Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 263-265.
Previous Articles Next Articles
YU Jie, LI Qiang, LI Sha-sha, MA Jun and LI Zhou-jun
[1] Stoica I,Morris R,Karger D,et al.Chord:A scalable peer-to-peer lookup service for Internet applications[C]∥Proceedings of SIGCOMM’01.2001:149-160 [2] Han J,Liu Y.Rumor Riding:Anonymizing Unstructured Peer-to-Peer Systems[M].IEEE ICNP,Santa Barbara,California,USA,November,2006 [3] 刘琼,徐鹏,杨海涛,等.Peer-to-Peer文件共享系统的测量研究[J].软件学报,2006,17(10):2131-2140 [4] Maymounkov P,Mazières D.Kademlia:A Peer-to-Peer Information System Based on the XOR Metric[C]∥Proceedings of the 1st International Workshop on Peer-to-Peer Systems(IPTPS’02).2002:53-65 [5] Bhagwan R,Savage S,Voelker G.Understanding availability[C]∥Proceedings of the 2nd International Workshop on Peer-to-Peer Systems(IPTPS’03).2003:256-267 [6] Brunner R.A performance evaluation of the Kad-protocol[M].Master Thesis,2006 [7] Steiner M,Biersack E W,Ennajjary T.Actively monitoringpeers in KAD[C]∥Proceedings of the 6th International Workshop on Peer-to-Peer Systems(IPTPS’07).2007 [8] Guo L,Chen S,Xiao Z,et al.Measurement,analysis,and mode-ling of BitTorrent-like systems[C]∥Proceedings of IMC’05.2005 [9] Neglia G,Reina G,Zhang H.Availability in BitTorrent Systems[C]∥Proceedings of INFOCOM’07.2007 [10] Jimenez R,Osmani F,Knutsson B.Connectivity Properties ofMainline BitTorrent DHT Nodes[C]∥Proceedings of P2P’09.2009 [11] Yu J,Fang C,Xu J,et al.ID repetition in Kad[C]∥Proceedings of IEEE P2P’09.2009 [12] Yu J,Lu L,Li Z,et al.A simple effective scheme to enhance the capability of web servers using P2P networks[C]∥Proceedings of ICPP’10.2010 [13] 李强,李舟军,周长斌,等.Kad网络中Sybil攻击团体检测技术研究[J].计算机研究与发展,2014,51(7):1614-1624 [14] Steiner M,Carra D,Biersack E W.Long term study of peer behavior in the KAD DHT[C]∥IEEE/ACM Trans.Networking.2009 |
No related articles found! |
|