Selfish Overlay Network Creation and Maintenance
暂无分享,去创建一个
Azer Bestavros | Nikolaos Laoutaris | Georgios Smaragdakis | Mema Roussopoulos | John W. Byers | Vassilis Lekakis | J. Byers | Azer Bestavros | Georgios Smaragdakis | M. Roussopoulos | Nikolaos Laoutaris | Vassilis Lekakis
[1] Rajmohan Rajaraman,et al. Bounded budget connection (BBC) games or how to make friends and influence people, on a budget , 2008, PODC '08.
[2] Kimberly C. Claffy,et al. Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links , 2005, PAM.
[3] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[4] Kam-Wing Ng,et al. Analyzing Multiple File Downloading in BitTorrent , 2006, 2006 International Conference on Parallel Processing (ICPP'06).
[5] Scott Shenker,et al. On a network creation game , 2003, PODC '03.
[6] Rajmohan Rajaraman,et al. Analysis of a local search heuristic for facility location problems , 2000, SODA '98.
[7] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[8] David C. Parkes,et al. The price of selfish behavior in bilateral network formation , 2005, PODC '05.
[9] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[10] Mostafa H. Ammar,et al. Preemptive Strategies to Improve Routing Performance of Native and Overlay Layers , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[11] William Chan,et al. Improving Traffic Locality in BitTorrent via Biased Neighbor Selection , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[12] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[13] Hari Balakrishnan,et al. Resilient overlay networks , 2001, SOSP.
[14] Larry L. Peterson,et al. Reliability and Security in the CoDeeN Content Distribution Network , 2004, USENIX Annual Technical Conference, General Track.
[15] Rajmohan Rajaraman,et al. Reducibility among Fractional Stability Problems , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[16] Reza Rejaie,et al. PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[17] Donald F. Towsley,et al. On the interaction between overlay routing and underlay routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[18] Joan Feigenbaum,et al. Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.
[19] Azer Bestavros,et al. Distributed Network Formation for n-Way Broadcast Applications , 2010, IEEE Transactions on Parallel and Distributed Systems.
[20] Amin Vahdat,et al. Bullet: high bandwidth data dissemination using an overlay mesh , 2003, SOSP '03.
[21] Dmitri Loguinov,et al. Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[22] Narsingh Deo,et al. Graph Theory with Applications to Engineering and Computer Science , 1975, Networks.
[23] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[24] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[25] Christos H. Papadimitriou,et al. Worst-case Equilibria , 1999, STACS.
[26] Yin Zhang,et al. On selfish routing in Internet-like environments , 2003, IEEE/ACM Transactions on Networking.
[27] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[28] Rajmohan Rajaraman,et al. A bounded-degree network formation game , 2007, ArXiv.
[29] Aaron Archer. Inapproximability of the Asymmetric Facility Location and k-Median Problems , 2000 .
[30] Reza Rejaie,et al. PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[31] Leandros Tassiulas,et al. Market-Based Resource Allocation for Content Delivery in the Internet , 2003, IEEE Trans. Computers.
[32] Jeffrey Scott Vitter,et al. e-approximations with minimum packing constraint violation (extended abstract) , 1992, STOC '92.
[33] Massimo Marchiori,et al. Economic small-world behavior in weighted networks , 2003 .
[34] Morteza Zadimoghaddam,et al. The price of anarchy in network creation games , 2007, PODC '07.
[35] Gustavo de Veciana,et al. Performance of peer-to-peer networks: Service capacity and role of resource sharing policies , 2006, Perform. Evaluation.
[36] Miguel Castro,et al. SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.
[37] Azer Bestavros,et al. EGOIST: overlay routing using selfish neighbor selection , 2008, CoNEXT '08.
[38] Tim Roughgarden,et al. How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[39] J. Vitter,et al. Approximations with Minimum Packing Constraint Violation , 1992 .
[40] Anthony Young,et al. Overlay mesh construction using interleaved spanning trees , 2004, IEEE INFOCOM 2004.
[41] Bhaba R. Sarker,et al. Discrete location theory , 1991 .
[42] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[43] Ion Stoica,et al. Characterizing selfishly constructed overlay routing networks , 2004, IEEE INFOCOM 2004.
[44] Sudipto Guha,et al. A constant-factor approximation algorithm for the k-median problem (extended abstract) , 1999, STOC '99.
[45] Azer Bestavros,et al. Swarming on Optimized Graphs for n-Way Broadcast , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[46] Brighten Godfrey,et al. Minimizing churn in distributed systems , 2006, SIGCOMM.
[47] Srinivasan Seshan,et al. Donnybrook: enabling large-scale, high-speed, peer-to-peer games , 2008, SIGCOMM '08.
[48] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[49] Margo I. Seltzer,et al. Network Coordinates in the Wild , 2007, NSDI.
[50] Christian Scheideler,et al. Can ISPS and P2P users cooperate for improved performance? , 2007, CCRV.
[51] Said Salhi,et al. Discrete Location Theory , 1991 .
[52] Azer Bestavros,et al. Overlay network creation and maintenance with selfish users , 2009 .
[53] Kamesh Munagala,et al. Local Search Heuristics for k-Median and Facility Location Problems , 2004, SIAM J. Comput..
[54] Richard G. Baraniuk,et al. pathChirp: Efficient available bandwidth estimation for network paths , 2003 .
[55] Amin Vahdat,et al. Detour: informed Internet routing and transport , 1999, IEEE Micro.
[56] Laurent Massoulié,et al. ECHOS: edge capacity hosting overlays of nano data centers , 2008, CCRV.
[57] Vijay V. Vazirani,et al. Primal-dual approximation algorithms for metric facility location and k-median problems , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[58] Azer Bestavros,et al. Implications of Selfish Neighbor Selection in Overlay Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[59] N.R. Malik,et al. Graph theory with applications to engineering and computer science , 1975, Proceedings of the IEEE.
[60] Serge Fdida,et al. Toward a Measurement-Based Geographic Location Service , 2004, PAM.