Sciweavers

23 search results - page 3 / 5
» Token-Based Accounting for P2P-Systems
Sort
View
IPPS
2008
IEEE
14 years 12 days ago
On the need for query-centric unstructured peer-to-peer overlays
—Hybrid P2P systems rely on the assumption that sufficient objects exist nearby in order to make the unstructured search component efficient. This availability depends on the o...
William Acosta, Surendar Chandra
P2P
2003
IEEE
110views Communications» more  P2P 2003»
13 years 11 months ago
The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems
In this paper, we take an availability-centric view on quality of service (QoS) and propose a model and mechanisms for studying the effectiveness of realistic replication schemes ...
Giwon On, Jens Schmitt, Ralf Steinmetz
IPPS
2010
IEEE
13 years 3 months ago
Modeling and analyzing the effects of firewalls and NATs in P2P swarming systems
Many P2P systems have been designed without taking into account an important factor: a large fraction of Internet users nowadays are located behind a network address translator (NA...
Lucia D'Acunto, Michel Meulpolder, Rameez Rahman, ...
PE
2007
Springer
114views Optimization» more  PE 2007»
13 years 5 months ago
Performance analysis of BitTorrent-like systems with heterogeneous users
Among all peer-to-peer (P2P) systems, BitTorrent seems to be the most prevalent one. This success has drawn a great deal of research interest on the system. In particular, there h...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 11 days ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith