Overlays in mobile P2P networks

被引:0
|
作者
机构
[1] Zhang, Guo-Yin
[2] 1,Li, Jun
来源
Zhang, G.-Y. (zhangguoyin@hrbeu.edu.cn) | 1600年 / Chinese Academy of Sciences卷 / 24期
关键词
Vehicular ad hoc networks;
D O I
10.3724/SP.J.1001.2013.04332
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] GoDel: Delaunay Overlays in P2P Networks via Gossip
    Baraglia, Ranieri
    Dazzi, Patrizio
    Guidi, Barbara
    Ricci, Laura
    2012 IEEE 12TH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2012, : 1 - 12
  • [2] Taxonomy-based routing overlays in P2P networks
    Löser, A
    Schubert, K
    Zimmer, F
    INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2004, : 407 - 412
  • [3] Bootstrapping P2P Overlays in MANETs
    Mawji, Afzal
    Hassanein, Hossam
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [4] Local P2P group (LPG) communication in structured mobile P2P networks
    Singh, Mahendra
    Kumar, Chiranjeev
    Nath, Prem
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (07) : 3005 - 3019
  • [5] Local P2P group (LPG) communication in structured mobile P2P networks
    Mahendra Singh
    Chiranjeev Kumar
    Prem Nath
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3005 - 3019
  • [6] Optimising P2P Overlays for Pervasive Environments
    Peng, Fei
    Malatras, Apostolos
    MANAGING THE DYNAMICS OF NETWORKS AND SERVICES, 2011, 6734 : 61 - 64
  • [7] Advanced Multimedia Search in P2P Overlays
    Grega, Michal
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 317 - 318
  • [8] Underlay Aware Resiliency in P2P Overlays
    Kumar, S. D. Madhu
    Bellur, Umesh
    Govindan, V. K.
    DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 99 - +
  • [9] Implementation of adaptive control for P2P overlays
    Koulouris, T
    Henjes, R
    Tutschku, K
    De Meer, H
    ACTIVE NETWORKS, 2003, 2982 : 292 - 306
  • [10] Malicious Peers Eviction for P2P Overlays
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224