[1]
|
E. Rutheford, “The P2P Report 2000,” 2001.
www.cio.com/knowledge/edit/p2p.html
|
[2]
|
G. Ruffo and R. Schifanella, “Fairpeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places,” Journal of
Network and Systems Management, Vol. 15, No. 3, 2007, pp. 355-382. doi:10.1007/s10922-007-9066-9
|
[3]
|
F. Mata, J. L. Garcia-Dorado, J. Aracil and E. L. V. Jorge, “Factor Analysis of Internet Traffic Destinations from
Similar Source Networks,” Internet Research, Vol. 22, No. 1, 2012, pp. 29-56. doi:10.1108/10662241211199951
|
[4]
|
R. Torres, M. Hajjat, S. Rao, M. Mellia and M. Munafo, “Inferring Undesirable Behaviour from P2P Traffic Analysis,”
Proceedings of ACM SIGMETRICS, Seattle, 15-19 June 2009, pp. 25-36.
|
[5]
|
I. Wladawsky-Berger, “How CIOs Can Pilot the Untethered Enterprise,” 2013.
http://blogs.wsj.com/cio/2012/06/10/how-cios-can-pilot-the-untethered-enterprise/
|
[6]
|
D. Schoder and K. Fischbach, “Peer-to-Peer Prospects,” Communications of the ACM, Vol. 46, No. 2, 2003,
pp. 27-35. doi:10.1145/606272.606294
|
[7]
|
W. G. Yee, L. T. Nguyen and O. Frieder, “ A View of the Data on P2P File-sharing Systems,”
Journal of the American Society for Information Science and Technology, Vol. 60, No. 10, 2009, pp. 2132-2141.
doi:10.1002/asi.21106
|
[8]
|
R. M. Martin, J. Casanovas, J. F. Crespo and J. Giralt, “Sharing Audiovisual Content Using a P2P Environment
Based in JXTA,” Internet Research, Vol. 17, No. 5, 2007, pp. 554-562. doi:10.1108/10662240710830244
|
[9]
|
E. Frank, C. M. Gillett, E. Daley, S. R. Epps, B. Wang, T. Schadler and M. Yamnitsky, “Tablets Will Rule the
Personal Computing Landscape,” Forrestor Research, 2012.
|
[10]
|
J. Perlow, “Post-PC Era Means Mass Extinction for Personal Computer OEMs,” 2012.
http://www.zdnet.com/blog/
perlow/post-pc-era-means-mass-extinction-for-personal-computer-oems/20514?pg=2&tag=content;siu-container
|
[11]
|
C. Shirky, “What Is P2P… and What Isn’t?” 2000.
http://www.openp2p.com/lpt/a/1431
|
[12]
|
B. Hayes, “Collective Wisdom,” 1998.
http://www.amsci.org/amsci/issues/Comsci98/copmsci1998-03.html
|
[13]
|
M. A. Jovanovic, F. S. Annexstein and K. A. Berman, “Scalability Issues in Large Peer-to-Peer Networks—A Case
Study of Gnutella,” University of Cincinnati Technical Report, 2001.
|
[14]
|
Anonymous_2, “DRFortress Launches the First Local Pay-As-You-Use Cloud Computing Service for Hawaii and
the Pacific Rim,” Business Wire, New York, 2012.
|
[15]
|
E. Knorr and G. Gruman, “What Cloud Computing Really Means?” 2012.
http://www.infoworld.com/d/cloud-computing/what-cloud
-computing-really-means-031?page=0,1
|
[16]
|
Anonymous_1, “Gearing up for Grid,” 2004.
http://www.itutilitypipeline.com
|
[17]
|
S. Di and C. L. Wang, “Decentralized Proactive Resource Allocation for Maximizing Throughput of P2P Grid,”
Journal of Parallel and Distributed Computing, Vol. 72, No. 2, 2012, pp. 308-321. doi:10.1016/j.jpdc.2011.10.010
|
[18]
|
Anonymous_3, “The Science of SETI@Home,” 2012.
http://setiathome.berkeley.edu/sah_about.php
|
[19]
|
X. Zhang, “Research Issues for Building and Integrating Peer-Based and Grid Systems,” 2002.
http://www.nesc.ac.uk/talks/china_meet/zhang_beijing_talk.pdf
|
[20]
|
Anonymous_8, “Status and Plans for Globus Toolkit 3.0,” 2004. http://www-unix.globus.org/toolkit/
|
[21]
|
Anonymous_9, “About the Globus Alliance,” 2012.
http://www.globus.org/alliance/about.php
|
[22]
|
R. Krishnan, M. D. Smith and R. Telang, “The Economics of Peer-Peer Networks,” JITTA:
Journal of Information Technology Theory and Application, Vol. 5, No. 3, 2003, pp. 31-45.
|
[23]
|
P. J. Alexander, “Peer-to-Peer File Sharing—The Case of Music Recording Industry,” Review of
Industrial Organization, Vol. 20, 2002, pp. 151-161.
doi:10.1023/A:1013819218792
|
[24]
|
J. A. Clark and A. Tsiaparas, “Bandwidth-on-Demand Networks—A Solution to Peer-to-Peer File Sharing,”
BT Technology Journal, Vol. 20, No. 1, 2002, pp. 5-16.
doi:10.1023/A:1014518008964
|
[25]
|
T. Boyle, “Independent Axes for Centralization/Decentralization of Transaction Systems,” 2001.
http://www.ledgerism.net/P2Paxes.htm
|
[26]
|
X. Meng and W. Cui, “Research on the Immune Strategy for the Polluted File Propagation in Structured
P2P Networks,” Computers & Electrical Engineering, Vol. 38, No. 2, 2012, pp. 194-205.
doi:10.1016/j.compeleceng.2011.12.013
|
[27]
|
J. R. Galbraith, “Organization Design,” Addison Wesley, Reading, 1977.
|
[28]
|
H. Jarraya and M. Laurent, “A Secure Peer-to-Peer Backup Service Keeping Great Autonomy while under the
Supervision of a Provider,” Computers & Security, Vol. 29, No. 2, 2010 , pp. 180-195. doi:10.1016/j.cose.2009.10.003
|
[29]
|
E. Miller, “Decentrlaization, Gnutella and Bad Actors,” 2002. http://research.yale.edu/lawmeme/modules.php?name=News&file=article&sid=291
|
[30]
|
Y. Gu and A. Boukerche, “HD Tree: A Novel Data Dtructure to Support Multi-Dimensional Range Query for
P2P Networks,” Journal of Parallel and Distributed Computing, Vol. 71, No. 8, 2011, pp. 1111-1124.
doi:10.1016/j.jpdc.2011.04.003
|
[31]
|
M. Xu, S. Zhou and J. Guan, “A New and Effective Hierarchical Overlay Structure for Peer-to-Peer Networks,”
computer Communications, Vol. 34, No. 1, 2011, pp. 862-874. doi:10.1016/j.comcom.2010.10.005
|
[32]
|
G. Exarchakos, N. Antonopoulos and J. Salter, “G-ROME: Semantic-Driven Capacity Sharing Among P2P
Networks,” Internet Research, Vol. 17, No. 1, 2007, pp. 7-20.
doi:10.1108/10662240710730461
|
[33]
|
D. O. Rice, “Protecting Online Information Sharing in Peer-to-Peer (P2P) Networks,” Online Information Review,
Vol. 31, No. 5, 2007, pp. 682-693.
doi:10.1108/14684520710832351
|
[34]
|
P. Morrissey, “RTGuardian Delivers Skype Smackdown,” Network Computing, Vol. 17, No. 13, 2006, pp. 22-24.
|
[35]
|
Anonymous_6, “Managed Peer-to-Peer Networking,” 2012.
http://www.pandonetworks.com/p2p
|
[36]
|
C. Metz, “P2P Goes Private,” PC Magazine, February 2005, p. 92.
|
[37]
|
Anonymous_5, “Cybermanagement: Correction—CommerceNet and PeerIntelligence Galvanize Peer-to-Peer (P2P)
Community with Groundbreaking Research for Business Environment,” M2 Presswire, Coventry, 2001, p. 1.
|
[38]
|
E. Messmer, “Gartner: Top 10 Emerging Infrastructure Trends—The Tablet, the Cloud, Big Data All on the List,”
2012. http://www.networkworld.com/news/2012/060512-gartner-trends-259883.html
|
[39]
|
W. J. Bolosky, J. R. Douceur, D. Ely and M. Theimer, “Feasibility of a Serverless Distributed File System Deployed
on an Existing Set of Desktop PCs,” 2001. http://research.microsoft.com/sn/Farsite/Sigmetrics2000.pdf
|
[40]
|
C. C. Costa, C. C. Ferreira, L. L. Bastiao, L. L. Riberio, A. A. Silvo and J. L. Oliveira, “Dicoogle—An Open Source
Peer-to-Peer PACS,” Journal of Digital Imaging, Vol. 24, No. 5, 2011, pp. 848-856.
doi:10.1007/s10278-010-9347-9
|
[41]
|
P. D. Maciel, F. Brasilerio, R. A. Santos, D. Candeia, R. Lopes, M. Carvalho, R. Miceli, N. Andrade and M. Mowbray,
“Business-Driven Short-Term Management of a Hybrid IT Infrastructure,” Journal of Parallel and Distributed Computing,
Vol. 72, No. 2, 2012, pp. 106-119.
doi:10.1016/j.jpdc.2011.11.001
|
[42]
|
Anonymous_7, “Stortext: Stortext Launches DOXZONE,” M2 Presswire, Coventry, 2001.
|
[43]
|
S. Smith, “P2P in B2B,” EContent, Vol. 26, No. 7, 2003, pp. 20-24.
|
[44]
|
M. M. Schorlemmer, J. J. Abian, C. C. Sierra, D. D. Cruz, L. L. Bernacchioni, E. E. Jaen, A. A. P. Pinninck and
M. M. Atencia, “P2P Proteomics—Data Sharing for Enhanced Protein Identification,” Automated Experimentation, Vol. 4, No. 1, 2012, p. 1.
http://www.aejournal.net/content/4/1/1
|
[45]
|
Y. He, Z. Xiong, Y. Zhang, X. Tan and Z. Li, “Modeling and Analysis of Multi-Channel P2P VoD Systems,” Journal of Network and Computer Applications, Vol. 10, No. 16, 2012, pp. 1568-1578. doi:10.1016/j.jnca.2012.02.004
|
[46]
|
W. Sun, and C. King, “ORN: A Content-Based Approach to Improving Supplier Discovery in P2P VOD Networks,” Journal of Parallel and Distributed Computing, Vol. 71, No. 12, 2011, pp. 1558-1569.
doi:10.1016/j.jpdc.2011.08.004
|
[47]
|
Anonymous_13, “Skyrider Extends Peer-to-Peer (P2P) Leadership Role with Search Marketing Platform and Series C Round of Funding,” Business Wire, New York, 2006.
|
[48]
|
Anonymous_10, “TOR: Overview,” 2012.
https://www.torproject.org/about/overview.html.en
|
[49]
|
D. Schoder and K. Fischbach, “Peer-to-Peer Prospects,” Communications of the ACM, Vol. 46, No. 2, 2003, pp. 27-35. doi:10.1145/606272.606294
|
[50]
|
Wikipedia, “Wireless Ad-Hoc Nework,” 2012.
http://en.wikipedia.org/wiki/Wireless_ad-hoc_network
|
[51]
|
L. Hardesty, “Explained: Ad Hoc Networks,” 2011.
http://web.mit.edu/newsoffice/2011/exp-ad-hoc-0310.html
|
[52]
|
M. Wood, “If Facebook Dies (and It Might) Its Killer Will Be Born Mobile,” 2012.
http://news.cnet.com/8301-31322_3-57443289-256/if-facebook-dies-and-it-might-its-killer-will-be-born-mobile/?tag=nl.e703
|
[53]
|
A. Bruno, “UpFront: Mobile—Two New Apps Take P2P Mobile,” Billboard, Vol. 118, No. 5, 2006, p. 8.
|
[54]
|
Anonymous_11, “mTouche, Indian Partner to offer P2P mobile content,” New Straits Times, Kuala Lumpur, Malaysia, 2009, p. 5.
|
[55]
|
Anonymous_12, “Endeavors Technology: Endeavors Technology’s Magi P2P Collaboration Software for PDAs to Run Insignia’s Industry-Leading Jeode Platform,” M2 Presswire, Coventry, 2001.
|
[56]
|
D. Lonescu, “UPDATE: New Android Malware Uses Phones as Spam Botnet,” 2012.
http://www.pcworld.com/article/258794/update_new_android_malware_uses_phones_as_spam_botnet.
html#tk.nl_dnx_h_crawl
|