|
[1]“Napster” Available online at http://www.napster.com/ [2]“Publius” Available online at http://publius.cdt.org/ [3]Yang, B., & Garcia-Molina, H. (2002). Improving search in peer-to-peer networks. In Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on (pp. 5-14). IEEE. [4]Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., & Balakrishnan, H. (2001). Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Computer Communication Review, 31(4), 149-160. [5]Manku, G. S., Bawa, M., & Raghavan, P. (2003, March). Symphony: Distributed Hashing in a Small World. In USENIX Symposium on Internet Technologies and Systems (p. 10). [6]Milojicic, D. S., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., ... & Xu, Z. (2002). Peer-to-peer computing. [7]Ripeanu, M. (2001, August). Peer-to-peer architecture case study: Gnutella network. In Peer-to-Peer Computing, 2001. Proceedings. First International Conference on (pp. 99-100). IEEE. [8]Rowstron, A., & Druschel, P. (2001, January). Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Middleware 2001 (pp. 329-350). Springer Berlin Heidelberg. [9]Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422-426. [10]Liang, J., Kumar, R., & Ross, K. W. (2004). Understanding kazaa. Manuscript, Polytechnic Univ, 17. [11]Sheng, L., Song, J., Dong, X., & Zhou, L. (2010, April). Emule simulator: A practical way to study the emule system. In Networks (ICN), 2010 Ninth International Conference on (pp. 83-88). IEEE. [12]Joung, Y. J., & Yang, L. W. (2007). Wildcard search in structured peer-to-peer networks. Knowledge and Data Engineering, IEEE Transactions on, 19(11), 1524-1540. [13]Joung, Y. J., & Yang, L. W. (2014). On character-based index schemes for complex wildcard search in peer-to-peer networks. Information Sciences, 272, 209-222. [14]Naor, M., & Wieder, U. (2007). Novel architectures for P2P applications: the continuous-discrete approach. ACM Transactions on Algorithms (TALG), 3(3), 34. [15]Manku, G. S. (2004). Dipsea: a modular distributed hash table (Doctoral dissertation, stanford university). [16]Chang, C., Lu, E. J. L., Huang, S. Y., & Chen, Y. H. (2014). An RDF-based P2P overlay network supporting range and wildcard queries. Journal of Network and Computer Applications, 46, 124-138. [17]Taheri, J., & Akbari, M. K. TAC: A Topology-Aware Chord-based Peer-to-Peer Network. [18]Forestiero, A., & Mastroianni, C. (2011, July). Description of the Self-Chord P2P Application. In WOA (pp. 175-177). [19]Wang, Y., Li, X., Jin, Q., & Ma, J. (2012, September). AB-Chord: an efficient approach for resource location in structured P2P networks. In Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on (pp. 278-284). IEEE. [20]Schlosser, M., Sintek, M., Decker, S., & Nejdl, W. (2003). HyperCuP—hypercubes, ontologies, and efficient search on peer-to-peer networks. InAgents and Peer-to-Peer Computing (pp. 112-124). Springer Berlin Heidelberg. [21]Li, X., & Yu, J. (2008, October). A Novel P2P Overlay Network Based on Cycloid and Folded Hypercube. In Grid and Cooperative Computing, 2008. GCC''08. Seventh International Conference on (pp. 374-379). IEEE. [22]Ali, H., & Ahmed, M. (2012, October). HPRDG: A scalable framework hypercube-P2P-based for resource discovery in computational Grid. InComputer Theory and Applications (ICCTA), 2012 22nd International Conference on (pp. 2-8). IEEE. [23]Kamoun, F., Werghi, N., & Al Blushi, M. (2010). On the appropriateness of incident management systems in developing countries: a case from the UAE.Journal of technology management & innovation, 5(4), 57-69. [24]Ertel, S. (2014). Unstructured P2P networks by example: Gnutella 0.4, Gnutella 0.6. proceeding of Dresden University of Technology. [25]Zink, T., & Waldvogel, M. Distributed System Laboratory Analysis and Efficient Classification of P2P File Sharing Traffic. [26]Barriquello, C. H., Denardin, G. W., & Campos, A. (2015). A geographic routing approach for IPv6 in large-scale low-power and lossy networks. Computers & Electrical Engineering. [27]Dagang, G., Mingqin, Z., & Jirong, Z. (2014). Research of Resources Search Mechanism on Hybrid Stream Media System. Telecommunications Science,30(2), 33-39. [28]Ye, W., & Cho, K. (2014). Hybrid P2P traffic classification with heuristic rules and machine learning. Soft Computing, 18(9), 1815-1827. [29]Fournier, R., Cholez, T., Latapy, M., Chrisment, I., Magnien, C., Festor, O., & Daniloff, I. (2014). Comparing pedophile activity in different P2P systems.Social Sciences, 3(3), 314-325. [30]Komargodski, I., Moran, T., Naor, M., Pass, R., Rosen, A., & Yogev, E. (2014, October). One-way functions and (im) perfect obfuscation. In Foundations of Computer Science (FOCS), 2014 IEEE 55th Annual Symposium on (pp. 374-383). IEEE. [31]Tseng, Y. H. (2014). Research and Development on Automatic Information Organization and Subject Analysis in Recent Decades. Journal of Educational Media & Library Sciences, 51. [32]Antoine, M., Pellegrino, L., Huet, F., & Baude, F. (2014). Towards a generic API for data load balancing in structured P2P systems. [33]Abid, S. A., Othman, M., & Shah, N. (2014). 3D P2P overlay over MANETs.Computer Networks, 64, 89-111. [34]Sharifkhani, F., & Pakravan, M. R. (2013, August). A review of new advances in resource discovery approaches in unstructured P2P networks. In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 828-833). IEEE. [35]Lu, S. H., Li, K. C., Lai, K. C., & Chung, Y. C. (2014). A scalable P2P overlay based on arrangement graph with minimized overhead. Peer-to-Peer Networking and Applications, 7(4), 497-510.
|