-
2
-
-
0035474003
-
-
10.1103/PhysRevE.64.046135
-
L. A. Adamic, R. M. Lukose, A. R. Puniyani, and B. A. Huberman, Phys. Rev. E 64, 046135 (2001). 10.1103/PhysRevE.64.046135
-
(2001)
Phys. Rev. e
, vol.64
, pp. 046135
-
-
Adamic, L.A.1
Lukose, R.M.2
Puniyani, A.R.3
Huberman, B.A.4
-
3
-
-
41349109267
-
-
10.1103/PhysRevE.71.016103;
-
C. P. Herrero, Phys. Rev. E 71, 016103 (2005) 10.1103/PhysRevE.71.016103
-
(2005)
Phys. Rev. e
, vol.71
, pp. 016103
-
-
Herrero, C.P.1
-
4
-
-
41349093710
-
-
10.1103/PhysRevE.71.016107;
-
S.-J. Yang, Phys. Rev. E 71, 016107 (2005) 10.1103/PhysRevE.71.016107
-
(2005)
Phys. Rev. e
, vol.71
, pp. 016107
-
-
Yang, S.-J.1
-
6
-
-
34548729143
-
-
10.1016/j.physa.2007.07.022
-
S. Lee, S.-H. Yook, and Y. Kim, Physica A 385, 743 (2007). 10.1016/j.physa.2007.07.022
-
(2007)
Physica A
, vol.385
, pp. 743
-
-
Lee, S.1
Yook, S.-H.2
Kim, Y.3
-
7
-
-
33750561518
-
-
10.1103/PhysRevE.74.046118
-
S. Lee, S.-H. Yook, and Y. Kim, Phys. Rev. E 74, 046118 (2006). 10.1103/PhysRevE.74.046118
-
(2006)
Phys. Rev. e
, vol.74
, pp. 046118
-
-
Lee, S.1
Yook, S.-H.2
Kim, Y.3
-
10
-
-
31344474880
-
-
10.1016/j.physrep.2005.10.009
-
S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang, Phys. Rep. 424, 175 (2006). 10.1016/j.physrep.2005.10.009
-
(2006)
Phys. Rep.
, vol.424
, pp. 175
-
-
Boccaletti, S.1
Latora, V.2
Moreno, Y.3
Chavez, M.4
Hwang, D.-U.5
-
11
-
-
0036374187
-
-
Proceedings of the 16th Annual ACM International Conference on Supercomputing, New York City, USA, 2002 (unpublished).
-
Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker, Search and Replication in Unstructured Peer-to-Peer Networks, Proceedings of the 16th Annual ACM International Conference on Supercomputing, New York City, USA, 2002 (unpublished).
-
Search and Replication in Unstructured Peer-to-Peer Networks
-
-
Lv, Q.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
14
-
-
34547370197
-
-
ACM, New York
-
D. Stutzbach and R. Rejaie, Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, (ACM, New York, 2005), p. 402, extended abstract.
-
(2005)
Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
, pp. 402
-
-
Stutzbach, D.1
Rejaie, R.2
-
19
-
-
68949111463
-
-
http://www.theregister.co.uk/2003/10/14/edonkey-rides-like-the-wind/
-
-
-
-
20
-
-
68949120623
-
-
D. Plonka, Uw-Madison Napster Traffic Measurement, http://net.doit.wisc. edu/data/Napster, 2000.
-
(2000)
-
-
Plonka, D.1
-
22
-
-
68949128398
-
-
BitTorrent Protocol Specification
-
BitTorrent Protocol Specification, http://www.bittorrent.org/protocol. html
-
-
-
-
24
-
-
68949095299
-
-
Gnutella Protocol Specification v0.4 and v0.6.
-
Gnutella Protocol Specification v0.4 and v0.6.
-
-
-
-
25
-
-
68949109553
-
-
http://www.kazaa.com
-
-
-
-
26
-
-
2342616749
-
-
10.1103/PhysRevLett.92.118701
-
J. D. Noh and H. Rieger, Phys. Rev. Lett. 92, 118701 (2004). 10.1103/PhysRevLett.92.118701
-
(2004)
Phys. Rev. Lett.
, vol.92
, pp. 118701
-
-
Noh, J.D.1
Rieger, H.2
-
27
-
-
33646366644
-
-
10.1103/PhysRevE.73.056102
-
S. Kwon, S. Lee, and Y. Kim, Phys. Rev. E 73, 056102 (2006). 10.1103/PhysRevE.73.056102
-
(2006)
Phys. Rev. e
, vol.73
, pp. 056102
-
-
Kwon, S.1
Lee, S.2
Kim, Y.3
-
28
-
-
68949087832
-
-
In practice, the names of the files in the information packet can be restricted to those which are intended to be shared by the owner for the security.
-
In practice, the names of the files in the information packet can be restricted to those which are intended to be shared by the owner for the security.
-
-
-
-
29
-
-
44949153379
-
-
10.1103/PhysRevE.77.066105
-
S. Kwon, S. Yoon, and Y. Kim, Phys. Rev. E 77, 066105 (2008). 10.1103/PhysRevE.77.066105
-
(2008)
Phys. Rev. e
, vol.77
, pp. 066105
-
-
Kwon, S.1
Yoon, S.2
Kim, Y.3
-
31
-
-
34247549810
-
-
10.1103/PhysRevE.75.046114
-
S. Yoon, S. Lee, S.-H. Yook, and Y. Kim, Phys. Rev. E 75, 046114 (2007). 10.1103/PhysRevE.75.046114
-
(2007)
Phys. Rev. e
, vol.75
, pp. 046114
-
-
Yoon, S.1
Lee, S.2
Yook, S.-H.3
Kim, Y.4
-
32
-
-
68949128399
-
-
note
-
Since f (t) of FB algorithm is an exponential function of tTTL, f (t) of FB can be smaller than that of BNLL when tTTL is very small. However, when tTTL is less than or equal to the obtained T 's in Figs. 1 2, many packets fail to find the requested information and T diverges. Thus, tTTL should be much larger than the obtained T (4-5). As a result, f (t) of FB always exceeds that of BNLL when T is finite.
-
-
-
|