Information Technology Reference
In-Depth Information
Li, J., Stribling, J., Morris, R., Kaashoek, M.
F., & Gil, T. M. (2005): A performance vs. cost
framework for evaluating DHT design tradeoffs
under churn , In INFOCOM '05: Proc. of the 24 th
Joint Conference of the IEEE Computer and Com-
munications Societies, pages 225—236.
Reynolds, P., & Vahdat, A. (2003): Efficient
peer-to-peer keyword searching, Proceedings of
International Middleware Conference, Lecture
Notes in Computer Science, vol. 2672, Springer,
pages 21—40.
Rhea, S., Geels, D., Roscoe, T., & Kubiatowicz, J.
(2003): Handling churn in a DHT . Tech. Report
UCB/CSD-03-1299, EECS Department, Univer-
sity of California, Berkeley.
Liu, L., & Lee, K.-W. (2004): Keyword fusion to
support efficient keyword-based search in peer-
to-peer file sharing. In CCGRID'04: Proc. of the
2004 IEEE International Symposium on Cluster
Computing and the Grid, IEEE Computer Society,
pages 269—276.
Rowstron, A., & Druschel, P. (2001): Pastry: Scal-
able, decentralized object location and routing
for large-scale peer-to-peer systems. In Middle-
ware'01: Proc. of the IFIP/ACM International
Conference on Distributed Systems, volume 2218
of Lecture Notes in Computer Science, pages
329—350.
Lua, E. K., Crowcroft, J., Pias, M., Sharma, R.,
& Lim, S. (2005). A survey and comparison of
peer-to-peer overlay network schemes. IEEE Com-
munications Surveys and Tutorials , 7 (2), 72-93.
doi:10.1109/COMST.2005.1610546
Rusitschka, S., & Southall, A. (2003). The resource
management framework: A system for managing
metadata in decentralized networks using peer-
to-peer technology. In Agents and Peer-to-Peer
Computing. In Lecture Notes in Computer Science
( Vol. 2530 , pp. 144-149). Springer.
Maymounkov, P., & Mazières, D. (2006): Kadem-
lia: A peer-to-peer information system based
on the xor metric. In IPTPS'02: Proc of the 1 st
International Workshop on Peer-to-Peer Systems,
pages 53—65, London: UK, Springer
Milojicic, D. S., Kalogeraki, V., Lukose, R., Na-
garaja, K., Pruyne, J., Richard, B., et al. (2002):
Peer-to-peer computing . Technical Report HPL-
2002-57, HP Labs, Palo Alto, CA, USA.
Sarma, A., Bettstetter, C., Dixit, S., Kunzmann,
G., Schollmeier, R., & Nielsen, J. (2006). Self-
organization in communication networks (pp.
423-451). Wiley.
Oram, A. (Ed.). (2001). Peer-to-Peer, Harnessing
the Power of Disruptive Technologies . Sebastopol,
CA, USA: O'Reilly.
Seedorf, J. (2006). Security challenges for Peer-to-
Peer SIP. IEEE Network , 20 , 38-45. doi:10.1109/
MNET.2006.1705882
Ratnasamz, S., Francis, P., Handley, M., Karp,
R., & Schenker, S. (2001): A scalable content-
addressable network. In SIGCOMM'01: Proc. of
the 2001 Conference on Applications, Technolo-
gies, Architectures, and Protocols for Computer
Communications, pages 161—172, New York,
NY: USA, ACM Press.
Shu, Y., Ooi, B. C., Tan, K.-L., & Zhou, A. (2005):
Supporting multi-dimensional range queries in
peer-to-peer systems, In P2P '05: Proc. of the
5 th IEEE International Conference on Peer-to-
Peer Computing, IEEE Computer Society, pages
173—180.
Search WWH ::




Custom Search