An architecture for peer-to-peer information retrieval, Workshop on Peer-to-Peer Information Retrieval, 2004. ,
Geopeer: a location-aware peer-to-peer system, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., 2001. ,
DOI : 10.1109/NCA.2004.1347760
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets, Proceedings of ACNS, 2006. ,
DOI : 10.1007/11767480_9
Handbook of Computational Geometry, chapter 18, pp.201-290, 2000. ,
MANAGING MUTUAL AWARENESS IN COLLABORATIVE VIRTUAL ENVIRONMENTS, Virtual Reality Software and Technology, 1994. ,
DOI : 10.1142/9789814350938_0018
Understanding Availability, Proceedings of the 2 nd International Workshop on Peer-to-Peer Systems (IPTPS), pp.256-267, 2003. ,
DOI : 10.1007/978-3-540-45172-3_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.1523
High Availability, Scalable Storage, Dynamic Peer Networks: Pick two, HotOs, 2003. ,
The hierarchical representation of objects: the Delaunay tree, Proceedings of the second annual symposium on Computational geometry , SCG '86, 1996. ,
DOI : 10.1145/10515.10543
Online Routing in Triangulations, Proceedings of the 10 th International Symposium on Algorithms and Computation (ISAAC), pp.113-122, 1999. ,
Tails in scheduling, ACM SIGMETRICS Performance Evaluation Review, vol.34, issue.4, 2007. ,
DOI : 10.1145/1243401.1243406
Why distance matters, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.226-235, 2002. ,
DOI : 10.1145/587078.587110
Designing Less-Structured P2P Systems for the Expected High Churn, IEEE/ACM Transactions on Networking, vol.16, issue.3, 2008. ,
DOI : 10.1109/TNET.2007.903986
Modeling Internet topology, IEEE Communications Magazine, vol.35, issue.6, pp.160-163, 1997. ,
DOI : 10.1109/35.587723
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.2169
Extending and enhancing GT-ITM, Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research , MoMeTools '03, pp.23-27, 2003. ,
DOI : 10.1145/944773.944778
The SIMNET virtual world architecture, Proceedings of IEEE Virtual Reality Annual International Symposium, pp.450-455, 1993. ,
DOI : 10.1109/VRAIS.1993.380745
Building a reliable P2P system out of unreliable P2P clients, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, 2007. ,
DOI : 10.1145/1364654.1364690
Extreme Value Theory in Engineering, 1988. ,
Secure routing for structured peer-to-peer overlay networks, Proceedings of OSDI, 2002. ,
Topology-aware routing in structure Peer-to-peer overlay network, International Workshop on Future Directions in Distributed Computing (FuDiCo), 2002. ,
Availability and locality measurements of peer-to-peer file systems, Proceedings of SPIE, 2002. ,
Arpeggio: Metadata??Searching and Content??Sharing with??Chord, International Workshop on Peer-To-Peer Systems, 2005. ,
DOI : 10.1007/11558989_6
The zombie roundup: Understanding , detecting, and disrupting botnets, Workshop on Steps to Reducing Unwanted Traffic on theInternet (SRUTI), pp.39-44, 2005. ,
PIC: practical Internet coordinates for distance estimation, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.178-187, 2004. ,
DOI : 10.1109/ICDCS.2004.1281582
Vivaldi: A Decentralized Network Coordinate System, Proceedings ACM SIGCOMM, 2004. ,
Designing a DHT for low latency and high throughput, NSDI, 2004. ,
Sybilresistant DHT routing, European Symposium On Research In Computer Security, 2005. ,
Sur la sphère vide. A la mémoire de Georges Voronoi, Izv. Akad. Nauk SSSR, Otdelenie Matematicheskih i Estestvennyh Nauk, pp.793-800, 1934. ,
On Deletion in Delaunay Triangulations, Proceedings of the Fifteenth Annual Symposium on Computational Geometry (SGC), pp.181-188, 1999. ,
URL : https://hal.archives-ouvertes.fr/hal-01179435
Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration, First International Conference on Availability, Reliability and Security (ARES'06), pp.756-763, 2006. ,
DOI : 10.1109/ARES.2006.45
Characterizing residential broadband networks, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298313
The Sybil Attack, Proceedings of the 1 st International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Incremental topological flipping works for regular triangulations, Algorithmica, vol.133, issue.3, pp.223-241, 1996. ,
DOI : 10.1007/BF01975867
BotTorrent: Misusing BitTorrent to Launch DDoS Attack, Proceedings of USENIX SRUTI, 2007. ,
Cluster Analysis using Triangulation, Computational Techniques and Applications, 1997. ,
AUTOCLUST: Automatic Clustering via Boundary Extraction for Mining Massive Point-data Sets, Proceedings of the 5 th International Conference on GeoComputation University of Greenwich, pp.82-89, 2000. ,
Criteria on Proximity Graphs for Boundary Extraction and Spatial Clustering, Proceedings of the 5 th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), pp.348-357, 2001. ,
DOI : 10.1007/3-540-45357-1_37
Profiling a million user dht, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298325
Clustering in Peer-to-Peer File Sharing Workloads, The 3rd International Workshop on Peer-to-Peer Systems (IPTPS), 2004. ,
DOI : 10.1007/978-3-540-30183-7_21
A communication architecture for massive multiplayer games, Proceedings of the 1st workshop on Network and system support for games , NETGAMES '02, 2002. ,
DOI : 10.1145/566500.566503
Subexponential Distributions, pp.435-455, 1997. ,
Computing Dirichlet Tessellations in the Plane, The Computer Journal, vol.21, issue.2, pp.168-173, 1978. ,
DOI : 10.1093/comjnl/21.2.168
The Worm That Roared Internet: http://www.time.com/ time, 2007. ,
Randomized incremental construction of Delaunay and Voronoi diagrams, Algorithmica, vol.134, issue.1-6, pp.381-413, 1992. ,
DOI : 10.1007/BF01758770
The impact of DHT routing geometry on resilience and proximity, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003. ,
DOI : 10.1145/863955.863998
King: Estimating Latency between Arbitrary Internet End Hosts, Proceedings of 2 nd Internet Measurement Workshop, 2002. ,
Efficient epidemic-style protocols for reliable and scalable multicast, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings., p.180, 2002. ,
DOI : 10.1109/RELDIS.2002.1180187
Lévy flights as an underlying mechanism for global optimization algorithms. ArXiv Mathematical Physics e-prints, 2001. ,
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm, First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET), 2008. ,
Know your Enemy: Tracking Botnets, 2005. ,
VON: a scalable peer-to-peer network for virtual environments, IEEE Network, vol.20, issue.4, pp.22-31, 2006. ,
A Case for End System Multicast, IEEE Journal on Selected Areas in Communication, Special Issue on Networking Support for Multicast, vol.20, 2002. ,
Small world overlay P2P networks, Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004., pp.201-210, 2004. ,
DOI : 10.1109/IWQOS.2004.1309383
Dissecting BitTorrent: Five Months in a Torrent???s Lifetime, Proceedings of the Passive and Active Measurement Conference, 2004. ,
DOI : 10.1007/978-3-540-24668-8_1
A spatial data mining method by Delaunay triangulation SOLIPSIS: A Massively Multi-Participant Virtual World, Proceedings of the 5 th international workshop on Advances in geographic information systems (GIS) Proceedings of the International Conference on Parallel and Distributed Techniques and Applications, pp.35-39, 1997. ,
The small-world phenomenon, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.163-170, 2000. ,
DOI : 10.1145/335305.335325
A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems, Current Trends in Database Technology - EDBT Workshops, pp.506-515, 2004. ,
DOI : 10.1007/978-3-540-30192-9_50
Peer-to-peer support for massively multiplayer games, IEEE INFOCOM 2004, 2004. ,
DOI : 10.1109/INFCOM.2004.1354485
Storm worm dwarfs world's top supercomputers, 2007. ,
Measuring Large Overlay Networks ??? The Overnet Example, Proceedings of the 14 th KiVS, 2005. ,
DOI : 10.1007/3-540-27301-8_16
Network Coordinates in the Wild, Proceedings of the 4 th USENIX Symposium on Networked Systems Design & Implementation, pp.299-311, 2007. ,
Network Coordinates in the Wild, 2007. ,
6. Random Graphs, Small-Worlds and Scale-Free Networks, LNCS, vol.3485, issue.6, pp.57-76, 2005. ,
DOI : 10.1007/11530657_6
URL : https://hal.archives-ouvertes.fr/in2p3-00021197
SCORE: A Scalable Communication Protocol for Large-Scale Virtual Environments, IEEE/ACM Transactions on Networking, vol.12, issue.2, pp.247-260, 2004. ,
DOI : 10.1109/TNET.2004.826276
Théorie de l'Addition des Variables Aléatoires, 1937. ,
A performance vs. cost framework for evaluating DHT design tradeoffs under churn, Proceedings of INFOCOM, 2005. ,
Semantic small world: An overlay network for peer-to-peer search, Proceedings of the 12 th IEEE International Conference on Network Protocols (ICNP), pp.228-238, 2004. ,
Distributed Construction of a Planar Spanner and Routing for Ad Hoc Wireless Networks, Proceedings of INFOCOM, 2002. ,
Application-layer multicasting with Delaunay triangulation overlays, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, pp.1472-1488, 2003. ,
DOI : 10.1109/JSAC.2002.803067
A distributed approach to solving overlay mismatching problem, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.132-139, 2004. ,
DOI : 10.1109/ICDCS.2004.1281576
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Proceedings of the 1 st International Workshop on Peer-to-Peer Systems (IPTPS), pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
Adding Structure to Unstructured Peer-to-Peer Networks: The Role of Overlay Topology, Proceedings of NGC, pp.83-94, 2003. ,
DOI : 10.1007/978-3-540-39405-1_8
Exploiting availability prediction in distributed systems, Proceedings of NSDI, 2006. ,
The small world problem, Psychology Today, vol.2, pp.60-67, 1967. ,
DOI : 10.1037/e400002009-005
Probabilistic Modelling, 1998. ,
DOI : 10.1017/CBO9781139173087
Probability and Computing: Randomized Algorithms and Probabilistic Analysis, 2005. ,
DOI : 10.1017/CBO9780511813603
Delete and insert operations in Voronoi/Delaunay methods and applications, Computers & Geosciences, pp.523-530, 2003. ,
DOI : 10.1016/S0098-3004(03)00017-7
Exploiting P2P systems for DDoS attacks, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, 2006. ,
DOI : 10.1145/1146847.1146894
In millions of windows, the perfect storm is gathering, 2007. ,
Random graph models of social networks, PNAS, pp.2566-2572, 2002. ,
DOI : 10.1073/pnas.012582999
A network positioning system for the internet, USENIX Annual Technical Conference, pp.141-154, 2004. ,
Spatial Tesselations: Concepts and Applications of Voronoi Diagrams, 2000. ,
Lighthouses for Scalable Distributed Location, Proceedings of 2 nd International Workshop on Peer-to-Peer Systems (IPTPS), pp.278-291, 2003. ,
DOI : 10.1007/978-3-540-45172-3_26
Digging into KAD Users' Shared Folders Beyond term indexing: A p2p framework forweb information retrieval, Poster of SIGCOMM, pp.153-161, 2006. ,
Prolexic Distributed Denial of Service Attack Alert, 2007. ,
Extending locales: awareness management in MASSIVE-3, Proceedings IEEE Virtual Reality 2000 (Cat. No.00CB37048), 2000. ,
DOI : 10.1109/VR.2000.840515
Structured and Unstructured Overlays Under the Microscope -A Measurement-based View of Two P2P Systems That People Use, Proceedings of the USENIX Annual Technical Conference, 2006. ,
A multifaceted approach to understanding the botnet phenomenon, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177086
A scalable contentaddressable network, Proceedings of SIGCOMM, 2001. ,
Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007. ,
DOI : 10.1109/INFCOM.2007.328
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Proceedings of Middleware, 2001. ,
DOI : 10.1007/3-540-45518-3_18
A measurement study of peer-topeer file sharing systems, Proceedings of Multimedia Computing and Networking (MMCN), 2002. ,
Analyzing peer-to-peer traffic across large networks, IEEE Transactions on Networking, 2004. ,
pNear: combining Content Clustering and Distributed Hash Tables, Proceedings of the IEEE -p2pkm, 2005. ,
Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, 2004. ,
DOI : 10.1145/1133572.1133613
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of IPTPS, 2002. ,
DOI : 10.1007/3-540-45748-8_25
The popularity of gnutella queries and its implications on scalability, Proceedings of O'Reilly's OpenP2P, 2001. ,
Shortcuts in a virtual world, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006. ,
DOI : 10.1145/1368436.1368460
DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2005. ,
DOI : 10.1145/1095921.1095984
A fully distributed peer to peer structure based on 3D Delaunay Triangulation, Proceedings of Algotel -Septièmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, pp.93-96, 2005. ,
DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2006. ,
DOI : 10.1145/1095921.1095984
Actively Monitoring Peers in Kad, Proceedings of the 6 th International Workshop on Peer-to-Peer Systems (IPTPS), 2007. ,
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007. ,
DOI : 10.1145/1290168.1290176
Long Term Study of Peer Behavior in the KAD DHT. Accepted for Publication, IEEE/ACM Transactions on Networking, 2008. ,
Faster Content Access in KAD, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008. ,
DOI : 10.1109/P2P.2008.28
Load Reduction in the KAD Peer-to-Peer System, Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing, 2007. ,
A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298323
Snow Crash. Bantam Spectra Book, 1992. ,
Storm worm DDoS attack Internet: http://www.secureworks. com/research/threats/storm-worm, 2007. ,
Chord: A scalable Peer-to-peer lookup service for Internet applications, Proceedings of SIGCOMM, pp.149-160, 2001. ,
Evaluating the Accuracy of Captured Snapshots by Peer-to-Peer Crawlers, Proceedings of PAM, pp.353-357, 2005. ,
DOI : 10.1007/978-3-540-31966-5_33
Improving Lookup Performance Over a Widely-Deployed DHT, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.329
Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177105
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval, 2003. ,
Latency-Driven Replica Placement, Proceedings of the Symposium on Applications and the Internet (SAINT), pp.399-405, 2005. ,
Low traffic overlay networks with large routing tables, Proceedings of SIG- METRICS, pp.14-25, 2005. ,
Virtual landmarks for the internet, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, 2003. ,
DOI : 10.1145/948205.948223
Understanding the Dynamic of Peer-to-Peer Systems, Proceedings of the 6 th International Workshop on Peer-to-Peer Systems (IPTPS), 2007. ,
An open middleware for large-scale networked virtual environments, Proceedings IEEE Virtual Reality 2002, 2002. ,
DOI : 10.1109/VR.2002.996501
A Measurement-Based Traffic Profile of the eDonkey Filesharing Service, 5th Passive and Active Measurement Workshop (PAM2004), 2004. ,
DOI : 10.1007/978-3-540-24668-8_2
Nouvelles applications des paramètres continus à la théorie des formes quadratiques Deuxième mémoire: Recherches sur lesparallellò res primitifs, Journal für die Reine and Angewandte Mathematik, vol.134, pp.198-287, 1908. ,
Epidemic-Style Management of Semantic Overlays for Content-Based Searching, Proceedings of the 11 th International Euro-Par Conference, p.1143, 2005. ,
DOI : 10.1007/11549468_125
Diamond Park and Spline:Social Virtual Reality with 3D Animation, Spoken Interaction, and Runtime Extendability, Presence: Teleoperators and Virtual Environments, vol.6, issue.4, pp.461-480, 1997. ,
DOI : 10.1162/pres.1994.3.1.19
Computing the n-dimensional Delaunay tessellation with application to Voronoi polytopes, The Computer Journal, vol.24, issue.2, pp.167-172, 1981. ,
DOI : 10.1093/comjnl/24.2.167
Collective dynamics of 'small-world' networks, Nature, vol.393, issue.6684, pp.409-410, 1998. ,
The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments, Presence: Teleoperators and Virtual Environments, vol.27, issue.51, pp.309-329, 2006. ,
DOI : 10.1080/03637750500111781
SybilGuard: Defending Against Sybil Attacks via Social Networks, Proceedings of SIGCOMM, 2006. ,
Tapestry, ACM SIGCOMM Computer Communication Review, vol.32, issue.1, 2001. ,
DOI : 10.1145/510726.510755
Time-space consistency in large-scale distributed virtual environments, ACM Transactions on Modeling and Computer Simulation, vol.14, issue.1, pp.31-47, 2004. ,
DOI : 10.1145/974734.974736
NPSNET-IV, ACM SIGGRAPH 97 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH '97 on , SIGGRAPH '97, 1997. ,
DOI : 10.1145/259081.259451
A fully distributed peer to peer structure based on 3D Delaunay Triangulation, Proceedings of Algotel -Septièmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, pp.93-96, 2005. ,
DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2005. ,
DOI : 10.1145/1095921.1095984
DDC, Proceedings of the 2005 ACM conference on Emerging network experiment and technology , CoNEXT'05, 2006. ,
DOI : 10.1145/1095921.1095984
Shortcuts in a virtual world, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006. ,
DOI : 10.1145/1368436.1368460
Actively Monitoring Peers in Kad, Proceedings of the 6 th International Workshop on Peer-to-Peer Systems (IPTPS), 2007. ,
Load Reduction in the KAD Peer-to-Peer System, Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing, 2007. ,
A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298323
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007. ,
DOI : 10.1145/1290168.1290176
Faster Content Access in KAD, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008. ,
DOI : 10.1109/P2P.2008.28
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm, First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET), 2008. ,