A survey and comparison of peer-to-peer overlay network schemes

EK Lua, J Crowcroft, M Pias… - … Surveys & Tutorials, 2005 - ieeexplore.ieee.org
Over the Internet today, computing and communications environments are significantly more
complex and chaotic than classical distributed systems, lacking any centralized organization …

[图书][B] Network analysis: methodological foundations

U Brandes - 2005 - books.google.com
'Network'is a heavily overloaded term, so that 'network analysis' means different things to
different people. Specific forms of network analysis are used in the study of diverse …

Geographic routing in social networks

D Liben-Nowell, J Novak, R Kumar… - Proceedings of the …, 2005 - National Acad Sciences
We live in a “small world,” where two arbitrary people are likely connected by a short chain
of intermediate friends. With scant information about a target individual, people can …

[PDF][PDF] Analysis and visualization of network data using JUNG

J O'Madadhain, D Fisher, P Smyth, S White… - Journal of Statistical …, 2005 - Citeseer
Abstract The JUNG (Java Universal Network/Graph) Framework is a free, open-source
software library that provides a common and extendible language for the manipulation …

Sybil-resistant DHT routing

G Danezis, C Lesniewski-Laas, MF Kaashoek… - … –ESORICS 2005: 10th …, 2005 - Springer
Abstract Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but
at the same time vulnerable to disruptive nodes. Designers of such systems want them used …

[PDF][PDF] Bandwidth-efficient management of DHT routing tables

J Li, J Stribling, R Morris, MF Kaashoek - Proceedings of the 2nd …, 2005 - usenix.org
Today an application developer using a distributed hash table (DHT) with n nodes must
choose a DHT protocol from the spectrum between O (1) lookup protocols [9, 18] and O (log …

The essence of P2P: A reference architecture for overlay networks

K Aberer, LO Alima, A Ghodsi… - … Conference on Peer …, 2005 - ieeexplore.ieee.org
The success of the P2P idea has created a huge diversity of approaches, among which
overlay networks, for example, Gnutella, Kazaa, Chord, Pastry, Tapestry, P-Grid, or DKS …

[PDF][PDF] Unsupervised name disambiguation via social network similarity

B Malin - Workshop on link analysis, counterterrorism, and …, 2005 - siam.org
Though names reference actual entities it is nontrivial to resolve which entity a particular
name observation represents. Even when names are devoid of typographical error, the …

Hybrid sensor networks: a small world

G Sharma, R Mazumdar - Proceedings of the 6th ACM international …, 2005 - dl.acm.org
In this paper, we investigate the use of limited infrastructure, in the form of wires, for
improving the energy efficiency of a wireless sensor network. We call such a sensor network …

[图书][B] Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

J Wu - 2005 - books.google.com
The availability of cheaper, faster, and more reliable electronic components has stimulated
important advances in computing and communication technologies. Theoretical and …