[1] Guo H, Lo K T, and Cheng C T. Overlay networksconstruction for multilayered live media streaming[C]. EighthIEEE International Symposium on Multimedia, San Diego,CA, USA, Dec. 11-13, 2006: 427-436. [2] Feldman M, Papadimitriou C, and Chuang J, et al..Free-riding and whitewashing in peer-to-peer systems[J].IEEE Journal on Selected Areas in Communications.2006,24(5):1010-1019 [3] Yang M, Feng Q, and Dai Y F, et al.. A multi-dimensionalreputation system combined with trust and incentivemechanisms in P2P file sharing systems[C]. 27thInternational Conference on Distributed Computing SystemsWorkshops, Toronto, Ont, Canada, June 22-29, 2007: 29. Lian Q, Zhang Z, and Yang M, et al.. An empirical study ofcollusion behavior in the maze P2P file-sharing system[C].27th International Conference on Distributed ComputingSystems, Toronto, Ont, Canada, June 22-29, 2007: 56. [4] Wang W Y, Zhao L, and Yan R X. Improving cooperation inpeer-to-peer systems using social networks[C]. 20thInternational on Parallel and Distributed ProcessingSysposium, Rhodes, Island, Greece, April, 25-29, 2006: 8. Fedotova N and Veltri L. Byzantine generals problem in thelight of P2P computing[C]. 2006 Third Annual InternationalConference on Mobile and Ubiquitous Systems: Networking Services, San Jose, CA, July, 17-21, 2006: 1-5. [5] Sears W, Yu Z, and Guan Y. An adaptive reputation-basedtrust framework for Peer-to-Peer applications[C]. FourthIEEE International Symposium on Network Computing andApplications, Cambridge, MA, USA, July, 27-29, 2005:13-20. [6] Xiao L, Liu Y H, and Ni M L. Improving unstructuredpeer-to-peer systems by adaptive connection establishment[J].IEEE Trans. on Computers.2005, 54(9):1091-1103 [7] 田慧荣, 邹仕洪, 王文东,等. 激励一致的自适应P2P 拓扑构造[J]. 软件学报, 2006, 17(4): 845-853.Tian H R, Zou S H, and Wang W D, et al.. Incentivecompatible adaptive topologies for P2P networks[J]. Journalof Software, 2006, 17(4): 845-853. [8] Chuang J. Designing incentive mechanisms for peer-to-peersystems[C]. First IEEE International Workshop on GridEconomics and Business Models, Seoul, Korea, April, 23,2004: 67-81. [9] Trinh A T. A game-theoretic analysis of trust management inP2P systems[C]. First International Conference onCommunications and Electronics, Hanoi, Vietnam, Oct.10-11, 2006: 130-134.
|