Instructor: | Alex Brodsky | Office: | 3D17 | |
E-mail: | acs7301@acs.uwinnipeg.ca | Office hours: | Monday and Wednesday, 16:00-17:00 | |
Class Meeting Time: | Monday and Wednesday, 14:30-15:45 | Room No: | 4M39 | |
Course Group: | Email acs7301@acs.uwinnipeg.ca to receive an invite. |
The course official course outline is available here.
Work Due | Description | Due Date |
Summaries | 300 word summaries of papers to be discussed in class (posted to the course news group). | 23:59h, January 18 and 25, 2009 23:59h, February 1, 8, and 22, 2009 23:59h, March 1, 8, 15, 22, and 29, 2009 |
Assignment | Basic Networking Solution: Inject.java, Peer.java |
17:00h, February 2, 2009 |
Proposal | Guidelines | 17:00h, March 2, 2009 |
Presentation | In-class presentation (20-30 minute) of your class project. | April 1 and 6, 2009 |
Report | Final report on your project. | 17:00h, April 23, 2009 |
Submissions will not be accepted after the due date.
The assignment must be submitted in both paper and electronic form. The project proposal and project report must be submitted in paper form, and any accompanying code should be submitted in electronic form.
A course mark will be assigned based on:
Component | Evaluation Weight |
Proramming Assignment | 10% |
Project Proposal | 15% | Paper Summaries | 10% | Paper Discussion Participation | 10% |
Project | 45% |
Project Presentation | 10% |
Each week a couple papers will be discussed in class. For each paper the student must prepare a paper summary of approximately 300 words, answering the five question:
January 19, 2009 |
[CSWH00] I. Clarke, O. Sandberg, B. Wiley, and T. Hong.
Freenet: a distributed anonymous information storage and retrieval system.
In ICSI Workshop on Design Issues in Anonymity and Unobservability,
pages 311-320, 2000.
[AH00] E. Adar and B. Huberman. Free riding on gnutella. First Monday, 5(10), 2000. |
January 26, 2009 |
[DKK+01] F. Dabek, F. Kaashoek, D. Karger, R. Morris, and I. Stoica.
Wide-Area cooperative storage with CFS.
In Proceedings of the 18th ACM Symposium on Operating Systems
Principles, volume 35 of ACM SIGOPS Operating Systems Review, pages
202-215, October 21-24 2001.
[RD01b] A. Rowstron and P. Druschel. Storage management and caching in PAST, A large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, volume 35 of ACM SIGOPS Operating Systems Review, pages 188-201, October 21-24 2001. |
February 2, 2009 |
[RFH+01] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker.
A scalable Content-Addressable network.
In Proceedings of the ACM SIGCOMM Conference, volume 31 of Computer
Communication Review, pages 161-172, August 27-31 2001.
[RD01a] A. Rowstron and P. Druschel. Pastry: Scalable, decentralized ob ject location, and routing for large-scale peer-to-peer systems. In (Middleware 2001) 10th IFIP/ACM International Conference on Distributed Systems Platforms, volume 2218 of Lecture Notes in Computer Science, pages 329-350, 2001. [SMK+01] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. of the ACM SIGCOMM Conference, 2001. |
February 9, 2009 |
[Coh03] B. Cohen.
Incentives build robustness in bittorrent.
In Proceedings of the Workshop on Economics of Peer-to-Peer Systems,
Berkeley, CA, USA, 2003.
[SBB04] R. Sherwood, R. Braud, and B. Bhattacharjee. Slurpie: A cooperative bulk data transfer protocol. In Proceedings of the IEEE INFOCOM, 2004. [AG04] K. Anagnostakis and M. Greenwald. Exchange-based incentive mechanisms for peer-to-peer file sharing. In IEEE 24th International Conference on Distributed Computing Systems, pages 524-533, 2004. |
February 23, 2009 |
[MRR+03] P. Maniatis, D. Rosenthal, M. Roussopoulos, M. Baker, T. Giuli, and
Y. Muliadi.
Preserving peer replicas by rate-limited sampled voting.
In Proc. of the 19th ACM Symposium on Operating Systems Principles, 2003.
[DN93] C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 139-147, 1993. |
March 2, 2009 |
[DM06] R. Dingledine and N. Mathewson.
Anonimity lovees company: Usability and the network effect.
In The Fifth Workshop on the Economics of Information Security, 2006.
[DMS04] R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, pages 303-320. USENIX, 2004. |
March 9, 2009 |
[Dou02] J. Douceur.
The sybil attack.
In Peer-to-Peer Systems, First International Workshop, IPTPS, volume
2429 of Lecture Notes in Computer Science, pages 251-260, 2002.
[CDG+02] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proc. of the 5th ACM Symposium on Operating System Design and Implementation, 2002. |
March 16, 2009 |
[Les01] L. Lessig.
The internet under siege.
Foreign Policy, November/December 2001.
[Les04] L. Lessig. The laws of cyberspace. In R. Spinello and H. Tavani, editors, Readings in Cyberethics, 2nd ed. 2004. |
March 23, 2009 |
[Les07b] L. Lessig.
Does copyright have limits? eldred v. ashcroft and its aftermath.
In B. Fitzgerald, editor, Open Content Licensing: Cultivating the
Creative Commons. 2007.
[vL03] F. von Lohmann. Peer-to-peer file sharing and copyright law: A primer for developers. In Peer-to-Peer Systems, Second International Workshop, volume 2735 of Lecture Notes in Computer Science, pages 108-117, 2003. [Sam04] P. Samuelson. Legally speaking: What's at stake in MGM v. Grokster?. Communications of the ACM, 47(2):15-20, 2004. [Sam05] P. Samuelson. Did MGM really win the grokster case?. Communications of the ACM, 48(10):19-24, 2005. Optional [Ger05] D. Gervais. Use of copyright content on the internet: Considerations on excludibility and collective licensing. In M. Geist, editor, In the Public Interest: The Future of Canadian Copyright Law. 2005. |
March 30, 2009 |
[GWB97] I. Goldberg, D. Wagner, and E. Brewer.
Privacy-enhancing technologies for the internet.
October 20 1997.
[Gol02] I. Goldberg. Privacy-enhancing technologies for the internet, II: Five years later. In Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, pages 1-12, 2002. [Les07a] L. Lessig. Code of privacy. 151 Proceedings of the American Philosophical Society, 283, 2007. |