Sciweavers

53 search results - page 10 / 11
» Incentives for large peer-to-peer systems
Sort
View
SIGCOMM
2009
ACM
14 years 1 days ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber
INFOCOM
2009
IEEE
14 years 5 days ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
13 years 10 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
FMN
2009
Springer
99views Multimedia» more  FMN 2009»
14 years 3 days ago
Interest-Based Peer-to-Peer Group Management
Abstract. Peer-to-Peer systems become popular applications but suffer from insufficient resource availability which is caused by free-riders and inefficient lookup algorithms. To a...
Jun Lei, Xiaoming Fu
ISCA
2007
IEEE
171views Hardware» more  ISCA 2007»
13 years 11 months ago
Power provisioning for a warehouse-sized computer
Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilit...
Xiaobo Fan, Wolf-Dietrich Weber, Luiz André...