ACS-7301/3-001 Winter 2009

Administrivia

Instructor: Alex Brodsky     Office: 3D17
E-mail: acs7301@acs.uwinnipeg.ca     Office hours: Monday and Wednesday, 16:00-17:00
Class Meeting Time: Monday and Wednesday, 14:30-15:45     Room No: 4M39
Course Group: Email acs7301@acs.uwinnipeg.ca to receive an invite.

The course official course outline is available here.


Course Work

Work Due Description Due Date
Summaries 300 word summaries of papers to be discussed in class (posted to the course news group). 23:59h, January 18 and 25, 2009
23:59h, February 1, 8, and 22, 2009
23:59h, March 1, 8, 15, 22, and 29, 2009
Assignment Basic Networking
Solution: Inject.java, Peer.java
17:00h, February 2, 2009
Proposal Guidelines 17:00h, March 2, 2009
Presentation In-class presentation (20-30 minute) of your class project. April 1 and 6, 2009
Report Final report on your project. 17:00h, April 23, 2009

Late Submissions

Submissions will not be accepted after the due date.

Submitting Work

The assignment must be submitted in both paper and electronic form. The project proposal and project report must be submitted in paper form, and any accompanying code should be submitted in electronic form.


Marking Scheme

A course mark will be assigned based on:
Component Evaluation Weight
Proramming Assignment 10%
Project Proposal 15%
Paper Summaries 10%
Paper Discussion Participation 10%
Project 45%
Project Presentation 10%


Readings

Each week a couple papers will be discussed in class. For each paper the student must prepare a paper summary of approximately 300 words, answering the five question:

taken from the strongly recommended reading article "How to Read an Engineering Research Paper", by Bill Griswold, modified by Gail Murphy. The summaries MUST be posted to the course group by midnight of the day before the class when the paper will be discussed. The schedule for the class discussions and the papers follow below:

January 19, 2009 [CSWH00] I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: a distributed anonymous information storage and retrieval system. In ICSI Workshop on Design Issues in Anonymity and Unobservability, pages 311-320, 2000.
[AH00] E. Adar and B. Huberman. Free riding on gnutella. First Monday, 5(10), 2000.
January 26, 2009 [DKK+01] F. Dabek, F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-Area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, volume 35 of ACM SIGOPS Operating Systems Review, pages 202-215, October 21-24 2001.
[RD01b] A. Rowstron and P. Druschel. Storage management and caching in PAST, A large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, volume 35 of ACM SIGOPS Operating Systems Review, pages 188-201, October 21-24 2001.
February 2, 2009 [RFH+01] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable Content-Addressable network. In Proceedings of the ACM SIGCOMM Conference, volume 31 of Computer Communication Review, pages 161-172, August 27-31 2001.
[RD01a] A. Rowstron and P. Druschel. Pastry: Scalable, decentralized ob ject location, and routing for large-scale peer-to-peer systems. In (Middleware 2001) 10th IFIP/ACM International Conference on Distributed Systems Platforms, volume 2218 of Lecture Notes in Computer Science, pages 329-350, 2001.
[SMK+01] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. of the ACM SIGCOMM Conference, 2001.
February 9, 2009 [Coh03] B. Cohen. Incentives build robustness in bittorrent. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA, 2003.
[SBB04] R. Sherwood, R. Braud, and B. Bhattacharjee. Slurpie: A cooperative bulk data transfer protocol. In Proceedings of the IEEE INFOCOM, 2004.
[AG04] K. Anagnostakis and M. Greenwald. Exchange-based incentive mechanisms for peer-to-peer file sharing. In IEEE 24th International Conference on Distributed Computing Systems, pages 524-533, 2004.
February 23, 2009 [MRR+03] P. Maniatis, D. Rosenthal, M. Roussopoulos, M. Baker, T. Giuli, and Y. Muliadi. Preserving peer replicas by rate-limited sampled voting. In Proc. of the 19th ACM Symposium on Operating Systems Principles, 2003.
[DN93] C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 139-147, 1993.
March 2, 2009 [DM06] R. Dingledine and N. Mathewson. Anonimity lovees company: Usability and the network effect. In The Fifth Workshop on the Economics of Information Security, 2006.
[DMS04] R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, pages 303-320. USENIX, 2004.
March 9, 2009 [Dou02] J. Douceur. The sybil attack. In Peer-to-Peer Systems, First International Workshop, IPTPS, volume 2429 of Lecture Notes in Computer Science, pages 251-260, 2002.
[CDG+02] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proc. of the 5th ACM Symposium on Operating System Design and Implementation, 2002.
March 16, 2009 [Les01] L. Lessig. The internet under siege. Foreign Policy, November/December 2001.
[Les04] L. Lessig. The laws of cyberspace. In R. Spinello and H. Tavani, editors, Readings in Cyberethics, 2nd ed. 2004.
March 23, 2009 [Les07b] L. Lessig. Does copyright have limits? eldred v. ashcroft and its aftermath. In B. Fitzgerald, editor, Open Content Licensing: Cultivating the Creative Commons. 2007.
[vL03] F. von Lohmann. Peer-to-peer file sharing and copyright law: A primer for developers. In Peer-to-Peer Systems, Second International Workshop, volume 2735 of Lecture Notes in Computer Science, pages 108-117, 2003.
[Sam04] P. Samuelson. Legally speaking: What's at stake in MGM v. Grokster?. Communications of the ACM, 47(2):15-20, 2004.
[Sam05] P. Samuelson. Did MGM really win the grokster case?. Communications of the ACM, 48(10):19-24, 2005.
Optional [Ger05] D. Gervais. Use of copyright content on the internet: Considerations on excludibility and collective licensing. In M. Geist, editor, In the Public Interest: The Future of Canadian Copyright Law. 2005.
March 30, 2009 [GWB97] I. Goldberg, D. Wagner, and E. Brewer. Privacy-enhancing technologies for the internet. October 20 1997.
[Gol02] I. Goldberg. Privacy-enhancing technologies for the internet, II: Five years later. In Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, pages 1-12, 2002.
[Les07a] L. Lessig. Code of privacy. 151 Proceedings of the American Philosophical Society, 283, 2007.

Resources