A Diophantine model of routes in structured P2P overlays
暂无分享,去创建一个
[1] Pekka Nikander,et al. Hi3: An efficient and secure networking architecture for mobile hosts , 2008, Comput. Commun..
[2] CarperI. Lynne,et al. Computer capacity planning , 1983 .
[3] Javier Esparza. Petri Nets, Commutative Context-Free Grammars, and Basic Parallel Processes , 1995, FCT.
[4] Alexander Schrijver,et al. Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.
[5] Miguel Castro,et al. Performance and dependability of structured peer-to-peer overlays , 2004, International Conference on Dependable Systems and Networks, 2004.
[6] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[7] Dimitri P. Bertsekas,et al. Network optimization : continuous and discrete models , 1998 .
[8] Shui F. Lam,et al. Computer Capacity Planning: Theory and Practice , 1987 .
[9] Dmitri Loguinov,et al. Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience , 2003, IEEE/ACM Transactions on Networking.
[10] Dmitri Loguinov,et al. Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience , 2005, TNET.
[11] Hari Balakrishnan,et al. Resilient overlay networks , 2001, SOSP.
[12] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[13] Jun Xu. On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks , 2004, IEEE Journal on Selected Areas in Communications.
[14] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[15] Scott Shenker,et al. Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.
[16] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.
[17] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[18] Robert Tappan Morris,et al. Serving DNS Using a Peer-to-Peer Lookup Service , 2002, IPTPS.
[19] Krishna P. Gummadi,et al. The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.
[20] Antonio F. Gómez-Skarmeta,et al. A novel methodology for constructing secure multipath overlays , 2005, IEEE Internet Computing.
[21] Moni Naor,et al. Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.
[22] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.