Research on Churn Problem in P2P Networks: Research on Churn Problem in P2P Networks

[1]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[2]  Fabián E. Bustamante,et al.  Designing Less-Structured P2P Systems for the Expected High Churn , 2008, IEEE/ACM Transactions on Networking.

[3]  Daniel Stutzbach,et al.  Characterizing unstructured overlay topologies in modern P2P file-sharing systems , 2008, TNET.

[4]  Alex Galis,et al.  Stochastic maintenance of overlays in structured P2P systems , 2008, Comput. Commun..

[5]  Changjia Chen,et al.  On Gnutella topology dynamics by studying leaf and ultra connection jointly in phase space , 2008, Comput. Networks.

[6]  Kam-Wing Ng,et al.  Stochastic analysis of the interplay between object maintenance and churn , 2008, Comput. Commun..

[7]  Seif Haridi,et al.  An Analytical Study of a Structured Overlay in the Presence of Dynamic Membership , 2008, IEEE/ACM Transactions on Networking.

[8]  Dmitri Loguinov,et al.  On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks , 2007, TNET.

[9]  Dai Yafei,et al.  Study on Durable Peer-to-Peer Storage Techniques , 2007 .

[10]  Simon S. Lam,et al.  Failure recovery for structured p2p networks: Protocol design and performance under churn , 2006, Comput. Networks.

[11]  Rakesh Kumar,et al.  The FastTrack overlay: A measurement study , 2006, Comput. Networks.

[12]  Xu Peng,et al.  Research on Measurement of Peer-to-Peer File Sharing System , 2006 .

[13]  Dmitri Loguinov,et al.  Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience , 2005, TNET.

[14]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[15]  Dong Xuan,et al.  Analyzing and enhancing the resilience of structured peer-to-peer systems , 2005, J. Parallel Distributed Comput..

[16]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[17]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.

[18]  Jun Xu,et al.  On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[19]  Eli Upfal,et al.  Building low-diameter peer-to-peer networks , 2003, IEEE J. Sel. Areas Commun..

[20]  Krishna P. Gummadi,et al.  Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.

[21]  Anja Feldmann,et al.  Fitting Mixtures of Exponentials to Long-Tail Distributions to Analyze Network , 1998, Perform. Evaluation.

[22]  Luigi Rizzo,et al.  Effective erasure codes for reliable computer communication protocols , 1997, CCRV.