Reference16 articles.
1. Chavez, E., Graff, M., Navarro, G., Tellez, E.S.: Near neighbor searching with K-nearest references. J. Inf. Syst. 51, 43–61 (2015).
https://doi.org/10.1016/j.is.2015.02.001
2. Chen, K., Shen, H., Zhang, H.: Leveraging social networks for P2P content-based file sharing in disconnected MANETs. IEEE Trans. Mob. Comput. 13, 235–249 (2015).
https://doi.org/10.1109/TMC.2012.239
3. Chiu, Y.M., Eun, D.Y.: On the performance of content delivery under competition in a stochastic unstructured peer-to-peer network. IEEE Trans. Parallel Distrib. Syst. 21(10), 1487–1500 (2010).
https://doi.org/10.1109/TPDS.2010.15
4. An, D., Ha, B., Cho, G.: A robust trust management scheme against the malicious nodes in distributed P2P network. Int. J. Secur. Appl. 7(3), 317–326 (2013)
5. Gaeta, R., Sereno, M.: Generalized probabilistic flooding in unstructured peer-to-peer networks. IEEE Trans. Parallel Distrib. Syst. 22(12), 2055–2062 (2011).
https://doi.org/10.1109/TPDS.2011.82
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献