-
1
-
-
0042920663
-
Exploiting network proximity in distributed hash tables
-
Technical report, Microsoft Research
-
M. Castro, P. Druschel, Y. C. Hu, and A. Rowstron. Exploiting network proximity in distributed hash tables. Technical report, Microsoft Research, 2002.
-
(2002)
-
-
Castro, M.1
Druschel, P.2
Hu, Y.C.3
Rowstron, A.4
-
3
-
-
52249114530
-
-
Cooperative Association for Internet Data Analysis CAIDA
-
Cooperative Association for Internet Data Analysis (CAIDA). Macroscopic Topology Project. http://www.caida.org/analysis/topology/macroscopic/.
-
Macroscopic Topology Project
-
-
-
5
-
-
42149083231
-
Profiling a million user DHT
-
J. Falkner, M. Piatek, J. P. John, A. Krishnamurthy, and T. Anderson. Profiling a million user DHT. In IMC '07, 2007.
-
(2007)
IMC '07
-
-
Falkner, J.1
Piatek, M.2
John, J.P.3
Krishnamurthy, A.4
Anderson, T.5
-
7
-
-
21244483478
-
A study of the performance potential of DHT-based overlays
-
S. Jain, R. Mahajan, and D. Wetherall. A study of the performance potential of DHT-based overlays. In USENIX '03, 2003.
-
(2003)
USENIX '03
-
-
Jain, S.1
Mahajan, R.2
Wetherall, D.3
-
8
-
-
18144414978
-
Is P2P dying or just hiding?
-
T. Karagiannis, A. Broido, N. Brownlee, K. C. Claffy, and M. Faloutsos. Is P2P dying or just hiding? In GLOBECOM '04, 2004.
-
(2004)
GLOBECOM '04
-
-
Karagiannis, T.1
Broido, A.2
Brownlee, N.3
Claffy, K.C.4
Faloutsos, M.5
-
9
-
-
0039087025
-
-
Traffic, http://www.lightreading.com, P
-
Light Reading, Controlling P2P Traffic, http://www.lightreading.com.
-
Controlling
-
-
-
11
-
-
2442421260
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
P. Maymounkov and D. Mazières. Kademlia: A peer-to-peer information system based on the XOR metric. In IPTPS '02, 2002.
-
(2002)
IPTPS '02
-
-
Maymounkov, P.1
Mazières, D.2
-
12
-
-
55149115293
-
-
T. Ng and H. Zhang. Towards Global Network Positioning. In IMW'01, 2001.
-
T. Ng and H. Zhang. Towards Global Network Positioning. In IMW'01, 2001.
-
-
-
-
15
-
-
55149086470
-
Accessing nearby copies of replicated objects in a distributed environment
-
Plaxton, Rajaraman, and Richa. Accessing nearby copies of replicated objects in a distributed environment. MST: Mathematical Systems Theory, 1999.
-
(1999)
MST: Mathematical Systems Theory
-
-
Plaxton, R.1
Richa2
-
18
-
-
33845215790
-
Using planetlab for network research: Myths, realities, and best practices
-
N. Spring, L. Peterson, A. Bavier, and V. Pai. Using planetlab for network research: myths, realities, and best practices. ACM SIGOPS Operating Systems Review, 2006.
-
(2006)
ACM SIGOPS Operating Systems Review
-
-
Spring, N.1
Peterson, L.2
Bavier, A.3
Pai, V.4
-
19
-
-
55149107107
-
Analyzing peer behavior in KAD
-
Technical report, Institut Eurecom
-
M. Steiner, T. En Najjary, and E. W. Biersack. Analyzing peer behavior in KAD. Technical report, Institut Eurecom, 2007.
-
(2007)
-
-
Steiner, M.1
En Najjary, T.2
Biersack, E.W.3
-
21
-
-
38049024292
-
Improving lookup performance over a widely-deployed DHT
-
D. Stutzbach and R. Rejaie. Improving lookup performance over a widely-deployed DHT. In INFOCOM '06, 2006.
-
(2006)
INFOCOM '06
-
-
Stutzbach, D.1
Rejaie, R.2
-
22
-
-
55149089419
-
-
The PingER Project
-
The PingER Project. http://www-iepm.slac.stanford.edu/pinger/.
-
-
-
-
24
-
-
55149096501
-
-
B. Y. Zhao, A. D. Joseph, and J. Kubiatowicz. Locality aware mechanisms for large-scale networks. In FuDiCo '02, 2002.
-
B. Y. Zhao, A. D. Joseph, and J. Kubiatowicz. Locality aware mechanisms for large-scale networks. In FuDiCo '02, 2002.
-
-
-
|