1 |
Godsi P, "Bitcoin: bubble or blockchain," in Proc. of 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications, pp. 191-203, May 29, 2015.
|
2 |
Kraft D, "Difficulty control for blockchain-based consensus systems," Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397-413, March, 2016.
DOI
|
3 |
Swan M, "Blockchain thinking: the brain as a decentralized autonomous corporation," IEEE Technology and Society Magazine, vol. 34, no. 4, pp. 41-52, December, 2015.
DOI
|
4 |
Eldred M, "Blockchain thinking and euphoric Hubris," IEEE Technology and Society Magazine, vol. 35, no. 1, pp. 39, March, 2016.
DOI
|
5 |
Zyskind G, Nathan O and Pentland A S, "Decentralizing privacy: using blockchain to protect personal data," in Proc. of 2015 IEEE Security and Privacy Workshops, pp. 180-184, May 21-22, 2015.
|
6 |
Wilson D and Ateniese G, "From pretty good to great: enhancing PGP using Bitcoin and the blockchain," in Proc. of 9th International Conference on Network and System Security, pp. 368-375, November 3-5, 2015.
|
7 |
Kypriotaki K N, Zamani E D and Giaglis G M, "From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networksand blockchains," in Proc. of 17th International Conference on Enterprise Information Systems, pp. 284-290, April 27-30, 2015.
|
8 |
George H, "Might the Blockchain Outlive Bitcoin?" IT Professional, vol. 18, no. 2, pp. 12-16, March-April, 2016.
DOI
|
9 |
Nakamoto S, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008
|
10 |
Pai V, Kumar K, Tamilmani K, Sambamurthy V and Mohr A E, "Chainsaw: eliminating trees from overlay multicast," in Proc. of 4th International Workshop on Peer-to-Peer Systems, pp. 127-140, February 24-25, 2005.
|
11 |
Liu T S, Li J, Cao Q N. "Study on a network communication optimization algorithm of P2P mode," in Proc. of Artificial Intelligence and Computational Intelligence, pp. 212-217, November, 7-8, 2009.
|
12 |
Biskupski B, Schiely M, Felber P and Meier R, "Tree-based analysis of mesh overlays for peer-to-peer streaming," in Proc. of 8th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, pp. 126-139, June 4-6, 2008.
|
13 |
Mokhtarian K and Jacobsen H A, "Minimum-Delay multicast algorithms for mesh overlays," IEEE/ACM Transactions on Networking, vol. 23, no. 3, pp. 973-986, June, 2015.
DOI
|
14 |
Kim K, Mehrotra S and Venkatasubramanian N, "Efficient and reliable application layer multicast for flash dissemination," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 10, pp. 2571-2582, October, 2014.
DOI
|
15 |
Liu T S, Yang K Y, Li J, "Study on a concurrent communication tree algorithm of P2P multi-link mode," in Proc. of International Conference on Multimedia Technology, pp. 2034-2038, October 29-31, 2010.
|
16 |
Liu T S, Zhang LM, Cheng G J, Li J and Yang K Y, "FIN multicast optimization algorithm in P2P communication," Application Research of Computers, vol. 30, no. 5, pp. 1464-1466&1491, May, 2013.
|
17 |
Tan Z H, Wang XW and Wang X Y, "A novel iterative and dynamic trust computing model for large scaled P2P networks," Mobile Information Systems, no. 4, pp. 1-12, April, 2016.
|
18 |
Wang Q J, Wang J R, Yu J and Yu M, "Trust-aware query routing in P2P social networks," International Journal of Communication Systems, vol. 25, no. 10, pp. 1260-1280, October, 2012.
DOI
|
19 |
Jia M J, Wang H Q, Ye B and Wang Y, "A dynamic grouping-based trust model for mobile P2P networks", in Proc. of 2016 IEEE International Conference on Services Computing, pp. 848-851, June 27, 2016.
|
20 |
Liao J and Li Z, "A novel dynamic trust model for P2P network," Open Automation and Control Systems Journal, vol. 7, no. 1, pp. 893-901, August, 2015.
DOI
|
21 |
Shen Y, Feng J, Ma W J, Jiang L and Yin M., "Overlay multicast update strategy based on perturbation theory," KSII Transactions on Internet and Information Systems, vol. 11, no. 1, pp. 171-192, January, 2017.
DOI
|
22 |
Alekseev S and Schafer J, "Evaluation of a topological distance algorithm for construction of a P2P multicast hybrid overlay tree," International Journal of Computer Networks and Communications, vol. 8, no. 1, pp. 1-12, January, 2016.
|
23 |
Wei W, Yang X L, Shen P Y and Zhou B., "Holes detection in anisotropic sensornets: topological methods," International Journal of Distributed Sensor Networks, vol. 8, no. 10, October 23, 2012.
|
24 |
Wei W and Qi Y., "Information potential fields navigation in wireless Ad-Hoc sensor networks," Sensors, vol. 11, no. 5, pp. 4794-4807, May, 2011.
DOI
|
25 |
Wei W, Xu Q, Wang L, Hei X H, Shen P, Shi W and Shan L., "GI/Geom/1 queue based on communication model for mesh networks," International Journal of Communication Systems, vol. 27, no. 11, pp. 3013-3029, November, 2014.
DOI
|
26 |
Li J and Liu T S, "Study on a P2P communication tree algorithm based on multi-link," Northwest University Journal: Natural Science, vol. 40, no. 6, pp. 970-974, November, 2010.
|
27 |
Sanchez D, Martinez S and Domingo-Ferrer J, "Co-utile P2P ridesharing via decentralization and reputation management," Transportation Research Part C: Emerging Technologies, vol. 73, pp. 147-166, December, 2016.
DOI
|
28 |
Selvaraj C and Anand S, "A survey on security issues of reputation management systems for peer-to-peer networks," Computer science review, vol. 6, no. 4, pp. 145-160, July, 2012.
DOI
|
29 |
Duarte J, Siegel S and Young L, "Trust and credit: the role of appearance in peer-to-peer lending," Review of Financial Studies, vol. 25, no. 8, pp. 2455-2484, August, 2012.
DOI
|
30 |
Huang G M, Hu M, Zhou Y, Liu P S, and Zhang Y C, "A distributed trust model based on reputation management of peers for P2P VoD services," KSII Transactions on Internet and Information Systems, vol. 6, no. 9, pp. 2285-2301, September, 2012.
DOI
|
31 |
Song H B and Maite B P. "Model-centric nonlinear equalizer for coherent long-haul fiber-optic communication systems," in Proc. of IEEE Global Telecommunications Conference, pp. 2394-2399, December 9-13, 2013.
|
32 |
Song H B, Maite B P, Xie T J and Wilson Stephen G, "Combined constrained code and LDPC code for long-haul fiber-optic communication systems," in Proc. of IEEE Global Telecommunications Conference, pp. 2984-2989, December 3-7, 2012.
|
33 |
Li J, Liang G Q, Liu T S and Li X J, "P2P multicast algorithm considering node service priority," Application Research of Computers, vol. 34, no. 4, pp. 1176-1179, April, 2017.
|