Sciweavers

52 search results - page 10 / 11
» On the Social Cost of Distributed Selfish Content Replicatio...
Sort
View
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
13 years 10 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
IPPS
2007
IEEE
13 years 11 months ago
Locality-Aware Consistency Maintenance for Heterogeneous P2P Systems
Replication and caching have been deployed widely in current P2P systems. In update-allowed P2P systems, a consistency maintenance mechanism is strongly demanded. Several solution...
Zhenyu Li, Gaogang Xie, Zhongcheng Li
ICDCS
2008
IEEE
13 years 11 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
PPOPP
2010
ACM
14 years 2 months ago
A distributed placement service for graph-structured and tree-structured data
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
Gregory Buehrer, Srinivasan Parthasarathy, Shirish...
SIGMOD
2011
ACM
241views Database» more  SIGMOD 2011»
12 years 8 months ago
Neighborhood based fast graph search in large networks
Complex social and information network search becomes important with a variety of applications. In the core of these applications, lies a common and critical problem: Given a labe...
Arijit Khan, Nan Li, Xifeng Yan, Ziyu Guan, Supriy...