Search and replication in unstructured peer-to-peer networks
ICS '02 Proceedings of the 16th international conference on Supercomputing
IEEE Internet Computing
Measuring and analyzing the characteristics of Napster and Gnutella hosts
Multimedia Systems
Evaluating the accuracy of captured snapshots by peer-to-peer crawlers
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Dubious feedback: fair or not?
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Novel approaches to efficient flooding search in peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Characterizing unstructured overlay topologies in modern P2P file-sharing systems
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Efficient file search in non-DHT P2P networks
Computer Communications
ECHOS: edge capacity hosting overlays of nano data centers
ACM SIGCOMM Computer Communication Review
Characterizing unstructured overlay topologies in modern P2P file-sharing systems
IEEE/ACM Transactions on Networking (TON)
Popularity adaptive search in hybrid P2P systems
Journal of Parallel and Distributed Computing
Measuring web feature impacts in BitTorrent-like systems
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Measuring web feature impacts in Peer-to-Peer file sharing systems
Computer Communications
A Robust Algorithm for the Membership Management of Super-Peer Overlay
MMNS 2009 Proceedings of the 12th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services: Wired-Wireless Multimedia Networks and Services Management
A study of a weighting scheme for information retrieval in hierarchical peer-to-peer networks
ECIR'07 Proceedings of the 29th European conference on IR research
GAS: overloading a file sharing network as an anonymizing system
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Homepage finding in hybrid peer-to-peer networks
Large Scale Semantic Access to Content (Text, Image, Video, and Sound)
Measuring the validity of peer-to-peer data for information retrieval applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Misusing unstructured p2p systems to perform dos attacks: the network that never forgets
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
Characterizing the properties of peer-to-peer (P2P) overlay topologies in file-sharing applications is essential for understanding their impact on the network, identifying their performance bottlenecks in practice, and evaluating their performance via simulation. Such characterization requires accurate snapshots of the overlay topology which is difficult to capture due to the large size and dynamic nature. Previous studies characterizing overlay topologies not only are outdated but also rely on partial or potentially distorted snapshots. In this extended abstract, we briefly present the first characterization of two-tier Gnutella topologies based on recent and accurate snapshots.