|
[1]The Napster home page, 2000. http://www.napster.com/. [2]The Gnutella home page, 2000. http://www.gnutella.wego.com. [3]The Gnutella2 file-sharing protocol, 2002. http://www.gnutella2.com. [4]I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” in Proceedings of ACM SIGCOMM, 2001. [5]A. Rowstron and P. Druschel, “Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems,“ in Proceedings of ACM International Conference on Distributed Systems Platforms, Heidelberg, pages 329-350, November 2001. [6]S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, “A Scalable Content-Addressable Network,” in Proceedings of ACM SIGCOMM, 2001. [7]M. Papadopouli, H. Schulzrinne, “Seven Degrees of Separation in Mobile Ad Hoc Networks,” in Proceedings of IEEE Global Telecommunications Conference, 2000. [8]C. Lindemann, O. P. Waldhorst, “A Distribution Search Service for Peer-to-Peer File Sharing in Mobile Applications,” in Proceedings of the Second International Conference on Peer-to-Peer Computing, 2002. [9]A. Klemm, C. Lindemann, and O. P. Waldhorst, “A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks,” in Workshop on Mobile Ad Hoc Networking and Computing, 2003. [10]Chia-Feng Li and Ren-Hung Hwang. “A Location-Aware P2P Information Sharing System in Bluetooth-Based Mobile Ad Hoc Network,” in Proceedings of Active Networking Workshop, 2004. [11]Yu-Chee Tseng, Sze-Yao Ni, Yuh-Shyan Chen and Jang-Ping Sheu, “The Broadcast Storm Problem in a Mobile Ad Hoc Network,” in Proceedings of ACM MobiCom, August 1999. [12]R. Porter and Y. Shoham, “Addressing the Free-Rider Problem in File-Sharing Systems: A Mechanism-Design Approach,” In Proceedings of 5th ACM Conference on Electronic Commerce, 2004. [13]B. H. Bloom, “Space/Time Trade-offs in Hash coding with allowable errors,” Communications of the ACM, 1970. [14]Marco Dorigo, Member, IEEE, Vittorio Maniezzo, and Alberto Colorni, “The Ant System:Optimization by a colony of cooperating agents,” IEEE Transactions on Systems, 1996. [15]E. Bonabeau, M. Dorigo, and G. Theraulaz, “Swarm Intelligence: From natural to artificial systems,” Oxford University Press, 1999. [16]C. Perkins, E. Royer, and S. Das, “Ad hoc On-Demand Distance Vector(AODV) Routing,” IETF Internet Draft(work in progress), June 2002. [17]M. A. Landers, “An Overview of Peer-to-Peer Network Topologies,” 2004. [18]QualNet network simulator, http://www.scalable-networks.com/. [19]D. Karger, E. Lehman, F. Leighton, M. Levine, D. Lewin, and R. panigrahy, “Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web,” in the proceedings of ACM symposium on Theory of Computing, 1997. [20]D. lewin, “Consistent hashing and random trees: Algorithms for caching in distributed networks,” Master’s thesis, Department of EECS, MIT, 1998. Available at the MIT Library, http://thesis,mit.edu/. [21]E. Adar and B.A Huberman, “Free riding on Gnutella,” Technical Report, SSL-00-63, Internet Ecologies Area Xerox Palo Alto Research Center, Palo Alto, 2002. [22]M. Roth and S. Wicker, “Termite: Ad-Hoc Networking with Stigmergy.,” in Proceedings of Global Telecommunications Conference, Dec. 2003. [23]S. Rajagopalan and C.C. Shen, “ANSI: A Unicast Routing Protocol for Mobile Ad hoc Networks Using Swarm Intelligence,” In Proceedings of the ICAI, 2005. [24]T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing (WCMC), 2002. [25]Chien-Chung Shen,“NeTS-NR:A Salutogenic Approach to Robust Peer-to-Peer Systems over Mobile Ad hoc Networks,” 2004.
|