[1] 张国印, 李军. 移动对等网络覆盖网[J]. 软件学报, 2013, 24(1): 139-152. (Zhang G Y, Li J.Overlays in mobile P2P networks[J]. Journal of Software (S1000-9825), 2013, 24(1): 139-152.) [2] 郑明, 吴建平, 刘武. 一种基于价格的P2P匿名通信系统激励机制[J]. 软件学报, 2015, 26(2): 52-60. (Zheng M, Wu J P, Liu W.Price-Based incentive mechanism for P2P anonymous communication system[J]. Journal of Software (S1000-9825), 2015, 26(2): 52-60.) [3] 曲大鹏, 王兴伟, 黄敏. 移动对等网络中自私节点的检测和激励机制[J]. 软件学报, 2013, 24(4): 887-899. (Qu D P, Wang X W, Huang M.Selfish node detection and incentive mechanism in mobile P2P networks[J]. Journal of Software (S1000-9825), 2013, 24(4): 887-899.) [4] Michal Feldman, Christos Papadimitriou, John Chuang.Free-Riding and Whitewashing in Peer-to-Peer Systems[J]. IEEE Journal on Selected Areas in Communications (S0733-8716), 2006, 24(5): 1010-1019. [5] 刘丙双, 韦韬, 邹维, 等. KAD网络恶意索引节点行为研究[J]. 计算机学报, 2014, 37(5): 1124-1135. (Liu B S, Wei T, Zou W, et al.Study on the Behavior of Malicious Index Nodes in Kad[J]. Chinese Journal of Computers (S0254-4164), 2014, 37(5): 1124-1135.) [6] 刘浩, 张连明, 贺文华. 一种基于互惠能力的P2P网络拓扑优化算法[J]. 计算机工程与科学, 2016, 38(6): 1091-1096. (Liu H, Zhang L M, He W H.A topology optimization algorithm based on reciprocal capability in P2P network[J]. Computer Engineering &Science (S1007-130X), 2016, 38(6): 1091-1096.) [7] Gaur H, Gaur P, Choudhary V.Different search Algorithms in Unstructured P2P Systems[J]. International Journal of Engineering Technology and Management (S2394-6881), 2015, 2(3): 8-13. [8] 周欣欣, 高越, 宋人杰, 等. 移动P2P网络拓扑构造及资源查找策略[J]. 计算机应用研究, 2015, 32(12): 3773-3776. (Zhou X X, Gao Y, Song R J, et al.Topology construction and resource searching strategy for Peer-to-Peer networks[J]. Application Research of Computers (S1001-3695), 2015, 32(12): 3773-3776.) [9] 白宇清, 李海健, 蔡青松. 移动P2P社会网络中关键节点发现方法[J]. 计算机科学与探索, 2016, 10(3): 350-362. (Bai Y Q, Li H J, Cai Q S.Discovering key nodes in mobile P2P social networks[J]. Journal of Frontiers of Computer Science and Technology (S1673-9418), 2016, 10(3): 350-362.) [10] Chen Wang, Li Xiao.An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity[J]. IEEE Transactions on Parallel and Distributed Systems (S1045-9219), 2007, 18(2): 145-157. [11] Juncheng Huang, Xiuqi Li, Jie Wu.A semantic searching scheme in heterogeneous unstructured P2P networks[J]. Journal of Computer Science and Technology (S1000-9000), 2011, 26(6): 925-941. [12] 何明, 张玉洁, 孟祥武. 面向用户需求的非结构化P2P资源定位泛洪策略[J]. 软件学报, 2015, 26(3): 640-662. (He M, Zhang Y J, Meng X W.Resource location flooding strategy of unstructured P2P for user requirements[J]. Journal of Software (S1000-9825), 2015, 26(3): 640-662.) [13] 梅红岩, 张玉洁, 孟祥武, 等. 非结构P2P 网络受限搜索机制[J]. 软件学报, 2013, 24(9): 2132-2150. (Mei H Y, Zhang Y J, Meng X W, et al.Limited search mechanism for unstructured peer-to-peer network[J]. Journal of Software (S1000-9825), 2013, 24(9): 2132-2150.) [14] Endo K, Imaoka A, Okano D, et al.A search method using temporary links for unstructured P2P networks[J]. Journal of Networks (S1796-2056), 2014, 9(7): 1665-1673. [15] 梅红岩, 张玉洁, 孟祥武. 基于局部需求的稀有资源主动复制与搜索机制[J]. 软件学报, 2015, 26(9): 2418-2435. (Mei H Y, Zhang Y J, Meng X W.Active replication and search strategy of scarce resources based on local demand[J]. Journal of Software (S1000-9825), 2015, 26(9): 2418-2435.) [16] 郭世泽, 陆哲明. 复杂网络基础理论 [M]. 北京: 科学出版社, 2012. (Guo ShiZe, Lu ZheMing. Basic theory of complex network [M]. Beijing, China: Science Press, 2012.) [17] 谢季坚, 刘承平. 模糊数学方法及其应用 [M]. 武汉: 华中科技大学出版社, 2000. (Xie Jijian, Liu ChengPing. Fuzzy mathematics method and its application [M]. Wuhan, China: Huazhong University of Science and Technology Press, 2000.) [18] 史蒂文·泰迪里斯. 博弈论导论 [M]. 李井奎译. 北京: 中国人民大学出版社, 2015. (Steven Tadelis.Game theory: an Introduction [M]. Li Jingkui translation. Beijing, China: Ren Min University of China Press, 2012.) [19] 卢苇, 周韬, 邢薇薇. 一种改进的非结构化P2P网络洪泛搜索机制[J]. 西北工业大学学报, 2015, 33(2): 342-349. (Lu W, Zhou T, Xing W W.An Improved Flooding Based Search Mechanism in Unstructured P2P Network[J]. Journal of Northwestern Polytechnical University (S1000-2758), 2015, 33(2): 342-349.) |