|
參考文獻
[1]Y. Tang, Z. Zhang, S. Chen, G. Fan, “A Distributed Hybrid Scheme for Unstructured Peer-to-Peer Networks”, ICC 2006 - IEEE International Conference on Communications, Vol. 29, No. 1, pp. 30-35, June. 2006 [2]C. Cheng, S. Tsao, and J. Chou, “Unstructured Peer-to-Peer Session Initiation Protocol For Mobile Environment”, PIMRC 2007 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, No. 1, September. 2007 [3]T. Hamada, K. Chujo, T. Chujo , X. Yang “Peer-to-Peer Traffic in Metro Networks: Analysis, Modeling, and Policies”, IEEE/IFIP Network Operations and Management Symposium, No. 1, pp. 425-438 ,April. 2004 [4]Y. Joung, L. Yang, and C. Fang ,”Keyword Search in DHT-based Peer-to-Peer Networks”, IEEE Journal On Selected Areas In Communciation, Vol. 25, No. 1, January. 2007 [5] X. Jin, Q. Xia, S.-H. Gary Chan, “Building A Monitoring Overlay for Peer-to-Peer Streaming”, GLOBECOM 2006 - IEEE Global Telecommunications Conference, Vol.25, No.1, pp. 1132-1136,November. 2006 [6]C. Lin, Y. Chang, S. Tsai, C. Chou, “Distributed Social-based Overlay Adaptation for Unstructured P2P Networks”, IEEE INFOCOM 2008 - 27th IEEE International Conference on Computer Communications, Vol. 27, No. 1, pp. 2494-2499,April 2008 [7]M. Yang, Z. Fei, “Assigning Identifications to Nodes in Unstructured Peer-to-Peer Networks:A Novel Approach to Improving Search Efficiency”, GLOBECOM 2007 - IEEE Global Telecommunications Conference, No. 1, pp. 411 - 415, November 2007 [8]R. Hanneman , M. Riddle, “Introduction to social network methods:Table of contents”, http://www.faculty.ucr.edu/ hanneman/nettext/, 2005 [9]M. Sripanidkulchai, K. Maggs, B. Zhang, H. Carnegie Mellon Univ., Pittsburgh, PA, USA,”Efficient content location using interest-based locality in peer-to-peer systems” INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. Vol.3,pp. 2166- 2176, April 2003 [10]A. Abada, L. Cui, C. Huang , H. Chen, “A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications”, WCNC 2007 - IEEE Wireless Communications and Networking Conference, Vol. 8, pp. 3303 - 3308, no. 1, March 2007 [11] JXSE_ProgGuide_v2.5, see https://jxta-jxse.dev.java.net/ [12] A. Peiravi, H. T. Kheibari , “ Connectivity Group Approximation Using Modified Manhattan Distance in Mobile Ad Hoc Networks”, Asian Network for Scientific Information Journal of Applied Sciences Journal of Applied Sciences, Vol. 8, pp. 1462 – 1470, August 2008 [13] J. Beusekom, D. Keysers, F. Shafait, T. M. Breuel, “Distance Measures for Layout-Based Document Image Retrieval”, DIAL apos;06. Second International Conference pp.232-242, April 2006 [14] Bitorrent, see http://www.bittorrent.com/ [15] Gnutella, see http://www.gnutellaforums.com/ [16] eDonkey, see http://www.zeropaid.com/edonkey/ [17] JXTA v2.0 Protocols Specification, see https://jxta-spec.dev.java.net/JXTAProtocols.pdf [18] Java™ P2P Programming, see http://java.sun.com/developer/Books/networking/jxta/index.html [19] Mastering JXTA: Building Java Peer-to-Peer Applications, see http://www.win.tue.nl/~ymazuryk/books/m_jxta.pdf [20] The Gnutella Protocol Specification v0.4, see http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf
|