[1]秦丰林,刘琚.P2P网络流媒体关键技术[J].电子学报,2011,39(4):919-927.[2]孙知信,陈亚当,任志广.基于P2P流媒体直播系统的数据传输策略[J].通信学报,2011,32(6):1-9.[3]SANDERSON P. Identifying an existing file via KaZaA artefacts [J]. Digital Investigation, 2006, 3(3): 174-180.[4]CHEN Z G, LIU J Q, LI D, et al. SOBIE: a novel super-node P2P overlay based on information exchange [J]. Journal of Computers, 2009, 4(9): 853-861.[5]KHO W, BASET S, SCHULZRINNE H. Skype relay calls: measurements and experiments [C]// INFOCOM 2008: Proceedings of the 27th Conference on Computer Communications. Piscataway: IEEE Press, 2008: 1-6.[6]BitTorrent.org. BitTorrent [EB/OL]. [2012-04-20]. http://www.bittorrent.org.[7]MAYMOUNKOV P, MAZIERES D. Kademlia: a peer-to-peer information system based on the XOR metric [C]// IPTPS'01: Proceedings of the First International Workshop on Peer-to-Peer Systems. Berlin: Springer-Verlag, 2002, 2429: 53-65.[8]WU D, DHUNGEL P, HEI X J, et al. Understanding peer ex-change in BitTorrent systems [C]// 2010 IEEE 10th International Conference on Peer-to-Peer Computing. Piscataway: IEEE Press, 2010: 1-8.[9]ZHANG H, ZHANG J B, ZHANG T. Leak research concerning BitTorrent meta file [C]// Proceedings of the 2011 Second International Conference on Networking and Distributed Computing. Washington, DC: IEEE Computer Society, 2011: 347-351.[10]PITSILIS G, PERIORELLIS P, MARSHALL L. A policy for electing super-nodes in unstructured P2P networks [C]// Proceedings of the Third International Conference on Agents and Peer-to-Peer Computing. Berlin: Springer-Verlag, 2005, 3601: 54-61.[11]PERIORELLIS P, IDOWU O C, LYNDEN S J, et al. Dealing with complex networks of process interactions: a security measure [C]// Proceedings of the Ninth IEEE International Conference on Engineering Complex Computer Systems Navigating Complexity in the e-Engineering Age. Washington, DC: IEEE Computer Society, 2004: 29-36.[12]杨寿保,许通,胡云.用户需求适应的P2P超级节点选取机制[J].电子科技大学学报,2009,38(3):385-388.[13]ZHAO S H, CHEN G L, WU G X, et al. A strategy for selecting super-peer in P2P and grid based hybrid system [C]// Proceedings of the 3rd International Conference on Technologies for E-Learning and Digital Entertainment. Berlin: Springer-Verlag, 2008: 192-199.[14]MONTRESOR A. A robust protocol for building superpeer overlay topologies [C]// Proceedings of the Fourth International Conference on Peer-to-Peer Computing. Washington, DC: IEEE Computer Society, 2004: 202-209.[15]LI J, VUONG S. An efficient clustered architecture for P2P networks [C]// Proceedings of the 18th International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2004: 278-283. |