An Introduction to Models of Online Peer-to-Peer Social Networking
暂无分享,去创建一个
[1] Cem U. Saraydar,et al. Power control in a multicell CDMA data system using pricing , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).
[2] Abhishek Kumar,et al. Efficient and scalable query routing for unstructured peer-to-peer networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Lea Kutvonen,et al. Reputation Management Survey , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[4] Richard M. Karp,et al. Probabilistic recurrence relations , 1994, JACM.
[5] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[6] Ishai Menache,et al. Rate-Based Equilibria in Collision Channels with Fading , 2008, IEEE Journal on Selected Areas in Communications.
[7] James Aspnes,et al. Randomized protocols for asynchronous consensus , 2002, Distributed Computing.
[8] M. Newman. Spread of epidemic disease on networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[9] Eli Upfal,et al. The Complexity of Parallel Search , 1988, J. Comput. Syst. Sci..
[10] Matteo Dell Amico. A Measurement of Mixing Time in Social Networks , 2009 .
[11] Ming Zhong,et al. Popularity-Biased Random Walks for Peer-to-Peer Search under the Square-Root Principle , 2006, IPTPS.
[12] Jesús Seade. THE STABILITY OF COURNOT REVISITED , 1980 .
[13] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[14] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[15] Serge A. Plotkin,et al. A non-manipulable trust system based on EigenTrust , 2005, SECO.
[16] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[18] Edith Cohen,et al. Search and replication in unstructured peer-to-peer networks , 2002 .
[19] James Aspnes,et al. Fault-tolerant routing in peer-to-peer systems , 2002, PODC '02.
[20] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[21] M E J Newman,et al. Identity and Search in Social Networks , 2002, Science.
[22] Zhuoqing Morley Mao,et al. Toward understanding distributed blackhole placement , 2004, WORM '04.
[23] Chita R. Das,et al. A dynamic quarantine scheme for controlling unresponsive TCP sessions , 2008, Telecommun. Syst..
[24] Christos Faloutsos,et al. Epidemic spreading in real networks: an eigenvalue viewpoint , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[25] Claudio Mezzetti,et al. Learning in Games by Random Sampling , 2001, J. Econ. Theory.
[26] David R. Karger,et al. Simple Efficient Load-Balancing Algorithms for Peer-to-Peer Systems , 2006, Theory of Computing Systems.
[27] Miguel Castro,et al. Security for Structured Peer-to-peer Overlay Networks , 2004 .
[28] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[29] Dahlia Malkhi,et al. A unifying framework of rating users and data items in peer-to-peer and social networks , 2008, Peer-to-Peer Netw. Appl..
[30] Ramesh Govindan,et al. Using the small-world model to improve Freenet performance , 2004, Comput. Networks.
[31] Paolo Avesani,et al. Trust-aware recommender systems , 2007, RecSys '07.
[32] Licia Capra,et al. SOFIA: Social Filtering for Robust Recommendations , 2008, IFIPTM.
[33] Eitan Altman,et al. From Altruism to Non-Cooperation in Routing Games , 2008, ArXiv.
[34] Béla Bollobás,et al. Random Graphs: Notation , 2001 .
[35] Ness B. Shroff,et al. A utility-based power-control scheme in wireless cellular systems , 2003, TNET.
[36] David M. Nicol,et al. Simulating realistic network worm traffic for worm warning system design and testing , 2003, WORM '03.
[37] George Kesidis,et al. Preliminary results using scale-down to explore worm dynamics , 2004, WORM '04.
[38] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[39] M. Newman,et al. Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.
[40] Yoram Moses,et al. Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds , 1998, SIAM J. Comput..
[41] S. Bornholdt,et al. World Wide Web scaling exponent from Simon's 1955 model. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.
[42] Donald F. Towsley,et al. The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[43] Robert Metcalfe,et al. Reverse path forwarding of broadcast packets , 1978, CACM.
[44] Donald F. Towsley,et al. Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.
[45] Earl T. Barr,et al. TrustDavis: a non-exploitable online reputation system , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[46] Eitan Altman,et al. Application neutrality and a paradox of side payments , 2010, ReARCH '10.
[47] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[48] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[49] Christos Gkantsidis,et al. Random walks in peer-to-peer networks , 2004, IEEE INFOCOM 2004.
[50] George Kesidis,et al. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.
[51] George Kesidis,et al. A model of the spread of randomly scanning Internet worms that saturate access links , 2008, TOMC.
[52] Anne-Marie Kermarrec,et al. Epidemic information dissemination in distributed systems , 2004, Computer.
[53] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[54] T. Vicsek,et al. Uncovering the overlapping community structure of complex networks in nature and society , 2005, Nature.
[55] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[56] S. N. Dorogovtsev,et al. Evolution of networks , 2001, cond-mat/0106144.
[57] Alan J. Barrett,et al. An asparaginyl endopeptidase processes a microbial antigen for class II MHC presentation , 1998, Nature.
[58] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[59] Tansu Alpcan,et al. A power control game based on outage probabilities for multicell wireless data networks , 2004 .
[60] Chris Lesniewski-Laas,et al. A Sybil-proof one-hop DHT , 2008, SocialNets '08.
[61] J J Hopfield,et al. Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.
[62] D. Earn,et al. Vaccination and the theory of games. , 2004, Proceedings of the National Academy of Sciences of the United States of America.
[63] Keith W. Ross,et al. Hash routing for collections of shared Web caches , 1997, IEEE Netw..
[64] Eitan Altman,et al. A survey on networking games in telecommunications , 2006, Comput. Oper. Res..
[65] Danny Dolev,et al. Shifting Gears: Changing Algorithms on the Fly to Expedite Byzantine Agreement , 1992, Inf. Comput..
[66] Rayadurgam Srikant,et al. Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.
[67] A. Zhang,et al. Stability of Nash Equilibrium: The Multiproduct Case , 1996 .
[68] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[69] Cem U. Saraydar,et al. Pareto efficiency of pricing-based power control in wireless data networks , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[70] D. Stroock,et al. Simulated annealing via Sobolev inequalities , 1988 .
[71] Edith Cohen,et al. Replication strategies in unstructured peer-to-peer networks , 2002, SIGCOMM.
[72] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[73] Jordi Domingo-Pascual,et al. On the challenges of establishing disjoint QoS IP/MPLS paths across multiple domains , 2006, IEEE Communications Magazine.
[74] Eitan Altman,et al. CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.
[75] Michael Mitzenmacher,et al. A Brief History of Generative Models for Power Law and Lognormal Distributions , 2004, Internet Math..
[76] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[77] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[78] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[79] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[80] H. Vincent Poor,et al. A game-theoretic approach to energy-efficient power control in multicarrier CDMA systems , 2006, IEEE Journal on Selected Areas in Communications.
[81] Stephen P. Boyd,et al. Randomized gossip algorithms , 2006, IEEE Transactions on Information Theory.
[82] A. Zhang,et al. Stability of a Cournot-Nash equilibrium: The multiproduct case , 1996 .
[83] George Kesidis,et al. A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks , 2008, NET-COOP.
[84] Nicholas Hopper,et al. Scalable onion routing with torsk , 2009, CCS.
[85] Ali al-Nowaihi,et al. The stability of the cournot oligopoly model: A reassessment , 1985 .
[86] Albert-László Barabási,et al. Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.
[87] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[88] Ayalvadi J. Ganesh,et al. On the effectiveness of automatic patching , 2005, WORM '05.
[89] Panayotis Antoniadis,et al. Comparing economic incentives in peer-to-peer networks , 2004, Comput. Networks.
[90] Jiangchuan Liu,et al. Proxy caching for media streaming over the Internet , 2004, IEEE Communications Magazine.
[91] Jussi Kangasharju,et al. Explaining BubbleStorm: Resilient, Probabilistic, and Exhaustive PeertoPeer Search , 2007, SIGCOMM 2007.
[92] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.