|
[1] Aimster, http://computer.howstuffworks.com/question587.htm [2] S. Androutsellis-Theotokis and D. Spinellis. A survey of peer-to-peer content distribution technologies. ACM Comput. Surv., 36(4):335–371, 2004. [3] G. Bolcer. Magi: An architecture for mobile and disconnected workflow. In White paper (www.endeavors.com), 2001. [4] M. Castro, P. Druschel, Y. C. Hu, and A. Rowstron. Topology-aware routing in structured peer-to-peer overlay networks. In Future Directions in Distributed Computing, 2003. [5] N. Daswani and H. Garcia-Molina. Query-flood dos attacks in gnutella. In Proc. Ninth ACM Conference on Computer and Communications Security, 2002. [6] FastTrack, http://www.fasttrackdcn.net/ [7] Gnutella., http://www.gnutella.com. [8] I. Gupta, K. Birman, P. Linga, A. Demers, and R. van Renesse. Kelips: building an efficient and stable p2p dht through increased memory and background overhead. In Proc. of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), pages 81–86, 2003. [9] Groove Networks. Groove networks product backgrounder, groove networks white paper, 2001. www.groove.net/pdf/groove product backgrounder.pdf. [10] A. Grimshaw, W. Wulf, J. French, A. Weaver, and Reynolds Jr. P. Legion: The next logical step toward a nation-wide virtual computer. Technical report, Department of Computer Science, University of Virginia, 1994. [11] Steven D. Gribble, Eric A. Brewer, Joseph M. Hellerstein, and David Culler. Scalable, Distributed Data Structures for Internet Service Construction. 2000. Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI 2000). [12] iMesh, http://www.imesh.com/ [13] Jxta 2001. JXTA home page: http://www.jxta.org. [14] Joltid, http://www.joltid.com [15] KaZaA, http://www.kazaa.com [16] M. Kleis, E. K. Lua, X. Zhou, “Hierarchical Peer-to-Peer Networks using Lightweight SuperPeer Topologies”, In IEEE Symposium on Computers and Communications (ISCC), 2005. [17] LimeWire, http://www.limewire.com/english/content/home.shtml [18] D. Liben-Nowell, H. Balakrishnan, and D. Karger. Observations on the dynamic evolution of peer-to-peer networks. In Proc. of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002. [19] J. Ledlie, J. Taylor, L. Serban, and M. Seltzer. Self-organization in peer-to-peer systems. In Proc. of the ACM SIGOPS European Workshop, 2002. [20] P. Linga, I. Gupta, and K. Birman. A churn-resistant peer-to-peer web caching system. In Proc. of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), 2004. [21] J. Li, J. Stribling, T.M. Gil, R. Morris, and F. Kaashoek. Comparing the performance of distributed hash tables under churn. In Proc. of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), 2004. [22] N. A. Lynch. Distributed algorithms. Morgan Kaufmann Publisher, 1996. [23] S. M. Lui and S. H. Kwok. Interoperability of peer-to-peer file sharing protocols. ACM SIGecom Exchanges, 3(3):25–33, 2002. [24] Witold Litwin and Marie-Anna Neimat and Donovan A. Schneider. LH* -- a scalable, distributed data structure. 1996. ACM Trans. Database Syst., 21(4):480--525. [25] F.T. Leighton, “Introduction to Parallel Algorithms and Ar- chitectures: Arrays, Trees, Hypercubes,” Academic Press Morgan Kaufmann, 1991. [26] D. Loguinov, A. Kumar, V. Rai, S. Ganesh, Graph-Theoretic Analysis of Structured Peer-to-Peer Systems—Routing Distances and Fault Resilience. In Proc. of the SIGCOMM 2003. 2003. [27] Morpheus, http://morpheus.com/. [28] D. Molnar, R. Dingledine, and M. Freedman. Chapter 12: Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates, 2001. [29] A. T. Mizrak, Y. Cheng, V. Kumar, S. Savage, “Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup”, in The Third IEEE Workshop on Internet Applications San Jose, California, 2003. [30] Napster, http://www.napster.com. [31] A. Oram, editor. Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates, March 2001. [32] Peer-to-peer working goup, 2001. www.p2pwg.org. [33] G. Pandurangan, P. Raghavan, and E. Upfal. Building low-diameter peer-to-peer networks. In IEEE FOCS, 2001. [34] Peer-to-peer working goup, 2001. www.p2pwg.org. [35] C. Greg Plaxton, Rajmohan Rajaraman, and Andrea W. Richa. Accessing nearby copies of replicated objects in a distributed environment. In Proceedings of ACM SPAA. ACM, June 1997. [36] S. Ratnasamy, M. Handley, R. Karp, and S. Shenker. Topologically-aware overlay construction and server selection. In Proc. of IEEE Conference on Computer Communications (INFOCOM), 2002. [37] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proc. of ACM SIGCOMM, pages 329–350, 2001. [38] SoftWax, http://www.softwax.com/ [39] C. Shirky. What is p2p...and what isn’t? The O’Reilly Netowrk, 2000. [40] Haiying Shen, Aharon S. Brodie, Cheng-zhong Xu, and Weisong Shi, Scalable and Secure P2P Overlay Networks, a chapter of the book "Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks," Editted by Jie Wu, CRC press, June 2005. [41] J. Saia, A. Fiat, S. Gribble, A.R. Karlin, and S. Saroiu. Dynamically Fault-Tolerant Content Addressable Networks. In Proc. of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002. [42] I. Stoica, R. Morris, D. Liben-Nowell, Kaashoek M. F. Karger, D. R. Karger, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup protocol for Internet applications. In IEEE/ACM Trans. on Networking, 2002. [43] M. Satyanarayanan, J. Kistler, P. Kumar, M. Okasadi, E. Siegel, and D. Steere. Coda: A highly available file system for a distributed workstation environment. In IEEE Transactions on Computers, pages 447–459, 1990. [44] K.N. Sivarajan and R. Ramaswami, “Lightwave Networks Based on de Bruijn Graphs,” IEEE/ACM Trans. on Net- working, vol. 2, no. 1, 1994. [45] A. Veytsel. There is no p-to-p market... but there is a market for p-to-p. In Aberdeen Group Presentation at the P2PWG, 2001. [46] B. Wiley. Chapter 19: Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates, 2001. [47] M. Waldman, A. Rubin, and L. Cranor. Publius: A robust, tamper-evident, censorshipresistant web publishing system. In Proc. of the USENIX Security Symposium, 2000. [48] Z. Xu, C. Tang, and Z. Zhang. Building topology-aware overlays using global soft-state. In Proc. of the 23rd International Conference on Distributed Computing Systems (ICDCS), 2003. [49] B. Yang, H. Garcia-Molina, “Designing a Super-Peer Network”, in: IEEE International Conference on Data Engineering. San Jose, California, 2003.
|