Peer-to-Peer Social Networks
暂无分享,去创建一个
[1] Meredith Ringel Morris,et al. What do people ask their social networks, and why?: a survey study of status message q&a behavior , 2010, CHI.
[2] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[3] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[4] Jörg P. Müller,et al. Architectures and applications of intelligent agents: A survey , 1999, The Knowledge Engineering Review.
[5] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[6] Brian W. Fitzpatrick,et al. The Case Against Data Lock-in , 2010, ACM Queue.
[7] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[8] Rüdiger Schollmeier,et al. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[9] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[10] Emmanuelle Anceaume,et al. PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems.
[11] Michael Zink,et al. Characteristics of YouTube network traffic at a campus network - Measurements, models, and implications , 2009, Comput. Networks.
[12] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[13] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[14] D. Stroud. Social networking: An age-neutral commodity — Social networking becomes a mature web application , 2008 .
[15] Bill Moore,et al. GFS: Evolution on Fast-Forward , 2010 .
[16] Kazuhiro Kuwabara,et al. Shine: a peer-to-peer based framework of network community support systems , 2003, Comput. Commun..
[17] Giancarlo Ruffo,et al. LotusNet: Tunable privacy for distributed online social network services , 2012, Comput. Commun..
[18] S. Wasserman,et al. Models and methods in social network analysis , 2005 .
[19] Manolis Koubarakis,et al. Multi-agent Systems and Peer-to-Peer Computing: Methods, Systems, and Challenges , 2003, CIA.
[20] Makoto Yokoo,et al. Socialware: multiagent systems for supporting network communities , 1999, CACM.
[21] Jürgen Dix,et al. Multi-Agent Programming: Languages, Tools and Applications , 2009 .
[22] Nicholas R. Jennings,et al. Developing Industrial Multi-Agent Systems , 1995, ICMAS.
[23] Agostino Poggi,et al. Multi-Agent Systems and Social Networks , 2012 .
[24] Kenneth G. Paterson,et al. Trusted computing: providing security for peer-to-peer networks , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[25] Rayadurgam Srikant,et al. Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.
[26] Luciano Rossoni,et al. Models and methods in social network analysis , 2006 .
[27] Michele Tomaiuolo,et al. Software Agents for Distributed Social Networking , 2012, WOA.
[28] Li Xiaoming,et al. Maze: a social peer-to-peer network , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[29] Guillaume Pierre,et al. A survey of DHT security techniques , 2011, CSUR.
[30] Jacques Ferber,et al. Multi-agent systems - an introduction to distributed artificial intelligence , 1999 .
[31] Fang Wang,et al. Structure of peer-to-peer social networks. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[32] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[33] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[34] Jun Wang,et al. TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.
[35] Bart Selman,et al. Referral Web: combining social networks and collaborative filtering , 1997, CACM.
[36] Munindar P. Singh,et al. Searching social networks , 2003, AAMAS '03.
[37] Rita Gunther McGrath. Business Models: A Discovery Driven Approach , 2010 .
[38] Leonard N. Foner,et al. Yenta: a multi-agent, referral-based matchmaking system , 1997, AGENTS '97.
[39] Agostino Poggi,et al. JADE: A software framework for developing multi-agent applications. Lessons learned , 2008, Inf. Softw. Technol..