Measurement on a Peer-to-Peer Package Management System for Linux Distributions
暂无分享,去创建一个
Qiang Li | Shasha Li | Weihua Zhang | Jie Yu | Xiaodong Tang | Qingtao Shen | Jie Yu | Shasha Li | Qiang Li | Weihua Zhang | Xiaodong Tang | Qingtao Shen
[1] Taoufik En-Najjary,et al. Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.
[2] Xiaoning Ding,et al. Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.
[3] Yongdae Kim,et al. Why Kad lookup fails , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[4] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[5] Keith W. Ross,et al. Measurement and mitigation of BitTorrent leecher attacks , 2009, Comput. Commun..
[6] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[7] Raúl Jiménez,et al. Connectivity properties of Mainline BitTorrent DHT nodes , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[8] Zhoujun Li,et al. Toward an Accurate Snapshot of DHT Networks , 2011, IEEE Communications Letters.
[9] Mary K. Vernon,et al. Characterizing the query behavior in peer-to-peer file sharing systems , 2004, IMC '04.
[10] Daniel Stutzbach,et al. Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[11] Thomas E. Anderson,et al. Profiling a million user dht , 2007, IMC '07.
[12] Eric Neblock. Peer-to-peer based package management , 2013 .
[13] Zhoujun Li,et al. ID Repetition in Structured P2P Networks , 2011, Comput. J..
[14] Jiangchuan Liu,et al. apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates , 2009, IEEE INFOCOM 2009.
[15] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[16] Jeff Morgan,et al. A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.
[17] Taoufik En-Najjary,et al. Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.