Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems
暂无分享,去创建一个
[1] Yunhao Liu,et al. Virtual Surrounding Face Geocasting with Guaranteed Message Delivery for Ad Hoc and Sensor Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[2] Li Xiao,et al. Improving Query Response Delivery Quality in Peer-to-Peer Systems , 2006, IEEE Transactions on Parallel and Distributed Systems.
[3] David K. Y. Yau,et al. Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach , 2006, IEEE/ACM Transactions on Networking.
[4] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[5] Yunhao Liu. A Two-Hop Solution to Solving Topology Mismatch , 2008, IEEE Transactions on Parallel and Distributed Systems.
[6] Li Xiao,et al. Location awareness in unstructured peer-to-peer systems , 2005, IEEE Transactions on Parallel and Distributed Systems.
[7] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[8] Yunhao Liu,et al. Difficulty-Aware Hybrid Search in Peer-to-Peer Networks , 2009, IEEE Trans. Parallel Distributed Syst..
[9] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[10] Li Xiao,et al. Dynamic Layer Management in Superpeer Architectures , 2005, IEEE Trans. Parallel Distributed Syst..
[11] Yunhao Liu,et al. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems , 2006, IEEE Transactions on Parallel and Distributed Systems.
[12] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[13] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[14] Yunhao Liu,et al. VOVO: VCR-Oriented Video-on-Demand in Large-Scale Peer-to-Peer Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[15] Vana Kalogeraki,et al. Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.
[16] Daniel Stutzbach,et al. Characterizing the two-tier gnutella topology , 2005, SIGMETRICS '05.
[17] Jean-Yves Le Boudec,et al. Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[18] Hitay Özbay,et al. Introduction to Feedback Control Theory , 1999 .
[19] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[20] Yunhao Liu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.
[21] Li Xiao,et al. DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems , 2006, IEEE Transactions on Parallel and Distributed Systems.
[22] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[23] Yunhao Liu,et al. Scalable Live Streaming Service Based on Interoverlay Optimization , 2007, IEEE Transactions on Parallel and Distributed Systems.
[24] Li Fan,et al. Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[25] Li Xiao,et al. Building a Scalable Bipartite P2P Overlay Network , 2007, IEEE Trans. Parallel Distributed Syst..
[26] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[27] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[28] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[29] Yunhao Liu,et al. Dubious feedback: fair or not? , 2006, InfoScale '06.
[30] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.