CUFTI: Methods for core users finding and traffic identification in P2P systems
暂无分享,去创建一个
[1] Jun Li,et al. Optimal P2P Cache Sizing: A Monetary Cost Perspective on Capacity Design of Caches to Reduce P2P Traffic , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[2] Xiaoning Ding,et al. Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.
[3] Chih-Lin Hu,et al. Distributed pairing for file sharing in large-scale peer-to-peer networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[4] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[5] Indranil Gupta,et al. Understanding overlay characteristics of a large-scale peer-to-peer IPTV system , 2010, TOMCCAP.
[6] Chuan Wu,et al. Distilling Superior Peers in Large-Scale P2P Streaming Systems , 2009, IEEE INFOCOM 2009.
[7] Marco Mellia,et al. Mining Unclassified Traffic Using Automatic Clustering Techniques , 2011, TMA.
[8] Keith W. Ross,et al. Inferring Network-Wide Quality in P2P Live Streaming Systems , 2007, IEEE Journal on Selected Areas in Communications.
[9] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[10] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..
[11] Zhi-Li Zhang,et al. Inferring applications at the network layer using collective traffic statistics , 2010, International Teletraffic Congress.
[12] Feng Wang,et al. Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[13] Hwangjun Song,et al. A robust P2P video multicast streaming system under high peer-churn rate , 2011, 2011 IEEE 13th International Conference on Communication Technology.
[14] Tao Qin,et al. Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring , 2010, IEEE Transactions on Information Forensics and Security.
[15] Bo Li,et al. Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast , 2008, Proceedings of the IEEE.
[16] Panayiotis Mavrommatis,et al. Identifying Known and Unknown Peer-to-Peer Traffic , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[17] Chadi Barakat,et al. Using host profiling to refine statistical application identification , 2012, 2012 Proceedings IEEE INFOCOM.
[18] Michael Sirivianos,et al. Free-riding in BitTorrent Networks with the Large View Exploit , 2007, IPTPS.
[19] Renata Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[20] Antonio Pescapè,et al. Early Classification of Network Traffic through Multi-classification , 2011, TMA.
[21] Keith W. Ross,et al. A Measurement Study of a Large-Scale P2P IPTV System , 2007, IEEE Transactions on Multimedia.
[22] Chun-Jen Tsai,et al. Visual sensitivity guided bit allocation for video coding , 2006, IEEE Transactions on Multimedia.
[23] Kunwadee Sripanidkulchai,et al. Considering Priority in Overlay Multicast Protocols Under Heterogeneous Environments , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[24] Xinbo Jiang,et al. Churn performance study of structured peer-to-peer overlay in supporting massively multiplayer online role playing games (MMORPGs) , 2011, 2011 17th IEEE International Conference on Networks.
[25] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[26] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[27] Matthew Roughan,et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification , 2004, IMC '04.
[28] Matthew Roughan,et al. P2P the gorilla in the cable , 2003 .
[29] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[30] Michalis Faloutsos,et al. Profiling-By-Association: a resilient traffic profiling solution for the internet backbone , 2010, CoNEXT.