-
1
-
-
1442284120
-
Measuring and analyzing the characteristics of napster and gnutella hosts
-
Aug
-
S. Saroiu, K. P. Gummadi, and S. D. Gribble, "Measuring and analyzing the characteristics of napster and gnutella hosts," Multimedia Syst., vol. 9, no. 2, pp. 170-184, Aug. 2003.
-
(2003)
Multimedia Syst.
, vol.9
, Issue.2
, pp. 170-184
-
-
Saroiu, S.1
Gummadi, K.P.2
Gribble, S.D.3
-
2
-
-
77951157906
-
A survey and comparison of peer-to-peer overlay network schemes
-
E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, "A survey and comparison of peer-to-peer overlay network schemes," IEEE Commun. Surveys Tutorials, vol. 7, no. 2, pp. 72-93, 2005.
-
(2005)
IEEE Commun. Surveys Tutorials
, vol.7
, Issue.2
, pp. 72-93
-
-
Lua, E.K.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
3
-
-
77955703762
-
Robust super-peer-based P2P file-sharing systems
-
Sep
-
J. Lin and M. Yang, "Robust super-peer-based P2P file-sharing systems," Computer J., vol. 53, no. 7, pp. 951-968, Sep. 2010.
-
(2010)
Computer J.
, vol.53
, Issue.7
, pp. 951-968
-
-
Lin, J.1
Yang, M.2
-
4
-
-
10744230331
-
Hierarchical peer-to-peer systems
-
Dec
-
L. Garcés-Erice, E. W. Biersack, K. W. Ross, P. A. Felber, and G. Urvoy-Keller, "Hierarchical peer-to-peer systems," Parallel Process. Lett., vol. 13, no. 4, pp. 643-657, Dec. 2003.
-
(2003)
Parallel Process. Lett.
, vol.13
, Issue.4
, pp. 643-657
-
-
Garcés-Erice, L.1
Biersack, E.W.2
Ross, K.W.3
Felber, P.A.4
Urvoy-Keller, G.5
-
5
-
-
0036187056
-
Mapping the Gnutella network
-
DOI 10.1109/4236.978369
-
M. Ripeanu, A. Iamnitchi, and I. Foster, "Mapping the gnutella network," IEEE Internet Comput., vol. 6, no. 1, pp. 50-57, Jan.-Feb. 2002. (Pubitemid 34198227)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 50-57
-
-
Ripeanu, M.1
Iamnitchi, A.2
Foster, I.3
-
6
-
-
34548137778
-
Analyzing the characteristics of Gnutella overlays
-
DOI 10.1109/ITNG.2007.39, 4151850, Proceedings - International Conference on Information Technology-New Generations, ITNG 2007
-
Y. Wang, X. Yun, and Y. Li, "Analyzing the characteristics of gnutella overlays," in Proc. Int. Conf. Inf. Technol.-New Generations, Apr. 2007, pp. 1095-1100. (Pubitemid 47298622)
-
(2007)
Proceedings - International Conference on Information Technology-New Generations, ITNG 2007
, pp. 1095-1100
-
-
Wang, Y.1
Yun, X.2
Li, Y.3
-
7
-
-
34547342602
-
Characterizing files in the modern Gnutella network
-
DOI 10.1007/s00530-007-0079-8
-
D. Stutzbach, S. Zhao, and R. Rejaie, "Characterizing files in the modern gnutella network," Multimedia Syst., vol. 13, no. 1, pp. 35-50, Mar. 2007. (Pubitemid 47150830)
-
(2007)
Multimedia Systems
, vol.13
, Issue.1
, pp. 35-50
-
-
Stutzbach, D.1
Zhao, S.2
Rejaie, R.3
-
8
-
-
42649124325
-
Characterizing unstructured overlay topologies in modern P2P file-sharing systems
-
DOI 10.1109/TNET.2007.900406
-
D. Stutzbach, R. Rejaie, and S. Sen, "Characterizing unstructured overlay topologies in modern P2P file-sharing systems," IEEE/ACM Trans. Netw., vol. 16, no. 2, pp. 267-280, Apr. 2008. (Pubitemid 351596032)
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.2
, pp. 267-280
-
-
Stutzbach, D.1
Rejaie, R.2
Sen, S.3
-
9
-
-
34548021406
-
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
-
DOI 10.1016/j.comcom.2007.04.012, PII S014036640700165X
-
Y. Jiang, C. Lin, M. Shi, X. S. Shen, and X. Chu, "A DOS and faulttolerant authentication protocol for group communications in ad hoc networks," Computer Commun., vol. 30, no. 11-12, pp. 2428-2441, Sep. 2007. (Pubitemid 47285282)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2428-2441
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.S.4
Chu, X.5
-
10
-
-
41349118482
-
Optimization of network robustness to waves of targeted and random attacks
-
Apr
-
T. Tanizawa, G. Paul, R. Cohen, S. Havlin, and H. E. Stanley, "Optimization of network robustness to waves of targeted and random attacks," Physical Review E, vol. 71, no. 4, Apr. 2005.
-
(2005)
Physical Review e
, vol.71
, Issue.4
-
-
Tanizawa, T.1
Paul, G.2
Cohen, R.3
Havlin, S.4
Stanley, H.E.5
-
11
-
-
28844473499
-
Resilience of complex networks to random breakdown
-
G. Paul, S. Sreenivasan, and H. E. Stanley, "Resilience of complex networks to random breakdown," Physical Review E, vol. 72, no. 5, 2005.
-
(2005)
Physical Review e
, vol.72
, Issue.5
-
-
Paul, G.1
Sreenivasan, S.2
Stanley, H.E.3
-
12
-
-
79951777261
-
Percolation on correlated complex networks
-
Feb.
-
T. Tanizawa, "Percolation on correlated complex networks," Computer Software-JSSST, vol. 28, no. 1, pp. 135-144, Feb. 2011.
-
(2011)
Computer Software-JSSST
, vol.28
, Issue.1
, pp. 135-144
-
-
Tanizawa, T.1
-
13
-
-
77957203090
-
Cavity analysis on the robustness of random networks against targeted attacks: Influences of degree-degree correlations
-
Sep
-
Y. Shiraki and Y. Kabashima, "Cavity analysis on the robustness of random networks against targeted attacks: Influences of degree-degree correlations," Physical Review E, vol. 82, no. 3, Sep. 2010.
-
(2010)
Physical Review e
, vol.82
, Issue.3
-
-
Shiraki, Y.1
Kabashima, Y.2
-
14
-
-
84862021996
-
Evolving networks with bimodal degree distribution
-
Apr
-
A. R. Sonawane, A. Bhattacharyay, M. S. Santhanam, and G. Ambika, "Evolving networks with bimodal degree distribution," European Physical J. B, vol. 85, no. 4, Apr. 2012.
-
(2012)
European Physical J. B
, vol.85
, Issue.4
-
-
Sonawane, A.R.1
Bhattacharyay, A.2
Santhanam, M.S.3
Ambika, G.4
-
15
-
-
34547453122
-
Understanding churn in peer-to-peer networks
-
DOI 10.1145/1177080.1177105, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
D. Stutzbach and R. Rejaie, "Understanding churn in peer-to-peer networks," in Proc. ACM SIGCOMM, Sep. 2006, pp. 189-202. (Pubitemid 47165601)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 189-202
-
-
Stutzbach, D.1
Rejaie, R.2
-
16
-
-
1242332540
-
Making gnutella-like P2P systems scalable
-
Aug.
-
Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, "Making gnutella-like P2P systems scalable," in Proc. ACM SiGCOMM, Aug. 2003, vol. 33, pp. 407-418.
-
(2003)
Proc. ACM SiGCOMM
, vol.33
, pp. 407-418
-
-
Chawathe, Y.1
Ratnasamy, S.2
Breslau, L.3
Lanham, N.4
Shenker, S.5
-
17
-
-
0042025132
-
Building low-diameter peer-to-peer networks
-
Aug
-
G. Pandurangan, P. Raghavan, and E. Upfal, "Building low-diameter peer-to-peer networks," IEEE J. Sel. Areas Commun., vol. 21, no. 6, pp. 995-1002, Aug. 2003.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.6
, pp. 995-1002
-
-
Pandurangan, G.1
Raghavan, P.2
Upfal, E.3
-
18
-
-
39049163369
-
On heterogeneous overlay construction and random node selection in unstructured P2P networks
-
Apr.
-
V. Vishnumurthy and P. Francis, "On heterogeneous overlay construction and random node selection in unstructured P2P networks," in Proc. IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Vishnumurthy, V.1
Francis, P.2
-
19
-
-
77955431938
-
Minimizing node churn in peer-topeer streaming
-
Sep
-
C. Vassilakis and I. Stavrakakis, "Minimizing node churn in peer-topeer streaming," Computer Commun., vol. 33, no. 14, pp. 1598-1614, Sep. 2010.
-
(2010)
Computer Commun.
, vol.33
, Issue.14
, pp. 1598-1614
-
-
Vassilakis, C.1
Stavrakakis, I.2
-
20
-
-
34250797392
-
On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks
-
DOI 10.1109/TNET.2007.893199
-
D. Leonard, Z. Yao, V. Rai, and D. Loguinov, "On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks," IEEE/ACM Trans. Netw., vol. 15, no. 3, pp. 644-656, June 2007. (Pubitemid 46979744)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.3
, pp. 644-656
-
-
Leonard, D.1
Yao, Z.2
Rai, V.3
Loguinov, D.4
-
21
-
-
61449129202
-
Node isolation model and age-based neighbor selection in unstructured P2P networks
-
Feb
-
Z. Yao, X. Wang, D. Leonard, and D. Loguinov, "Node isolation model and age-based neighbor selection in unstructured P2P networks," IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 144-157, Feb. 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 144-157
-
-
Yao, Z.1
Wang, X.2
Leonard, D.3
Loguinov, D.4
-
22
-
-
79961153384
-
An age-based membership protocol against strong churn in unstructured P2P networks
-
May
-
H. Liu, X. Liu, W. Song, and W. Wen, "An age-based membership protocol against strong churn in unstructured P2P networks," in Proc. Int. Conf. Netw. Comput. Inf. Security, May 2011, vol. 2, pp. 195-200.
-
(2011)
Proc. Int. Conf. Netw. Comput. Inf. Security
, vol.2
, pp. 195-200
-
-
Liu, H.1
Liu, X.2
Song, W.3
Wen, W.4
-
23
-
-
0037330403
-
Peer-to-peer membership management for gossip-based protocols
-
Feb
-
A. J. Ganesh, A. Kermarrec, and L. Massoulié, "Peer-to-peer membership management for gossip-based protocols," IEEE Trans. Comput., vol. 52, no. 2, pp. 139-149, Feb. 2003.
-
(2003)
IEEE Trans. Comput.
, vol.52
, Issue.2
, pp. 139-149
-
-
Ganesh, A.J.1
Kermarrec, A.2
Massoulié, L.3
-
24
-
-
22044433190
-
CYCLON: Inexpensive membership management for unstructured P2P overlays
-
DOI 10.1007/s10922-005-4441-x
-
S. Voulgaris, D. Gavidia, and M. Van Steen, "Cyclon: Inexpensive membership management for unstructured P2P overlays," J. Netw. Syst. Manage., vol. 13, no. 2, pp. 197-216, June 2005. (Pubitemid 40963651)
-
(2005)
Journal of Network and Systems Management
, vol.13
, Issue.2
, pp. 197-216
-
-
Voulgaris, S.1
Gavidia, D.2
Van Steen, M.3
-
25
-
-
47949110510
-
-
Ph.D. dissertation Swiss Federal Institute of Technology (ETH)
-
B. Pretre, "Attacks on peer-to-peer networks," Ph.D. dissertation, Swiss Federal Institute of Technology (ETH), 2005.
-
(2005)
Attacks on Peer-to-peer Networks
-
-
Pretre, B.1
-
26
-
-
67349157090
-
Optimally DOS resistant P2P topologies for live multimedia streaming
-
Jan
-
M. Brinkmeier, G. Schäfer, and T. Strufe, "Optimally DOS resistant P2P topologies for live multimedia streaming," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 6, Jan. 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.6
-
-
Brinkmeier, M.1
Schäfer, G.2
Strufe, T.3
-
28
-
-
58049110249
-
Analyzing the vulnerability of superpeer networks against attack
-
Oct.-Nov.
-
B. Mitra, F. Peruani, S. Ghose, and N. Ganguly, "Analyzing the vulnerability of superpeer networks against attack," in Proc. 14th ACM Conf. Comput. Commun. Security, Oct.-Nov. 2007, pp. 225-234.
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Security
, pp. 225-234
-
-
Mitra, B.1
Peruani, F.2
Ghose, S.3
Ganguly, N.4
-
29
-
-
79960188278
-
Attacks on correlated peer-to-peer networks: An analytical study
-
Apr.
-
A. Srivastava, B. Mitra, F. Peruani, and N. Ganguly, "Attacks on correlated peer-to-peer networks: An analytical study," in Proc. Int. Workshop Security Comput., Netw. Commun., Apr. 2011, pp. 1093-1098.
-
(2011)
Proc. Int. Workshop Security Comput., Netw. Commun.
, pp. 1093-1098
-
-
Srivastava, A.1
Mitra, B.2
Peruani, F.3
Ganguly, N.4
-
30
-
-
77949651044
-
Formal understanding of the emergence of superpeer networks: A complex network approach
-
Jan.
-
B. Mitra, A. K. Dubey, S. Ghose, and N. Ganguly, "Formal understanding of the emergence of superpeer networks: A complex network approach," in Proc. 11th Int. Conf. Distrib. Comput. Netw., Jan. 2010, pp. 219-230.
-
(2010)
Proc. 11th Int. Conf. Distrib. Comput. Netw.
, pp. 219-230
-
-
Mitra, B.1
Dubey, A.K.2
Ghose, S.3
Ganguly, N.4
-
31
-
-
77951126500
-
Catastrophic cascade of failures in interdependent networks
-
Apr
-
S. V. Buldrev, R. Parshani, G. Paul, H. E. Stanley, and S. Havlin, "Catastrophic cascade of failures in interdependent networks," Nature, vol. 464, pp. 1025-1028, Apr. 2010.
-
(2010)
Nature
, vol.464
, pp. 1025-1028
-
-
Buldrev, S.V.1
Parshani, R.2
Paul, G.3
Stanley, H.E.4
Havlin, S.5
-
32
-
-
84883320208
-
-
Y. Matsumoto, "Ruby" [Online]. Available: http://www.ruby-lang. org/en/
-
Ruby
-
-
Matsumoto, Y.1
-
33
-
-
33750454058
-
Error and attack tolerance of evolving networks with local preferential attachment
-
DOI 10.1016/j.physa.2006.05.049, PII S0378437106006595
-
S. Sun, Z. Liu, Z. Chen, and Z. Yuan, "Error and attack tolerance of evolving networks with local preferential attachment," Physica A: Statistical Theoretical Physics, vol. 373, no. 1, pp. 851-860, Jan. 2007. (Pubitemid 44647712)
-
(2007)
Physica A: Statistical Mechanics and its Applications
, vol.373
, pp. 851-860
-
-
Sun, S.1
Liu, Z.2
Chen, Z.3
Yuan, Z.4
-
34
-
-
0032286776
-
The Size of the Giant Component of a Random Graph with a Given Degree Sequence
-
M. Molloy and B. Reed, "The size of the giant component of a random graph with a given degree sequence," Combinatorics, Probability, Comput., vol. 7, no. 3, pp. 295-305, Sep. 2000. (Pubitemid 128480814)
-
(1998)
Combinatorics Probability and Computing
, vol.7
, Issue.3
, pp. 295-305
-
-
Molloy, M.1
Reed, B.2
-
35
-
-
33751255669
-
Identity-based secure collaboration in ad hoc networks
-
Feb
-
J. Pan, L. Cai, X. Shen, and J. W. Mark, "Identity-based secure collaboration in ad hoc networks," Elsevier Comput. Netw., vol. 51, no. 3, pp. 835-865, Feb. 2007.
-
(2007)
Elsevier Comput. Netw.
, vol.51
, Issue.3
, pp. 835-865
-
-
Pan, J.1
Cai, L.2
Shen, X.3
Mark, J.W.4
-
36
-
-
36849079903
-
A survey of routing attacks in MANET
-
Oct
-
B. Kannhavong, H. Nakayama, A. Jamalipour, Y. Nemoto, and N. Kato, "A survey of routing attacks in MANET," IEEE Wireless Commun. Mag., vol. 14, no. 5, pp. 85-91, Oct. 2007.
-
(2007)
IEEE Wireless Commun. Mag.
, vol.14
, Issue.5
, pp. 85-91
-
-
Kannhavong, B.1
Nakayama, H.2
Jamalipour, A.3
Nemoto, Y.4
Kato, N.5
|