P2P's Significance for eBusiness: Towards a Research Agenda
暂无分享,去创建一个
[1] Keith W. Ross,et al. Computer networking - a top-down approach featuring the internet , 2000 .
[2] RissonJohn,et al. Survey of research towards robust peer-to-peer networks , 2006 .
[3] Ian J. Lloyd. Society for Computers and Law , 1996, Journal of Information, Law and Technology.
[4] Jean-Noël Ezingeard,et al. Developing a Relevant Research Agenda in Knowledge Management - Bridging the Gap Between Knowing and Doing , 2000, ECIS.
[5] Mary Baker,et al. 2 P2P or Not 2 P2P? , 2003, IPTPS.
[6] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[7] Hiroyuki Morikawa,et al. Exploiting Semantics in Unstructured Peer-to-Peer Networks , 2004 .
[8] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[9] J. Chuang,et al. Economics of Peer-to-Peer Systems , 2004 .
[10] Keith W. Ross,et al. The KaZaA Overlay : A Measurement Study , 2004 .
[11] Adam Wierzbicki,et al. Deconstructing the Kazaa network , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.
[12] Bryn Loban,et al. Between rhizomes and trees: P2P information systems , 2004, First Monday.
[13] G. Fox. Peer-to-peer networks , 2001, Comput. Sci. Eng..
[14] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[15] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[16] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[17] Heather A. Smith,et al. Developments in Practice VI: Riding the Wave: Discovering the Value of P2P Technologies , 2003, Commun. Assoc. Inf. Syst..
[18] James F. Doyle,et al. Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.
[19] Glynn S. Lunney,et al. The Death of Copyright: Digital Technology, Private Copying, and the DMCA , 2001 .
[20] Ren J. Chevance. Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions , 2004 .
[21] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[22] Ron Weber,et al. Research Commentary: Information Systems and Conceptual Modeling - A Research Agenda , 2002, Inf. Syst. Res..
[23] Rakesh Kumar,et al. Understanding KaZaA , 2004 .
[24] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[25] Tim Moors,et al. Survey of Research towards Robust Peer-to-Peer Networks: Search Methods , 2007, RFC.
[26] Andy Oram,et al. Peer-to-Peer: Harnessing the Power of Disruptive Technologies , 2001 .
[27] John C.-I. Chuang,et al. Incentive mechanism for peer-to-peer media streaming , 2004, Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004..
[28] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[29] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .
[30] Steve Mann,et al. Wearable Computing: A First Step Toward Personal Imaging , 1997, Computer.
[31] Stephen D. Crocker. Host Software , 1969, RFC.
[32] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[33] Alex Berson. Client-Server Architecture , 2006, Encyclopedia of Multimedia.
[34] LawrenceElaine,et al. Legal and Technical Issues Management Frameworkfor Peer-to-Peer Networks , 2006, J. Theor. Appl. Electron. Commer. Res..
[35] Roger Clarke,et al. Open Source Software And Open Content As Models For eBusiness , 2004, Bled eConference.
[36] Cezary Dubnicki,et al. FPN: a distributed hash table for commercial applications , 2004, Proceedings. 13th IEEE International Symposium on High performance Distributed Computing, 2004..