吉林大学学报(工学版) ›› 2015, Vol. 45 ›› Issue (5): 1581-1585.doi: 10.13229/j.cnki.jdxbgxb201505029
Previous Articles Next Articles
LIU Yan-heng, TANG Bo-hao, LI Song-jiang, WANG Ai-min
CLC Number:
[1] Fan X, Li M, Ma J, et al. Behavior-based reputation management in P2P file-sharing networks[J]. Journal of Computer and System Sciences, 2012, 78(6): 1737-1750. [2] Sarjaz B S, Abbaspour M. Securing BitTorrent using a new reputation-based trust management system[J]. Peer-to-Peer Networking and Applications, 2013, 6(1): 86-100. [3] Shin K, Reeves D S, Rhee I. Treat-before-trick: Free-riding prevention for BitTorrent-like peer-to-peer networks[C]∥Parallel & Distributed Processing, IEEE, 2009: 1-12. [4] Gheorghe G, Cigno R L, Montresor A. Security and privacy issues in P2P streaming systems: a survey[J]. Peer-to-Peer Networking and Applications, 2011, 4(2): 75-91. [5] Douceur J R. The Sybil Attack[M].Berlin:Springer Berlin Heidelberg, 2002: 251-260. [6] Locher T, Moor P, Schmid S, et al. Free riding in BitTorrent is cheap[C]∥Proc Workshop on Hot Topics in Networks (HotNets),California,USA,2006: 85-90. [7] Piatek M, Isdal T, Anderson T, et al. Do incentives build robustness in BitTorrent[C]∥Proc of NSDI,Cambridge,2007:1-14. [8] Levin D, LaCurts K, Spring N, et al. Bittorrent is an auction: analyzing and improving bittorrent's incentives[C]∥ACM SIGCOMM Computer Communication Review, ACM, 2008, 38(4): 243-254. [9] Shah P, Pâris J F. Incorporating trust in the BitTorrent protocol[C]∥International Symposium on Performance Evaluation of Computer and Telecommunication Systems,San Diego,USA,2007:586-593. [10] Ge T, Manoharan S. Mitigating free-riding on bittorrent networks[C]∥Digital Telecommunications (ICDT), 2010 Fifth International Conference on, IEEE, 2010: 52-56. [11] Manoharan S, Ge T. A demerit point strategy to reduce free-riding in BitTorrent[J]. Computer Communications, 2013, 36(8): 875-880. [12] 陈绵书, 王世朋, 陈贺新, 等. 改进的基于推荐证据的对等网络信任模型[J]. 吉林大学学报: 工学版, 2013,43 (6): 1666-1674. Chen Mian-shu, Wang Shi-peng, Chen He-xin, et al. Improved trust model based on recommendation evidence for P2P networks[J]. Journal of Jilin University (Engineering and Technology Edition), 2013,43 (6): 1666-1674. [13] Bhakuni A, Sharma P, Kaushal R. Free-rider detection and punishment in BitTorrent based P2P networks[C]∥Advance Computing Conference (IACC), 2014 IEEE International, IEEE, 2014: 155-159. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|