[2]
I. Stoica, R. Morris, D. Karger, M. Frans Kaashoek, H. Balakrishnan : Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. SIGCOMM 2001: 149-160 also see the the tech report
[8]
Duncan J. Watts, Steven H. Strogatz : Collective dynamics of small-world networks. Nature 393:440-42
[12]
James Aspnes, Gauri Shah : Skip Graphs. SODA 2003: 384-393
[21]
Bin Yu, Munindar P. Singh : Searching Social Networks. AAMAS 2003: 65-72
[23] Amos Fiat and Jared Saia: Censorship Resistant Peer-to-Peer Content Addressable NetworksSODA 2002
[24]
S. Guha, Neil Daswani, and Ravi Jain: An Experimental Study of the Skype Peer-to-Peer VoIP System
[25]
K.P. Gummadi et al.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
[28]
John Douceur: The Sybil Attack. IPTPS 2003
[30] The Beehive System
[31] Karthik Tamilmani, Vinay Pai, Alexander E. Mohr: SWIFT: A System With Incentives For Trading (2004)
[32] Gurmeet Singh Manku, Mayank Bawa, Prabhakar Raghavan: Symphony: Distributed Hashing in a Small
World
[34] Fabrikant, Luthra, Maneva, Papadimitriou, Shenker: On a Network Creation Game. ACM PODC 2003
[39]
Ian. Foster, Carl Kesselman, Steven Tuecke, ``Anatomy of a Grid''
[40] The Bamboo Distributed Hash Table:
A Robust Open-source DHT
[41] C. G. Plaxton, R. Rajaraman, A.W. Richa : Accessing nearby copies of replicated objects in a distributed environment. In Theory of Computing Systems 32:241-280, 1999
[50] Alberto Blanc, Yi-Kai Liu, Amin Vahdat: Designing Incentives for P2P networks