Sciweavers

P2P
2008
IEEE
120views Communications» more  P2P 2008»
13 years 10 months ago
Failure-Tolerant Overlay Trees for Large-Scale Dynamic Networks
Trees are fundamental structures for data dissemination in large-scale network scenarios. However, their inherent fragility has led researchers to rely on more redundant mesh topo...
Davide Frey, Amy L. Murphy
P2P
2008
IEEE
13 years 10 months ago
Query Workload Driven Summarization for P2P Query Routing
Linh Thai Nguyen, Wai Gen Yee, Ophir Frieder
P2P
2008
IEEE
109views Communications» more  P2P 2008»
13 years 10 months ago
LiveShift: Peer-to-Peer Live Streaming with Distributed Time-Shifting
Fabio Victora Hecht, Thomas Bocek, Cristian Morari...
P2P
2008
IEEE
122views Communications» more  P2P 2008»
13 years 10 months ago
CYBER: A CommunitY-Based sEaRch engine
Yingguang Li, Lidan Shou, Kian-Lee Tan
P2P
2008
IEEE
137views Communications» more  P2P 2008»
13 years 10 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
P2P
2008
IEEE
135views Communications» more  P2P 2008»
13 years 10 months ago
Popularity-Aware Prefetch in P2P Range Caching
Unstructured peer-to-peer infrastructure has been widely employed to support large-scale distributed applications. Many of these applications, such as locationbased services and m...
Qiang Wang, Khuzaima Daudjee, M. Tamer Özsu
P2P
2008
IEEE
184views Communications» more  P2P 2008»
13 years 10 months ago
Ad Hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Hasan Guclu, Durgesh Kumari, Murat Yuksel
P2P
2008
IEEE
13 years 10 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
P2P
2008
IEEE
13 years 10 months ago
Playing with the Bandwidth Conservation Law
We investigate performance bounds of P2P systems by application of the law of bandwidth conservation. This approach is quite general and allows us to consider various sharing syst...
Farid Benbadis, Fabien Mathieu, Nidhi Hegde, Diego...
P2P
2008
IEEE
13 years 10 months ago
Peer-to-Peer Traffic in Operator Networks
Ayodele Damola, Victor Souza, Per Karlsson, Howard...