1 |
R. A. Schollmeier, "Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architecture and Applications," Proceedings of the 1st Int'l Conf.onPeer-to-PeerComputing (P2P'01), (2001), 101-102, DOI: https://doi.org/10.1109/p2p.2001.990434
DOI
|
2 |
E. K. Lua, et al, "A Survey and Comparison of Peer-to-Peer Overlay Network Schemes," IEEE Communications Survey & Tutorial, Vol. 7, No. 2, March 2005, pp.72-93, DOI: https://doi.org/10.1009/comst.2005.1610546
DOI
|
3 |
I. Clarke et al., "Freenet: A Distributed Anonymous Information Storage and Retrieval System," Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, 2000, LNCS 2001, DOI: https://doi.org/10.1109/3-540-44702-4_4
|
4 |
B. Yang, and H. Garcia-Molina, " Designing a Super-Peer Network," Proc. of 19th Int'l Conf. on Data Engineering, Bangalore, India, (2003) DOI: https://doi.org/10.1009/icde.2003.1260781
|
5 |
M. Liu, M. E. Harjula, and M. Ylianttila, "An Efficient Selection Algorithm for Building a Super-Peer Overlay," Journal of Internet Services and Applications, 4(4), (2013) DOI: https://doi.org/10.1186/1869-0238-4-4
DOI
|
6 |
W.-H. Chung, "A Super-Peer Selection Strategy for Peer-to-Peer Systems," Advanced Science & Technology Letters, 125, Jeju island, (2016), 25-29 DOI: https://doi.org/10.14257/astl.2016.125.05
DOI
|
7 |
GP. Jesi, A. Montresor,, O. Babaoglu, "Proximity-aware Superpeer Overlay Topologies." Self-Managed Networks, Systems, and Services, 3996, LNCS, (2006), 43-57 DOI: https://doi.org/10.1007/11767886_4
DOI
|
8 |
P. Garbacki, D, H. J. Epema, and M. Steen, "The Design and Evaluation of a Self-Organizing Super-Peer Networks," IEEE Trans. on Computers, 59(3), (2010), 317-331 DOI: https://doi.org/10.1109/tc.2009.157
DOI
|
9 |
J. Yu, and M. Li, "CBT: A Proximity-Aware Peer Clustering System in Large Scale BitTorrent-like Peer-to-Peer Networks," Computer Communications 31(3), (2008), 591-602 DOI: https://doi.org/10.1016/j.comcom.2007.08.020
DOI
|
10 |
S.-H. Min, J. Holiday, and D.-S. Cho, "Optimal Super-Peer Selection for Large-Scale P2P System," Proc. of 2006 Int'l Conf. on Hybrid Information Technology (ICHIT'06), (2006) DOI: https://doi.org/10.1109/ichit.2006.253666
DOI
|
11 |
W. -J. Kang, "A Method for Semantic Access Control using Hierarchy Tree," The Journal of The Institute of Internet, Broadcasting and Communication(JiiBC), Vol. 11, No. 6, pp.223-234
|
12 |
M. Jelasity, W. Kowalczyk and M. van Steen, Newscast Computing, Internal Report IR-CS-006, Vrije Universiteit Amsterdam, (2003)
|
13 |
J. Ledlie, J. M. Taylor, L. Serban, and M. Seltzer, "Self-Organization in Peer-to-Peer Systems," Proc. of the 10th Workshop on ACMSIGOPS European Workshop, (2002), 125-132 DOI: https://doi.org/10.1145/1133373.1133397
DOI
|
14 |
T. E. Ng, and H. Zhang, "Predicting Internet Network Distance with Coordinates-based Approach," Proc. of INFOCOM, (2002) DOI: https://doi.org/10.1109/infcom.2002.1019258
DOI
|
15 |
KaZaA, http://www.kazaa.com
|
16 |
Napster, http://www.napster.com
|
17 |
Gnutella, http://www.gnutella.com
|
18 |
Gnutella2, http://www.gnutella2.com
|