• Nem Talált Eredményt

• I have given an algorithm for BitTorrent engine in mobile environment. I have shown that the algorithm consider the limitations of the mobile devices.

• I have designed and implemented MobTorrent software package, which is the first BitTorrent client for feature phones and operates in real BitTorrent net-work. The designed MobTorrent engine is a platform independent BitTorrent library on mobile phones, I have successfully applied it on Android platform as well.

• I have proposed a model based on average measurements to calculate the total required energy for downloading a specific amount of data.

• I have provided measurements that show that memory requirement and en-ergy consumption of MobTorrent is low and remains on a relatively constant level during the download.

• I have shown how a BitTorrent based hybrid peer-to-peer based content dis-tribution architecture is applicable in a mobile related social network.

• I have proposed an analytical model to calculate the cost of the content distribution considering lower seed ratio for mobile phones. I have proven that the relative cost of the hybrid architecture decreases significantly when the seed relation increases, compared to the general client-server architecture.

• I have contributed in the implementation of a hybrid peer-to-peer content distribution solution at Nokia Research Center and Nokia Siemens Networks.

different popular social networks, e.g.: MySpace, iGoogle, iWiW, etc. Future work includes to create measurements on different type of large database that can help designing resource requirements and scalability of mobile related social networks further.

Efficient similarity detecting and handling is a key issue in mobile related social networks, we have proposed an algorithm for it and based on measurements more than 90% of the detected similarities and duplications were accepted by the users.

In this research we mainly focused on how to detect all similarities, but there are numerous researches for efficient document comparison. Further research should be done to examine and compare these methods from the perspective of person profile comparison and extend our current similarity detecting algorithm.

Mobile related social networks are based on the fact that the phonebook of the mobile phone represents the social relationships of its owner. However this approach can be extended further. Nowadays when we are using an online social network we can see all kind of social network related information which are sent by our friends to us (e.g.: picture comments, notes, messages, etc.). However even if mobile phones are involved in the social network we still cannot see our telco information related to our friends. We have been invited to participate in the Social Radar research and prototyping project at Nokia Siemens Networks, where the goal is to display telco information in online social networks, considering privacy issues as well. For example Social Radar is able to detect when we have a missed call from one of our friend and highlights this information inside the social networking application to us. Future work includes to propose and examine a model for such architecture and create measurements in order to analyze the overhead of the telco network.

In Chapter 6 we discussed about efficient content sharing on mobile phones.

We have shown that feature phones have limitations when considering peer-to-peer technologies. We have given a BitTorrent algorithm that considers the limitations.

The results were also demonstrated in the MobTorrent implementation. We have shown measurements to MobTorrent memory requirements and energy consump-tion. We have shown that energy consumption of the implementation remains on a constant level. However there are ongoing research [Kelényi and Nurminen, 2009]

related to energy consumption of mobile phones while using network

communica-tion, which should be examined in order to decrease the energy consumption in MobTorrent if possible. Therefore an energy efficient communication solution is still subject of further research.

We have proposed also in Chapter 6 a hybrid architecture for efficient content sharing, which is applicable in mobile related social networks. For the content distribution we have used MobTorrent, as the goal was to support as wide range of mobile devices as possible. Measurements, related to MobTorrent performance, were encouraging. However the performance of a BitTorrent client mainly depends from the applied extensions and protocol features. Currently MobTorrent supports multitracker feature and DHT, however there are numerous additional extensions and a new BitTorrent protocol is coming soon. This way improving MobTorrent further and analyze its behavior is a continuous research.

[TRE, 2003] (2003). Nist special publication 500-255. In The Twelfth Text rE-trieval Conference (TREC 2003).

[ene, 2010] (2010). Nokia energy profiler.

[A. Berke, 2010] A. Berke, Á. Ludányi, P. E. B. F. (2010). Analyzing java me from mobile based social networks point of view (under review). Hindawi, Advances in Software Engineering Journal.

[Adamic., 2000] Adamic., L. A. (2000). Zipf, power-law, pareto - a ranking tutorial.

[Adamic and Huberman, 2002] Adamic, L. A. and Huberman, B. A. (2002). Zipf’s law and the internet. Glottometrics, 3:143–150.

[Andrade et al., 2005] Andrade, N., Mowbray, M., Lima, A., Wagner, G., and Ripeanu, M. (2005). Influences on cooperation in bittorrent communities. In Proceedings of ACM SIGCOMM workshop on Economics of peer-to-peer systems 2005.

[Android 2.0, 2010] Android 2.0 (2010). Android 2.0.

http://developer.android.com/intl/de/sdk/android-2.0-highlights.html.

[Asztalos et al., 2010a] Asztalos, M., Ekler, P., Lengyel, L., Levendovszky, T., Madari, I., and Vajk, T. (2010a). Automated formal verification of graph rewriting-based model transformations. Scientific Bulletin of Politehnica Uni-versity of Timisoara Journal, 4.

[Asztalos et al., 2010b] Asztalos, M., Ekler, P., Lengyel, L., Levendovszky, T., and Mészáros, T. (2010b). Formalizing models with abstract attribute constraints. In Proceedings of the Third International Workshop on Graph Computation Models.

[Asztalos et al., 2010c] Asztalos, M., Ekler, P., Lengyel, L., Levendovszky, T., and Mészáros, T. (2010c). Verification by declarative description of graph rewriting-based model transformations. 4th International Workshop on Multi-Paradigm Modeling, ECEASST.

[Asztalos et al., 2010d] Asztalos, M., Ekler, P., Lengyel, L., Levendovszky, T., Mészáros, T., and Mezei, G. (2010d). Automated verification by declarative description of graph rewriting-based model transformations. Electronic Com-munications of the EASST.

[Asztalos et al., 2010e] Asztalos, M., Ekler, P., Lengyel, L., Levendovszky, T., and Vajk, T. (2010e). Mcdl: A language for specifying graph conditions with at-tribute constraints. In Proceedings of Workshop on Model-Driven Engineering, Verification, and Validation.

[Bakos et al., 2005] Bakos, B., Farkas, L., and Nurminen, J. K. (2005). Phonebook search engine for mobile p2p social networks. In In Databases and Applications 2005.

[Barabási, 2002] Barabási, A.-L. (2002). Linked: How everything is connected to everything else. Perseus Publishing.

[Barabási and Albert., 1999] Barabási, A.-L. and Albert., R. (1999). Emergence and scaling in random networks. Science, 286:509–512.

[Barbera et al., 2005] Barbera, M., Lombardo, A., Schembra, G., and Tribastone, M. (2005). A markov model of a freerider in a bittorrent p2p network. In Proceedings of the Global Telecommunications Conference 2005 (GLOBECOM 2005).

[Biddle et al., 2002] Biddle, P., England, P., Peinado, M., and Willman, B. (2002).

The darknet and the future of content distribution. In Proceedings of the 2002 ACM Workshop on Digital Rights Management.

[BitTorrent 1.0, 2010] BitTorrent 1.0 (2010). Bittorrent specification.

[Blair and Maron, 1985] Blair, D. C. and Maron, M. E. (1985). An evaluation of retrieval effectiveness for a full-text document-retrieval system. In Proceedings of Communications of the ACM, 28(3), pages 289–299.

[Bollobás et al., 2001] Bollobás, B., Riordan, O., Spencer, J., and Tusnady, G.

(2001). Random structures and algorithms. IEEE Internet Computing Journal, 18:279–290.

[Boyd and Ellison, 2007] Boyd, D. M. and Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Com-munication, 13(1):article 11.

[Broder et al., 2000] Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Ra-jagopalan, S., Stata, R., Tomkins, A., and Wienere, J. (2000). Graph structure in the web. In In Proc. of the 9th international World Wide Web conference on Computer networks.

[Buckley, 2009] Buckley, C. (2009). Why current ir engines fail. Inf. Retr., 12(6):652–665.

[Carothers et al., 2006] Carothers, C. D., LaFortune, R., Smith, W. D., and Gilder, M. (2006). A case study in modeling large-scale peer-to-peer file-sharing networks using discrete-event simulation. InProceedings of the 2006 European of Modeling and Simulation Symposium which is part of the I3M Multiconference.

[Chakrabarti et al., 2008] Chakrabarti, Deepayan, Agarwal, Deepak, Josifovski, and Vanja (2008). Contextual advertising by combining relevance with click feedback. In WWW ’08: Proceeding of the 17th international conference on World Wide Web, pages 417–426, New York, NY, USA. ACM.

[Cheng and Lin, 2006] Cheng, A.-T. and Lin, M.-S. (2006). Method for synchro-nizing two sets of contact data of two storage media in a communications system.

[Clarke et al., 2002] Clarke, I., Miller, S. G., Hong, T. W., Sandberg, O., and Wiley, B. (2002). Protecting free expression online with freenet. IEEE Internet Computing, 6:40–49.

[Crovella et al., 1998] Crovella, M. E., Taqqu, M. S., and Bestavros, A. (1998).

Heavy-tailed probability distributions in the world wide web. In: R. J. Adler, R. E. Feldman, M. S. Taqqu (eds.), A Practical Guide To Heavy Tails 1., pages 3–26.

[Eagle and Pentland, 2005] Eagle, N. and Pentland, A. (2005). Social serendipity:

Mobilizing social software. IEEE Pervasive Computing, 4:28–34.

[Ekler, 2008] Ekler, P. (2008). Ambiguity handling in mobile-capable social net-works. In Proceedings of Automation and Applied Computer Science Workshop (AACS 2008), Budapest, Hungary.

[Ekler, 2009] Ekler, P. (2009). Mobile Peer to Peer A Tutorial Guide, chapter Developing Java games on Symbian OS-based mobile devices (F. H. P. Fitzek and H. Charaf), pages 223–252. Number ISBN 978-0-470-69992-8. Wiley.

[Ekler and Asztalos, 2010] Ekler, P. and Asztalos, M. (2010). Performance analy-sis of maintaining mobile-based social network models (under review). WSEAS Transactions on Computers Journal.

[Ekler and Charaf, 2007] Ekler, P. and Charaf, H. (2007). Developing of network mobile application. In Proceedings of Microcad International Conference 2007, Miskolc, Hungary.

[Ekler and Charaf, 2008a] Ekler, P. and Charaf, H. (2008a). Analyzing the concept of involving low end devices in a cooperative network. In Proceedings of 43th IEEE International Conference on Communications (ICC 2008), Beijing, China.

[Ekler and Charaf, 2008b] Ekler, P. and Charaf, H. (2008b). Building motion and noise detector networks from mobile phones. In Proceedings of 9th Interna-tional Symposium of Hungarian Researchers on ComputaInterna-tional Intelligence and Informatics (CINTI 2008), Budapest, Hungary.

[Ekler and Charaf, 2008c] Ekler, P. and Charaf, H. (2008c). Investigating the role of mobile devices in social networks. In Proceedings of Microcad International Conference 2008, Miskolc, Hungary.

[Ekler and Charaf, 2009] Ekler, P. and Charaf, H. (2009). Mobile motion and noise detector application with network support. InProceedings of JavaOne 2009, San Francisco, USA.

[Ekler et al., 2007] Ekler, P., Csúcs, G., Kelényi, I., and Kereskenyi, R. (2007).

Alkalmazásfejlesztes modern mobilkeszülekekre. Magyar Távközles, 4.

[Ekler et al., 2008a] Ekler, P., Dévai, I., Kiss, A., and Bakos, B. (2008a). Bittor-rent based solution for efficient content sharing on next generation networks.

In Proceedings of 4th EURO-NGI Conference on Next Generation Internet Net-works (NGI 2008), Krakow, Poland.

[Ekler et al., 2009a] Ekler, P., Ivánfi, Z., and Aczél, K. (2009a). Similarity man-agement in phonebook-centric social networks. In Proceedings of 4th Interna-tional Conference on Internet and Web Applications and Services (ICIW 2009), Venice, Italy.

[Ekler et al., 2008b] Ekler, P., Kelényi, I., and Charaf, H. (2008b). Bittorrent at mobile phones (poster). In Demo Session of 5th IEEE Consumer Communica-tions and Networking Conference (CCNC 2008), Las Vegas, USA.

[Ekler et al., 2009b] Ekler, P., Kelényi, I., Dévai, I., Bakos, B., and Kiss, A.

(2009b). Efficient mobile content sharing with local cooperation support. Jour-nal of Networks, 2:119–132. ISSN: 1796-2056.

[Ekler and Ludányi, 2009] Ekler, P. and Ludányi, A. (2009). Mobtorrent 1.10.

[Ekler and Lukovszki, 2009a] Ekler, P. and Lukovszki, T. (2009a). Calculating the total number of similarities in phonebook-centric social networks. In Pro-ceedings of Automation and Applied Computer Science Workshop (AACS 2009), Budapest, Hungary.

[Ekler and Lukovszki, 2009b] Ekler, P. and Lukovszki, T. (2009b). Learning meth-ods for similarity handling in phonebook-centric social networks. In Proceedings of 10th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics (CINTI 2009), Budapest, Hungary.

[Ekler and Lukovszki, 2009c] Ekler, P. and Lukovszki, T. (2009c). Similarity dis-tribution in phonebook-centric social networks. In Proceedings of 5th Inter-national Conference on Wireless and Mobile Communications (ICWMC 2009), Cannes, France.

[Ekler and Lukovszki, 2010a] Ekler, P. and Lukovszki, T. (2010a). The accuracy of power law based similarity model in phonebook-centric social networks (under review). In Proceedings of 6th International Conference on Wireless and Mobile Communications (ICWMC 2010), Valencia, Spain.

[Ekler and Lukovszki, 2010b] Ekler, P. and Lukovszki, T. (2010b). The accuracy of similarity calculation of phonebook-centric social networks. In Proceedings of International Carpathian Control Conference (ICCC 2010), Eger, Hungary.

[Ekler and Lukovszki, 2010c] Ekler, P. and Lukovszki, T. (2010c). Experiences with network coding in mobile bittorrent environment. InProceedings of Micro-cad International Conference 2010, Miskolc, Hungary.

[Ekler and Lukovszki, 2010d] Ekler, P. and Lukovszki, T. (2010d). Experiences with phonebook-centric social networks. In Proceedings of 7th IEEE Consumer Communications and Networking Conference (CCNC 2010), Las Vegas, USA.

[Ekler and Lukovszki, 2010e] Ekler, P. and Lukovszki, T. (2010e). Modelling the variance of power law distrbution considering phonebook-centric social networks.

In Proceedings of Automation and Applied Computer Science Workshop (AACS 2010), Budapest, Hungary.

[Ekler and Lukovszki, 2010f] Ekler, P. and Lukovszki, T. (2010f). Phonebook-centric social networks – dealing with similarities (under review). Publicationes Mathematicae. ISSN: 0033-3883.

[Ekler and Lukovszki, 2011] Ekler, P. and Lukovszki, T. (2011). Extending mobile bittorrent environment with network coding (under review). InIEEE Consumer Communications and Networking Conference (CCNC 2011).

[Ekler et al., 2010a] Ekler, P., Lukovszki, T., and Charaf, H. (2010a). Dimension-ing mobile based social networks considerDimension-ing similarity detection (under review).

Periodica Polytechnica.

[Ekler et al., 2010b] Ekler, P., Lukovszki, T., and Charaf, H. (2010b). Evaluating dynamically evolving mobile-based social networks. Acta Cybernetica Journal.

[Ekler et al., 2011] Ekler, P., Lukovszki, T., and Charaf, H. (2011). Dimensioning mobile based social networks considering similarity detection (under review). In IEEE Consumer Communications and Networking Conference (CCNC 2011), SECCCA Workshop.

[Ekler et al., 2008c] Ekler, P., Nurminen, J. K., and Kiss, A. (2008c). Experi-ences of implementing bittorrent on java me platform. In Proceedings of 5th IEEE Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, USA.

[Ekler and Pszota, 2007] Ekler, P. and Pszota, Z. (2007). Controlling access to bit-torrent content from mobile devices. In Proceedings of Automation and Applied Computer Science Workshop (AACS 2007), Budapest, Hungary.

[Ekler and Zavarkó, 2009] Ekler, P. and Zavarkó, G. (2009).Mobile Peer to Peer A Tutorial Guide (F. H. P. Fitzek and H. Charaf ), chapter Using Location-based Services on Mobile Phones, pages 191–222. Number ISBN 978-0-470-69992-8.

Wiley.

[Ekler et al., 2009c] Ekler, P., Zavarkó, G., and Forstner, B. (2009c). Mobile Peer to Peer A Tutorial Guide (F. H. P. Fitzek and H. Charaf ), chapter Developing Network Capable Mobile Applications, pages 81–100. Number ISBN 978-0-470-69992-8. Wiley.

[Erdődy-Nagy and Ekler, 2010] Erdődy-Nagy, Z. and Ekler, P. (2010). Efficient content sharing on android platform. In Proceedings of Microcad International Conference 2010, Miskolc, Hungary.

[Erlang, 1909] Erlang, A. K. (1909). The theory of probabilities and telephone conversations. Nyt Tidsskrift for Matematik, 20.

[Fabrikant et al., 2002] Fabrikant, A., Koutsoupias, E., and Papadimitriou, C. H.

(2002). Heuristically optimized trade-offs: A new paradigm for power laws in the internet. In Proceedings of the 29th International Colloquium on Automata, Languages and Programming (ICALP), pages 110–122.

[Facebook statistics, 2010] Facebook statistics (2010). Facebook statistics.

http://www.facebook.com/press/info.php?statistics.

[Fitzek and Marcos, 2007] Fitzek, F. H. and Marcos, K. D. (2007).Cognitive Wire-less Networks. Number ISBN 978-1-4020-5978-0. Springer.

[Forstner et al., 2008] Forstner, B., Ekler, P., and Kelényi, I. (2008). Bevezetés a mobilprogramozásba. Number ISBN 978-9-639-863019. Budapest, Szak Kiadó.

[Forstner and Kelényi, 2009] Forstner, B. and Kelényi, I. (2009). Mobile Peer to Peer A Tutorial Guide, chapter Mobile Social networking - Beyond the Hype, pages 161–190. Number ISBN 978-0-470-69992-8. Wiley.

[Foster, 1953] Foster, F. G. (1953). On the stochastic matrices associated with certain queueing processes. Annals of Mathematical Statistics, pages 355–360.

[Galuba et al., 2010] Galuba, W., Aberer, K., Despotovic, Z., and Kellerer, W.

(2010). Leveraging social networks for increased bittorrent robustness. In Pro-ceedings of 7th IEEE Consumer Communications and Networking Conference (CCNC 2010), Las Vegas, USA.

[Gordon, 1997] Gordon, M. (1997). It is 10 a.m. do you know where your docu-ments are? Information Processing and Management, 33:107–121.

[Grossman and Frieder, 2004] Grossman, D. A. and Frieder, O. (2004). Informa-tion Retrieval: Algorithms and Heuristics. Number ISBN 978-1-4020-3004-8.

Springer.

[Guo et al., 2005] Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., and Zhang, X.

(2005). Measurements, analysis, and modeling of bittorrent-like systems. In Proceedings of The ACM/SIGCOMM Internet Measurement Conference (IMC 2005).

[I. Kelényi, 2007] I. Kelényi, G. Csúús, B. F. H. C. (2007).Mobile Phone Program-ming: Application to Wireless Networks (F. Fitzek, F. Reichert Eds.), chapter Peer-to-Peer File Sharing for Mobile Devices. Number ISBN 978-1-4020-5968-1.

Springer.

[Internet traffic, 2010] Internet traffic (2010). 2008 global broadband phenomena, sandvine.

[Izal et al., 2004] Izal, M., Urvoy-Keller, G., Biersack, E. W., Felber, P. A., Al Hamra, A., and Garcés-Erice, L. (2004). Dissecting bittorrent: Five months in a torrent’s lifetime. Passive and Active Network Measurement, pages 1–11.

[Julianna et al., 2007] Julianna, M. W., Ryszard, K., Albena, R., Bruce, J., and Henry, T. (2007). Opensocial: from social networks to social ecosystem. In Proceedings of the Inaugural IEEE-IES Digital EcoSystems and Technologies Conference (DEST 07), pages 361–366.

[Kantor, 1994] Kantor, P. (1994). Information retrieval techniques. Learned In-formation Innc., 29:53–90.

[Karonen and Nurminen, 2008] Karonen, O. and Nurminen, J. (2008). Coopera-tion incentives and enablers for wireless peers in heterogeneous networks. In Proceedings of 43th IEEE International Conference on Communications (ICC 2008).

[Kelényi and Molnár, 2007] Kelényi, I. and Molnár, B. (2007). Symella 1.40.

[Kelényi and Nurminen, 2009] Kelényi, I. and Nurminen, J. K. (2009). Energy-efficient peer-to-peer content sharing using application-level traffic sharing. In 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2009), Tenerife, Spain.

[Kelényi et al., 2008] Kelényi, I., Ekler, P., and Forstner, B. (2008). Mobile bit-torrent technology. In Proceedings of Microcad International Conference 2008, Miskolc, Hungary.

[Kelényi et al., 2010] Kelényi, I., Nurminen, J. K., and Ekler, P. (2010). Modelling and simulation of energy efficient mobile content sharing based on bittorrent.

In Proceedings of International Carpathian Control Conference (ICCC 2010), Eger, Hungary.

[Kendall, 1953] Kendall, D. (1953). Stochastic processes occurring in the theory of queues and their analysis by the method of the imbedded markov chain. Annals of Mathematical Statistics, 24:338–354.

[Kleinrock, 1975] Kleinrock, L. (1975).Qeueing Systems. Volume 1: Theory, pages 94-101. Number ISBN-13 978-0471491101. Wiley-Interscience.

[Kulbak and Bickson, 2010] Kulbak, Y. and Bickson, D. (2010). The emule pro-tocol specification.

[Kumar et al., 2006] Kumar, R., Novak, J., and Tomkinse, A. (2006). Structure and evolution of online social networks. In In KDD 2006.

[Levendovszki et al., 2009] Levendovszki, T., Mészáros, T., Ekler, P., and Aszta-los, M. (2009). Dsml-aided developement for mobile p2p systems. InProceedings of 9th OOPSLA Workshop on Domain specific modeling, Orlando, USA.

[Li and Dabek, 2006] Li, J. and Dabek, F. (2006). F2f: Reliable storage in open networks. In Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006).

[Li et al., 2007] Li, M., Yu, J., and Wu, J. (2007). Free-riding on bittorrent-like peer-to-peer file sharing systems: Modeling analysis and improvement. In Proceedings of International Conference on Parallel Processing Workshops 2007 (ICPPW 2007).

[Locher et al., 2006] Locher, T., Moor, P., Schmid, S., and Wattenhofer, R. (2006).

Free riding in bittorrent is cheap. In In HotNets.

[Ludányi and Ekler, 2010] Ludányi, . and Ekler, P. (2010). Bringing distributed hash table technology to mainstream mobile phones. In Proceedings of Microcad International Conference 2010, Miskolc, Hungary.

[Maemo Synchronization Support, 2010] Maemo Synchronization Support (2010).

Maemo synchronization support. http://wiki.maemo.org/sync.

[Mislove et al., 2007] Mislove, A., Marcon, M., Gummadi, P. K., Druschel, P., and Bhattacharjee, B. (2007). Measurement and analysis of online social networks. In Proceedings of the 5th ACM/USENIX Internet Measurement Conference (IMC 2007).

[Mitzenmacher, 2001] Mitzenmacher, M. (2001). A brief history of generative mod-els for power law and lognormal distributions. Internet Mathematics, 1:225–251.

[Nazir et al., ] Nazir, A., Raza, S., and nee Chuah, C. Unveiling facebook: A measurement study of social network based applications.

[Newman et al., 2002] Newman, M. E. J., Watts, D. J., and Strogatz, S. H. (2002).

Random graph models of social networks. Proc. Natl. Acad. Sci. USA, 99:2566–

2572.

[Nurminen and Noyranen, 2008] Nurminen, J. and Noyranen, J. (2008). Energy consumption in mobile peer to peer quantitative results from file sharing. In Proceedings of 5th IEEE Consumer Communications and Networking Confer-ence (CCNC 2008).

[Pareto, 1896] Pareto, V. (1896). Course d’economie politique professé a l’université de lausanne. 3.

[Plaxo, 2010] Plaxo (2010). Plaxo social networking application.

http://www.plaxo.com.

[Pouwelse et al., 2008] Pouwelse, J., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, D., Reinders, M., van Steen, M., and Sips, H. (2008). Tribler:

a socialbased peer-to-peer system. Concurrency and Computation, 20:127.

[Pouwelse et al., 2007] Pouwelse, J. A., Garbacki, P., Epema, D., and Sips, H. J.

(2007). The bittorrent p2p file-sharing system: Measurements and analysis. In Proceedings of 4th Int. Workshop on Peer-To-Peer Systems 2007.

[Rice, 1995] Rice, J. A. (1995). Mathematical Statistics and Data Analysis (Second ed.). Number ISBN 0-534-20934-3. Duxbury Press.

[Ripeanu et al., 2002] Ripeanu, M., Foster, I., and Iamnitch, A. (2002). Mapping the gnutella network: Properties of large-scale peer-to-peer systems and impli-cations for system design. IEEE Internet Computing Journal, 6:50–57.

[Rogers and Bhatti, 2007] Rogers, M. and Bhatti, S. (2007). How to disappear completely: A survey of private peer-to-peer networks. In SPACE.

[Sandberg, 2006] Sandberg, O. (2006). Distributed routing in small-world net-works. In Proceedings of the Eighth Workshop on Algorithm Engineering and Experiments.

[Sirivianos et al., 2007] Sirivianos, M., Han, J., Rex, P., and Yang, C. X. (2007).

Free-riding in bittorrent networks with the large view exploit. In In IPTPS 2007.

[Tomiyasu et al., 2006] Tomiyasu, T. H. H., Maekawa, T., and Nishio, S. (2006).

Profile-based query routing in a mobile social network. InProceedings of Mobile Data Management (MDM 2006).

[Top Sites, 2010] Top Sites (2010). The top 500 sites on the web.

http://www.alexa.com/topsites.

[Walters and H., 2009] Walters and H., W. (2009). Google scholar search perfor-mance: Comparative recall and precision libraries and the academy - volume 9, number 1, january 2009. Libraries and the Academy, 9(1).

[Watts and Dodds, 2002] Watts, M. E. J. N. D. J. and Dodds, P. S. (2002). Iden-tity and search in social networks. In Science.

[Xing, 2010] Xing (2010). Xing social networking application.

http://www.xing.com.

[Yule, 1944] Yule, G. U. (1944). Statistical study of literary vocabulary. In Cam-bridge University Press.

[Zipf, 1935] Zipf, G. K. (1935). The psycho-biology of language. an introduction to dynamic philology. In Houghton Mifflin.

[Zipf, 1949] Zipf, G. K. (1949). Human behavior and the principle of least effort.

Addison-Wesle.