C. Amza, A. L. Cox, S. Dwarkadas, P. Keleher, H. Lu et al., TreadMarks: shared memory computing on networks of workstations, Computer, vol.29, issue.2, pp.18-28, 1996.
DOI : 10.1109/2.485843

K. Anderson, Analysis of the traffic on the Gnutella network, pp.2-2, 2001.

G. Antoniu, L. Bougé, and S. Lacour, Making a DSM consistency protocol hierarchy-aware: an efficient synchronization scheme, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings., pp.516-523, 2003.
DOI : 10.1109/CCGRID.2003.1199409

URL : https://hal.archives-ouvertes.fr/inria-00447935

A. Bassi, M. Beck, G. Fagg, T. Moore, J. Plank et al., The Internet Backplane Protocol: A study in resource sharing, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid2002), pp.194-201, 2002.

J. Bester, I. Foster, C. Kesselman, J. Tedesco, and S. Tuecke, GASS, Proceedings of the sixth workshop on I/O in parallel and distributed systems , IOPADS '99, pp.77-88, 1999.
DOI : 10.1145/301816.301839

S. Botros and S. Waterhouse, Search in JXTA and other distributed networks, Proceedings First International Conference on Peer-to-Peer Computing, pp.30-35, 2001.
DOI : 10.1109/P2P.2001.990421

D. Brookshier, D. Govoni, and N. Krishnan, JXTA: Java P2P Programming, 2002.

E. Caron, F. Desprez, F. Lombard, J. Nicod, M. Quinson et al., A Scalable Approach to Network Enabled Servers, Proceedings of the 8th International Euro-Par Conference, p.47
DOI : 10.1007/3-540-45706-2_128

URL : https://hal.archives-ouvertes.fr/inria-00072087

N. Carriero, D. Gelernter, T. Mattson, and A. Sherman, The Linda alternative to message-passing systems, Parallel Computing, vol.20, issue.4, pp.633-655, 1994.
DOI : 10.1016/0167-8191(94)90032-9

J. B. Carter, J. K. Bennett, and W. Zwaenepoel, Implementation and performance of munin, 13th ACM Symposium on Operating Systems Principles (SOSP), pp.152-164, 1991.

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, 5th Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.
DOI : 10.1145/844128.844156

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870

S. Chapin, D. Katramatos, J. Karpovich, and A. Grimshaw, The Legion Resource Management System, 5th Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP '99), pp.162-178, 1999.
DOI : 10.1007/3-540-47954-6_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.3400

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability , number 2009 in Lecture Notes in Computer Science, pp.46-66, 2000.
DOI : 10.1007/3-540-44702-4_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919

P. Corbett, D. Feitelson, S. Fineberg, Y. Hsu, B. Nitzberg et al., Overview of the MPI-IO Parallel I/O Interface, High Performance Mass Storage and Parallel I/O: Technologies and Applications, pp.477-487, 2001.
DOI : 10.1007/978-1-4613-1401-1_5

F. Dabek, F. Kaashoek, D. Karger, R. Morris, and I. Stoica, Wide-area cooperative storage with CFS, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), pp.202-215, 2001.
DOI : 10.1145/502059.502054

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.41

F. Dabek, B. Zhao, P. Druschel, and I. Stoica, Towards a Common API for Structured Peer-to-Peer Overlays, 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), 2003.
DOI : 10.1007/978-3-540-45172-3_3

N. Desai and F. Mueller, A log(n) multi-mode locking protocol for distributed systems, Proceedings International Parallel and Distributed Processing Symposium, p.4, 2003.
DOI : 10.1109/IPDPS.2003.1213077

I. Foster and A. Iamnitchi, On death, taxes, and the convergence on peer-topeer and grid computing, 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), 2003.

I. Foster and C. Kesselman, Globus: a Metacomputing Infrastructure Toolkit, International Journal of High Performance Computing Applications, vol.11, issue.2, pp.115-128, 1997.
DOI : 10.1177/109434209701100205

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.8254

I. Foster, C. Kesselman, and S. Tuecke, The anatomy of the grid: Enabling scalable virtual organizations, pp.200-222, 2001.

P. Fraigniaud and P. Gauron, An overview of the content-addressable network D2B, 2003.

L. Garces-erce, E. Biersack, P. Felber, K. W. Ross, and G. Urvoy-keller, Hierarchical peer-to-peer systems, 2003.

K. Gharachorloo, D. Lenoski, J. Laudon, P. Gibbons, A. Gupta et al., Memory consistency and event ordering in scalable sharedmemory multiprocessors, 17th International Symposium Computer Architecture (ISCA 1990), pp.15-26, 1990.
DOI : 10.1145/325096.325102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.8112

L. Iftode, Home-based Shared Virtual Memory, Thèse de Ph.D, 1998.

F. Kaashoek and D. R. Karger, Koorde: A Simple Degree-Optimal Distributed Hash Table, 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), 2003.
DOI : 10.1007/978-3-540-45172-3_9

J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels et al., OceanStore: An architecture for global-scale persistent storage, Proceedings of the 9th International Conference on Architecture Support for Programming Languages and Operating Systems number 2218 in Lecture Notes in Computer Science, pp.190-201, 2000.

H. T. Kung and C. Wu, Hierarchical peer-to-peer networks, 2001.

L. Lamport, How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs, IEEE Transactions on Computers, vol.28, issue.9, pp.28690-691, 1979.
DOI : 10.1109/TC.1979.1675439

S. Li, Early Adopter JXTA: Peer-to-Peer Computing with Java, 2002.

S. Dejan, V. Milojicic, R. Kalogeraki, K. Lukose, J. Nagaraja et al., Peer-to-peer computing, pp.2002-57, 2002.

D. Molnar, R. Dingledine, and M. J. Freedman, The Free Haven project: Distributed anonymous storage service, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, number 2009 in Lecture Notes in Computer Science, pp.67-95, 2000.

A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen, Ivy, 5th Symposium on Operating Systems Design and Implementation (OSDI '02), 2002.
DOI : 10.1145/844128.844132

A. Oram and . Gnutella, chapter 8 in Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp.94-122, 2001.

A. Oram, Performance, chapter 14 in Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp.203-241, 2001.

J. Plank, M. Beck, W. Elwasif, T. Moore, M. Swany et al., The Internet Backplane Protocol: Storage in the network, Network Storage Symposium (NetStore '99), 1999.

C. , G. Plaxton, R. Rajaraman, and A. W. Richa, Accessing nearby copies of replicated objects in a distributed environment, Proceedings of the 9th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA '97), pp.311-320, 1997.

S. Ratnasamy, S. Shenker, and I. Stoica, Routing Algorithms for DHTs: Some Open Questions, 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), number 2429 in Lecture Notes in Computer Science, pp.45-52, 2002.
DOI : 10.1007/3-540-45748-8_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.6554

I. T. Antony, P. Rowstron, and . Druschel, Pastry: Scalable, decentralized object location , and routing for large-scale peer-to-peer systems, Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, pp.329-350, 2001.

I. T. Antony, P. Rowstron, and . Druschel, Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), pp.188-201, 2001.

I. Foster, S. Vazhkudai, and S. Tuecke, Replica selection in the globus data grid, 1st IEEE/ACM International Conference on Cluster Computing and the Grid (CCGrid2001), pp.106-113, 2001.

J. Seigneur, JXTA pipes performance, 2002.

K. Shin, S. Lee, G. Lim, H. Yoon, and J. Ma, Grapes: Topology-based hierarchical virtual network for peer-to-peer lookup services, 2002 International Conference on Parallel Processing Workshops (ICPPW'02), pp.159-166, 2002.

C. Shirky, What is P2P, 2000.

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), number 2429 in ? 50 ? BIBLIOGRAPHIE Lecture Notes in Computer Science, pp.261-269, 2002.
DOI : 10.1007/3-540-45748-8_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.7175

I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM 2001 conference on applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001.

J. Ben-yanbin-zhao, A. Kubiatowicz, and . Joseph, Tapestry: An infrastructure for fault-tolerant wide-area location and routing, 2001.

Y. Zhou, L. Iftode, and K. Li, Performance evaluation of two home-based lazy release consistency protocols for shared memory virtual memory systems, 2nd Symposium on Operating Systems Design and Implementation (OSDI'96), pp.75-88, 1996.