Churn handling strategies for structured overlay networks: A survey
暂无分享,去创建一个
[1] John R. Douceur. Is remote host availability governed by a universal law? , 2003, PERV.
[2] Scott Shenker,et al. Minimizing churn in distributed systems , 2006, SIGCOMM.
[3] Krishna P. Gummadi,et al. Canon in G major: designing DHTs with hierarchical structure , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[4] Amrit Lal Sangal,et al. Performance Analysis of Predictive Stabilization for Churn Handling in Structured Overlay Networks , 2016, BDAW '16.
[5] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[6] Ramesh Govindan,et al. Incrementally improving lookup latency in distributed hash table systems , 2003, SIGMETRICS '03.
[7] Krishna P. Gummadi,et al. The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.
[8] Seif Haridi,et al. Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[9] Stefan Saroiu,et al. A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .
[10] Brian D. Noble,et al. Exploiting Availability Prediction in Distributed Systems , 2006, NSDI.
[11] Indranil Gupta,et al. A churn-resistant peer-to-peer web caching system , 2003, SSRS '03.
[12] Stefan Saroiu,et al. Dynamically Fault-Tolerant Content Addressable Networks , 2002, IPTPS.
[13] Yu-Kwong Kwok,et al. Autonomic Peer-to-Peer Systems: Incentive and Security Issues , 2009, Autonomic Computing and Networking.
[14] Jim Dowling,et al. Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology , 2006, DAIS.
[15] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[16] Maher Khemakhem,et al. A novel replication technique to attenuate churn effects , 2016, Peer Peer Netw. Appl..
[17] George Pallis,et al. Insight and perspectives for content delivery networks , 2006, CACM.
[18] Dan S. Wallach,et al. A Survey of Peer-to-Peer Security Issues , 2002, ISSS.
[19] Kamil Saraç,et al. A survey on the design, applications, and enhancements of application-layer overlay networks , 2010, CSUR.
[20] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[21] Daeil Seo,et al. Replica Placement Algorithm for Highly Available Peer-to-Peer Storage Systems , 2009, 2009 First International Conference on Advances in P2P Systems.
[22] Reza Akbarinia,et al. Building a peer-to-peer content distribution network with high performance, scalability and robustness , 2011, Inf. Syst..
[23] Jean-Marc Vincent,et al. Mining for Availability Models in Large-Scale Distributed Systems:A Case Study of SETI@home , 2009 .
[24] Apostolos Malatras,et al. State-of-the-art survey on P2P overlay networks in pervasive computing environments , 2015, J. Netw. Comput. Appl..
[25] Ion Stoica,et al. Non-Transitive Connectivity and DHTs , 2005, WORLDS.
[26] Robert Tappan Morris,et al. Bandwidth-efficient management of DHT routing tables , 2005, NSDI.
[27] Mika Ylianttila,et al. Robustness of a P2P community management system based on two-level hierarchical DHT overlays , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[28] Stefan Savage,et al. Understanding Availability , 2003, IPTPS.
[29] Yong Meng Teo,et al. An adaptive stabilization framework for distributed hash tables , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[30] Ilangko Balasingham,et al. Management of Overlay Networks: A Survey , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[31] Guillaume Urvoy-Keller,et al. Hierarchical Peer-To-Peer Systems , 2003, Parallel Process. Lett..
[32] Vladimir Vlassov,et al. Interaction between Network Partitioning and Churn in a Self-Healing Structured Overlay Network , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).
[33] Yi Qiao,et al. Designing less-structured P2P systems for the expected high churn , 2008, TNET.
[34] Miguel Castro,et al. Performance and dependability of structured peer-to-peer overlays , 2004, International Conference on Dependable Systems and Networks, 2004.
[35] Stefan Schmid,et al. Towards worst-case churn resistant peer-to-peer systems , 2010, Distributed Computing.
[36] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[37] Kam-Wing Ng,et al. An analytical study on optimizing the lookup performance of distributed hash table systems under churn , 2007, Concurr. Comput. Pract. Exp..
[38] Ben Y. Zhao,et al. Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks , 2005, IPTPS.
[39] Hector Garcia-Molina,et al. Designing a super-peer network , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[40] Valerio Schiavoni,et al. Exploiting Node Connection Regularity for DHT Replication , 2011, 2011 IEEE 30th International Symposium on Reliable Distributed Systems.
[41] Yang Guo,et al. A survey on peer-to-peer video streaming systems , 2008, Peer-to-Peer Netw. Appl..
[42] Cláudio L. Amorim,et al. D1HT: a distributed one hop hash table , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[43] Andrei V. Gurtov,et al. Hierarchical architectures in structured peer-to-peer overlay networks , 2014, Peer Peer Netw. Appl..
[44] Seif Haridi,et al. DKS(N, k, f): a family of low communication, scalable and fault-tolerant infrastructures for P2P applications , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..
[45] John Kubiatowicz,et al. Handling Churn in a DHT (Awarded Best Paper!) , 2004, USENIX Annual Technical Conference, General Track.
[46] Jacky C. Chu,et al. Availability and locality measurements of peer-to-peer file systems , 2002, SPIE ITCom.
[47] Mudhakar Srivatsa,et al. Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.
[48] Moni Naor,et al. Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks , 2004, STOC '04.
[49] Wolfgang Kellerer,et al. Achieving and Maintaining Cost-Optimal Operation of a Hierarchical DHT System , 2009, 2009 IEEE International Conference on Communications.
[50] Yalin Ding,et al. Using the complementary nature of node joining and leaving to handle churn problem in P2P networks , 2013, Comput. Electr. Eng..
[51] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[52] David R. Karger,et al. Analysis of the evolution of peer-to-peer systems , 2002, PODC '02.
[53] Jhoanna Rhodette Pedrasa,et al. Evaluation of hierarchical DHTs to mitigate churn effects in mobile networks , 2016, Comput. Commun..
[54] David R. Karger,et al. Koorde: A Simple Degree-Optimal Distributed Hash Table , 2003, IPTPS.
[55] Seif Haridi,et al. Comparing Maintenance Strategies for Overlays , 2008, 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008).
[56] Peter Druschel,et al. Topology-aware routing in structured peer-to-peer overlay networks , 2003 .
[57] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[58] Dmitri Loguinov,et al. Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience , 2003, IEEE/ACM Transactions on Networking.
[59] A. L. Sangal,et al. Modeling and simulation of adaptive Neuro-fuzzy based intelligent system for predictive stabilization in structured overlay networks , 2017 .
[60] Xiaozhou Li,et al. Active and Concurrent Topology Maintenance , 2004, DISC.
[61] Ben Y. Zhao,et al. Distributed Object Location in a Dynamic Network , 2002, SPAA '02.
[62] Karl Aberer,et al. P-Grid: a self-organizing structured P2P system , 2003, SGMD.
[63] Erik D. Demaine,et al. EpiChord: parallelizing the chord lookup algorithm with reactive routing state management , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[64] Ravi Jain,et al. An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.
[65] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[66] A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack , 2016, J. Comput. Networks Commun..
[67] Wolfgang Nejdl,et al. Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks , 2003, WWW '03.