Information Technology Reference
In-Depth Information
[Leung and Kwok, 2008] Leung, A. K.-H. and Kwok, Y.-K. (2008). On Lo-
calized Application-Driven Topology Control for Energy-E cient Wire-
less Peer-to-Peer File Sharing. IEEE Transactions on Mobile Computing,
(1):66-80.
[Li et al., 2007] Li, B., Xie, S., Keung, G. Y., Liu, J., Stoica, I., Zhang, H.,
and Zhang, X. (2007). An Empirical Study of the CoolStreaming+ System.
IEEE Journal on Selected Areas in Communications, (9):1627-1639.
[Li et al., 2009] Li, D., Wu, J., and Cui, Y. (2009). Defending Against Buffer
Map Cheating in DONet-Like P2P Streaming. IEEE Transactions on Mul-
timedia, (3):535-542.
[Li and Singhal, 2007] Li, H. and Singhal, M. (2007). Trust Management in
Distributed Systems. IEEE Computer, pages 45-53.
[Li et al., 2008] Li, Z., Yu, Y., Hei, X., and Tsang, D. H. K. (2008). Towards
Low-Redundany Push-Pull P2P Live Streaming. In Proceedings of QShine
2008.
[Liang et al., 2005] Liang, J., Kumar, R., and Ross, K. W. (2005). The KaZaA
Overlay: A Measurement Study. Computer Networks.
[Lin et al., 2007] Lin, Z., Feng, X., Yuan, W., and Jian, L. (2007). A Seman-
tic and Time Related Recommendation-Feedback Trust Model. In Pro-
ceedings 2nd International Conference Availability, Reliability, and Security
(ARES).
[Liu and Ning, 2003] Liu, D. and Ning, P. (2003). Location-Based Pairwise
Key Establishments for Static Sensor Networks. In The 1st ACM Workshop
on Security of Ad Hoc and Sensor Networks, pages 72-82.
[Liu et al., 2005a] Liu, D., Ning, P., and Li, R. (2005a). Establishing Pairwise
Keys in Distributed Sensor Networks. ACM Transactions on Information
and System Security, 8(1):41-77.
[Liu et al., 2005b] Liu, Y., Xiao, L., Liu, X., Ni, L. M., and Zhang, X. (2005b).
Location Awareness in Unstructured Peer-to-Peer Systems. IEEE Trans-
actions on Parallel and Distributed Systems, (2):163-174.
[Lorincz et al., 2004] Lorincz, K., Malan, D. J., Fulford-Jones, T. R., Nawoj,
A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., and Moulton, S.
(2004). Sensor Networks for Emergency Response: Challenges and Oppor-
tunities. IEEE Pervasive Computing, 3(4):16-23.
[Lou and Hwang, 2009] Lou, X. and Hwang, K. (2009). Collusive Piracy Pre-
vention in P2P Content Deliver Networks. IEEE Transactions on Comput-
ers, (7):970-983.
Search WWH ::




Custom Search