[1]程钰杰. 我国物联网产业发展研究[D]. 合肥:安徽大学, 2012.
[2]陈海明,崔莉,谢开斌. 物联网体系结构与实现方法的比较研究[J]. 计算机学报, 2013,36(1):168-188.
[3]魏强,金芝,李戈,等. 物联网服务发现初探:传统SOA的可行性和局限性[J]. 计算机科学与探索, 2013,7(2):97-113.
〖LL〗
[4]LI Jinyang, Stribling J, Gil T M, et al. Comparing the performance of distributed hash tables under churn[C]// International Workshop on Peer-to-Peer Systems. Springer Berlin Heidelberg, 2004,3279:87-99.
[5]Klauck R, Kirsche M. Bonjour Contiki: A case study of a DNS-based discovery service for the Internet of Things[M]// Ad-hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2012,7363(1):316-329.
[6]王自峰. 基于Chord的物联网资源发现方法的研究[D]. 武汉:华中科技大学, 2012.
[7]Cirani S, Davoli L, Ferrari G, et al. Ascalable and self-configuring architecture for service discovery in the Internet of Things[J]. Internet of Things Journal IEEE, 2014,1(5):508-521.
[8]Felber P, Kropf P, Schiller E, et al. Survey on load balancing in peer-to-peer distributed hash tables[J]. IEEE Communications Surveys & Tutorials, 2014,16(1):473-492.
[9]Fersi G, Louati W, Jemaa M B. Distributed hash table-based routing and data management in wireless sensor networks: A survey[J]. Wireless Networks, 2013,19(2):219-236.
[10]Maymounkov P, Mazieres D. Kademlia: A peer-to-peer information system based on the XOR metric[C]// International Workshop on Peer-to-Peer Systems. 2002,2429:53-65.
[11]Meshkova E, Riihijrvi J, Petrova M, et al. A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks[J]. Computer Networks, 2008,52(11):2097-2128.
[12]Steiner M, Ennajjary T, Biersack E W. A global view of KAD[C]// Acm Sigcomm Conference on Internet Measurement, 2007,15(2):117-122.
[13]张龙,李巍,李云春. 基于改进DHT算法的分布式资源发现模型的研究[J]. 计算机应用研究, 2007,24(12):313-316.
[14]王志晓,张大陆,刘雷,等. 基于本体的P2P复杂搜索[J]. 计算机应用, 2007,27(4):780-783.
[15]Gil Einziger, Roy Friedman, Yoav Kantor. Shades: Expediting Kademlia’s lookup process[J]. Computer Networks, 2016,99(1):37-50.
[16]侯祥松,曹元大,张煜. 基于Kademlia的P2P多维范围查询系统[J]. 计算机工程, 2008,34(20):29-30.
[17]〖KG-*4〗Schmidt C, Parashar M. Enabling flexible queries with guarantees in P2P systems[J]. Internet Computing IEEE, 2004,8(3):19-26.
[18]Lee K C K, Zheng Baihua, Li Huajing, et al. Approaching the skyline in Z order[C]// International Conference on Very Large Data Bases. 2007:279-290. |