Electronic Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02)

7-8 March 2002 - MIT Faculty Club, Cambridge, MA, USA.


Proceedings of all IPTPS workshops can be found via the main site of the International Workshop on Peer-to-Peer Systems (IPTPS).


Organizing chairs

Frans Kaashoek, MIT
Antony Rowstron, Microsoft Research

Steering committee

Peter Druschel, Rice University
Frans Kaashoek, MIT
Antony Rowstron, Microsoft Research
Scott Shenker, ACIRI, Berkeley
Ion Stoica, UC Berkeley
Program Committee

Ross Anderson, Cambridge University
Roger Dingledine, Reputation Technologies, Inc.
Peter Druschel, Rice University (co-chair)
Steve Gribble, University of Washington
David Karger, MIT
John Kubiatowicz, UC Berkeley
Robert Morris, MIT
Antony Rowstron, Microsoft Research (co-chair)
Avi Rubin, AT&T Labs - Research
Scott Shenker, ACIRI, Berkeley
Ion Stoica, UC Berkeley

Springer-Verlag has produced a post-proceedings in their LNCS Hot Topics series, containing revised versions of the papers. The volume is available as LNCS 2429.
Peer-to-peer has emerged as a promising new paradigm for distributed computing.  The 1st International Workshop on Peer-to-Peer Systems (IPTPS) aimed to provide a forum for researchers active in peer-to-peer computing to discuss the state-of-the-art and to identify key research challenges in peer-to-peer computing.

The goal of the workshop was to examine peer-to-peer technologies, applications and systems, and also to identify key research issues and challenges that lie ahead.  In the context of this workshop, peer-to-peer systems were characterized as being decentralized, self-organizing distributed systems, in which all or most communication is symmetric.  Topics of interest include, but were not limited to:

  • novel peer-to-peer applications and systems
  • peer-to-peer infrastructure
  • security in peer-to-peer systems
  • anonymity and anti-censorship
  • performance of peer-to-peer systems
  • workload characterization for peer-to-peer systems

The program of the workshop was a combination of invited review talks, presentations of position papers, and discussions. To ensure a productive workshop environment, attendance was limited to about 50 participants who were active in the field.  Each potential participant submitted a position paper of 5 pages or less that exposes a new problem, advocates a specific solution, or reports on actual experience. We received 99 submissions, and participants were invited based on the originality, technical merit and topical relevance of their submissions, as well as the likelihood that the ideas expressed in their submissions would lead to insightful technical discussions at the workshop.

We will be producing minutes of the workshop which will be available in a few weeks.


  DHT routing protocols: State of the art and future directions      
  Observations on the Dynamic Evolution of Peer-to-peer Networks David Liben-Nowell, Hari Balakrishnan and David Karger PDF
  Brocade: Landmark Routing on Overlay Networks Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz PDF
  Routing Algorithms for DHTs: Some Open Questions Sylvia Ratnasamy, Scott Shenker and Ion Stoica PDF
  Deployed peer-to-peer systems      
  Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu and Ian Foster PDF
  Can Heterogeneity Make Gnutella Scalable? Qin Lv, Sylvia Ratnasamy and Scott Shenker PDF
  Experiences Deploying a Large-Scale Emergent Network Bryce Wilcox-O'Hearn PDF
  Anonymous overlays      
 Achord: A Variant of the Chord Lookup Service for Use in Censorship Resistant Peer-to-PeerSteven Hazel and Brandon Wiley PDF
 Anonymizing censorship resistant systemsA. Serjantov PDF
 Tarzan: A Peer-to-Peer Anonymizing Network LayerMichael J. Freedman, Emil Sit, Josh Cates and Robert Morris PDF
  Applications I      
 Mnemosyne: Peer-to-Peer Steganographic StorageSteven Hand and Timothy Roscoe PDF
 ConChord: Cooperative SDSI Certificate Storage and Name ResolutionSameer Ajmani, Dwaine Clarke, Chuang-Hue Moh and Steven Richman PDF
 Serving DNS using ChordRuss Cox, Athicha Muthitacharoen and Robert Morris PDF
  Are we on the right track?      
  Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS Stefan Saroiu, P. Krishna Gummadi and Steven D. Gribble PDF
  Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Samrat Bhattacharjee and Bujor Silaghi PDF
  Searching and indexing      
 Locating Data in (Small-World?) P2P Scientific CollaborationsAdriana Iamnitchi, Matei Ripeanu and Ian Foster PDF
 Complex Queries in DHT-based Peer-to-Peer Networks Matthew Harren, Joseph M. Hellerstein, Ryan Huebsch, Boon T. Loo, Scott Shenker and Ion Stoica PDF
  Security in peer-to-peer systems      
 The Sybil AttackJohn R. Douceur PDF
  Security Considerations for Peer-to-Peer Distributed Hash TablesEmil Sit and Robert Morris PDF
 Dynamically Fault-Tolerant Content Addressable NetworksJared Saia, Amos Fiat, Steve Gribble, Anna Karlin and Stefan Saroiu PDF
  Application II      
 Network Measurement as a Cooperative Enterprise Sridhar Srinivasan and Ellen Zegura PDF
 The Case for Cooperative Networking Venkata N. Padmanabhan and Kunwadee Sripanidkulchai PDF
 Internet Indirection Infrastructure Ion Stoica, Dan Adkins, Sylvia Ratnasamy, Scott Shenker, Sonesh Surana and Shelley Zhuang PDF
 Peer-to-Peer Caching Schemes to Address Flash Crowds Tyron Stading, Petros Maniatis and Mary Baker PDF
  Data Management      
 Scalable Management and Data Mining Using AstrolabeRobbert Van Renesse and Kenneth Birman PDF
 Atomic Data Access in Content Addressable NetworksNancy Lynch, Dahlia Malkhi and David Ratajczak PDF
 Dynamic Replica Placement for Scalable Content DeliveryYan Chen, Randy Katz and John Kubiatowicz PDF
 Kademlia: A Peer-to-peer Information System Based on the XOR MetricPetar Maymounkov and David Mazieres PDF
 Peer-to-peer resource trading in a reliable distributed systemBrian F. Cooper and Hector Garcia-Molina PDF
 Efficient Peer-to-Peer Lookup Based on a Distributed TrieMichael J. Freedman and Radek Vingralek PDF
 Erasure Coding vs. Replication: A Quantitative ComparisonHakim Weatherspoon and John D. Kubiatowicz PDF
 Self-Organizing Subsets: From Each According to His Abilities, To Each According to His NeedsAmin Vahdat, Jeffrey Chase, Rebecca Braynard, Dejan Kostic and Adolfo Rodriguez PDF

We gratefully acknowledge the financial support for IPTPS'02 from: