A Survey of Socially Aware Peer-to-Peer Systems
暂无分享,去创建一个
[1] Krishna P. Gummadi,et al. Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.
[2] John C.-I. Chuang,et al. Incentive mechanism for peer-to-peer media streaming , 2004, Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004..
[3] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[4] David Jurgens,et al. That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships , 2013, ICWSM.
[5] Aleksandar Kuzmanovic,et al. Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.
[6] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[7] Matt Bishop,et al. Attack class: address spoofing , 1997 .
[8] Moni Naor,et al. Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.
[9] Alon Y. Halevy,et al. Crowdsourcing systems on the World-Wide Web , 2011, Commun. ACM.
[10] Pinar Yilgor. Super-peer architectures for distributed computing , 2002 .
[11] Venugopalan Ramasubramanian,et al. Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays , 2003 .
[12] Jun Wang,et al. TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.
[13] Hector Garcia-Molina,et al. Designing a super-peer network , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[14] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[15] Krishna P. Gummadi,et al. Exploiting Social Networks for Internet Search , 2006, HotNets.
[16] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[17] Diego Suarez Touceda,et al. Privacy in Peer-to-Peer Networks , 2015 .
[18] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[19] Adam Wierzbicki,et al. Deconstructing the Kazaa network , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.
[20] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[21] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[22] Cheng Huang,et al. Can internet video-on-demand be profitable? , 2007, SIGCOMM '07.
[23] Ramayya Krishnan,et al. The impact of free-riding on peer-to-peer networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[24] Thorsten Strufe,et al. A survey on decentralized Online Social Networks , 2014, Comput. Networks.
[25] Honghui Lu,et al. Peer-to-peer support for massively multiplayer games , 2004, IEEE INFOCOM 2004.
[26] Adriana Iamnitchi,et al. Out of the wild: On generating default policies in social ecosystems , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[27] Ed H. Chi,et al. Towards a model of understanding social search , 2008, SSM '08.
[28] Fabián E. Bustamante,et al. Elders know best - handling churn in less structured P2P systems , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[29] Cristian Borcea,et al. Special Issue on Foundations of Social Computing , 2015, ACM Trans. Internet Techn..
[30] Zhibin Lei,et al. Applications of Social Networks in Peer-to-Peer Networks , 2012 .
[31] Ben Y. Zhao,et al. An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[32] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[33] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[34] Andrea Passarella,et al. A survey on content-centric technologies for the current Internet: CDN and P2P solutions , 2012, Comput. Commun..
[35] Adriana Iamnitchi,et al. The power of indirect ties in friend-to-friend storage systems , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.
[36] Ralf Steinmetz,et al. LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[37] Pascal Felber,et al. Efficient search in unstructured peer-to-peer networks , 2004, SPAA '04.
[38] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[39] Hector Garcia-Molina,et al. Open Problems in Data-Sharing Peer-to-Peer Systems , 2003, ICDT.
[40] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.
[41] Paul Anderson,et al. Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications , 2010, Middleware.
[42] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[43] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[44] Santo Fortunato,et al. Community detection in graphs , 2009, ArXiv.
[45] Nenghai Yu,et al. Distributed Hash Table , 2013, SpringerBriefs in Computer Science.
[46] B. Wellman. Structural analysis: From method and metaphor to theory and substance. , 1988 .
[47] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[48] 共立出版株式会社. コンピュータ・サイエンス : ACM computing surveys , 1978 .
[49] Lakshmish Ramaswamy,et al. A distributed approach to node clustering in decentralized peer-to-peer networks , 2005, IEEE Transactions on Parallel and Distributed Systems.
[50] A-L Barabási,et al. Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.
[51] Prateek Mittal,et al. Trustworthy and scalable anonymous communication , 2012 .
[52] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[53] TranNguyen,et al. Efficient cooperative backup with decentralized trust management , 2012 .
[54] J. Delvenne,et al. Random walks on graphs , 2004 .
[55] Jinyang Li,et al. F2F: Reliable Storage in Open Networks , 2006, IPTPS.
[56] Pietro Michiardi,et al. An empirical study of availability in friend-to-friend storage systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[57] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[58] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1999, Theory of Computing Systems.
[59] D. Dolinski,et al. Social Influence , 2007 .
[60] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[61] Zhenyu Liu,et al. Inferring Privacy Information from Social Networks , 2006, ISI.
[62] Ehrhard Behrends. Introduction to Markov Chains With Special Emphasis on Rapid Mixing , 2013 .
[63] Yazan Boshmaf,et al. A Quick Survey of Social Network-based Sybil Defenses , 2012 .
[64] Florian Schintke,et al. Peer-to-Peer Computing , 2010, Euro-Par.
[65] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[66] M. Lam,et al. All Friends are Not Equal : Using Weights in Social Graphs to Improve Search , 2010 .
[67] Konstantin Beznosov,et al. Graph-based Sybil Detection in social and information systems , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[68] Hector Garcia-Molina,et al. SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.
[69] Ben Leong,et al. Hydra: a massively-multiplayer peer-to-peer architecture for the game developer , 2007, NetGames '07.
[70] Rainer Alt,et al. IEEE/WIC/ACM International Conference on Web Intelligence , 2015, WI-IAT.
[71] Roelof van Zwol,et al. Author Index , 2007, Web Intelligence.
[72] Anjali Gupta,et al. Efficient Routing for Peer-to-Peer Overlays , 2004, NSDI.
[73] F. Göbel,et al. Random walks on graphs , 1974 .
[74] Stefan Saroiu,et al. A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .
[75] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[76] Ralf Steinmetz,et al. Enabling resilient P2P video streaming: survey and analysis , 2011, Multimedia Systems.
[77] Jinyang Li,et al. Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.
[78] Bettina Kemme,et al. Peer-to-peer architectures for massively multiplayer online games: A Survey , 2013, CSUR.
[79] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[80] Haifeng Yu,et al. Sybil defenses via social networks: a tutorial and survey , 2011, SIGA.
[81] Jinyang Li,et al. Efficient cooperative backup with decentralized trust management , 2012, TOS.
[82] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[83] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[84] Thomas E. Anderson,et al. Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.
[85] Nenghai Yu,et al. Distributed Hash Table: Theory, Platforms and Applications , 2013 .
[86] Adriana Iamnitchi,et al. Vulnerability in socially-informed peer-to-peer systems , 2011, SNS '11.
[87] Olivier Fourmaux,et al. Measuring P2P IPTV Systems , 2007 .
[88] Jia Zhang,et al. Improving peer-to-peer search performance through intelligent social search , 2009, Expert Syst. Appl..
[89] Adriana Iamnitchi,et al. The power of indirect ties , 2016, Comput. Commun..
[90] Mika Suvanto,et al. Privacy In Peer-to-Peer Networks , .
[91] Raúl Gracia Tinedo,et al. Analysis of data availability in F2F storage systems: When correlations matter , 2012, P2P.
[92] Brighten Godfrey,et al. OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.
[93] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[94] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[95] Altruism with Social Roots: An Emerging Literature , 2006 .
[96] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[97] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[98] Mehdi Mani,et al. socP2P: P2P content discovery enhancement by considering social networks characteristics , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).
[99] Nathaniel Husted,et al. Pythia: a privacy aware, peer-to-peer network for social search , 2011, WPES '11.
[100] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[101] Adriana Iamnitchi,et al. On the Design of Socially-Aware Distributed Systems , 2012 .
[102] Keith W. Ross,et al. A Measurement Study of a Large-Scale P2P IPTV System , 2007, IEEE Transactions on Multimedia.
[103] Srinivasan Seshan,et al. A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..
[104] Adriana Iamnitchi,et al. The Social Hourglass: An Infrastructure for Socially Aware Applications and Services , 2012, IEEE Internet Computing.
[105] Taoufik En-Najjary,et al. Exploiting KAD: possible uses and misuses , 2007, CCRV.
[106] Hector Garcia-Molina,et al. DHT Routing Using Social Links , 2004, IPTPS.
[107] Anirban Mondal,et al. Effective load-balancing of peer-to-peer systems , 2003 .
[108] Alhussein A. Abouzeid,et al. Modeling and analysis of random walk search algorithms in P2P networks , 2005, Second International Workshop on Hot Topics in Peer-to-Peer Systems.
[109] David Mazières,et al. Democratizing Content Publication with Coral , 2004, NSDI.
[110] Hector Garcia-Molina,et al. Incentives for Combatting Freeriding on P2P Networks , 2003, Euro-Par.
[111] Alexandru Iosup,et al. TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .
[112] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[113] Henning Schulzrinne,et al. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[114] John Langford,et al. Telling humans and computers apart automatically , 2004, CACM.
[115] Mark Newman,et al. Networks: An Introduction , 2010 .
[116] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[117] Jiangchuan Liu,et al. Exploring interest correlation for peer-to-peer socialized video sharing , 2012, TOMCCAP.
[118] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[119] Yiming Hu,et al. A Super-Peer Based Lookup in Structured Peer-to-Peer Systems , 2003, ISCA PDCS.
[120] Geoff Coulson,et al. Free Riding on Gnutella Revisited: The Bell Tolls? , 2005, IEEE Distributed Syst. Online.
[121] Frank Eliassen,et al. Stir: Spontaneous social peer-to-peer streaming , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[122] Adriana Iamnitchi,et al. The Influence of Indirect Ties on Social Network Dynamics , 2014, SocInfo.
[123] Raúl Gracia Tinedo,et al. FRIENDBOX: A cloudified F2F storage application , 2012, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P).
[124] Noah E. Friedkin,et al. Horizons of Observability and Limits of Informal Control in Organizations , 1983 .
[125] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[126] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[127] B. Wellman,et al. Different Strokes from Different Folks: Community Ties and Social Support , 1990, American Journal of Sociology.
[128] Matteo Dell Amico. A Measurement of Mixing Time in Social Networks , 2009 .
[129] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[130] Dan S. Wallach,et al. A Survey of Peer-to-Peer Security Issues , 2002, ISSS.
[131] Haiying Shen,et al. Social-P2P: Social network-based P2P file sharing system , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[132] Andrew S. Tanenbaum,et al. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.
[133] Indranil Gupta,et al. Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut , 2005, ArXiv.
[134] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[135] Indranil Gupta,et al. Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead , 2003, IPTPS.
[136] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[137] J. Chuang,et al. Designing incentive mechanisms for peer-to-peer systems , 2004, 1st IEEE International Workshop on Grid Economics and Business Models, 2004. GECON 2004..
[138] H. Russell Bernard,et al. Estimating the size of personal networks , 1990 .
[139] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[140] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.
[141] Bobby Bhattacharjee,et al. Scalable application layer multicast , 2002, SIGCOMM '02.
[142] Emin Gün Sirer,et al. The design and implementation of a next generation name service for the internet , 2004, SIGCOMM '04.
[143] Danny Bickson,et al. The eMule Protocol Specification , 2005 .