|
[1] Napster, http://www.napster.com. [2] Qin Lv, Pei Cao, Edith Cohen, Kai Li and Scott Shenker Sponsor, “Search and replication in unstructured peer-to-peer,” in Series-Proceeding-Section-Article ACM Press, Pages:84-95, 2002. [3]Ian Clarke, Oskar Sandberg, Brandon Wiley and Theodore W. Hong, “Freenet: A Distributed Anonymous Information Storage and Retrieval System,” in Workshop on Design Issues in Anonymity and Unob servability, Pages: 311-320, 2000. [4] Junginger M. and Yugyung Lee, “The Multi-Ring Topology —High-Performance Group Communication in Peer-to-Peer Networks,” in Peer-to-Peer Computing, 2002. (P2P 2002). Proceedings, Pages: 49- 56, 2002. [5] James Aspnes, Zoë Diamadi and Gauri Shah, “Fault-tolerant in Routing in Peer-to-Peer System,” in ACM Series-Proceeding-Section-Article, Pages: 223 — 232, 2002. [6] Ripeanu, M., “Peer-to-Peer Architecture Case Study : Gnutalla Network,” in Peer-to-Peer Computing Proceeding., Pages: 99-100, 2001. [7] Stoica I., Morris R., Liben-Nowell D., Karger D.R., Kaashoek M.F., Dabek F. and Balakrishnan H., ”Chord :a scalable peer-to-peer lookup protocol for Internet applications,” in Networking, IEEE/ACM Transactions on, Pages: 17 -32, 2003. [8] S. Ratnasamy, P. Francis, M. Handley, R. Karp and S. Shenker, “A scalable content-addressable network,” in Proc. ACM SIGCOMM, Pages: 161-172, 2001. [9] A. Rowstron and P. Druschel, ”Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems,” in Proc. 18th IFIP/ACM Int. Conf. Distributed Systems Platforms (Middleware 2001), Pages: 329-350, 2001. [10] B. Zhao, J. Kubiatowicz, and A. Joseph, “Tapestry:An infrastructure for fault-tolerant wide-area location and routing,” in Comput. Sci. Div., Univ. California, Berkeley, Tech. Rep. UCB/CSD-01-1141, 2001. [11] Behzad A., Caballero E., Huiyu Luo, Rubin I. and Runhe Zhang, “TBONE : A Mobile-Backbone Protocol for Ad Hoc Wireless Networks,” in Aerospace Conference Proceedings, IEEE , Volume: 6 , Pages: 2727 -2740, 2002. [12] Das B. and Bharghavan V., “Routing in Ad-Hoc Networks Using Minimum Connected Dominating Sets,” in IEEE International Conference on Communications, Volume: 1 , Pages: 376 -380, 1997. [13] Jie Wu, ”Extended Dominating-Set-Based Routing in Ad Hoc Wireless Networks with Unidirectional Links,” in Parallel and Distributed Systems, IEEE Transactions on, Volume: 13 ,Pages: 866 -881, 2002. [14] Paul Francis, Yuri Pryadkin, Pavlin Radoslavov, Ramesh Govindan and Bob Lindell “YOID: Your Own Internet Distribution,” in http://www.icir.org/yoid/. [15] Paul Francis, Yuri Pryadkin, Pavlin Radoslavov, Ramesh Govindan and Bob Lindell, “Yoid Tree Management Protocol (YTMP) Specification,” in http://www.icir.org/yoid/. [16] Hui Zhang, Rao S.G., Seshan S. and Yang-hua Chu, ”A Case for End System Multicast,” in IEEE J. Selected Areas Commun, Volume: 20, Pages: 1456 -1471, 2002. [17] Kwangwook Shin, Seunghak Lee, Geunhwi Lim, Yoon H. and Joong Soo Ma, “Grapes: Topology-based Hierarchical Virtual Network for Peer-to-Peer Lookup Services,” in Parallel Processing Workshops Proceedings, Pages: 159 -164, 2002. [18] LimeWire. http://www.limewire.org. [19] Matei R., Iamnitchi A. and Foster P., “Mapping the Guntella Network,” in Internet Computing IEEE, Volume: 6, Pages: 50 -57, 2002. [20] Shu-Wei Liu, ”Analysis of Node Density_Based Hybrid Clustering Routing in Wireliss Ad-hoc Networks,” in Master Thesis, Yuan-Ze University, 2001. [21]Chic-Kang Chien, ”A GPS-base Quorum Hybrid Routing Algorithm in Ad hoc Wireless Network” in Master Thesis, Yuan-Ze University, 2001. [22] Behzad A., Caballero E., Huiyu Luo, Rubin I. and Runhe Zhang, “Topological Synthesis of Mobile Backbone Networks for Managing Ad Hoc Wireless Networks” presented at IEEE MILCOM, Los Angeles, CA, October 2000. [23] Tasi H.P. Vuong and D.T. Huynh, ”Adapting D-hop Dominating Sets to Topology Changes in Ad Hoc Networks,” in Proceedings Ninth International Conference on Computer Communications and Networks, Pages: 348 -353, 2000 [24] Melander B, Bjorkman M. and Gunningberg P., ”A New End-to-End Probing and Analysis Method for Estimating Bandwidth Bottlenecks,” in IEEE Global Telecommunications Conference GLOBECOM '00 , Volume: 1, Pages: 415 -420, 2000. [25] Dovrolis C., Ramanathan P. and Moore D., ”What do packet dispersion techniques measure?,” in INFOCOM 2001 Proceedings , Volume: 2, Pages: 905 -914, 2001. [26] Lavian T. and Phil Yonghui Wang , “Active networking on a programmable networking platform,” in IEEE Open Architectures and Network Programming Proceedings, Pages: 95 -103, 2001.
|