,11 @@
        title = {Compact, adaptive placement schemes for non-uniform 
requirements},
        booktitle = {Proceedings of the fourteenth annual ACM symposium on 
Parallel algorithms and architectures},
        year = {2002},
-       isbn = {1-58113-529-7},
+       %isbn = {1-58113-529-7},
        pages = {53--62},
        location = {Winnipeg, Manitoba, Canada},
-       url = {http://doi.acm.org/10.1145/564870.564878},
-       publisher = {ACM Press},
+       %url = {http://doi.acm.org/10.1145/564870.564878},
+       publisher = {ACM Press}
  }
 
 
@@ -673,11 +673,11 @@
        title = {Peer-to-peer Hypertext},
        booktitle = {Proceedings of the thirteenth conference on Hypertext and 
hypermedia},
        year = {2002},
-       isbn = {1-58113-477-0},
+       %isbn = {1-58113-477-0},
        pages = {69--71},
        location = {College Park, Maryland, USA},
-       url = {http://eprints.ecs.soton.ac.uk/archive/00006647/},
-       publisher = {ACM Press},
+       %url = {http://eprints.ecs.soton.ac.uk/archive/00006647/},
+       publisher = {ACM Press}
  }
 
 %Discussion about p2p and hypertext
@@ -686,11 +686,11 @@
        title = {Open hypermedia in a peer-to-peer context},
        booktitle = {Proceedings of the thirteenth conference on Hypertext and 
hypermedia},
        year = {2002},
-       isbn = {1-58113-477-0},
+       %isbn = {1-58113-477-0},
        pages = {138--139},
        location = {College Park, Maryland, USA},
-       url = {http://doi.acm.org/10.1145/513338.513373},
-       publisher = {ACM Press},
+       %url = {http://doi.acm.org/10.1145/513338.513373},
+       publisher = {ACM Press}
 }
 
 %Overview of distributed file systems
@@ -703,8 +703,8 @@
         year = {1990},
         issn = {0360-0300},
         pages = {321--374},
-        url = {http://doi.acm.org/10.1145/98163.98169},
-        publisher = {ACM Press},
+        %url = {http://doi.acm.org/10.1145/98163.98169},
+        publisher = {ACM Press}
 }
 
 %DHT which is relies on geographic hash
@@ -713,11 +713,11 @@
        title = {{GHT}: a geographic hash table for data-centric storage},
        booktitle = {Proceedings of the first ACM international workshop on 
Wireless sensor networks and applications},
        year = {2002},
-       isbn = {1-58113-589-0},
+       %isbn = {1-58113-589-0},
        pages = {78--87},
        location = {Atlanta, Georgia, USA},
-       url = {http://wsna02.cs.uga.edu/papers/p78-ratnasamy.pdf},
-       publisher = {ACM Press},
+       %url = {http://wsna02.cs.uga.edu/papers/p78-ratnasamy.pdf},
+       publisher = {ACM Press}
  }
 
 %SDSI (distributed key management) in Chord p2p system
@@ -726,7 +726,7 @@
        title = {{C}on{C}hord: Cooperative {SDSI} Certificate Storage and Name 
Resolution},     
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        year = {2002},
-       url = {http://www.pmg.lcs.mit.edu/~ajmani/papers/lncs2429.pdf}
+       %url = {http://www.pmg.lcs.mit.edu/~ajmani/papers/lncs2429.pdf}
 }
 
 
@@ -736,7 +736,7 @@
        title = {{LS*S}: A High-Availability and High-Security Scalable 
Distributed Data Structure},
        booktitle = {Proceedings of Research Issues in Data Engineering (RIDE)},
        year = {1997},
-       url = {http://ceria.dauphine.fr/Lhraid2.pdf}
+       %url = {http://ceria.dauphine.fr/Lhraid2.pdf}
 
 }
 %Term Distributed Hash Table mentioned first time
@@ -749,8 +749,8 @@
        year = {1996},
        issn = {0362-5915},
        pages = {480--525},
-       doi = {http://doi.acm.org/10.1145/236711.236713},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/236711.236713},
+       publisher = {ACM Press}
 }
 
 
@@ -791,7 +791,7 @@
        number = "1",
        pages = "48--63",
        year = "1996",
-       url = "citeseer.nj.nec.com/stonebraker96mariposa.html"
+       %url = "citeseer.nj.nec.com/stonebraker96mariposa.html"
 }
 
 %Mobile ad-hoc networks
@@ -823,8 +823,8 @@
        year = {1970},
        issn = {0001-0782},
        pages = {422--426},
-       doi = {http://doi.acm.org/10.1145/362686.362692},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/362686.362692},
+       publisher = {ACM Press}
 }
 
 %Feasibility studie of DFS on desktop PCs: Farsite
@@ -833,11 +833,11 @@
        title = {Feasibility of a serverless distributed file system deployed 
on an existing set of desktop PCs},
        booktitle = {Proceedings of the 2000 ACM SIGMETRICS international 
conference on Measurement and modeling of computer systems},
        year = {2000},
-       isbn = {1-58113-194-1},
+       %isbn = {1-58113-194-1},
        pages = {34--43},
        location = {Santa Clara, California, United States},
-       doi = {http://doi.acm.org/10.1145/339331.339345},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/339331.339345},
+       publisher = {ACM Press}
 }
 
 %PAST storage utility
@@ -846,8 +846,8 @@
        title = "Storage Management and Caching in {PAST}, A Large-scale, 
Persistent Peer-to-peer Storage Utility",
        booktitle = "Symposium on Operating Systems Principles",
        pages = "188-201",
-       year = "2001",
-       url = "http://www.cs.ucsd.edu/sosp01/papers/rowstron.pdf";
+       year = "2001"
+       %url = "http://www.cs.ucsd.edu/sosp01/papers/rowstron.pdf";
 }
 
 %Search method
@@ -857,8 +857,8 @@
        booktitle = {Proceedings of International Workshop on Peer-to-Peer 
Computing},
        publisher = {Springer-Verlag},
        year =   2002,
-       month =  may,
-       url = "http://www.cs.rutgers.edu/~mcuenca";,
+       month =  may
+       %url = "http://www.cs.rutgers.edu/~mcuenca";
 }
 
 %Review of existing p2p systems
@@ -868,8 +868,8 @@
        title = "Peer-to-Peer Computing",
        institution = "Hewlett-Packard",
        number = "HPL-2002-57", 
-       year = 2002,
-       url = "http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf";
+       year = 2002
+       %url = "http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf";
 }
 
 %Alpine p2p system, licence LGPL
@@ -920,8 +920,8 @@
        title = {Traditional and Non-Traditional Applications; Peer-to-Peer 
Networks},
        author = {Ross Lee Graham},
        text = {Lecture},
-       year = {2002},
-       url = {http://www.ida.liu.se/conferences/p2p/p2p2001/p2pwhatis.html}
+       year = {2002}
+       %url = {http://www.ida.liu.se/conferences/p2p/p2p2001/p2pwhatis.html}
 }
 
 %definition of p2p
@@ -937,16 +937,16 @@
 @misc{shirky00whatisp2p,       
        title = {What is P2P...and what Isn't},
        author = {Clay Shirky}, 
-       year = {2000},
-       url = 
{http://www.openp2p.com/pub/a/p2p/2000/11/24/shirky1-whatisp2p.html, 
http://www.ida.liu.se/conferences/p2p/p2p2001/pure.html}
+       year = {2000}
+       %url = 
{http://www.openp2p.com/pub/a/p2p/2000/11/24/shirky1-whatisp2p.html, 
http://www.ida.liu.se/conferences/p2p/p2p2001/pure.html}
 }
 
 %definition of p2p (good one!)
 @misc{winer00whatisp2p,
        title = {What is P2P?},
        author = {Dave Winer},  
-       year = {2000},
-       url = {http://davenet.userland.com/2000/09/20/whatIsP2p}
+       year = {2000}
+       %url = {http://davenet.userland.com/2000/09/20/whatIsP2p}
 }
 
 %distributed net
@@ -968,13 +968,13 @@
         author = {Ian Foster and Carl Kesselman},
         year = {1998},
         publisher = {Morgan Kaufmann Publishers},
-        isbn = {1558604758}
+        %isbn = {1558604758}
 }
 
 @book{perkins01adhocnetworking,
        title = {Ad Hoc Networking},
        author = {Charles E. Perkins},
-       isbn = {0--201--30976--9},
+       %isbn = {0--201--30976--9},
        publisher ={Addison-Wesley},
        year = {2001}
 }
@@ -1005,8 +1005,8 @@
        author = "Russel Sandberg",
        title = "The Sun Network Filesystem: Design, Implementation, and 
Experience",
        booktitle = "Proceedings of the Summer 1986 USENIX Technical Conference 
and Exhibition",
-       year = "1986",
-       url = 
"http://www.diku.dk/topps/activities/plan10/papers/sandbergnfs.pdf";
+       year = "1986"
+       %url = 
"http://www.diku.dk/topps/activities/plan10/papers/sandbergnfs.pdf";
 }
 
 
@@ -1016,8 +1016,8 @@
        booktitle = {Proceedings of the Fourth International Workshop on the 
Web and Databases (WebDB'2001)},
        year = {2001},
        month = {may},
-       location = {Santa Barbara, CA, USA},
-       url = {http://www.cs.washington.edu/homes/gribble/papers/p2p.pdf}
+       location = {Santa Barbara, CA, USA}
+       %url = {http://www.cs.washington.edu/homes/gribble/papers/p2p.pdf}
 }
 
 @misc{internet2url,
@@ -1030,8 +1030,8 @@
        title = "The {Free Haven Project}: Distributed Anonymous Storage 
Service",
        booktitle = "Workshop on Design Issues in Anonymity and 
Unobservability",
        pages = "67-95",
-       year = "2000",
-       url = "http://www.freehaven.net/paper/paper.html";
+       year = "2000"
+       %url = "http://www.freehaven.net/paper/paper.html";
 }
 
 %Anonymity
@@ -1055,8 +1055,8 @@
        volume = "1",
        number = "1",
        pages = "66--92",
-       year = "1998",
-       url = "http://avirubin.com/crowds.pdf";
+       year = "1998"
+       %url = "http://avirubin.com/crowds.pdf";
 }
 
 %Anonymity
@@ -1065,11 +1065,11 @@
        title = {A protocol for anonymous communication over the Internet},
        booktitle = {Proceedings of the 7th ACM conference on Computer and 
communications security},
        year = {2000},
-       isbn = {1-58113-203-4},
+       %isbn = {1-58113-203-4},
        pages = {33--42},
        location = {Athens, Greece},
-       doi = {http://doi.acm.org/10.1145/352600.352607},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/352600.352607},
+       publisher = {ACM Press}
 }
 
 %Anonymity
@@ -1082,8 +1082,8 @@
         year = {1999},
         issn = {0001-0782},
         pages = {42--47},
-        doi = {http://doi.acm.org/10.1145/293411.293447},
-        publisher = {ACM Press},
+        %doi = {http://doi.acm.org/10.1145/293411.293447},
+        publisher = {ACM Press}
 }
 
 %Publius publishing system
@@ -1094,8 +1094,8 @@
        booktitle =    {Proc. 9th USENIX Security Symposium},
        pages =        {59--72},
        year =         2000,
-       month =        {August},
-       url = {http://cs1.cs.nyu.edu/~waldman/publius/publius.pdf}
+       month =        {August}
+       %url = {http://cs1.cs.nyu.edu/~waldman/publius/publius.pdf}
 }
 
 %Definition of self organizing system
@@ -1129,8 +1129,8 @@
        publisher = "Springer-Verlag",
        editor = "S. Abiteboul and A.-M. Vercoustre",
        pages = "443--452",
-       year = "1999",
-       url = "http://www.hpl.hp.com/shl/papers/smallworld/smallworldpaper.html";
+       year = "1999"
+       %url = 
"http://www.hpl.hp.com/shl/papers/smallworld/smallworldpaper.html";
 }
 
 %The Small world problem
@@ -1140,8 +1140,8 @@
        booktitle = {Proceedings of International Parallel and Distributed 
Computing Symposium (IPDPS)},
        location = {Fort Lauderdale, Florida},
        year = {2002},
-       month = {april},
-       url = {http://www.cs.ucr.edu/~vana/kalogeraki-IPDPS02.ps}
+       month = {april}
+       %url = {http://www.cs.ucr.edu/~vana/kalogeraki-IPDPS02.ps}
 }
 
 %1st major milestone that showed that high performance can be obtained by 
using a number of standard machines
@@ -1151,8 +1151,8 @@
        booktitle = "Proceedings of the 24th International Conference on 
Parallel Processing",
        address = "Oconomowoc, WI",
        pages = "I:11--14",
-       year = "1995",
-       url = "http://www.beowulf.org/papers/ICPP95/icpp95.html";
+       year = "1995"
+       %url = "http://www.beowulf.org/papers/ICPP95/icpp95.html";
 }
 
 %Example of grid computing
@@ -1164,8 +1164,8 @@
     number = "2/3",
     month = "Summer\slash Fall",
     pages = "123--131",
-    year = "1996",
-    url = "citeseer.nj.nec.com/defanti96overview.html"
+    year = "1996"
+    %url = "citeseer.nj.nec.com/defanti96overview.html"
 }
 
 
@@ -1182,8 +1182,8 @@
        title = "Probabilistic location and routing",
        booktitle = {Proceedings of the 21st Annual Joint Conference of the 
IEEE Computer and Communications Societies},
        month = {June},
-       year = "2002",
-       url = 
"http://oceanstore.cs.berkeley.edu/publications/papers/pdf/rk-infocom-2002.pdf";
+       year = "2002"
+       %url = 
"http://oceanstore.cs.berkeley.edu/publications/papers/pdf/rk-infocom-2002.pdf";
 }
 
 %Tangler publishing system
@@ -1192,11 +1192,11 @@
        title = {Tangler: a censorship-resistant publishing system based on 
document entanglements},
        booktitle = {Proceedings of the 8th ACM conference on Computer and 
Communications Security},
        year = {2001},
-       isbn = {1-58113-385-5},
+       %isbn = {1-58113-385-5},
        pages = {126--135},
        location = {Philadelphia, PA, USA},
-       doi = {http://doi.acm.org/10.1145/501983.502002},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/501983.502002},
+       publisher = {ACM Press}
 }
 
 %Security considerations for structured peer-to-peer overlay networks
@@ -1227,8 +1227,8 @@
        journal = "Cornell Computer Science Technical Report",
        volume = "1776",
        number = "99",
-       year = "1999",
-       url = "http://www.cs.cornell.edu/home/kleinber/kleinber.html#papers";
+       year = "1999"
+       %url = "http://www.cs.cornell.edu/home/kleinber/kleinber.html#papers";
 } 
 
 %Small world phenomenon
@@ -1240,8 +1240,8 @@
        editor    = "T. G. Dietterich and S. Becker and Z. Ghahramani",
        publisher = "MIT Press",
        address   = "Cambridge, MA",
-       year      = "2002",
-       url = "http://www.cs.cornell.edu/home/kleinber/kleinber.html#papers";
+       year      = "2002"
+       %url = "http://www.cs.cornell.edu/home/kleinber/kleinber.html#papers";
 }
 
 %Small world phenomenon in Freenet
@@ -1249,8 +1249,8 @@
        author = "H. Zhang and A. Goel and R. Govindan",
        title = "Using the Small-World Model to Improve {F}reenet's 
Performance",
        booktitle = "Proceedings of IEEE Infocom",
-       year = "2002",
-       url = "http://www.ieee-infocom.org/2002/papers/386.pdf";
+       year = "2002"
+       %url = "http://www.ieee-infocom.org/2002/papers/386.pdf";
 }
 
 %SWAN system (small world network)
@@ -1267,11 +1267,11 @@
        title = {Core specification and experiments in {DIET}: a decentralised 
ecosystem-inspired mobile agent system},
        booktitle = {Proceedings of the first international joint conference on 
Autonomous agents and multiagent systems},
        year = {2002},
-       isbn = {1-58113-480-0},
+       %isbn = {1-58113-480-0},
        pages = {623--630},
        location = {Bologna, Italy},
-       doi = {http://doi.acm.org/10.1145/544862.544890},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/544862.544890},
+       publisher = {ACM Press}
 }
 
 %SHA-1 secure hash standard
@@ -1287,8 +1287,8 @@
        title = {Brocade: Landmark routing on overlay networks},
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},  
        year = {2002},
-       month = {March},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/151.pdf}
+       month = {March}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/151.pdf}
 }
 
 @misc{neurogridurl,
@@ -1302,16 +1302,16 @@
        title = {Butterflies and Peer-to-Peer Networks},
        booktitle = {Proceedings of ESA 2002 (LNCS)},
        year = {2002},
-       month = {June},
-       url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-33&format=pdf&compression=}
+       month = {June}
+       %url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-33&format=pdf&compression=}
 }
 
 @inproceedings{crespo02semanticoverlay,
        author = {Arturo Crespo and Hector Garcia-Molina},
        title = {Semantic Overlay Networks for {P2P} Systems},
        booktitle = {Submitted for Publication},
-       year = {2003},  
-       url = {http://www-db.stanford.edu/~crespo/publications/op2p.pdf}
+       year = {2003}   
+       %url = {http://www-db.stanford.edu/~crespo/publications/op2p.pdf}
 }
 
 @inproceedings{ripeanu02mapping,
@@ -1319,8 +1319,8 @@
        title = {Mapping the Gnutella Network: Macroscopic Properties of 
Large-Scale Peer-to-Peer Systems},
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        month = {March},
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/128.pdf}
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/128.pdf}
 }
 
 @inproceedings{lv02gnutellascalable,
@@ -1328,8 +1328,8 @@
        title = {Can Heterogeneity Make Gnutella Scalable ?},
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        month = {March},
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/165.pdf}
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/165.pdf}
 }
 
 @inProceedings{keleher-02-p2p,
@@ -1337,8 +1337,8 @@
        author = "Pete Keleher and Samrat Bhattacharjee and Bujor Silaghi",
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        month = {March},
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/169.pdf}
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/169.pdf}
 }
 
 @inProceedings{saia02dynamicfaultcontentnetwork,
@@ -1346,8 +1346,8 @@
        author = "Jared Saia and Amos Fiat and Steven Gribble and Anna Karlin 
and Stefan Saroiu",
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        month = {March},
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/180.pdf}
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/180.pdf}
 }
 
 @inProceedings{yang02efficientsearch,
@@ -1355,8 +1355,8 @@
        author = "Beverly Yang and Hector Garcia-Molina",
        booktitle = {Proceedings of the 22nd IEEE International Conference on 
Distributed Computing Systems (ICDCS)},
        month = {July},
-       year = {2002},
-       url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2001-47&format=pdf&compression=}
+       year = {2002}
+       %url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2001-47&format=pdf&compression=}
 }
 
 
@@ -1365,16 +1365,16 @@
        author = "Nancy Lynch and Dahlia Malkhi and David Ratajczak",
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        month = {March},
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/137.pdf}
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/137.pdf}
 }
 
 @inProceedings{yang02comparinghybrid,
        title = "Comparing Hybrid Peer-to-Peer Systems",
        author = "Beverly Yang and Hector Garcia-Molina",
        booktitle = {Proceedings of Very Large Databases (VLDB)},       
-       year = {2001},
-       url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2000-35&format=pdf&compression=}
+       year = {2001}
+       %url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2000-35&format=pdf&compression=}
 }
 
 @inproceedings{571863,
@@ -1382,11 +1382,11 @@
        title = {Analysis of the evolution of peer-to-peer systems},
        booktitle = {Proceedings of the twenty-first annual symposium on 
Principles of distributed computing},
        year = {2002},
-       isbn = {1-58113-485-1},
+       %isbn = {1-58113-485-1},
        pages = {233--242},
        location = {Monterey, California},
-       doi = {http://doi.acm.org/10.1145/571825.571863},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/571825.571863},
+       publisher = {ACM Press}
  }
 
  
@@ -1396,8 +1396,8 @@
        booktitle = {Proceedings of the 10th ACM SIGOPS European Workshop},
        location = {Saint-Émilion, France},
        month = {September},    
-       year = {2002},
-       url = {http://www.eecs.harvard.edu/~jonathan/p2p/sigops02abstract.pdf}
+       year = {2002}
+       %url = {http://www.eecs.harvard.edu/~jonathan/p2p/sigops02abstract.pdf}
 }
 
 @inProceedings{castro02securerouting,
@@ -1406,8 +1406,8 @@
        booktitle = {Proceedings of the 5th Usenix Symposium on Operating 
Systems Design and Implementation},
        location = {Boston, MA},
        month = {December},
-       year = {2002},
-       url = {http://www.cs.rice.edu/~dwallach/pub/osdi2002.pdf}       
+       year = {2002}
+       %url = {http://www.cs.rice.edu/~dwallach/pub/osdi2002.pdf}      
 }
 
 %WOW!
@@ -1416,8 +1416,8 @@
        title = {A Framework for Resource Management in Peer-to-Peer Networks},
        booktitle = {Proceedings of NetObjectdays 2002},
        month = {October},
-       year ={2002},
-       url = {http://www.netobjectdays.org/pdf/02/papers/node/0017.pdf}
+       year ={2002}
+       %url = {http://www.netobjectdays.org/pdf/02/papers/node/0017.pdf}
 }
 
 @inProceedings{schlosser-scalable,
@@ -1425,8 +1425,8 @@
        title = "A Scalable and Ontology-Based P2P Infrastructure for Semantic 
Web Services",
        booktitle = "Proceedings of the Second IEEE International Conference on 
Peer-to-Peer Computing (P2P2002)",
        month = {September},
-       year = {2002},
-       url = "http://www-db.stanford.edu/~schloss/docs/SWSP2P-P2P2002.pdf";
+       year = {2002}
+       %url = "http://www-db.stanford.edu/~schloss/docs/SWSP2P-P2P2002.pdf";
 }
 
 @misc{joseph02p2players,       
@@ -1440,8 +1440,8 @@
        title = {Scalable, Efficient Range Queries for Grid Information 
Services},
        booktitle = "Proceedings of the Second IEEE International Conference on 
Peer-to-Peer Computing (P2P2002)",
        month = {September},
-       year = {2002},
-       url = {http://www.hpl.hp.com/techreports/2002/HPL-2002-209.pdf}
+       year = {2002}
+       %url = {http://www.hpl.hp.com/techreports/2002/HPL-2002-209.pdf}
 }
 
 @inProceedings{joseph02neurogrid,
@@ -1450,8 +1450,8 @@
        booktitle = {Proceedings of Internation Workshop on Peer-to-Peer 
Computing},
        location = {Pisa, Italy},
        month = {May},
-       year = {2002},
-       url = {http://www.neurogrid.net/NeuroGridSimulations_mod_b.pdf}
+       year = {2002}
+       %url = {http://www.neurogrid.net/NeuroGridSimulations_mod_b.pdf}
 }
 
 @inProceedings{babaoglu02anthill,
@@ -1460,8 +1460,8 @@
        booktitle = "Proceedings of the 22th International Conference on 
Distributed Computing Systems",
        location = {Vienna, Austria},
        month = {July},
-       year = "2002",
-       url = "http://www.cs.unibo.it/projects/anthill/papers/anthill-01.pdf";
+       year = "2002"
+       %url = "http://www.cs.unibo.it/projects/anthill/papers/anthill-01.pdf";
 }
 
 %Research about network construction, molecules in cell, internet
@@ -1471,8 +1471,8 @@
         journal = {Reviews of Modern Physics},
         volume = {74},
         number = {47},
-        year = {2002},
-        url = {http://www.santafe.edu/sfi/education/csss/files02/albert.pdf}   
 
+        year = {2002}
+        %url = {http://www.santafe.edu/sfi/education/csss/files02/albert.pdf}  
 
 }
 
 @article{albert-00-tolerance,
@@ -1531,7 +1531,7 @@
         year = {1990},
         issn = {0001-0782},
         pages = {668--676},
-        doi = {http://doi.acm.org/10.1145/78973.78977},
+        %doi = {http://doi.acm.org/10.1145/78973.78977},
         publisher = {ACM Press},
 }
 
@@ -1540,8 +1540,8 @@
         title = "Censorship Resistant Peer-to-Peer Content Addressable 
Networks",
         booktitle = "Thirteenth ACM-SIAM Symposium on Discrete Algorithms",
         month = "Jan",
-        year = "2002",
-        url = "citeseer.nj.nec.com/fiat02censorship.html"
+        year = "2002"
+        %url = "citeseer.nj.nec.com/fiat02censorship.html"
 }
 
 @inproceedings{gurmeet03symphony,
@@ -1550,8 +1550,8 @@
        booktitle = {Proceedings of the 4th USENIX Symposium on Internet 
Technologies and System (USITS '03)},
        month = {March},
        year = {2003},
-       location = {Seattle, Washington},
-       url = {http://www-db.stanford.edu/~manku/papers/03usits-symphony.pdf}
+       location = {Seattle, Washington}
+       %url = {http://www-db.stanford.edu/~manku/papers/03usits-symphony.pdf}
 }
 
 @inproceedings{258660,
@@ -1559,11 +1559,11 @@
        title = {Consistent hashing and random trees: distributed caching 
protocols for relieving hot spots on the World Wide Web},
        booktitle = {Proceedings of the twenty-ninth annual ACM symposium on 
Theory of computing},
        year = {1997},
-       isbn = {0-89791-888-6},
+       %isbn = {0-89791-888-6},
        pages = {654--663},
        location = {El Paso, Texas, United States},
-       doi = {http://doi.acm.org/10.1145/258533.258660},
-       publisher = {ACM Press},
+       %doi = {http://doi.acm.org/10.1145/258533.258660},
+       publisher = {ACM Press}
 }
 
 
@@ -1589,8 +1589,8 @@
        title = {Experiences Deploying a Large-Scale Emergent Network},
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        month = {March},
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/188.pdf}      
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/188.pdf}     
 }
 
 @inproceedings{eriksson03peernet,
@@ -1598,8 +1598,8 @@
        title = {{PeerNet}: Pushing Peer-to-Peer Down the Stack},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {Mar},
-       year = {2003},
-       url = {http://www.cs.ucr.edu/~jeriksson/peernet_iptps03.pdf}
+       year = {2003}
+       %url = {http://www.cs.ucr.edu/~jeriksson/peernet_iptps03.pdf}
 }
 
 
@@ -1608,8 +1608,8 @@
        title = {Efficient Recovery From Organizational Disconnects in 
{SkipNet}},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {Mar},
-       year = {2003},
-       url = 
{http://research.microsoft.com/sn/Herald/papers/usits_submission.pdf}
+       year = {2003}
+       %url = 
{http://research.microsoft.com/sn/Herald/papers/usits_submission.pdf}
 }
 
 @inproceedings{ansaryefficientbroadcast03,
@@ -1617,8 +1617,8 @@
        title = {Efficient Broadcast in Structured {P2P} Networks},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {Mar},
-       year = {2003},
-       url = {http://www.sics.se/pepito/D2.7/paper3.pdf}
+       year = {2003}
+       %url = {http://www.sics.se/pepito/D2.7/paper3.pdf}
 }
 
 @inproceedings{harvey03skipnet2,
@@ -1627,8 +1627,8 @@
        booktitle = {Proceedings of the 4th USENIX Symposium on Internet 
Technologies and Systems (USITS '03)},
        month = {March},
        year = {2003},
-       location = {Seattle, Washington},
-       url = 
{http://research.microsoft.com/sn/Herald/papers/usits_submission.pdf}
+       location = {Seattle, Washington}
+       %url = 
{http://research.microsoft.com/sn/Herald/papers/usits_submission.pdf}
 }
 
 @inproceedings{castro03evalutionoverlays,
@@ -1636,8 +1636,8 @@
        title = {An Evaluation of Scalable Application-Level Multicast Built 
Using Peer-To-Peer Overlays},
        booktitle = {The 22nd Annual Joint Conference of the IEEE  Computer  
and Communications Societies (INFOCOM 2003)},
        month = {April},
-       year = {2003},
-       url = {http://research.microsoft.com/sn/Herald/papers/Infocom03.pdf}
+       year = {2003}
+       %url = {http://research.microsoft.com/sn/Herald/papers/Infocom03.pdf}
 }
 
 @inproceedings{garciamolina03sil,
@@ -1645,8 +1645,8 @@
        title = {Studying search networks with {SIL}},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-51&format=pdf&compression=}
+       year = {2003}   
+       %url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-51&format=pdf&compression=}
 }
 
 @inproceedings{rowston03controlloingreliability,
@@ -1654,8 +1654,8 @@
        title = {Controlling the Cost of Reliability in Peer-to-Peer Overlays},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {Mar},
-       year = {2003},  
-       url = {http://research.microsoft.com/~antr/PAST/reliability.pdf}
+       year = {2003}   
+       %url = {http://research.microsoft.com/~antr/PAST/reliability.pdf}
 }
 
 @inProceedings{Bhattacharjee03resultcache,        
@@ -1663,8 +1663,8 @@
        title = "Efficient Peer-To-Peer Searches Using Result-Caching",
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},
-       url = {http://www.cs.umd.edu/~keleher/papers/view02.pdf}        
+       year = {2003}
+       %url = {http://www.cs.umd.edu/~keleher/papers/view02.pdf}       
 }
 
 @inproceedings{byers03dhtbalancing,
@@ -1672,8 +1672,8 @@
        title = {Simple Load Balancing for Distributed Hash Tables},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = 
{http://www.cs.bu.edu/techreports/ps/2002-029-simple-load-balancing.ps}
+       year = {2003}   
+       %url = 
{http://www.cs.bu.edu/techreports/ps/2002-029-simple-load-balancing.ps}
 }
 
 @inproceedings{pias03lighthouse,
@@ -1681,8 +1681,8 @@
        title = {Lighthouses for Scalable Distributed Location},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = 
{http://www.cs.ucl.ac.uk/staff/m.pias/reports_ucl_phd/lighthouse-final.ps}
+       year = {2003}   
+       %url = 
{http://www.cs.ucl.ac.uk/staff/m.pias/reports_ucl_phd/lighthouse-final.ps}
 }
 
 @inproceedings{naor03simpledht,
@@ -1690,8 +1690,8 @@
        title = {A Simple Fault Tolerant Distributed Hash Table},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://www.wisdom.weizmann.ac.il/~uwieder/papers/ftdht.ps}
+       year = {2003}   
+       %url = {http://www.wisdom.weizmann.ac.il/~uwieder/papers/ftdht.ps}
 }
 
 @inproceedings{gupta03kelips,
@@ -1699,8 +1699,8 @@
        title = {Kelips: Building an Efficient and Stable {P2P DHT} Through 
Increased Memory and Background Overhead},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = 
{http://www.cs.cornell.edu/info/projects/spinglass/public_pdfs/Kelips.pdf}
+       year = {2003}   
+       %url = 
{http://www.cs.cornell.edu/info/projects/spinglass/public_pdfs/Kelips.pdf}
 }
 
 @inproceedings{ng02predicting,
@@ -1708,8 +1708,8 @@
        title = {Predicting Internet network distance with coordiantes-based 
approaches},
        booktitle = {The 21st Annual Joint Conference of the IEEE  Computer  
and Communications Societies (INFOCOM '02)},
        location = {New York, USA},
-       year = {2001},
-       url = {http://www.ieee-infocom.org/2002/papers/785.pdf}
+       year = {2001}
+       %url = {http://www.ieee-infocom.org/2002/papers/785.pdf}
 }
 
 @InProceedings{Gribble:2000:SDD,
@@ -1717,8 +1717,8 @@
        title = "Scalable, Distributed Data Structures for {Internet} Service 
Construction",
        booktitle = "Proceedings of the Fourth OSDI",
        month = "October",      
-       year = "2000",  
-       url = 
"http://www.usenix.org/publications/library/proceedings/osdi2000/gribble.html";  
           
+       year = "2000"   
+       %url = 
"http://www.usenix.org/publications/library/proceedings/osdi2000/gribble.html";  
          
 }
 
 @inproceedings{douceur02sybil, 
@@ -1726,8 +1726,8 @@
        title = {The {S}ybil Attack},
        booktitle = {Proceedings of the 1st {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS02})},
        month = {March},
-       year = {2002},
-       url = {http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf}      
+       year = {2002}
+       %url = {http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf}     
 }
 
 @techreport{castro02networkproximity,
@@ -1735,8 +1735,8 @@
        title = {Exploiting network proximity in peer-to-peer overlay networks},
        number = {MSR-TR-2002-82},
        institution = {Microsoft Research},     
-       year = {2002},
-       url = {http://www.cs.rice.edu/CS/Systems/PAST/location.pdf}       
+       year = {2002}
+       %url = {http://www.cs.rice.edu/CS/Systems/PAST/location.pdf}      
 }
 
 @inproceedings{296824,
@@ -1744,11 +1744,11 @@
        title = {Practical Byzantine fault tolerance},
        booktitle = {Proceedings of the third symposium on Operating systems 
design and implementation},
        year = {1999},
-       isbn = {1-880446-39-1},
+       %isbn = {1-880446-39-1},
        pages = {173--186},
        location = {New Orleans, Louisiana, United States},
-       publisher = {USENIX Association},
-       url = {http://www.pmg.lcs.mit.edu/papers/osdi99.pdf}
+       publisher = {USENIX Association}
+       %url = {http://www.pmg.lcs.mit.edu/papers/osdi99.pdf}
 }
 
 @inproceedings{juels99clientpuzzles,
@@ -1757,8 +1757,8 @@
        booktitle = {Proceedings of NDSS '99 (Networks and Distributed Security 
Systems)},
        pages = {151--165},
        month = {February},
-       year = {1999.},
-       url = 
{http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/client-puzzles/clientpuzzles.ps}
+       year = {1999.}
+       %url = 
{http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/client-puzzles/clientpuzzles.ps}
 }
 
 @article{357176,
@@ -1770,15 +1770,15 @@
        year = {1982},
        issn = {0164-0925},
        pages = {382--401},
-       doi = {http://doi.acm.org/10.1145/357172.357176},
+       %doi = {http://doi.acm.org/10.1145/357172.357176},
        publisher = {ACM Press},
 }
 
 @misc{grahamp2psecurity,
        title = {{P2P} Security Issues},
        author = {Ross Lee Graham},     
-       year = {2001},
-       url = {http://www.ida.liu.se/~rosgr/p2psecurity.html}   
+       year = {2001}
+       howpublished = {http://www.ida.liu.se/~rosgr/p2psecurity.html}  
 }
 
 @inproceedings{zhao03api,
@@ -1786,8 +1786,8 @@
        title = "Towards a {C}ommon {API} for Structured Peer to Peer Overlays",
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})}, 
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/api.ps},
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/api.ps},
 }
 
 %Schema based access control
@@ -1796,7 +1796,7 @@
        title = {Information Integration in Schema-Based Peer-To-Peer Networks},
        booktitle = {In proceedings of the Twelfth International WWW03 
Conference},     
        year = {2003},
-       location = {Budapest, Hungary}, 
+       location = {Budapest, Hungary}  
 }
 
 @inproceedings{bhagwan03availability,
@@ -1804,8 +1804,8 @@
        title = {Understanding Availability},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/availability.pdf}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/availability.pdf}
 }
 
 
@@ -1814,8 +1814,8 @@
        title = {Rateless Codes and Big Downloads},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/rateless_codes.ps}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/rateless_codes.ps}
 }
 
 @inproceedings{li03feasibility,
@@ -1823,8 +1823,8 @@
        title = {On the Feasibility of Peer-to-Peer Web Indexing and Search},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = 
{http://iptps03.cs.berkeley.edu/final-papers/search_feasibility.ps}
+       year = {2003}   
+       %url = 
{http://iptps03.cs.berkeley.edu/final-papers/search_feasibility.ps}
 }
 
 @inproceedings{balakrishnan03semanticfree,
@@ -1832,8 +1832,8 @@
        title = {Semantic-Free Referencing in Linked Distributed Systems},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/sfl.ps}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/sfl.ps}
 }
 
 @inproceedings{zhang03somo,
@@ -1841,8 +1841,8 @@
        title = {{SOMO}: self-organized metadata overlay for resource 
management in {P2P DHT}},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/somo.pdf}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/somo.pdf}
 }
 
 @inproceedings{kaashoek03koorde,
@@ -1850,8 +1850,8 @@
        title = {Koorde: A Simple Degree-optimal Hash Table},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/koorde.ps}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/koorde.ps}
 }
 
 @inproceedings{rao03loadbalancing,
@@ -1859,8 +1859,8 @@
        title = {Load Balancing in Structured P2P Systems},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/load_balancing.ps}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/load_balancing.ps}
 }
 
 @inproceedings{rhea03benchmarks,
@@ -1868,8 +1868,8 @@
        title = {Structured Peer-to-Peer Overlays Need Application-Driven 
Benchmarks},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/benchmark.ps}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/benchmark.ps}
 }
 
 
@@ -1898,8 +1898,8 @@
         number = {2},
         year = {2003},  
         pages = {43--48},
-        url = {http://project-iris.net/papers/cacm-paper.pdf},
-        publisher = {ACM Press},
+        %url = {http://project-iris.net/papers/cacm-paper.pdf},
+        publisher = {ACM Press}
 }
 
 
@@ -1936,8 +1936,8 @@
        author ={Neil Daswani and Hector Garcia-Molina},
        title = {Query-Flood {DoS} Attacks in {Gnutella}},
        booktitle = {Proceedings of the ACM Transactions on Information Systems 
({TOIS '02})},
-       year = {2002},  
-       url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-26&format=pdf&compression=}
+       year = {2002}   
+       %url = 
{http://dbpubs.stanford.edu/pub/showDoc.Fulltext?lang=en&doc=2002-26&format=pdf&compression=}
 
 }
 
@@ -1947,8 +1947,8 @@
         booktitle ="In Proc. of the Eleventh International Workshop on Network 
and Operating System Support 
         for Digital Audio and Video (NOSSDAV 2001)",
         month = "June",
-        year = "2001",  
-        url = 
{http://www.cs.berkeley.edu/~ravenben/publications/pdf/bayeux.pdf}
+        year = "2001"  
+        %url = 
{http://www.cs.berkeley.edu/~ravenben/publications/pdf/bayeux.pdf}
 }
 
 @misc{fenfireurl,
@@ -1966,14 +1966,14 @@
        year = {1996},
        issn = {0004-5411},
        pages = {293--330},
-       doi = {http://doi.acm.org/10.1145/226643.226658},
+       %doi = {http://doi.acm.org/10.1145/226643.226658},
        publisher = {ACM Press},
 }
 
 @misc{ted-xu-model,
        author = {Ted Nelson},
        title = {Deep hypertext: the {X}anadu{\textregistered} model},
-       howpublished = {\url{http://xanadu.net/xuTheModel/}},
+       howpublished = {http://xanadu.net/xuTheModel},
        year = 2001,
 }
 
@@ -1989,37 +1989,37 @@
        title = "{SDSI} -- {A} Simple Distributed Security Infrastructure",
        howpublished = "Presented at CRYPTO'96 Rumpsession",
        year = "1996",
-       url = "http://theory.lcs.mit.edu/~rivest/sdsi10.html";
+       %url = "http://theory.lcs.mit.edu/~rivest/sdsi10.html";
 }
 
 @misc{spkiworkinggroup,
        title = {Simple Public Key Infrastructure working group},
        key = {Simple Public Key Infrastructure working group},
-       url = {http://www.ietf.org/html.charters/spki-charter.html}
+       howpublished = {http://www.ietf.org/html.charters/spki-charter.html}
 }
 
address@hidden,
address@hidden,
        title = {Advogato Trust Metric},
        key = {Advogato Trust Metric},
-       url = {http://advogato.org/trust-metric.html}
+       howpublished = {http://advogato.org/trust-metric.html}
 }
 
 @misc{kashmirurl,
        key = {Khashmir},
        title ={Khashmir},
-       url = {http://khashmir.sourceforge.net/}
+       howpublished = {http://khashmir.sourceforge.net/}
 }
 
 @misc{mixminionurl,
        title ={Mixminion},
        key = {Mixminion},
-       url ={http://www.mixminion.net/}
+       howpublished ={http://www.mixminion.net/}
 }
 
 @misc{mneturl,
        title = {MNet},
        key = {MNet},
-       url = {http://mnet.sourceforge.net/}
+       howpublished = {http://mnet.sourceforge.net/}
 }
 
 @article{Shamir1979a,
@@ -2054,10 +2054,10 @@
        title = {Adaptive set intersections, unions, and differences},
        booktitle = {Proceedings of the eleventh annual ACM-SIAM symposium on 
Discrete algorithms},
        year = {2000},
-       isbn = {0-89871-453-2},
+       %isbn = {0-89871-453-2},
        pages = {743--752},
        location = {San Francisco, California, United States},
-       doi = {http://doi.acm.org/10.1145/338219.338634},
+       %doi = {http://doi.acm.org/10.1145/338219.338634},
        publisher = {ACM Press},
 }
 
@@ -2067,8 +2067,8 @@
        title = {Adaptive Peer Selection},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = 
{http://iptps03.cs.berkeley.edu/final-papers/adaptive_selection.pdf}
+       year = {2003}   
+       %url = 
{http://iptps03.cs.berkeley.edu/final-papers/adaptive_selection.pdf}
 }
 
 @article{504642,
@@ -2080,7 +2080,7 @@
         year = {2001},
         issn = {1063-6692},
         pages = {392--403},
-        doi = {http://doi.acm.org/10.1145/504640.504642},
+        %doi = {http://doi.acm.org/10.1145/504640.504642},
         publisher = {ACM Press},
 }
 
@@ -2119,8 +2119,8 @@
        journal = {IEEE Internet Computing},
        volume = {6},
        pages = {68--73}, 
-       year = {2002},
-       url = {http://www.jxta.org/project/www/docs/jsearch.pdf}
+       year = {2002}
+       %url = {http://www.jxta.org/project/www/docs/jsearch.pdf}
 }
 
 
@@ -2129,8 +2129,8 @@
        title = {Rationality and Self-Interest in Peer to Peer Networks},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/rationality.ps}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/rationality.ps}
 }
 
 @inproceedings{ngan03enforcefile,
@@ -2138,8 +2138,8 @@
        title = {Enforcing Fair Sharing of Peer-to-Peer Resources},
        booktitle = {Proceedings of the 2nd {I}nternational {W}orkshop on 
{P}eer-to-{P}eer {S}ystems ({IPTPS03})},
        month = {February},
-       year = {2003},  
-       url = {http://iptps03.cs.berkeley.edu/final-papers/rationality.ps}
+       year = {2003}   
+       %url = {http://iptps03.cs.berkeley.edu/final-papers/rationality.ps}
 }  
 
 @misc{googleurl,
@@ -2157,7 +2157,7 @@
        year = {1997},
        issn = {0001-0782},
        pages = {102--108},
-       doi = {http://doi.acm.org/10.1145/253671.253741},
+       %doi = {http://doi.acm.org/10.1145/253671.253741},
        publisher = {ACM Press},
 }
 
@@ -2168,7 +2168,7 @@
        publisher = {Prentice-Hall},
        Pages = {651},
        Year = {1990},
-       ISBN = {0-13-643016-3} 
+       %isbn = {0-13-643016-3} 
 }
 
 @inproceedings{372148,
@@ -2176,10 +2176,10 @@
        title = {Protecting web servers from distributed denial of service 
attacks},
        booktitle = {Proceedings of the tenth international conference on World 
Wide Web},
        year = {2001},
-       isbn = {1-58113-348-0},
+       %isbn = {1-58113-348-0},
        pages = {514--524},
        location = {Hong Kong, Hong Kong},
-       doi = {http://doi.acm.org/10.1145/371920.372148},
+       %doi = {http://doi.acm.org/10.1145/371920.372148},
        publisher = {ACM Press},
 }
 
@@ -2201,7 +2201,7 @@
     title = {Implementing the ISO-OSI reference model},
     booktitle = {Proceedings of the eigth Data Communications Symposium},
     year = {1983},
-    isbn = {0-89791-113-X},
+    %isbn = {0-89791-113-X},
     pages = {56--66},
     location = {North Falmouth, Massachusetts, United States},
 }




reply via email to

[Prev in Thread] Current Thread [Next in Thread]