1 |
Cisco visual networking index : Forecast and methodology, http://www.cisco.com/
|
2 |
The bittorrent protocol specification. http://www.bittorrent.org/
|
3 |
B. Cohen, Incentives build robustness in bittorrent, In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, June 2003.
|
4 |
A. Vlavianos, M. Iliofotou, M. Faloutsos, Bitos: enhancing bittorrent for supporting streaming applications, IEEE International Conference on Computer Communications, pp. 1-6, April 2006
|
5 |
J. J. D. Mol, J. A. Pouwelse, M. Meulpolder, D. H. J. Epema, H. J. Sips, Give-to-get: free-riding resilient video-on-demand in p2p systems, In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 6818, January 2008,
|
6 |
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, A. Venkataramani, Do incentives build robustness in bittorrent?, USENIX NSDI, April 2007.
|
7 |
K. Shin, D. S. Reeves, I. Rhee, Treat-before- trick : Free-riding prevention for bittorrent-like peer-to-peer networks, IEEEInternational Symposiumon Parallel& Distributed Processing, pp. 1-12, May 2009.
|
8 |
T. Locher, P. Moor, S. Schmid, R. Wattenhofer, Free riding in bittorrent is cheap, In FifthWorkshop onHot Topics in Networks, November 2006.
|
9 |
M. Sirivianos, J. H. Park, R. Chen, X. Yang, Free-riding in bittorrent networks with the large view exploit, International workshop on Peer-To-Peer Systems, February 2007.
|
10 |
M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, Proceedings of the 5th ACMconference on Electronic commerce, pp. 102-111, May 2004.
|
11 |
S. D. Kamvar,M. T. Schlosser,H. Garcia -molina, The eigentrust algorithmfor reputationmanagement in p2p networks, Proceedings of the 12th international conference onWorldWideWeb, pp. 640-651,May 2003.
|
12 |
J. R. Douceur, The sybil attack, International workshop on Peer-To-Peer Systems, March 2002.
|
13 |
K. Shin, Preventing misbehavior in cooperative distributed systems, Ph.D. thesis, North Carolina State University, December 2009.
|
14 |
R. Landa, D. Griffin, R. G. Clegg, E. Mykoniati, M. Rio, A sybilproof indirect reciprocity mechanism for peer-to-peer networks, IEEE Conference on Computer Communications, pp. 343 - 351, April 2009.
|
15 |
M. Feldman, J. Chuang, Overcoming free-riding behavior in peer-to-peer systems, ACMSigecom Exchanges, Vol. 5, July 2005
|
16 |
G. Hardin, Tragedy of the commons, Science 162.
|
17 |
L. Jian, J. K.MacKie-Mason,Why share in peer-to-peer networks?, International Conference on Electronic Commerce, August 2008.
|
18 |
Redhat 9 torrent tracker trace. http://mikel.tlm.unavarra.es/-mikel/bt_pam2004/
|