[1]
Zhiyuan li, Ruchuan Wang, Secure topology protocol for mobile peer-to-peer networks[J]. Journal on Communications, 2010, 31(10): 146-157.
Google Scholar
[2]
Zhenyu Li, Gaogang Xie, Zhongcheng Li, Efficient and Scalable Consistency Maintenance for Heterogeneous Peer-to-Peer Systems[J], IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 12, pp.1695-1708, Dec. (2008).
DOI: 10.1109/tpds.2008.46
Google Scholar
[3]
Derr, Kurt, Manic, Milos. Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration[C]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS. 2011, 58(12): 424-5437.
DOI: 10.1109/tie.2011.2130492
Google Scholar
[4]
He Li, Kyoung Soo Bok, Jae Soo Yoo. An efficient clustering method for unstructured mobile peer-to-peer networks[C]. RACS '11: Proceedings of the 2011 ACM Symposium on Research in Applied Computation. 2011. 124-129.
DOI: 10.1145/2103380.2103407
Google Scholar
[5]
Yu J, Lu L M, Xiao P. Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT[J]. COMPUTER COMMUNICATIONS. 2011, 34(13): 622-1629.
DOI: 10.1016/j.comcom.2011.02.011
Google Scholar
[6]
YLi B C, N D. Random network coding in peer-to-peer networks: From theory to practice[J]. Proceedings of the IEEE. 2011, 99(3): 513-523.
DOI: 10.1109/jproc.2010.2091930
Google Scholar
[7]
Tsai Flora S, Han W C, Xu J W. Design and development of a mobile peer-to-peer social networking application[J]. expert systems with applications. 2009, 36(8): 11077-11087.
DOI: 10.1016/j.eswa.2009.02.093
Google Scholar
[8]
Zou D Y. Gan Y, Qu H T. Research of Structure Consistency between Overlay and Network Layer Based on Mobile P2P[c]. 2nd IEEE international conference on computer science and information technology. 2009, 2: 254-258.
DOI: 10.1109/iccsit.2009.5234435
Google Scholar
[9]
Liu Huey-Ing. A Distributed Intelligent Broadcasting Protocol for Mobile Ad Hoc Networks [J]. Mobile Networks and Applications. 2009, 14(5): 638-648.
DOI: 10.1007/s11036-008-0147-0
Google Scholar
[10]
Huang D M, Hu Z. Research of replication mechanism in P2P network [J]. World Scientific and Engineering Academy and Society. 2009. 845-1854.
Google Scholar
[11]
Xiao xiao, Weiping Wang, Luming Yang, Wireless broadcasting retransmission approach based on network coding[J]. Journal on Communications, 2009, 30(9): 69-75.
Google Scholar
[12]
Yingchun Lei, ShiCheng, Chanle Wu, P2P Content Distribution with Network Coding[J], Journal of Computer Research and Development, 2009, 46(1): 108-119.
Google Scholar
[13]
Liu L G, Chen Z X. Data forwarding in opportunistic networks[J]. Asian Network for Scientific Information. 2010. 215-223.
Google Scholar
[14]
Nguyen Hoang Anh, Giordano Silvia. Routing in opportunistic Networks [J]. Ambient Computing and Intelligence. 2009. 19-38.
Google Scholar
[15]
Anggadjaja, E. Point-to-Point OMNeT++ Based Simulation of Reliable Transmission Using Realistic Segmentation and Reassembly with Error Control[c]. Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference on. 2010, 10: 125-128.
DOI: 10.1109/act.2010.25
Google Scholar