Information Technology Reference
In-Depth Information
[Lu et al., 2007a] Lu, L., Han, J., Hu, L., Huai, J., Liu, Y., and Ni, L. M.
(2007a). Pseudo Trust: Zero-Knowledge Based Authentication in Anony-
mous Peer-to-Peer Protocols. In Proceedings 22nd International Parallel
and Distributed Symposium (IPDPS).
[Lu et al., 2007b] Lu, M.-T., Wu, J.-C., Peng, K.-J., Huang, P., Yao, J. J.,
and Chen, H. H. (2007b). Design and Evaluation of a P2P IPTV System
for Heterogeneous Networks. IEEE Transactions on Multimedia, (8):1568-
1579.
[Lv et al., 2002] Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S. (2002).
Search and Replication in Unstructured Peer-to-Peer Networks. In Pro-
ceedings of the 16th ACM International Conference on Supercomputing
(ICS'02), pages 84-95.
[Ma and Zhu, 2008] Ma, L. and Zhu, W. (2008). A Carrier Grade Peer-to-
Peer Network Architecture. In Proceedings of the 1st ITU-T Kaleidoscope
Academic Conference.
[Ma et al., 2004a] Ma, R. T. B., Lee, S. C. M., Lui, J. C. S., and Yau, D.
K. Y. (2004). A Game Theoretic Approach to Provide Incentive and Service
Differentiation in P2P Networks Richard T. B. Ma and Sam C. M. Lee and
John C. S. Lui and David K. Y. Yau.
In Proceedings of SIGMETRICS,
pages 189-198.
[Ma et al., 2004b] Ma, R. T. B., Lee, S. C. M., Lui, J. C. S., and Yau, D.
K. Y. (2004). An Incentive Mechanism for P2P Networks. In Proceedings
of the 24th International Conference on Distributed Computing Systems.
[Malan et al., 2004] Malan, D. J., Welsh, M., and Smith, M. D. (2004). A
Public-Key Infrastructure for Key Distribution in Tinyos Based on Elliptic
Curve Cryptography. In The 1st Annual IEEE Communications Society
Conference on Sensor and Ad Hoc Communications and Networks, pages
71-80.
[Marbach and Qiu, 2005] Marbach, P. and Qiu, Y. (2005). Cooperation in
Wireless Ad Hoc Networks: A Market Based Approach. IEEE/ACM Trans-
actions on Networking, 13(6):1325-1338.
[Marsh and Dibben, 2005] Marsh, S. and Dibben, M. R. (2005). Trust, Un-
trust, Distrust, and Mistrust—An Exploration of the Dark(er) Side.
In
Proceedings International Conference Trust Management, pages 17-33.
[Maze, 2006] Maze (2006). http://maze.pku.edu.cn .
[Metropolis et al., 1953] Metropolis, N., Rosenbluth, A., Rosenbluth, M.,
Teller, A., and Teller, E. (1953). Equation of State Calculations by Fast
Computing Machines. The Journal of Chemical Physics, (6):1087-1092.
Search WWH ::




Custom Search