[15] Leonidas Guibas and Jorge S<strong>to</strong>lfi. Primitives for the manipulation <strong>of</strong> general subdivisions and thecomputation <strong>of</strong> voronoi. ACM Trans. Graph., 4(2):74–123, 1985.[16] Shun-Yun Hu and Guan-Ming Liao. Scalable peer-<strong>to</strong>-peer networked virtual environment. InNet<strong>Game</strong>s ’04: Proceedings <strong>of</strong> 3rd ACM SIGCOMM workshop on Network and system support forgames, pages 129–133, New York, NY, USA, 2004. ACM.[17] Shun-Yun Hu and Guan-Ming Liao. Von: A scalable peer-<strong>to</strong>-peer network for virtual environments.In IEEE Network, vol. 20, no. 4, Jul./Aug. 2006, pages 22–31, 2006.[18] Patric Kabus and Alejandro Buchmann. Design <strong>of</strong> a cheat-resistant p2p online gaming system. InInternational Conference on Digital Interactive Media in Entertainment and Arts 2007, 2007.[19] Patric Kabus, Wesley Terpstra, Mariano Cilia, and Alejandro Buchmann. Addressing cheating in distributedmassively multiplayer online games. In ACM SIGCOMM workshop on Network and systemsupport for games, 2005.[20] Bjorn Knutsson, Honghui Lu, Wei Xu, and Bryan Hopkins. <strong>Peer</strong>-<strong>to</strong>-peer support for massivelymultiplayer games. volume 1, 2004.[21] Limewire.org. Gnutella pro<strong>to</strong>col specification wiki. http://wiki.limewire.org/index.php?title=GDF.[22] Michael R. Macedonia, Michael J. Zyda, David R. Pratt, Donald P. Brutzman, and Paul T. Barham.Exploiting reality <strong>with</strong> multicast groups. IEEE Comput. Graph. Appl., 15(5):38–45, 1995.[23] Petar Maymounkov and David Mazières. Kademlia: A peer-<strong>to</strong>-peer information system based onthe xor metric. In 1st International <strong>Peer</strong>-<strong>to</strong>-<strong>Peer</strong> Symposium (IPTPS 2002), pages 53–65, 2002.[24] Katherine L. Morse, Lubomir Bic, and Michael Dillencourt. Interest management in large-scalevirtual environments. Presence: Teleoper. Virtual Environ., 9(1):52–68, 2000.[25] Times Online. Computer games <strong>to</strong> out-sell music and video. http://business.timesonline.co.uk/<strong>to</strong>l/business/industry_sec<strong>to</strong>rs/technology/article5085685.ece, 2008.[26] Jeffrey Pang, Frank Uyeda, and Jacob R. Lorch. Scaling peer-<strong>to</strong>-peer games in low-bandwidthenvironments. In IPTPS: International workshop on <strong>Peer</strong>-To-<strong>Peer</strong> Systems, 2007.[27] Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. A scalablecontent-addressable network. SIGCOMM Comput. Commun. Rev., 31(4):161–172, 2001.[28] An<strong>to</strong>ny I. T. Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location, androuting for large-scale peer-<strong>to</strong>-peer systems. In Middleware ’01: Proceedings <strong>of</strong> the IFIP/ACM InternationalConference on Distributed Systems Platforms Heidelberg, pages 329–350, London, UK, 2001.Springer-Verlag.[29] Michael Scharf and Sebastian Kiesel. Head-<strong>of</strong>-line blocking in tcp and sctp: Analysis and measurements.In Global Telecommunications Conference, 2006. GLOBECOM ’06. IEEE, pages 1–5, 2006.[30] Arne Schmieg, Michael Stieler, Sebastian Jeckel, Patric Kabus, Bettina Kemme, and Alejandro Buchmann.psense - maintaining a dynamic localized peer-<strong>to</strong>-peer structure for position based multicastin games. In IEEE International Conference on <strong>Peer</strong>-<strong>to</strong>-<strong>Peer</strong> Computing 2008, 2008.[31] Randall R. Stewart. Stream control transmission pro<strong>to</strong>col. RFC 4960 (Proposed Standard), 2007.92 Bibliography
[32] Ion S<strong>to</strong>ica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalablepeer-<strong>to</strong>-peer lookup service for internet applications. In SIGCOMM ’01: Proceedings <strong>of</strong> the 2001conference on Applications, technologies, architectures, and pro<strong>to</strong>cols for computer communications,pages 149–160, New York, NY, USA, 2001. ACM.[33] Wesley Terpstra, Christ<strong>of</strong> Leng, Max Lehn, and Alejandro Buchmann. Channel-based unidirectionalstream pro<strong>to</strong>col (CUSP). In The 29th IEEE International Conference on Computer Communications,San Diego, USA.[34] Wesley W. Terpstra, Jussi Kangasharju, Christ<strong>of</strong> Leng, and Alejandro P. Buchmann. Bubbles<strong>to</strong>rm: resilient,probabilistic, and exhaustive peer-<strong>to</strong>-peer search. In SIGCOMM ’07: Proceedings <strong>of</strong> the 2007conference on Applications, technologies, architectures, and pro<strong>to</strong>cols for computer communications,pages 49–60, New York, NY, USA, 2007. ACM.[35] Wesley W. Terpstra, Christ<strong>of</strong> Leng, and Alejandro P. Buchmann. Brief announcement: Practicalsummation via gossip. In Twenty-Sixth Annual ACM SIGACT-SIGOPS Symposium on Principles <strong>of</strong>Distributed Computing (PODC 2007), pages 390–391, New York, NY, USA, 2007. ACM Press.[36] Tonio Triebel, Benjamin Guthier, and Wolfgang Effelsberg. Skype4<strong>Game</strong>s. In Proc. <strong>of</strong> the 6th AnnualWorkshop on Network and Systems Support for <strong>Game</strong>s: Netgames 2007, Melbourne, Australia, 2007.[37] Tonio Triebel, Benjamin Guthier, Richard Süselbeck, Gregor Schiele, and Wolfgang Effelsberg. <strong>Peer</strong><strong>to</strong>-peerinfrastructures for games. In NOSSDAV ’08: Proceedings <strong>of</strong> the 18th International Workshopon Network and Operating Systems Support for Digital Audio and Video, pages 123–124, New York,NY, USA, 2008. ACM.[38] Bruce Sterling Woodcock. An analysis <strong>of</strong> mmog subscription growth. http://www.mmogchart.com,2008.[39] Ben Y. Zhao, John D. Kubia<strong>to</strong>wicz, and Anthony D. Joseph. Tapestry: An infrastructure for fault<strong>to</strong>lerantwide-area location and. Technical report, Berkeley, CA, USA, 2001.Bibliography 93