Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
IPTPS
2004
Springer
11 years 12 months ago
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks
We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or l...
Antonio Nicolosi, David Mazières
IPTPS
2004
Springer
11 years 12 months ago
Know Thy Neighbor's Neighbor: Better Routing for Skip-Graphs and Small Worlds
We investigate an approach for routing in p2p networks called neighbor-of-neighbor greedy. We show that this approach may reduce significantly the number of hops used, when routi...
Moni Naor, Udi Wieder
IPTPS
2004
Springer
11 years 12 months ago
Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays
Structured peer-to-peer (p2p) overlay networks provide a decentralized, self-organizing substrate for distributed applicad support powerful abstractions such as distributed hash t...
Alan Mislove, Peter Druschel
IPTPS
2004
Springer
11 years 12 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
IPTPS
2004
Springer
11 years 12 months ago
The Case for a Hybrid P2P Search Infrastructure
Popular P2P file-sharing systems like Gnutella and Kazaa use unstructured network designs. These networks typically adopt flooding-based search techniques to locate files. Whil...
Boon Thau Loo, Ryan Huebsch, Ion Stoica, Joseph M....
IPTPS
2004
Springer
11 years 12 months ago
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet
— Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distr...
Virginia Mary Lo, Daniel Zappala, Dayi Zhou, Yuhon...
IPTPS
2004
Springer
11 years 12 months ago
A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems
— Mutual exclusion is one of the well-studied fundamental primitives in distributed systems. However, the emerging P2P systems bring forward several challenges that can’t be co...
Shiding Lin, Qiao Lian, Ming Chen, Zheng Zhang
IPTPS
2004
Springer
11 years 12 months ago
Comparing the Performance of Distributed Hash Tables Under Churn
A protocol for a distributed hash table (DHT) incurs communication costs to keep up with churn—changes in membership—in order to maintain its ability to route lookups efficie...
Jinyang Li, Jeremy Stribling, Thomer M. Gil, Rober...
IPTPS
2004
Springer
11 years 12 months ago
Spurring Adoption of DHTs with OpenHash, a Public DHT Service
Brad Karp, Sylvia Ratnasamy, Sean C. Rhea, Scott S...
IPTPS
2004
Springer
11 years 12 months ago
Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks
In most of the P2P systems developed so far, all nodes play essentially the same role. In some applications, however, different machine capabilities or owner preferences may mean ...
David R. Karger, Matthias Ruhl
books