Author:
Gummadi K.,Gummadi R.,Gribble S.,Ratnasamy S.,Shenker S.,Stoica I.
Cited by
107 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Kadabra: Adapting Kademlia for the Decentralized Web;Financial Cryptography and Data Security;2023-12-01
2. Multimedia streaming analytics;Proceedings of the 1st Mile-High Video Conference;2022-03
3. No-hop;Proceedings of the Symposium on Architectures for Networking and Communications Systems;2021-12-13
4. Churn Handling Strategies to Support Dependable and Survivable Structured Overlay Networks;IETE Technical Review;2020-10-15
5. Soft computing approach based malicious peers detection using geometric and trust features in P2P networks;Cluster Computing;2018-01-11