Editor, Bureaucrats, Administrators
414
edits
(→Topics) |
|||
Line 53: | Line 53: | ||
| [http://www.linkedin.com/] | | [http://www.linkedin.com/] | ||
|- | |- | ||
| Traffic Localization in P2P Networks | | <strike>Traffic Localization in P2P Networks</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] | | [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] | ||
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering] | | [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering] | ||
Line 65: | Line 65: | ||
| [http://avispa-project.org/] | | [http://avispa-project.org/] | ||
|- | |- | ||
| Distributed Hash Tables - Usage, properties and future development | | <strike>Distributed Hash Tables - Usage, properties and future development</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://en.wikipedia.org/wiki/Distributed_hash_table] | | [http://en.wikipedia.org/wiki/Distributed_hash_table] | ||
|- | |- | ||
| Matrix Factorization Model based Network Coordinate System | | <strike>Matrix Factorization Model based Network Coordinate System</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | | [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | ||
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf] | | [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf] | ||
Line 85: | Line 85: | ||
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125] | | [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125] | ||
|- | |- | ||
| Security Design in Network Coordinate Systems | | <strike>Security Design in Network Coordinate Systems</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | | [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | ||
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf] | | [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf] | ||
Line 97: | Line 97: | ||
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] | | [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] | ||
|- | |- | ||
| Cloud Computing | | <strike>Cloud Computing</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | | [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | ||
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [http://www.cs.rice.edu/~gw4314/papers/infocom10.pdf] [http://aws.amazon.com/ec2/] | | [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [http://www.cs.rice.edu/~gw4314/papers/infocom10.pdf] [http://aws.amazon.com/ec2/] |