Accessing nearby copies of replicated objects in a distributed environment
Proceedings of the ninth annual ACM symposium on Parallel algorithms and architectures
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Looking up data in P2P systems
Communications of the ACM
Experiences Deploying a Large-Scale Emergent Network
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Ivy: a read/write peer-to-peer file system
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
The impact of DHT routing geometry on resilience and proximity
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Making gnutella-like P2P systems scalable
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Storm: using P2P to make the desktop part of the web
Proceedings of the fourteenth ACM conference on Hypertext and hypermedia
Toward network data independence
ACM SIGMOD Record
Towards peer-to-peer content indexing
ACM SIGOPS Operating Systems Review
Unmanaged Internet Protocol: taming the edge network management crisis
ACM SIGCOMM Computer Communication Review
Simple efficient load balancing algorithms for peer-to-peer systems
Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures
The design and implementation of a next generation name service for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable distributed information management system
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Broose: A Practical Distributed Hashtable Based on the De-Bruijn Topology
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Collision Module Integration in a Specific Graphic Engine for Terrain Visualization
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Latency Model of a Distributed Hash Table with Big Routing Table
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
A mediation framework for multimedia delivery
Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia
Ivy: a read/write peer-to-peer file system
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Optimal tradeoffs for location-based routing in large-scale ad hoc networks
IEEE/ACM Transactions on Networking (TON)
A scheme for load balancing in heterogenous distributed hash tables
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Decentralized algorithms using both local and random probes for P2P load balancing
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Awarded Best Student Paper! - Pond: The OceanStore Prototype
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
A need for componentized transport protocols
Proceedings of the twentieth ACM symposium on Operating systems principles
One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networks
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
D2B: a de Bruijn based content-addressable network
Theoretical Computer Science - Complex networks
Robust network connectivity: when it's the big picture that matters
SIGMETRICS '06/Performance '06 Proceedings of the joint international conference on Measurement and modeling of computer systems
Consistency maintenance in dynamic peer-to-peer overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications
Cycloid: a constant-degree and lookup-efficient P2P overlay network
Performance Evaluation - P2P computing systems
Exploiting P2P systems for DDoS attacks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Virtual ring routing: network routing inspired by DHTs
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Measurement based analysis, modeling, and synthesis of the internet delay space
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Understanding churn in peer-to-peer networks
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Unexpected means of protocol inference
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Small World Architecture for Peer-to-Peer Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity
Computer Networks: The International Journal of Computer and Telecommunications Networking
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Queue - SIP
A design pattern for mobile-distributed knowledge spaces
MIS '05 Proceedings of the 2005 symposia on Metainformatics
Dual proximity neighbour selection method for peer-to-peer-based discovery service
Proceedings of the 2007 ACM symposium on Applied computing
Peer-to-Peer resource discovery in Grids: Models and systems
Future Generation Computer Systems
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Beehive: O(1)lookup performance for power-law query distributions in peer-to-peer overlays
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Designing a DHT for low latency and high throughput
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Beehive: O(1)lookup performance for power-law query distributions in peer-to-peer overlays
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Democratizing content publication with coral
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Bandwidth-efficient management of DHT routing tables
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Fixing the embarrassing slowness of OpenDHT on PlanetLab
WORLDS'05 Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2
Non-transitive connectivity and DHTs
WORLDS'05 Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2
Auto-Adaptive Distributed Hash Tables
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Novel architectures for P2P applications: The continuous-discrete approach
ACM Transactions on Algorithms (TALG)
Fault-tolerant peer-to-peer search on small-world networks
Future Generation Computer Systems
Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Navigation issues in semantic peer to peer network
SADPI '07 Proceedings of the 2007 international workshop on Semantically aware document processing and indexing
FairPeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places
Journal of Network and Systems Management
Enhanced DHT-based P2P Architecture for Effective Resource Discovery and Management
Journal of Network and Systems Management
Exploiting KAD: possible uses and misuses
ACM SIGCOMM Computer Communication Review
Design of a peer-to-peer system for optimized content replication
Computer Communications
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Wildcard Search in Structured Peer-to-Peer Networks
IEEE Transactions on Knowledge and Data Engineering
Architectures and algorithms for internet-scale (p2p) data management
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Data allocation scheme based on term weight for P2P information retrieval
Proceedings of the 9th annual ACM international workshop on Web information and data management
A measurement study of the structured overlay network in P2P file-sharing systems
Advances in Multimedia
Peer-to-peer botnets: overview and case study
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Semantic indexing in structured peer-to-peer networks
Journal of Parallel and Distributed Computing
Evaluation of DHTs from the viewpoint of interpersonal communications
Proceedings of the 6th international conference on Mobile and ubiquitous multimedia
Performance evaluation of replication strategies in DHTs under churn
Proceedings of the 6th international conference on Mobile and ubiquitous multimedia
Overlay Weaver: An overlay construction toolkit
Computer Communications
Range queries on structured overlay networks
Computer Communications
Efficient file search in non-DHT P2P networks
Computer Communications
Comparison of image similarity queries in P2P systems
Computer Communications
Exploiting parallelism in the design of peer-to-peer overlays
Computer Communications
On hierarchical DHT systems - An analytical approach for optimal designs
Computer Communications
Stochastic maintenance of overlays in structured P2P systems
Computer Communications
Foundations and Trends® in Networking
Evaluation of a Large-Scale Ubiquitous System Model through Peer-to-Peer Protocol Simulation
DS-RT '07 Proceedings of the 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications
DART: the distributed agent-based retrieval toolkit
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
C2: a new overlay network based on CAN and Chord
International Journal of High Performance Computing and Networking
Fault-tolerant routing through the 'Umbrella' protocol
International Journal of Internet Protocol Technology
NBDT: an efficient P2P indexing scheme for web service discovery
International Journal of Web Engineering and Technology
Hyperspaces for object clustering and approximate matching in peer-to-peer overlays
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
A networked virtual environment over KAD
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Contention-based performance evaluation of multidimensional range search in peer-to-peer networks
Proceedings of the 2nd international conference on Scalable information systems
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
Resilience of structured P2P systems under churn: The reachable component method
Computer Communications
Traffic volume analysis of a nation-wide eMule community
Computer Communications
Improving peer connectivity in wide-area overlays of virtual workstations
HPDC '08 Proceedings of the 17th international symposium on High performance distributed computing
A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hybrid agnostic middleware for Next Generation Networks (NGN) services
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
The heisenbot uncertainty problem: challenges in separating bots from chaff
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Virtual id routing: a scalable routing framework with support for mobility and routing efficiency
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Development of Grid resource discovery service based on semantic information
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Contention-based performance evaluation of multidimensional range search in peer-to-peer networks
Future Generation Computer Systems
BitDew: a programmable environment for large-scale data management and distribution
Proceedings of the 2008 ACM/IEEE conference on Supercomputing
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
From cells to organisms: long-term guarantees on service provisioning in peer-to-peer networks
NOTERE '08 Proceedings of the 8th international conference on New technologies in distributed systems
The Exclusion of Malicious Routing Peers in Structured P2P Systems
Agents and Peer-to-Peer Computing
Iterative Key Based Routing for Web Services Addressing and Discovery
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
N2N: A Layer Two Peer-to-Peer VPN
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Complex Queries for Moving Object Databases in DHT-Based Systems
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
A File Transfer Service with Client/Server, P2P and Wide Area Storage Protocols
Globe '08 Proceedings of the 1st international conference on Data Management in Grid and Peer-to-Peer Systems
Subrange Caching: Handling Popular Range Queries in DHTs
Globe '08 Proceedings of the 1st international conference on Data Management in Grid and Peer-to-Peer Systems
Towards the Design of a Scalable Email Archiving and Discovery Solution
ADBIS '08 Proceedings of the 12th East European conference on Advances in Databases and Information Systems
MMNS '08 Proceedings of the 11th IFIP/IEEE international conference on Management of Multimedia and Mobile Networks and Services: Management of Converged Multimedia Networks and Services
Optimization of an eMule-like modifier strategy
Computer Communications
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
GRaSP: generalized range search in peer-to-peer networks
Proceedings of the 3rd international conference on Scalable information systems
Overbot: a botnet protocol based on Kademlia
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A resilient architecture for DHT-based distributed collaborative environments
Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems
A P2P-based intelligent resource discovery mechanism in Internet-based distributed systems
Journal of Parallel and Distributed Computing
Performance Evaluation of Overlay-Based Range Queries in Mobile Systems
Wireless Systems and Mobility in Next Generation Internet
ACM Transactions on Computer Systems (TOCS)
A Resource Discovery Method Based on Multi-agents in P2P Systems
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Small-World Peer-to-Peer for Resource Discovery
Information Networking. Towards Ubiquitous Networking and Services
A Practical Approach to Network Size Estimation for Structured Overlays
IWSOS '08 Proceedings of the 3rd International Workshop on Self-Organizing Systems
A grid middleware for data management exploiting peer-to-peer techniques
Future Generation Computer Systems
SS'08 Proceedings of the 17th conference on Security symposium
Computer Networks: The International Journal of Computer and Telecommunications Networking
Peer-to-peer community management using structured overlay networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
GTPP: general truncated pyramid architecture over P2PSIP networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Global-scale peer-to-peer file services with DFS
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Plexus: a scalable peer-to-peer protocol enabling efficient subset search
IEEE/ACM Transactions on Networking (TON)
Node isolation model and age-based neighbor selection in unstructured P2P networks
IEEE/ACM Transactions on Networking (TON)
Enabling global multimedia distributed services based on hierarchical DHT overlay networks
International Journal of Internet Protocol Technology
Approximate object location and spam filtering on peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Optimized union of non-disjoint distributed data sets
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Dynamic Web Service discovery architecture based on a novel peer based overlay network
Journal of Systems and Software
P2P Networking and Applications
P2P Networking and Applications
HYDRAstor: a Scalable Secondary Storage
FAST '09 Proccedings of the 7th conference on File and storage technologies
A holistic mechanism against file pollution in peer-to-peer networks
Proceedings of the 2009 ACM symposium on Applied Computing
Network Control and Optimization
Parallel Load Balancing Strategies for Tree-Structured Peer-to-Peer Networks
APWeb/WAIM '09 Proceedings of the Joint International Conferences on Advances in Data and Web Management
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Towards complete node enumeration in a peer-to-peer botnet
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Fake servers in EDonkey networks
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Autonomous topology optimisation for unstructured Peer-To-Peer networks
International Journal of High Performance Computing and Networking
Effects of peer-to-peer overlay parameters on mobile battery duration and resource lookup efficiency
Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia
Capacity estimation of ADSL links
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
A P2P strategy for QoS discovery and SLA negotiation in Grid environment
Future Generation Computer Systems
Inferring undesirable behavior from P2P traffic analysis
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
A structured P2P network based on the small world phenomenon
The Journal of Supercomputing
TrInc: small trusted hardware for large distributed systems
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Where Is My Peer? Evaluation of the Vivaldi Network Coordinate System in Azureus
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
A Novel Content Distribution Mechanism in DHT Networks
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Hybrid Retrieval Mechanisms in Vehicle-Based P2P Networks
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
GRID Resource Searching on the GridSim Simulator
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
Journal of Network and Computer Applications
A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation
DAIS '09 Proceedings of the 9th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems
Reputation management algorithms for DHT-based peer-to-peer environment
Computer Communications
A Kademlia-Based Node Lookup System for Anonymization Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Evaluation of Sybil Attacks Protection Schemes in KAD
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Trustworthiness of acquaintances in Peer-to-Peer overlay networks
International Journal of High Performance Computing and Networking
An emulator for peer-to-peer distributed hash tables
Computer Communications
A distributed polylogarithmic time algorithm for self-stabilizing skip graphs
Proceedings of the 28th ACM symposium on Principles of distributed computing
A framework for constructing peer-to-peer overlay networks in Java
PPPJ '09 Proceedings of the 7th International Conference on Principles and Practice of Programming in Java
Implementing Reliable Data Structures for MPI Services in High Component Count Systems
Proceedings of the 16th European PVM/MPI Users' Group Meeting on Recent Advances in Parallel Virtual Machine and Message Passing Interface
EpiChord: Parallelizing the Chord lookup algorithm with reactive routing state management
Computer Communications
A totally distributed iterative scheme for web services addressing and discovery
PDCS '07 Proceedings of the 19th IASTED International Conference on Parallel and Distributed Computing and Systems
Consistency maintenance in dynamic peer-to-peer overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications
NISAN: network information service for anonymization networks
Proceedings of the 16th ACM conference on Computer and communications security
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Scalable onion routing with torsk
Proceedings of the 16th ACM conference on Computer and communications security
Long term study of peer behavior in the KAD DHT
IEEE/ACM Transactions on Networking (TON)
Statistical structures for Internet-scale data management
The VLDB Journal — The International Journal on Very Large Data Bases
PROSE: scalable routing in MANETs using prefix labels and distributed hashing
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Echo: A peer-to-peer clustering framework for improving communication in DHTs
Journal of Parallel and Distributed Computing
Privacy preserving social networking through decentralization
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Optimizing Data Management in Grid Environments
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Broadcast Encryption-Based P2P DRM without Central License Server
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Optimizing peer-to-peer backup using lifetime estimations
Proceedings of the 2009 EDBT/ICDT Workshops
A framework for mobile applications based on a structured P2P overlay
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Optimally efficient multicast in structured peer-to-peer networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
mDHT: multicast-augmented DHT architecture for high availability and immunity to churn
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Active measurement of routing table in Kad
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Efficient data management using the session log in DHT and its evaluation
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Rapid P2P overlay network programming on a distributed reduction machine
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Electronic Notes in Theoretical Computer Science (ENTCS)
Feasibility evaluation of a communication-oriented P2P system in mobile environments
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
On the self-organization of a hybrid peer-to-peer system
Journal of Network and Computer Applications
A walkable Kademlia network for virtual worlds
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
WTR: a reputation metric for distributed hash tables based on a risk and credibility factor
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
State of the art and challenges on peer-to-peer simulators
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
New routing update mechanisms of kademlia
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Performance evaluation of a Kademlia-based communication-oriented P2P system under churn
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 9th Symposium on Identity and Trust on the Internet
A small-world DHT built on generalized network coordinates
Proceedings of the 2010 EDBT/ICDT Workshops
eSciGrid: A P2P-based e-science Grid for scalable and efficient data sharing
Future Generation Computer Systems
Enforcing collaboration in peer-to-peer routing services
iTrust'03 Proceedings of the 1st international conference on Trust management
Using peer-to-peer protocols to enable implicit communication in a BDI agent architecture
ProMAS'06 Proceedings of the 4th international conference on Programming multi-agent systems
A peer-to-peer indexing service for data grids
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Replica-aware, multi-dimensional range queries in Distributed Hash Tables
Computer Communications
Estimating churn in structured P2P networks
ITC20'07 Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks
A novel overlay network for a secure global home agent dynamic discovery
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Bittella: a novel content distribution overlay based on bittorrent and social groups
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Self-healing in binomial graph networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Elaborating a decentralized market information system
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems - Volume Part I
An analytical estimation of durability in DHTs
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Optimal caching for first-order query load-balancing in decentralized index structures
DBISP2P'05/06 Proceedings of the 2005/2006 international conference on Databases, information systems, and peer-to-peer computing
Improving the dependability of prefix-based routing in DHTs
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Pushback for overlay networks: protecting against malicious insiders
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
A vEB-tree-based architecture for interactive video on demand services in peer-to-peer networks
Journal of Network and Computer Applications
Scalable merger of chord-rings
International Journal of Communication Networks and Distributed Systems
Implementation of traceability using a distributed RFID-based mechanism
Computers in Industry
Scalable support of interdomain routes in a single AS
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Peer-to-peer single hop distributed hash tables
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
SFDHT: a DHT designed for server farm
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A multicast-based bootstrap mechanism for self-organizing P2P networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A locality preserving routing overlay using geographic coordinates
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Multi-tree broadcast in peer-to-peer networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Asymmetric DHT based on performance of peers
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Distributed hash table based ID management optimization for internet of things
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Avoiding eclipse attacks on kad/kademlia: an identity based approach
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Networked Graphics: Building Networked Games and Virtual Environments
Networked Graphics: Building Networked Games and Virtual Environments
An improved P2P lookup protocol model
Cluster Computing
Channel-based unidirectional stream protocol (CUSP)
INFOCOM'10 Proceedings of the 29th conference on Information communications
Building a collaborative peer-to-peer wiki system on a structured overlay
Computer Networks: The International Journal of Computer and Telecommunications Networking
GTPP: General Truncated Pyramid Peer-to-Peer Architecture over Structured DHT Networks
Mobile Networks and Applications
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
Enhanced Paxos Commit for Transactions on DHTs
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
Crowdsourcing service-level network event monitoring
Proceedings of the ACM SIGCOMM 2010 conference
An emulation of GENI access control
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
A Walkable Kademlia network for virtual worlds
IPTPS'09 Proceedings of the 8th international conference on Peer-to-peer systems
Large-scale monitoring of DHT traffic
IPTPS'09 Proceedings of the 8th international conference on Peer-to-peer systems
Experiences with CoralCDN: a five-year operational view
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Census: location-aware membership management for large-scale distributed systems
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Exploiting DHT functionalities for pervasive network mobility
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 17th ACM conference on Computer and communications security
Selectivity-based XML query processing in structured peer-to-peer networks
Proceedings of the Fourteenth International Database Engineering & Applications Symposium
Identity based architecture for secure communication in future internet
Proceedings of the 6th ACM workshop on Digital identity management
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Performance impacts of node failures on a chord-based hierarchical peer-to-peer network
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
A proposal of P2P content retrieval system using access-based grouping technique
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III
HyCube: a DHT routing system based on a hierarchical hypercube geometry
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part II
A formal framework for the performance analysis of P2P networks protocols
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Crawling BitTorrent DHTs for fun and profit
WOOT'10 Proceedings of the 4th USENIX conference on Offensive technologies
In-degree dynamics of large-scale P2P systems
ACM SIGMETRICS Performance Evaluation Review
Uniformity of improved versions of chord
ICICA'10 Proceedings of the First international conference on Information computing and applications
Publish/subscribe on top of DHT using RETE algorithm
FIS'10 Proceedings of the Third future internet conference on Future internet
BotGrep: finding P2P bots with structured graph analysis
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
HyPeer: Structured overlay with flexible-choice routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Introducing mobile devices into Grid systems: a survey
International Journal of Web and Grid Services
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP
Principles, Systems and Applications of IP Telecommunications
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
Principles, Systems and Applications of IP Telecommunications
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient distributed discovery service for EPCglobal network in nested package scenarios
Journal of Network and Computer Applications
Report of the Second Workshop on the Usage of NetFlow/IPFIX in Network Management
Journal of Network and Systems Management
Proactive neighbor localization based on distributed geographic table
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Pond: the oceanstore prototype
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Network coordinates in the wild
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
AntBot: Anti-pollution peer-to-peer botnets
Computer Networks: The International Journal of Computer and Telecommunications Networking
Implementation of a distributed file storage with replica management in Peer-to-Peer environments
International Journal of Ad Hoc and Ubiquitous Computing
Making a case for distributed file systems at Exascale
Proceedings of the third international workshop on Large-scale system and application performance
Measuring the effectiveness of infrastructure-level detection of large-scale botnets
Proceedings of the Nineteenth International Workshop on Quality of Service
Auto-scaling emergency call centres using cloud resources to handle disasters
Proceedings of the Nineteenth International Workshop on Quality of Service
Experiences with self-organizing, decentralized grids using the grid appliance
Proceedings of the 20th international symposium on High performance distributed computing
Social network analysis on KAD and its application
APWeb'11 Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications
Using reinforcement learning for controlling an elastic web application hosting platform
Proceedings of the 8th ACM international conference on Autonomic computing
HD Tree: A novel data structure to support multi-dimensional range query for P2P networks
Journal of Parallel and Distributed Computing
BotTrack: tracking botnets using NetFlow and PageRank
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
Traffic localization for DHT-based BitTorrent networks
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Gridlet economics: resource management models and policies for cycle-sharing systems
GPC'11 Proceedings of the 6th international conference on Advances in grid and pervasive computing
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT
Computer Communications
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
Towards a fully distributed n-tuple store
Proceedings of the ACM SIGCOMM 2011 conference
Designing a testbed for large-scale distributed systems
Proceedings of the ACM SIGCOMM 2011 conference
MDHT: a hierarchical name resolution service for information-centric networks
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
dFault: fault localization in large-scale peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
A keyword search algorithm for structured peer-to-peer networks
International Journal of Grid and Utility Computing
Beyond simulation: large-scale distributed emulation of P2P protocols
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Content localization for non-overlay content-aware networks
NEW2AN'11/ruSMART'11 Proceedings of the 11th international conference and 4th international conference on Smart spaces and next generation wired/wireless networking
Towards a Kademlia DHT-based n-tuple store
Proceedings of the 3rd International Workshop on Theoretical Aspects of Dynamic Distributed Systems
MIDAS: multi-attribute indexing for distributed architecture systems
SSTD'11 Proceedings of the 12th international conference on Advances in spatial and temporal databases
An adversarial evaluation of network signaling and control mechanisms
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
FaDe: RESTful service for failure detection in SOA environment
PaCT'11 Proceedings of the 11th international conference on Parallel computing technologies
Scalable consistency in Scatter
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
On predictable large-scale data delivery in prefix-based virtualized content networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
RatBot: anti-enumeration peer-to-peer botnets
ISC'11 Proceedings of the 14th international conference on Information security
Error-Resilient Routing for Supporting Multi-dimensional Range Query in HD Tree
DS-RT '11 Proceedings of the 2011 IEEE/ACM 15th International Symposium on Distributed Simulation and Real Time Applications
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
A Read-Only Distributed Hash Table
Journal of Grid Computing
Peer-assisted texture streaming in metaverses
MM '11 Proceedings of the 19th ACM international conference on Multimedia
GoalBit: a free and open source peer-to-peer streaming network
MM '11 Proceedings of the 19th ACM international conference on Multimedia
Combining resource and location awareness in DHTs
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Journal of Network and Computer Applications
A design and implementation of nickname-based sockets for applications inside NATed network
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
Scalable and interoperable service discovery for future internet
Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Storing and locating mutable data in structured peer-to-peer overlay networks
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
A fault recovery scheme for p2p metacomputers
HiPC'05 Proceedings of the 12th international conference on High Performance Computing
Survive under high churn in structured P2P systems: evaluation and strategy
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Distributed node location in clustered multi-hop wireless networks
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
Enhancing the p2p protocols to support advanced multi-keyword queries
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
RDF: stores – a lightweight approach on managing shared knowledge
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A large scale key-value store based on range-key skip graph and its applications
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Proposal of social internetworking
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
The challenges of merging two similar structured overlays: a tale of two networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
DOH: a content delivery peer-to-peer network
Euro-Par'06 Proceedings of the 12th international conference on Parallel Processing
Towards autonomic networking using overlay routing techniques
ARCS'05 Proceedings of the 18th international conference on Architecture of Computing Systems conference on Systems Aspects in Organic and Pervasive Computing
Arpeggio: metadata searching and content sharing with chord
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Practical locality-awareness for large scale information sharing
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
The hybrid chord protocol: a peer-to-peer lookup service for context-aware mobile applications
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
A framework for structured peer-to-peer overlay networks
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
Bit zipper rendezvous optimal data placement for general p2p queries
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Resource and service discovery in the igrid information service
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
iTrust'05 Proceedings of the Third international conference on Trust Management
Secure overlay for service centric wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
On the cost of participating in a peer-to-peer network
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Comparing the performance of distributed hash tables under churn
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Providing administrative control and autonomy in structured peer-to-peer overlays
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Willow: DHT, aggregation, and publish/subscribe in one protocol
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Using identities to achieve enhanced privacy in future content delivery networks
Computers and Electrical Engineering
Exploring distributed hash tables in HighEnd computing
ACM SIGMETRICS Performance Evaluation Review
A novel data replication mechanism in P2P VoD system
Future Generation Computer Systems
Peer-to-peer data structures for cooperative traffic information systems
Pervasive and Mobile Computing
Probabilistic replication based on access frequencies in unstructured peer-to-peer networks
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Improving sender anonymity in a structured overlay with imprecise routing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Dependable peer-to-peer systems withstanding dynamic adversarial churn
Dependable Systems
Montra: A large-scale DHT traffic monitor
Computer Networks: The International Journal of Computer and Telecommunications Networking
A trust management scheme in structured p2p systems
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
Caching indices for efficient lookup in structured overlay networks
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
Trust in peer-to-peer content distribution protocols
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Increasing the resilience of critical SCADA systems using peer-to-peer overlays
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
A p2p-based framework for distributed network management
EURO-NGI'05 Proceedings of the Second international conference on Wireless Systems and Network Architectures in Next Generation Internet
T-Man: gossip-based overlay topology management
ESOA'05 Proceedings of the Third international conference on Engineering Self-Organising Systems
Improving data availability in chord p2p system
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A study of an hybrid CDN-P2P system over the PlanetLab network
Image Communication
Theory and network applications of balanced kautz tree structures
ACM Transactions on Internet Technology (TOIT)
Protection of SCADA communication channels
Critical Infrastructure Protection
TMA'12 Proceedings of the 4th international conference on Traffic Monitoring and Analysis
RelaxDHT: A churn-resilient replication strategy for peer-to-peer distributed hash-tables
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Network Security
CPSCox: A survival analysis model of peer behavior in large scale DHT system
Computer Communications
A hierarchical approach to improve performance of unstructured peer-to-peer system
International Journal of Communication Networks and Distributed Systems
Efficient and secure decentralized network size estimation
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Managing traffic in peer-to-peer networks: the token-web protocol
Proceedings of the 2011 Summer Computer Simulation Conference
Free-riding the BitTorrent DHT to improve DTN connectivity
Proceedings of the seventh ACM international workshop on Challenged networks
eDonkey & eMule's Kad: Measurements & Attacks
Fundamenta Informaticae
Data mobility in peer-to-peer systems to improve robustness
AP2PC'08 Proceedings of the 7th international conference on Agents and Peer-to-Peer Computing
A semi-structured overlay network for large-scale peer-to-peer systems
AP2PC'08 Proceedings of the 7th international conference on Agents and Peer-to-Peer Computing
Survey A survey of peer-to-peer live video streaming schemes - An algorithmic perspective
Computer Networks: The International Journal of Computer and Telecommunications Networking
How many eyes are spying on your shared folders?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Bio-Inspired P2P Systems: The Case of Multidimensional Overlay
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section: Extended Version of SASO 2011 Best Paper
Balanced partition scheme for distributed caching systems to solve load imbalance problems
ACM SIGSOFT Software Engineering Notes
Information Sciences: an International Journal
Journal of Network and Computer Applications
Sophia: A local trust system to secure key-based routing in non-deterministic DHTs
Journal of Parallel and Distributed Computing
Generic emergent overlays in arbitrary peer identifier spaces
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
Design of a P2P content recommendation system using affinity networks
Computer Communications
A self-managing sip-based ip telephony system based on a P2P approach using Kademlia
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
CDACAN: a scalable structured P2P network based on continuous discrete approach and CAN
HPCC'07 Proceedings of the Third international conference on High Performance Computing and Communications
Towards efficient replication of documents in chord: case (r,s) erasure codes
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Towards Robust Routing in HD Tree
DS-RT '12 Proceedings of the 2012 IEEE/ACM 16th International Symposium on Distributed Simulation and Real Time Applications
A secure self-destructing scheme for electronic data
Journal of Computer and System Sciences
A DHT-Based system for the management of loosely structured, multidimensional data
Transactions on Large-Scale Data- and Knowledge-Centered Systems VI
Cachet: a decentralized architecture for privacy preserving social networking with caching
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Optimization in a self-stabilizing service discovery framework for large scale systems
SSS'12 Proceedings of the 14th international conference on Stabilization, Safety, and Security of Distributed Systems
P2P group management systems: A conceptual analysis
ACM Computing Surveys (CSUR)
Persea: a sybil-resistant social DHT
Proceedings of the third ACM conference on Data and application security and privacy
Applying mapreduce framework to peer-to-peer computing applications
ICCCI'12 Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part II
A bird's eye view on the I2P anonymous file-sharing environment
NSS'12 Proceedings of the 6th international conference on Network and System Security
Simulation-based study of botnets and defense mechanisms against them
Journal of Computer and Systems Sciences International
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hierarchical DHT-based name resolution for information-centric networks
Computer Communications
Collaborative Relaying Strategies in Autonomic Management of Mobile Robotics
Wireless Personal Communications: An International Journal
Future Generation Computer Systems
A backward-compatible protocol for inter-routing over heterogeneous overlay networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
A peer to peer agent coordination framework for IHE based cross-community health record exchange
Proceedings of the 28th Annual ACM Symposium on Applied Computing
A security pattern for data integrity in P2P systems
Proceedings of the 17th Conference on Pattern Languages of Programs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure peer-to-peer trading for multiplayer games
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games
The state of peer-to-peer network simulators
ACM Computing Surveys (CSUR)
ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks
The Journal of Supercomputing
Improving security in data-centric storage for wireless sensor networks
Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks
Performance evaluation of EpiChord under high churn
Proceedings of the 8th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
STARR-DCS: Spatio-temporal adaptation of random replication for data-centric storage
ACM Transactions on Sensor Networks (TOSN)
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Supporting Social Networks With Agent-Based Services
International Journal of Virtual Communities and Social Networking
ACM SIGAPP Applied Computing Review
A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard
Computer Methods and Programs in Biomedicine
Mobile peer-to-peer approach for social computing services in distributed environment
Proceedings of the Fourth Symposium on Information and Communication Technology
Benchmarking Peer-to-Peer Systems
Benchmarking Peer-to-Peer Systems
Benchmarking Peer-to-Peer Systems
GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms
Proceedings of the 2013 Summer Computer Simulation Conference
ODSA: Chord-Based Object Discovery Service Architecture for the Internet of Things
Wireless Personal Communications: An International Journal
Enhancing decentralized service discovery in open service-oriented multi-agent systems
Autonomous Agents and Multi-Agent Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Systems Architecture: the EUROMICRO Journal
A botnet-based command and control approach relying on swarm intelligence
Journal of Network and Computer Applications
Behavioral modeling and formal verification of a resource discovery approach in Grid computing
Expert Systems with Applications: An International Journal
Conception of ID layer performance at the network level for Internet of Things
Personal and Ubiquitous Computing
The VLDB Journal — The International Journal on Very Large Data Bases
Exploiting multi-core nodes in peer-to-peer grids
Journal of Parallel and Distributed Computing
Hi-index | 0.02 |
We describe a peer-to-peer distributed hash table with provable consistency and performance in a fault-prone environment. Our system routes queries and locates nodes using a novel XOR-based metric topology that simplifies the algorithm and facilitates our proof. The topology has the property that every message exchanged conveys or reinforces useful contact information. The system exploits this information to send parallel, asynchronous query messages that tolerate node failures without imposing timeout delays on users.