-
1
-
-
72949089163
-
-
[Online]. Available
-
Sina.com Report on Taiwan Earthquake. [Online]. Available: http://tech.sina.com.cn/i/2007-01-05/09131320398.shtml
-
Sina.com Report on Taiwan Earthquake
-
-
-
2
-
-
0004189523
-
-
[Online]. Available
-
A Brief History of Internet. [Online]. Available: http://www.walthowe. com/navnet/history.html
-
A Brief History of Internet
-
-
-
4
-
-
85084162382
-
Geographic properties of Internet routing
-
Monterey, CA, Jun.
-
L. Subramanian, V. Padmanabhan, and R. Katz, "Geographic properties of Internet routing", in Proc. USENIX Annu. Tech. Conf., Monterey, CA, Jun. 2002, pp. 243-259.
-
(2002)
Proc. USENIX Annu. Tech. Conf.
, pp. 243-259
-
-
Subramanian, L.1
Padmanabhan, V.2
Katz, R.3
-
5
-
-
0141877349
-
-
Evanston, IL: Northwestern Univ.
-
U. Wilensky, Netlogo. Evanston, IL: Northwestern Univ., 1999.
-
(1999)
Netlogo
-
-
Wilensky, U.1
-
6
-
-
0002101577
-
Reputation systems
-
Dec.
-
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation systems", Commun. ACM, vol.43, no.12, pp. 45-48, Dec. 2001.
-
(2001)
Commun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
7
-
-
24944516457
-
Analysing topologies of transitive trust
-
Pisa, Italy, Sep.
-
A. Jøsang, E. Gray, and M. Kinateder, "Analysing topologies of transitive trust", in Proc. FAST, Pisa, Italy, Sep. 2003, pp. 9-22.
-
(2003)
Proc. FAST
, pp. 9-22
-
-
Jøsang, A.1
Gray, E.2
Kinateder, M.3
-
8
-
-
84948698587
-
A computational model of trust and reputation
-
L. Mui, M. Mohtashemi, and A. Halberstadt, "A computational model of trust and reputation", in Proc. HICSS-35, 2002, p. 188.
-
(2002)
Proc. HICSS-35
, pp. 188
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
9
-
-
27544488231
-
PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing
-
Jan.
-
Z. Liang and W. Shi, "PET: A PErsonalized Trust model with reputation and risk evaluation for P2P resource sharing", in Proc. HICSS-38, Jan. 2005, p. 201.2.
-
(2005)
Proc. HICSS-38
, pp. 201-202
-
-
Liang, Z.1
Shi, W.2
-
10
-
-
36148956575
-
Analysis of ratings on trust inference in open environments
-
Feb.
-
Z. Liang and W. Shi, "Analysis of ratings on trust inference in open environments", in Perform. Eval., Feb. 2008, vol.65, no.2, pp. 99-128.
-
(2008)
Perform. Eval.
, vol.65
, Issue.2
, pp. 99-128
-
-
Liang, Z.1
Shi, W.2
-
11
-
-
29844451556
-
Enforcing cooperative resource sharing in untrusted peer-to-peer environment
-
Dec.
-
Z. Liang and W. Shi, "Enforcing cooperative resource sharing in untrusted peer-to-peer environment", in ACM J. Mobile Netw. Appl. (MONET), Dec. 2005, vol.10, no.6, pp. 771-783.
-
(2005)
ACM J. Mobile Netw. Appl. (MONET)
, vol.10
, Issue.6
, pp. 771-783
-
-
Liang, Z.1
Shi, W.2
-
13
-
-
33847330330
-
HLP: A next-generation interdomain routing protocol
-
Aug.
-
L. Subramanian, M. Caesar, C. T. Ee, M. Handley, M. Mao, S. Shenker, and I. Stoica, "HLP: A next-generation interdomain routing protocol", in Proc. ACM SIGCOMM, Aug. 2005, pp. 13-24.
-
(2005)
Proc. ACM SIGCOMM
, pp. 13-24
-
-
Subramanian, L.1
Caesar, M.2
Ee, C.T.3
Handley, M.4
Mao, M.5
Shenker, S.6
Stoica, I.7
-
14
-
-
0033892689
-
Heuristics for internet map discovery
-
Mar.
-
R. Govindan and H. Tangmunarunkit, "Heuristics for Internet map discovery", in Proc. IEEE INFOCOM, Mar. 2000, pp. 1371-1380.
-
(2000)
Proc. IEEE INFOCOM
, pp. 1371-1380
-
-
Govindan, R.1
Tangmunarunkit, H.2
-
15
-
-
85084160220
-
Mapping and visualizing the internet
-
Jun.
-
B. Cheswick, H. Burch, and S. Branigan, "Mapping and visualizing the Internet", in Proc. USENIX Annu. Tech. Conf., Jun. 2000, pp. 1-12.
-
(2000)
Proc. USENIX Annu. Tech. Conf.
, pp. 1-12
-
-
Cheswick, B.1
Burch, H.2
Branigan, S.3
-
16
-
-
8344274436
-
A model of BGP routing for network engineering
-
Jun.
-
N. Feamster, J. Winick, and J. Rexford, "A model of BGP routing for network engineering", in Proc. ACM SIGMETRICS, Jun. 2004, pp. 331-342.
-
(2004)
Proc. ACM SIGMETRICS
, pp. 331-342
-
-
Feamster, N.1
Winick, J.2
Rexford, J.3
-
17
-
-
33750292280
-
Stable egress route selection for interdomain traffic engineering: Model and analysis
-
Boston, MA, Oct.
-
H. Wang, H. Xie, Y. R. Yang, L. E. Li, Y. Liu, and A. Silberschatz, "Stable egress route selection for interdomain traffic engineering: Model and analysis", in Proc. ICNP, Boston, MA, Oct. 2005, pp. 16-29.
-
(2005)
Proc. ICNP
, pp. 16-29
-
-
Wang, H.1
Xie, H.2
Yang, Y.R.3
Li, L.E.4
Liu, Y.5
Silberschatz, A.6
-
18
-
-
8344241940
-
Analyzing BGP policies:Methodology and tool
-
Hong Kong
-
G. Siganos andM. Faloutsos, "Analyzing BGP policies:Methodology and tool", in Proc. IEEE INFOCOM, Hong Kong, 2004, pp. 1640-1651.
-
(2004)
Proc. IEEE INFOCOM
, pp. 1640-1651
-
-
Siganos, G.1
Faloutsos, M.2
-
19
-
-
72949118760
-
-
[Online]. Available
-
M. Vutukuru, N. Feamster, M. Walfish, H. Balakrishnan, and S. Shenker, Revisiting Internet Addressing: Back to the Future! [Online]. Available: cs.shenker.net/files/aipposn.pdf
-
Revisiting Internet Addressing: Back to the Future!
-
-
Vutukuru, M.1
Feamster, N.2
Walfish, M.3
Balakrishnan, H.4
Shenker, S.5
-
20
-
-
84858152372
-
Negotiation-based routing between neighboring ISPs
-
May
-
R. Mahajan, D. Wetherall, and T. Anderson, "Negotiation-based routing between neighboring ISPs", in Proc. NSDI, May 2005, pp. 29-42.
-
(2005)
Proc. NSDI
, pp. 29-42
-
-
Mahajan, R.1
Wetherall, D.2
Anderson, T.3
-
21
-
-
2342454075
-
Feedback based routing
-
Oct.
-
D. Zhu, M. Gritter, and D. Cheriton, "Feedback based routing", in Proc. HotNets-I, Oct. 2002, vol.33, pp. 71-76.
-
(2002)
Proc. HotNets-I
, vol.33
, pp. 71-76
-
-
Zhu, D.1
Gritter, M.2
Cheriton, D.3
-
22
-
-
51449101912
-
Preemption with rerouting to minimize service disruption in connection-oriented networks
-
Sep.
-
C. H. Lau, B. Soong, and S. K. Bose, "Preemption with rerouting to minimize service disruption in connection-oriented networks", IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol.38, no.5, pp. 1093-1104, Sep. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.38
, Issue.5
, pp. 1093-1104
-
-
Lau, C.H.1
Soong, B.2
Bose, S.K.3
-
23
-
-
0035747559
-
Managing trust in a peer-to-peer information systems
-
Nov.
-
K. Aberer and Z. Despotovic, "Managing trust in a peer-to-peer information systems", in Proc. CIKM, Nov. 2001, pp. 310-317.
-
(2001)
Proc. CIKM
, pp. 310-317
-
-
Aberer, K.1
Despotovic, Z.2
-
24
-
-
29244482785
-
P2P reputation management: Probabilistic estimation vs. social networks
-
Mar.
-
Z. Despotovic and K. Aberer, "P2P reputation management: Probabilistic estimation vs. social networks", Comput. Netw., vol.50, no.4, pp. 485-500, Mar. 2006.
-
(2006)
Comput. Netw.
, vol.50
, Issue.4
, pp. 485-500
-
-
Despotovic, Z.1
Aberer, K.2
-
25
-
-
72949112877
-
Abductive reasoning with uncertainty
-
Jun.
-
A. Jøsang, "Abductive reasoning with uncertainty", in Proc. IPMU, Jun. 2008, pp. 9-16.
-
(2008)
Proc. IPMU
, pp. 9-16
-
-
Jøsang, A.1
-
26
-
-
33646831908
-
TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks
-
M. Srivatsa, L. Xiong, and L. Liu, "TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks", in Proc. WWW, 2005, pp. 422-431.
-
(2005)
Proc. WWW
, pp. 422-431
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
27
-
-
33750688177
-
Trust representation and aggregation in a distributed agent system
-
Y. Wang and M. P. Singh, "Trust representation and aggregation in a distributed agent system", in Proc. AAAI, 2006, pp. 1425-1430.
-
(2006)
Proc. AAAI
, pp. 1425-1430
-
-
Wang, Y.1
Singh, M.P.2
-
28
-
-
84880909594
-
Formal trust model for multiagent systems
-
Y. Wang and M. P. Singh, "Formal trust model for multiagent systems", in Proc. AAAI, 2007, pp. 1551-1556.
-
(2007)
Proc. AAAI
, pp. 1551-1556
-
-
Wang, Y.1
Singh, M.P.2
-
29
-
-
1142305174
-
Searching social networks
-
Melbourne, Australia, Jul.
-
B. Yu and M. P. Singh, "Searching social networks", in Proc. AAMAS, Melbourne, Australia, Jul. 2003, pp. 65-72.
-
(2003)
Proc. AAMAS
, pp. 65-72
-
-
Yu, B.1
Singh, M.P.2
-
30
-
-
34047150751
-
PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing
-
Apr.
-
R. Zhou and K. Hwang, "PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing", IEEE Trans. Parallel Distrib. Syst., vol.18, no.4, pp. 460-473, Apr. 2007.
-
(2007)
IEEE Trans. Parallel Distrib. Syst.
, vol.18
, Issue.4
, pp. 460-473
-
-
Zhou, R.1
Hwang, K.2
-
31
-
-
0029700344
-
Decentralized trust management
-
May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management", in Proc. IEEE Symp. Security Privacy, May 1996, p. 164.
-
(1996)
Proc. IEEE Symp. Security Privacy
, pp. 164
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
32
-
-
0003839495
-
-
Ph.D. dissertation, Univ. Stirling, Stirling, U.K.
-
S. Marsh, "Formalising trust as a computational concept", Ph.D. dissertation, Univ. Stirling, Stirling, U.K., 1994.
-
(1994)
Formalising Trust as a Computational Concept
-
-
Marsh, S.1
-
33
-
-
56449109901
-
Providing justifications in recommender systems
-
Nov.
-
P. Symeonidis, A. Nanopoulos, and Y. Manolopoulos, "Providing justifications in recommender systems", IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol.38, no.6, pp. 1262-1272, Nov. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.38
, Issue.6
, pp. 1262-1272
-
-
Symeonidis, P.1
Nanopoulos, A.2
Manolopoulos, Y.3
-
34
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
May
-
S. Kamvar, M. T. Schlosser, and H. Gacia-Molina, "The eigentrust algorithm for reputation management in P2P networks", in Proc. WWW, May 2003, pp. 640-651.
-
(2003)
Proc. WWW
, pp. 640-651
-
-
Kamvar, S.1
Schlosser, M.T.2
Gacia-Molina, H.3
-
35
-
-
0043016341
-
Cooperative peer groups in nice
-
Mar.
-
S. Lee, R. Sherwood, and B. Bhattacharjee, "Cooperative peer groups in nice", in Proc. INFOCOM, Mar. 2003, vol.2, pp. 1272-1282.
-
(2003)
Proc. INFOCOM
, vol.2
, pp. 1272-1282
-
-
Lee, S.1
Sherwood, R.2
Bhattacharjee, B.3
|