Sciweavers

147 search results - page 2 / 30
» Propagation Model of Active Worms in P2P Networks
Sort
View
INFOSCALE
2006
ACM
13 years 10 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
INFOCOM
2006
IEEE
13 years 10 months ago
"Take One Get One Free": Leveraging P2P Networks for Content Promotion
— The nature of digital content is undergoing a radical transformation due to the growing infusion of user-generated content. Users that generate content have a strong motivation...
Himabindu Pucha, Sabyasachi Roy, Y. Charlie Hu
TKDE
2010
272views more  TKDE 2010»
13 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
PERCOM
2008
ACM
14 years 4 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
DEXA
2007
Springer
135views Database» more  DEXA 2007»
13 years 11 months ago
Semantic Grouping of Social Networks in P2P Database Settings
Abstract. Sharing of structured data in decentralized environments is a challenging problem, especially in the absence of a global schema. Social network structures map network lin...
Verena Kantere, Dimitrios Tsoumakos, Timos K. Sell...