메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Estimating operating conditions in a peer-to-peer session initiation protocol overlay network

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED HASH TABLES; FAULT-TOLERANT; NETWORK SIZE; OPERATING CONDITION; PEER TO PEER; PEER-TO-PEER OVERLAYS; RATE ESTIMATION; SECONDARY NETWORKS; SESSION INITIATION PROTOCOLS; STATISTICAL MECHANISMS;

EID: 77954075544     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPSW.2010.5470935     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 1
    • 84869681671 scopus 로고    scopus 로고
    • Study on maintenance operations in a peer-to-peer session initiation protocol overlay network
    • J. Mäenpää and G. Camarillo, "Study on maintenance operations in a peer-to-peer session initiation protocol overlay network," in Proc. of IPDPS, 2009.
    • (2009) Proc. of IPDPS
    • Mäenpää, J.1    Camarillo, G.2
  • 6
    • 35248853324 scopus 로고    scopus 로고
    • Controlling the cost of reliability in peer-to-peer overlays
    • R. Mahajan, M. Castro, and A. I. T. Rowstron, "Controlling the cost of reliability in peer-to-peer overlays," in IPTPS, 2003, pp. 21-32.
    • (2003) IPTPS , pp. 21-32
    • Mahajan, R.1    Castro, M.2    Rowstron, A.I.T.3
  • 7
    • 33847108544 scopus 로고    scopus 로고
    • An adaptive stabilization framework for distributed hash tables
    • vol. 0. Los Alamitos, CA, USA: IEEE Computer Society
    • G. Ghinita and Y. M. Teo, "An adaptive stabilization framework for distributed hash tables," in Parallel and Distributed Processing Symposium, International, vol. 0. Los Alamitos, CA, USA: IEEE Computer Society, 2006, p. 12.
    • (2006) Parallel and Distributed Processing Symposium, International , pp. 12
    • Ghinita, G.1    Teo, Y.M.2
  • 13
    • 0242271286 scopus 로고    scopus 로고
    • Estimating network size from local information
    • K. Horowitz and D. Malkhi, "Estimating network size from local information," Inf. Process. Lett., vol. 88, no. 5, pp. 237-243, 2003.
    • (2003) Inf. Process. Lett. , vol.88 , Issue.5 , pp. 237-243
    • Horowitz, K.1    Malkhi, D.2
  • 18
    • 34848915641 scopus 로고    scopus 로고
    • The structure of an instant messenger network and its vulnerability to malicious codes
    • C. D. Morse and H. Wang, "The structure of an instant messenger network and its vulnerability to malicious codes," in Proc. of ACM SIGCOMM, 2005.
    • (2005) Proc. of ACM SIGCOMM
    • Morse, C.D.1    Wang, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.