skip to main content
10.1145/587078.587114acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
Article

Using speakeasy for ad hoc peer-to-peer collaboration

Published:16 November 2002Publication History

ABSTRACT

Peer-to-peer systems appear promising in terms of their ability to support ad hoc, spontaneous collaboration. However, current peer-to-peer systems suffer from several deficiencies that diminish their ability to support this domain, such as inflexibility in terms of discovery protocols, network usage, and data transports. We have developed the Speakeasy framework, which addresses these issues, and supports these types of applications. We show how Speakeasy addresses the shortcomings of current peer-to-peer systems, and describe a demonstration application, called Casca, that supports ad hoc peer-to-peer collaboration by taking advantages of the mechanisms provided by Speakeasy.

References

  1. Balfanz, D., Smetters, D.K., Stewart, P. and Wong, H.C., Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. Proceedings of Network and Distributed System Security Symposium (NDSS), (San Diego, CA, USA, 2002).]]Google ScholarGoogle Scholar
  2. Bellotti, V. Design for Privacy in Multimedia Computing and Communications Environments. in Rotenberg, M. ed. Technology and Privacy: The New Landscape, MIT Press, Cambridge, MA, 1997, 62--98.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bellotti, V. and Edwards, W.K. Intelligibility and Accountability: Human Considerations in Context Aware Systems. Jour. of Human Computer Interaction, 16:2-4. 2001.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Breidenbach, S. Peer-to-peer potential Network World, 2001.]]Google ScholarGoogle Scholar
  5. Cohen, J., Out to lunch: Further adventures monitoring background activity. Proceedings of ICAD 94, International Conference on Auditory Display, (Santa Fe, NM, USA, 1994), Santa Fe Institute, 15--20.]]Google ScholarGoogle Scholar
  6. Dourish, P. and Bellotti, V., Awareness and Coordination in Shared Workspaces. Proceedings of ACM Conference on Computer-Supported Cooperative Work (CSCW ), (Toronto, Canada., 1992), ACM Press, 107--114.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F. and Izadi, S., Challenge: Recombinant Computing and the Speakeasy Approach. Proceedings of The Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002), (Atlanta, GA USA, 2002).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gnutella. http://www.Gnutella.com, 2002.]]Google ScholarGoogle Scholar
  9. Goland, Y.Y., Cai, T., Leach, P., Gu, Y. and Albright, S. Simple Service Discovery Protocol/1.0: Operating Without an Arbiter. Internet Engineering Task Force Internet Draft. 1999.]]Google ScholarGoogle Scholar
  10. Gong, L. Project JXTA: A Technology Overview. Sun Microsystems, Inc. April 25, 2001.]]Google ScholarGoogle Scholar
  11. Groove Networks Inc. http://www.Groove.com, 2002.]]Google ScholarGoogle Scholar
  12. Litiu, R. and Prakash, A., Developing Adaptive Groupware Applications Using a Mobile Component Framework. Proceedings of Computer Supported Cooperative Work (CSCW), (Phil., PA, USA, 2000), ACM Press, 107--116.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Napster. http://www.Napster.com, 2002.]]Google ScholarGoogle Scholar
  14. Newman, M.W., Izadi, S., Edwards, W.K., Smith, T.F. and Sedivy, J.Z., User Interfaces When and Where They are Needed: An Infrastructure for Recombinant Computing. Proceedings of Symposium on User Interface Software and Technology (UIST), (Paris, France, 2002), ACM.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Newman, M.W., Sedivy, J.Z., Edwards, W.K., Smith, T.F., Marcelo, K., Neuwirth, C.M., Hong, J.I. and Izadi, S., Designing for Serendipity: Supporting End-User Configuration of Ubiquitous Computing Environments. Proceedings of Designing Interactive Systems (DIS), (London, UK, 2002), 147--156.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Palm, I. Bluetooth: Connecting Palm Powered(r) Handhelds. October 22, 2001.]]Google ScholarGoogle Scholar
  17. Palm Inc. Palm Bluetooth Card, 2002.]]Google ScholarGoogle Scholar
  18. Roseman, M. and Greenberg, S. Building Real Time Groupware with GroupKit, A Groupware Toolkit. ACM Transactions on Computer Human Interaction, 3 (1). 1996. 66--106.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Scannell, E. Wall Street firms embrace WorldStreet's p-to-p offerings InfoWorld, 2001.]]Google ScholarGoogle Scholar
  20. Smetters, D.K. and Grinter, R.E., Moving from the Design of Usable Security Technology to the Design of Useful Secure Applications. Proceedings of New Security Paradigms Workshop, (Norfolk, VA, 2002), ACM.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sun Microsystems. Jini Discovery and Join Specification. January, 1999.]]Google ScholarGoogle Scholar
  22. Sun Microsystems. Network File System Protocol Specification (RFC 1049). 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Universal Description Discovery and Integration Consortium. UDDI Technical Whitepaper. September 6, 2000.]]Google ScholarGoogle Scholar
  24. Waldo, J. The Jini Architecture for Network-centric Computing Communications of the ACM, 42:7, 1999, 76--82.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Wollrath, A., Riggs, R. and Waldo, J. A Distributed Object Model for the Java System. USENIX Computing Sys., 9. 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. WorldStreet. http://wwWorldStreet.com, 2002.]]Google ScholarGoogle Scholar

Index Terms

  1. Using speakeasy for ad hoc peer-to-peer collaboration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CSCW '02: Proceedings of the 2002 ACM conference on Computer supported cooperative work
      November 2002
      396 pages
      ISBN:1581135602
      DOI:10.1145/587078

      Copyright © 2002 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 November 2002

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      CSCW '02 Paper Acceptance Rate39of193submissions,20%Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader