Research on Measurement of Peer-to-Peer File Sharing System
暂无分享,去创建一个
Xu Peng | Peng Yun | Liu Qiong | Yang Haitao | L. Qiong | Xu-Bo Peng | Hai-Tao Yang | Peng Yun
[1] Hermann de Meer,et al. Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking , 2009, IWAN.
[2] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[3] Fabrice Guillemin,et al. IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm , 2004, ECUMN.
[4] Stefan Savage,et al. Understanding Availability , 2003, IPTPS.
[5] Daniel Stutzbach,et al. Characterizing unstructured overlay topologies in modern P2P file-sharing systems , 2008, TNET.
[6] Thomas Fuhrmann,et al. Measuring Large Overlay Networks - The Overnet Example , 2005, KiVS.
[7] D. Stutzbach. Characterizing Churn in Peer-to-Peer Networks , .
[8] M. Jovanovi. MODELING PEER-TO-PEER NETWORK TOPOLOGIES THROUGH “ SMALL-WORLD ” MODELS AND POWER LAWS , 2001 .
[9] Sebastian Zander,et al. Automated traffic classification and application identification using machine learning , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[10] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[11] Ian T. Foster,et al. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.
[12] Gang Liu,et al. Explaining BitTorrent Traffic Self-Similarity , 2004, PDCAT.
[13] A. Weigend,et al. Content Availability , Pollution and Poisoning in Peer-to-Peer File Sharing Networks ∗ , 2004 .
[14] Keith W. Ross,et al. The KaZaA Overlay : A Measurement Study , 2004 .
[15] Chae-Woo Lee,et al. Analysis and Modeling of Traffic from Residential High Speed Internet Subscribers , 2004, ICOIN.
[16] Michele Colajanni,et al. Peer-to-peer workload characterization: techniques and open issues , 2004, 2004 International Workshop on Hot Topics in Peer-to-Peer Systems.
[17] Krishna P. Gummadi,et al. Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.
[18] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[19] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[20] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[21] Patrick Brown,et al. Analysis of Peer-to-Peer Traffic on ADSL , 2005, PAM.
[22] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[23] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[24] Chen Changjia. Characterizing Peer-to-Peer Traffic Across Internet , 2004 .
[25] Jacky C. Chu,et al. Availability and locality measurements of peer-to-peer file systems , 2002, SPIE ITCom.
[26] Stefan Saroiu,et al. A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .
[27] Rakesh Kumar,et al. Understanding KaZaA , 2004 .
[28] C. Soldani,et al. Peer-to-Peer Behaviour Detection by TCP Flows Analysis , 2004 .
[29] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..