K. Aberer, F. Klemm, M. Rajman, and J. Wu, An architecture for peer-to-peer information retrieval, Workshop on Peer-to-Peer Information Retrieval, 2004.

F. Araujo and L. Rodrigues, Geopeer: a location-aware peer-to-peer system, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., 2001.
DOI : 10.1109/NCA.2004.1347760

E. Athanasopoulos, K. G. Anagnostakis, and E. P. Markatos, Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets, Proceedings of ACNS, 2006.
DOI : 10.1007/11767480_9

F. Aurenhammer and R. Klein, Handbook of Computational Geometry, chapter 18, pp.201-290, 2000.

S. Benford, J. Bowers, L. E. Fahlén, and C. Greenhalgh, MANAGING MUTUAL AWARENESS IN COLLABORATIVE VIRTUAL ENVIRONMENTS, Virtual Reality Software and Technology, 1994.
DOI : 10.1142/9789814350938_0018

R. Bhagwan, S. Savage, and G. Voelker, Understanding Availability, Proceedings of the 2 nd International Workshop on Peer-to-Peer Systems (IPTPS), pp.256-267, 2003.
DOI : 10.1007/978-3-540-45172-3_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.1523

C. Blake and R. Rodrigues, High Availability, Scalable Storage, Dynamic Peer Networks: Pick two, HotOs, 2003.

J. D. Boissonnat and M. Teillaud, The hierarchical representation of objects: the Delaunay tree, Proceedings of the second annual symposium on Computational geometry , SCG '86, 1996.
DOI : 10.1145/10515.10543

P. Bose and P. Morin, Online Routing in Triangulations, Proceedings of the 10 th International Symposium on Algorithms and Computation (ISAAC), pp.113-122, 1999.

O. Boxma and B. Zwart, Tails in scheduling, ACM SIGMETRICS Performance Evaluation Review, vol.34, issue.4, 2007.
DOI : 10.1145/1243401.1243406

E. Bradner and G. Mark, Why distance matters, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.226-235, 2002.
DOI : 10.1145/587078.587110

F. Bustamante and Y. Qiao, Designing Less-Structured P2P Systems for the Expected High Churn, IEEE/ACM Transactions on Networking, vol.16, issue.3, 2008.
DOI : 10.1109/TNET.2007.903986

K. Calvert, M. Doar, and E. W. Zegura, Modeling Internet topology, IEEE Communications Magazine, vol.35, issue.6, pp.160-163, 1997.
DOI : 10.1109/35.587723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.2169

K. Calvert, J. Eagan, S. Merugu, A. Namjoshi, J. Stasko et al., Extending and enhancing GT-ITM, Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research , MoMeTools '03, pp.23-27, 2003.
DOI : 10.1145/944773.944778

J. Calvin, A. Dickens, B. Gaines, P. Metzger, D. Miller et al., The SIMNET virtual world architecture, Proceedings of IEEE Virtual Reality Annual International Symposium, pp.450-455, 1993.
DOI : 10.1109/VRAIS.1993.380745

D. Carra and E. Biersack, Building a reliable P2P system out of unreliable P2P clients, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, 2007.
DOI : 10.1145/1364654.1364690

E. Castillo, Extreme Value Theory in Engineering, 1988.

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach, Secure routing for structured peer-to-peer overlay networks, Proceedings of OSDI, 2002.

M. Castro, P. Druschel, Y. C. Hu, and A. Rowstron, Topology-aware routing in structure Peer-to-peer overlay network, International Workshop on Future Directions in Distributed Computing (FuDiCo), 2002.

J. Chu, K. Labonte, and B. N. Levine, Availability and locality measurements of peer-to-peer file systems, Proceedings of SPIE, 2002.

A. T. Clements, D. R. Ports, and D. R. Karger, Arpeggio: Metadata??Searching and Content??Sharing with??Chord, International Workshop on Peer-To-Peer Systems, 2005.
DOI : 10.1007/11558989_6

E. Cooke, F. Jahanian, and D. Mcpherson, The zombie roundup: Understanding , detecting, and disrupting botnets, Workshop on Steps to Reducing Unwanted Traffic on theInternet (SRUTI), pp.39-44, 2005.

M. Costa, M. Castro, A. Rowstron, and P. Key, PIC: practical Internet coordinates for distance estimation, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.178-187, 2004.
DOI : 10.1109/ICDCS.2004.1281582

R. Cox, F. Dabek, F. Kaashoek, J. Li, and R. Morris, Vivaldi: A Decentralized Network Coordinate System, Proceedings ACM SIGCOMM, 2004.

F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek et al., Designing a DHT for low latency and high throughput, NSDI, 2004.

G. Danezis, C. Lesniewski-laas, M. Kaashoek, and R. Anderson, Sybilresistant DHT routing, European Symposium On Research In Computer Security, 2005.

]. B. Delaunay, Sur la sphère vide. A la mémoire de Georges Voronoi, Izv. Akad. Nauk SSSR, Otdelenie Matematicheskih i Estestvennyh Nauk, pp.793-800, 1934.

O. Devillers, On Deletion in Delaunay Triangulations, Proceedings of the Fifteenth Annual Symposium on Computational Geometry (SGC), pp.181-188, 1999.
URL : https://hal.archives-ouvertes.fr/hal-01179435

J. Dinger and H. Hartenstein, Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration, First International Conference on Availability, Reliability and Security (ARES'06), pp.756-763, 2006.
DOI : 10.1109/ARES.2006.45

M. Dischinger, A. Haeberlen, K. P. Gummadi, and S. Saroiu, Characterizing residential broadband networks, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298313

J. R. Douceur, The Sybil Attack, Proceedings of the 1 st International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

H. Edelsbrunner and N. R. Shah, Incremental topological flipping works for regular triangulations, Algorithmica, vol.133, issue.3, pp.223-241, 1996.
DOI : 10.1007/BF01975867

K. El-defrawy, M. Gjoka, and A. Markopoulou, BotTorrent: Misusing BitTorrent to Launch DDoS Attack, Proceedings of USENIX SRUTI, 2007.

C. Eldershaw and M. Hegland, Cluster Analysis using Triangulation, Computational Techniques and Applications, 1997.

V. Estivill-castro and I. Lee, AUTOCLUST: Automatic Clustering via Boundary Extraction for Mining Massive Point-data Sets, Proceedings of the 5 th International Conference on GeoComputation University of Greenwich, pp.82-89, 2000.

V. Estivill-castro, I. Lee, and A. T. Murray, Criteria on Proximity Graphs for Boundary Extraction and Spatial Clustering, Proceedings of the 5 th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), pp.348-357, 2001.
DOI : 10.1007/3-540-45357-1_37

J. Falkner, M. Piatek, J. P. John, A. Krishnamurthy, and T. Anderson, Profiling a million user dht, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298325

F. L. Fessant, S. B. Handurukande, A. Kermarrec, and L. Massoulié, Clustering in Peer-to-Peer File Sharing Workloads, The 3rd International Workshop on Peer-to-Peer Systems (IPTPS), 2004.
DOI : 10.1007/978-3-540-30183-7_21

S. Fiedler, M. Wallner, and M. Weber, A communication architecture for massive multiplayer games, Proceedings of the 1st workshop on Network and system support for games , NETGAMES '02, 2002.
DOI : 10.1145/566500.566503

C. Goldie and C. Klueppelberg, Subexponential Distributions, pp.435-455, 1997.

P. J. Green and R. R. Sibson, Computing Dirichlet Tessellations in the Plane, The Computer Journal, vol.21, issue.2, pp.168-173, 1978.
DOI : 10.1093/comjnl/21.2.168

L. Grossman, The Worm That Roared Internet: http://www.time.com/ time, 2007.

L. Guibas, D. Knuth, and M. Sharir, Randomized incremental construction of Delaunay and Voronoi diagrams, Algorithmica, vol.134, issue.1-6, pp.381-413, 1992.
DOI : 10.1007/BF01758770

K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker et al., The impact of DHT routing geometry on resilience and proximity, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003.
DOI : 10.1145/863955.863998

K. P. Gummadi, S. Saroiu, and S. D. Gribble, King: Estimating Latency between Arbitrary Internet End Hosts, Proceedings of 2 nd Internet Measurement Workshop, 2002.

I. Gupta, A. Kermarrec, and A. J. Ganesh, Efficient epidemic-style protocols for reliable and scalable multicast, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings., p.180, 2002.
DOI : 10.1109/RELDIS.2002.1180187

M. Gutowski, Lévy flights as an underlying mechanism for global optimization algorithms. ArXiv Mathematical Physics e-prints, 2001.

T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freiling, Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm, First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET), 2008.

H. Project, Know your Enemy: Tracking Botnets, 2005.

S. Hu, J. Chen, and T. Chen, VON: a scalable peer-to-peer network for virtual environments, IEEE Network, vol.20, issue.4, pp.22-31, 2006.

Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, A Case for End System Multicast, IEEE Journal on Selected Areas in Communication, Special Issue on Networking Support for Multicast, vol.20, 2002.

K. Hui, J. Lui, and D. Yau, Small world overlay P2P networks, Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004., pp.201-210, 2004.
DOI : 10.1109/IWQOS.2004.1309383

M. Izal, G. Urvoy-keller, E. Biersack, P. Felber, A. Hamra et al., Dissecting BitTorrent: Five Months in a Torrent???s Lifetime, Proceedings of the Passive and Active Measurement Conference, 2004.
DOI : 10.1007/978-3-540-24668-8_1

I. Kang, T. Kim, and K. Li, A spatial data mining method by Delaunay triangulation SOLIPSIS: A Massively Multi-Participant Virtual World, Proceedings of the 5 th international workshop on Advances in geographic information systems (GIS) Proceedings of the International Conference on Parallel and Distributed Techniques and Applications, pp.35-39, 1997.

J. Kleinberg, The small-world phenomenon, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.163-170, 2000.
DOI : 10.1145/335305.335325

F. Klemm, A. Datta, and K. Aberer, A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems, Current Trends in Database Technology - EDBT Workshops, pp.506-515, 2004.
DOI : 10.1007/978-3-540-30192-9_50

B. Knutsson, H. Lu, W. Xu, and B. Hopkins, Peer-to-peer support for massively multiplayer games, IEEE INFOCOM 2004, 2004.
DOI : 10.1109/INFCOM.2004.1354485

B. Krebs, Storm worm dwarfs world's top supercomputers, 2007.

K. Kutzner and T. Fuhrmann, Measuring Large Overlay Networks ??? The Overnet Example, Proceedings of the 14 th KiVS, 2005.
DOI : 10.1007/3-540-27301-8_16

J. Ledlie, P. Gardner, and M. Seltzer, Network Coordinates in the Wild, Proceedings of the 4 th USENIX Symposium on Networked Systems Design & Implementation, pp.299-311, 2007.

J. Ledlie, P. Gardner, and M. Seltzer, Network Coordinates in the Wild, 2007.

K. A. Lehmann and M. Kaufmann, 6. Random Graphs, Small-Worlds and Scale-Free Networks, LNCS, vol.3485, issue.6, pp.57-76, 2005.
DOI : 10.1007/11530657_6

URL : https://hal.archives-ouvertes.fr/in2p3-00021197

E. Léty, T. Turletti, and F. Bacceli, SCORE: A Scalable Communication Protocol for Large-Scale Virtual Environments, IEEE/ACM Transactions on Networking, vol.12, issue.2, pp.247-260, 2004.
DOI : 10.1109/TNET.2004.826276

P. Lévy, Théorie de l'Addition des Variables Aléatoires, 1937.

J. Li, J. Stribling, R. Morris, M. Kaashoek, and T. Gil, A performance vs. cost framework for evaluating DHT design tradeoffs under churn, Proceedings of INFOCOM, 2005.

M. Li, W. Lee, and A. Sivasubramaniam, Semantic small world: An overlay network for peer-to-peer search, Proceedings of the 12 th IEEE International Conference on Network Protocols (ICNP), pp.228-238, 2004.

X. Li, G. Calinescu, and P. Wan, Distributed Construction of a Planar Spanner and Routing for Ad Hoc Wireless Networks, Proceedings of INFOCOM, 2002.

J. Liebeherr, M. Nahas, and S. Weisheng, Application-layer multicasting with Delaunay triangulation overlays, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, pp.1472-1488, 2003.
DOI : 10.1109/JSAC.2002.803067

Y. Liu, Z. Zhuang, L. Xiao, and L. M. Ni, A distributed approach to solving overlay mismatching problem, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.132-139, 2004.
DOI : 10.1109/ICDCS.2004.1281576

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Proceedings of the 1 st International Workshop on Peer-to-Peer Systems (IPTPS), pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

S. Merugu, S. Srinivasan, and E. Zegura, Adding Structure to Unstructured Peer-to-Peer Networks: The Role of Overlay Topology, Proceedings of NGC, pp.83-94, 2003.
DOI : 10.1007/978-3-540-39405-1_8

J. Mickens and B. Noble, Exploiting availability prediction in distributed systems, Proceedings of NSDI, 2006.

S. Milgram, The small world problem, Psychology Today, vol.2, pp.60-67, 1967.
DOI : 10.1037/e400002009-005

I. Mitrani, Probabilistic Modelling, 1998.
DOI : 10.1017/CBO9781139173087

M. Mitzenmacher and E. Upfal, Probability and Computing: Randomized Algorithms and Probabilistic Analysis, 2005.
DOI : 10.1017/CBO9780511813603

M. A. Mostafavia, C. Gold, and M. Dakowicz, Delete and insert operations in Voronoi/Delaunay methods and applications, Computers & Geosciences, pp.523-530, 2003.
DOI : 10.1016/S0098-3004(03)00017-7

N. Naoumov and K. Ross, Exploiting P2P systems for DDoS attacks, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, 2006.
DOI : 10.1145/1146847.1146894

J. Naughton, In millions of windows, the perfect storm is gathering, 2007.

M. E. Newman, D. J. Watts, and S. H. Strogatz, Random graph models of social networks, PNAS, pp.2566-2572, 2002.
DOI : 10.1073/pnas.012582999

T. E. Ng and H. Zhang, A network positioning system for the internet, USENIX Annual Technical Conference, pp.141-154, 2004.

A. Okabe, B. Boots, and K. Sugihara, Spatial Tesselations: Concepts and Applications of Voronoi Diagrams, 2000.

M. Pias, J. Crowcroft, S. Wilbur, and T. H. Bhatti, Lighthouses for Scalable Distributed Location, Proceedings of 2 nd International Workshop on Peer-to-Peer Systems (IPTPS), pp.278-291, 2003.
DOI : 10.1007/978-3-540-45172-3_26

M. Pietrzyk, G. Urvoy-keller, J. Costeux, M. Rajman, T. Luu et al., Digging into KAD Users' Shared Folders Beyond term indexing: A p2p framework forweb information retrieval, Poster of SIGCOMM, pp.153-161, 2006.

. Prolexic, Prolexic Distributed Denial of Service Attack Alert, 2007.

J. Purbrick and C. Greenhalgh, Extending locales: awareness management in MASSIVE-3, Proceedings IEEE Virtual Reality 2000 (Cat. No.00CB37048), 2000.
DOI : 10.1109/VR.2000.840515

Y. Qiao and F. E. Bustamante, Structured and Unstructured Overlays Under the Microscope -A Measurement-based View of Two P2P Systems That People Use, Proceedings of the USENIX Annual Technical Conference, 2006.

M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, A multifaceted approach to understanding the botnet phenomenon, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177086

S. Ratnasamy, M. Handley, R. Karp, and S. Shenker, A scalable contentaddressable network, Proceedings of SIGCOMM, 2001.

H. Rowaihy, W. Enck, P. Mcdaniel, and T. L. Porta, Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007.
DOI : 10.1109/INFCOM.2007.328

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Proceedings of Middleware, 2001.
DOI : 10.1007/3-540-45518-3_18

S. Saroiu, P. K. Gummadi, and S. D. Gribble, A measurement study of peer-topeer file sharing systems, Proceedings of Multimedia Computing and Networking (MMCN), 2002.

S. Sen and J. Wang, Analyzing peer-to-peer traffic across large networks, IEEE Transactions on Networking, 2004.

R. Siebes, pNear: combining Content Clustering and Distributed Hash Tables, Proceedings of the IEEE -p2pkm, 2005.

A. Singh, M. Castro, P. Druschel, and A. Rowstron, Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, 2004.
DOI : 10.1145/1133572.1133613

A. Singh, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.231

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of IPTPS, 2002.
DOI : 10.1007/3-540-45748-8_25

K. Sripanidkulchai, The popularity of gnutella queries and its implications on scalability, Proceedings of O'Reilly's OpenP2P, 2001.

M. Steiner and E. Biersack, Shortcuts in a virtual world, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006.
DOI : 10.1145/1368436.1368460

M. Steiner and E. W. Biersack, DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2005.
DOI : 10.1145/1095921.1095984

M. Steiner and E. W. Biersack, A fully distributed peer to peer structure based on 3D Delaunay Triangulation, Proceedings of Algotel -Septièmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, pp.93-96, 2005.

M. Steiner and E. W. Biersack, DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2006.
DOI : 10.1145/1095921.1095984

M. Steiner, E. W. Biersack, and T. En-najjary, Actively Monitoring Peers in Kad, Proceedings of the 6 th International Workshop on Peer-to-Peer Systems (IPTPS), 2007.

M. Steiner, E. W. Biersack, and T. En-najjary, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007.
DOI : 10.1145/1290168.1290176

M. Steiner, E. W. Biersack, and T. En-najjary, Long Term Study of Peer Behavior in the KAD DHT. Accepted for Publication, IEEE/ACM Transactions on Networking, 2008.

M. Steiner, D. Carra, and E. W. Biersack, Faster Content Access in KAD, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008.
DOI : 10.1109/P2P.2008.28

M. Steiner, W. Effelsberg, T. En-najjary, and E. W. Biersack, Load Reduction in the KAD Peer-to-Peer System, Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing, 2007.

M. Steiner, T. En-najjary, and E. W. Biersack, A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298323

N. Stephenson, Snow Crash. Bantam Spectra Book, 1992.

J. Stewart, Storm worm DDoS attack Internet: http://www.secureworks. com/research/threats/storm-worm, 2007.

I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, Chord: A scalable Peer-to-peer lookup service for Internet applications, Proceedings of SIGCOMM, pp.149-160, 2001.

D. Stutzbach and R. Rejaie, Evaluating the Accuracy of Captured Snapshots by Peer-to-Peer Crawlers, Proceedings of PAM, pp.353-357, 2005.
DOI : 10.1007/978-3-540-31966-5_33

D. Stutzbach and R. Rejaie, Improving Lookup Performance Over a Widely-Deployed DHT, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.329

D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177105

T. Suel, C. Mathur, J. Wu, J. Zhang, A. Delis et al., ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval, 2003.

M. Szymaniak, G. Pierre, and M. Van-steen, Latency-Driven Replica Placement, Proceedings of the Symposium on Applications and the Internet (SAINT), pp.399-405, 2005.

C. Tang, M. J. Buco, R. N. Chang, S. Dwarkadas, L. Z. Luan et al., Low traffic overlay networks with large routing tables, Proceedings of SIG- METRICS, pp.14-25, 2005.

L. Tang and M. Crovella, Virtual landmarks for the internet, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, 2003.
DOI : 10.1145/948205.948223

J. Tian and Y. Dai, Understanding the Dynamic of Peer-to-Peer Systems, Proceedings of the 6 th International Workshop on Peer-to-Peer Systems (IPTPS), 2007.

F. D. Tran, M. Deslaugiersa, A. Gerodolle, L. Hazard, and N. Rivierre, An open middleware for large-scale networked virtual environments, Proceedings IEEE Virtual Reality 2002, 2002.
DOI : 10.1109/VR.2002.996501

K. Tutschku, A Measurement-Based Traffic Profile of the eDonkey Filesharing Service, 5th Passive and Active Measurement Workshop (PAM2004), 2004.
DOI : 10.1007/978-3-540-24668-8_2

G. Voronoï, Nouvelles applications des paramètres continus à la théorie des formes quadratiques Deuxième mémoire: Recherches sur lesparallellò res primitifs, Journal für die Reine and Angewandte Mathematik, vol.134, pp.198-287, 1908.

S. Voulgaris and M. Van-steen, Epidemic-Style Management of Semantic Overlays for Content-Based Searching, Proceedings of the 11 th International Euro-Par Conference, p.1143, 2005.
DOI : 10.1007/11549468_125

R. Waters and W. Yerazunis, Diamond Park and Spline:Social Virtual Reality with 3D Animation, Spoken Interaction, and Runtime Extendability, Presence: Teleoperators and Virtual Environments, vol.6, issue.4, pp.461-480, 1997.
DOI : 10.1162/pres.1994.3.1.19

D. Watson, Computing the n-dimensional Delaunay tessellation with application to Voronoi polytopes, The Computer Journal, vol.24, issue.2, pp.167-172, 1981.
DOI : 10.1093/comjnl/24.2.167

D. Watts and S. Strogatz, Collective dynamics of 'small-world' networks, Nature, vol.393, issue.6684, pp.409-410, 1998.

N. Yee, The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments, Presence: Teleoperators and Virtual Environments, vol.27, issue.51, pp.309-329, 2006.
DOI : 10.1080/03637750500111781

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard: Defending Against Sybil Attacks via Social Networks, Proceedings of SIGCOMM, 2006.

B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph, Tapestry, ACM SIGCOMM Computer Communication Review, vol.32, issue.1, 2001.
DOI : 10.1145/510726.510755

S. Zhou, W. Cai, B. Lee, and S. J. Turner, Time-space consistency in large-scale distributed virtual environments, ACM Transactions on Modeling and Computer Simulation, vol.14, issue.1, pp.31-47, 2004.
DOI : 10.1145/974734.974736

M. Zyda, NPSNET-IV, ACM SIGGRAPH 97 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH '97 on , SIGGRAPH '97, 1997.
DOI : 10.1145/259081.259451

M. Steiner and E. W. Biersack, A fully distributed peer to peer structure based on 3D Delaunay Triangulation, Proceedings of Algotel -Septièmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, pp.93-96, 2005.

M. Steiner and E. W. Biersack, DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2005.
DOI : 10.1145/1095921.1095984

M. Steiner and E. W. Biersack, DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2006.
DOI : 10.1145/1095921.1095984

M. Steiner and E. Biersack, Shortcuts in a virtual world, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006.
DOI : 10.1145/1368436.1368460

M. Steiner, E. W. Biersack, and T. En-najjary, Actively Monitoring Peers in Kad, Proceedings of the 6 th International Workshop on Peer-to-Peer Systems (IPTPS), 2007.

M. Steiner, W. Effelsberg, T. En-najjary, and E. W. Biersack, Load Reduction in the KAD Peer-to-Peer System, Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing, 2007.

M. Steiner, T. En-najjary, and E. W. Biersack, A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298323

M. Steiner, E. W. Biersack, and T. En-najjary, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007.
DOI : 10.1145/1290168.1290176

M. Steiner, D. Carra, and E. W. Biersack, Faster Content Access in KAD, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008.
DOI : 10.1109/P2P.2008.28

T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freiling, Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm, First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET), 2008.