Peer to Peer: Peering into the Future
暂无分享,去创建一个
[1] Richard A. Golding,et al. Fault-tolerant replication management in large-scale distributed storage systems , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.
[2] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[3] Hector Garcia-Molina,et al. Streaming Live Media over a Peer-to-Peer Network , 2001 .
[4] Andy Oram,et al. Peer-to-Peer: Harnessing the Power of Disruptive Technologies , 2001 .
[5] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[6] Lada A. Adamic,et al. Search in Power-Law Networks , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[8] Li Gong. Project JXTA: A Technology Overview , 2001 .
[9] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[10] Mark Handley,et al. Application-Level Multicast Using Content-Addressable Networks , 2001, Networked Group Communication.
[11] Srinivasan Seshan,et al. Enabling conferencing applications on the internet using an overlay muilticast architecture , 2001, SIGCOMM 2001.
[12] Ramesh Govindan,et al. Using the small-world model to improve Freenet performance , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[13] Roger M. Needham,et al. Grapevine: an exercise in distributed computing , 1982, CACM.
[14] Robert Tappan Morris,et al. Resilient overlay networks , 2001, SOSP.
[15] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[16] Hannes Federrath,et al. International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability , 2001 .
[17] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[18] Kirk L. Johnson,et al. Overcast: reliable multicasting with on overlay network , 2000, OSDI.
[19] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[20] Peter Druschel,et al. Exploiting network proximity in peer-to-peer overlay networks , 2002 .
[21] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .
[22] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[23] Ellen W. Zegura,et al. Application-layer anycasting: a server selection architecture and use in a replicated Web service , 2000, TNET.
[24] Brian Neil Levine,et al. Evaluation of a novel two-step server selection metric , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[25] Jonathan S. Turner,et al. Routing in overlay multicast networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[26] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[27] Matei Ripeanu,et al. Peer-to-peer architecture case study: Gnutella network , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[28] Krishna P. Gummadi,et al. A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems , 2002, CCRV.
[29] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[30] Hui Zhang,et al. A case for end system multicast (keynote address) , 2000, SIGMETRICS '00.
[31] Miguel Castro,et al. SCRIBE: The Design of a Large-Scale Event Notification Infrastructure , 2001, Networked Group Communication.
[32] Srinivasan Seshan,et al. A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..
[33] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[34] Ian Pratt,et al. Xenoservers: accountable execution of untrusted programs , 1999, Proceedings of the Seventh Workshop on Hot Topics in Operating Systems.
[35] Roger M. Needham,et al. Experience with Grapevine: the growth of a distributed system , 1984, TOCS.
[36] Robert Tappan Morris,et al. The case for resilient overlay networks , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.