Citation: | Li Jing, Liu Xudong, Lin Xuelian, et al. Routing mechanism in active Peer-to-Peer network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(03): 323-326. (in Chinese) |
[1] Lin Xuelian,Huai Jinpeng,Liu Xudong, et al. Active P2P Proceeding of the sixth International Conference on Networking.New York: IEEE Computer Society, 2007:31-43 [2] Ripeanu M.P2P architecture case study: gnutella network .TR-2001-26,2001 [3] Clarke I, Sandberg O, Wiley B ,et al. A distributed anonymous information storage and retrieval system Proceedings of the ICSI Workshop on Design Issues in Anongmity and Unobservability. Berkeley, USA: Springer-Verlag, 2000:46-66 [4] Yang B, Garcia-Molina H. Improving search in peer-to-peer networks Proceedings of the 22nd International Conference on Distributed Computing Systems. Vienna, Austria: IEEE Computer Society, 2002:5-14 [5] Zhuang Z, Liu Y, Xiao L, et al. Hybrid periodical flooding in unstructured peer-to-peer networks Proceedings of the 32nd International Conference on Parallel Processing. Kaohsiung, Taiwan: IEEE Computer Society, 2003:171-178 [6] Zhuge Hai, Li Xiang. P2P in metric space and semantic space[J].Knowledge and Data Engineering, 2007, 19(6),759-771 [7] Song Vuong, Li Juan . Efa: an efficient content routing algorithm in large P2P overlay networks Proceedings of the Third International Conference on P2P Computing. Washington DC, USA: IEEE Computer Society, 2003:216-217 [8] Wang Y, Vassileva J. Bayesian network-based trust model in P2P networks Moro G. Proc,of the 2nd Int-l Workshop on Agents and P2P Computing . Berlin: Springer-Verlag,2004:23-24 [9] 黄克中.随机方法和模糊数学应用[M].上海:同济大学出版社,1987:293-317 Huang Kezhong. The application of stochastic method and fuzzy mathematics[M]. Shanghai: Tongji University Press,1987: 293-317(in Chinese) [10] Chen Hanhua, Jin Hai, Ning Xiaomin, et al. Semrex: a semantic similarity based P2P overlay network[J]. Journal of Software, 2006, 17(5):400-411
|