Sciweavers

228 search results - page 5 / 46
» p2p 2005
Sort
View
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
13 years 11 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
P2P
2005
IEEE
137views Communications» more  P2P 2005»
13 years 11 months ago
The Essence of P2P: A Reference Architecture for Overlay Networks
The success of the P2P idea has created a huge diversity of approaches, among which overlay networks, for example, Gnutella, Kazaa, Chord, Pastry, Tapestry, P-Grid, or DKS, have r...
Karl Aberer, Luc Onana Alima, Ali Ghodsi, Sarunas ...
PDCAT
2005
Springer
13 years 11 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
INFOCOM
2005
IEEE
13 years 11 months ago
SCOPE: scalable consistency maintenance in structured P2P systems
— While current Peer-to-Peer (P2P) systems facilitate static file sharing, newly-developed applications demand that P2P systems be able to manage dynamically-changing files. Ma...
Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang
DBISP2P
2005
Springer
91views Database» more  DBISP2P 2005»
13 years 11 months ago
A Semantic Information Retrieval Advertisement and Policy Based System for a P2P Network
Abstract. In this paper we propose a semantic based P2P system that incorporates peer sharing policies, which allow a peer to state, for each of the concepts it deals with, the con...
Giovanna Guerrini, Viviana Mascardi, Marco Mesiti