Sciweavers

1630 search results - page 4 / 326
» Secure Overlay Network Design
Sort
View
NETWORKING
2007
13 years 7 months ago
Optimal Topology Design for Overlay Networks
Abstract. The topology creation is one of the most important step for the design of an overlay network. Traffic characteristic and volume, and behavior of nodes which can be sel...
Mina Kamel, Caterina M. Scoglio, Todd Easton
SIGOPSE
2004
ACM
13 years 11 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
SKG
2006
IEEE
13 years 11 months ago
Identifying Community Structure in Semantic Peer-to-Peer Networks
The research community has turned to create Semantic Overlay Networks for information retrieval in large scale peer-to-peer networks. Much research work in semantic overlay protoc...
Hanhua Chen, Hai Jin
SP
2002
IEEE
13 years 5 months ago
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
EURONGI
2006
Springer
13 years 9 months ago
The Challenges of Merging Two Similar Structured Overlays: A Tale of Two Networks
Structured overlay networks is an important and interesting primitive that can be used by diverse peer-to-peer applications. Multiple overlays can result either because of network ...
Anwitaman Datta, Karl Aberer