[1]
I. Stoica, R. Morris, D. Karger, M. Frans Kaashoek, H. Balakrishnan : Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. SIGCOMM 2001: 149-160 also see the the tech report
[2]
David Karger et al. Consistent Hashing and Random Trees:
Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web
a simpler version is available here .
[8]
Duncan J. Watts, Steven H. Strogatz : Collective dynamics of small-world networks. Nature 393:440-42
[12]
James Aspnes, Gauri Shah : Skip Graphs. SODA 2003: 384-393
[21]
Bin Yu, Munindar P. Singh : Searching Social Networks. AAMAS 2003: 65-72
[23] Amos Fiat and Jared Saia: Censorship Resistant Peer-to-Peer Content Addressable NetworksSODA 2002
[24]
S. Guha, Neil Daswani, and Ravi Jain: An Experimental Study of the Skype Peer-to-Peer VoIP System
[25]
K.P. Gummadi et al.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
[28]
John Douceur: The Sybil Attack. IPTPS 2003
[30] The Beehive System
[31] Karthik Tamilmani, Vinay Pai, Alexander E. Mohr: SWIFT: A System With Incentives For Trading (2004)
[32] Gurmeet Singh Manku, Mayank Bawa, Prabhakar Raghavan: Symphony: Distributed Hashing in a Small
World
[34] Fabrikant, Luthra, Maneva, Papadimitriou, Shenker: On a Network Creation Game. ACM PODC 2003
[39]
Ian. Foster, Carl Kesselman, Steven Tuecke, ``Anatomy of a Grid''
[40] The Bamboo Distributed Hash Table:
A Robust Open-source DHT
[41] C. G. Plaxton, R. Rajaraman, A.W. Richa : Accessing nearby copies of replicated objects in a distributed environment. In Theory of Computing Systems 32:241-280, 1999
[50] Alberto Blanc, Yi-Kai Liu, Amin Vahdat: Designing Incentives for P2P networks
[51] Benjamin Frank et al. Pushing CDN-ISP Collaboration to the Limit
ACM SIGCOMM 2013 pp. 35-44
[52]
Ramesh Sitaraman et al. Overlay Networks: An Akamai Perspective
[55] D. Liben Nowell, J. Kleinberg. The Link Prediction Problem for Social Networks. Proc. CIKM, 2003 .