Referências: |
Bibliografia básica: 1. COLOURIS, G. et al. Distributed Systems: Concepts and Design, 5th Edition. Pearson. 2. TANEBAUM, A.S. and STEEN, M.V. Distributed Systems: Principles and Paradigms, 2nd Edition. 3. KUROSE, J. F.; ROSS, K. W. Redes de Computadores e a Internet Uma Abordagem Top-down - 3ª Ed. Pearson Education.
Bibliografia complementar: 1. The Gnutella protocol specification v 0.4, Document revision 1.2. Disponível em: <www.clip2.com>. 2. STOICA, I. et al. Chord: a scalable peer-to-peer lookup service for Internet applications, SIGCOMM 2001. 3. FOSTER, I. The Grid: a new infrastructure for 21st century science. Physics Today, 2002. 4. GHEMAWAT, S. and DEAN, J. MapReduce: Simplified Data Processing on Large Clusters. OSDI 2004. 5. FOSTER, I. et al. On death, taxes and the convergence of peer-to-peer and grid computing. IPTPS 2003. 6. SOUSA, JR, R. T.; ADNANE, A. ; BIDAN, C.; MÉ, L. Vulnerabilidades e Proteções do Protocolo de Roteamento Ad Hoc OLSR sob o Ponto de Vista da Confiança. Revista IEEE América Latina, v. 7, p. 594-602, 2009. 7. HOLTZ, M. D.; DAVID, B. M.; SOUSA JR, R. T. Building Scalable Distributed Intrusion Detection Systems Based on the MapReduce Framework. Telecomunicações (Santa Rita do Sapucaí), v. 13, p. 22-31, 2011. |