Sciweavers

P2P
2007
IEEE
132views Communications» more  P2P 2007»
13 years 10 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
P2P
2007
IEEE
186views Communications» more  P2P 2007»
13 years 10 months ago
A P2PSIP Demonstrator Powered by OverSim
Ingmar Baumgart, Bernhard Heep, Stephan Krause
P2P
2007
IEEE
153views Communications» more  P2P 2007»
13 years 10 months ago
On Routing in Distributed Hash Tables
There have been many proposals for constructing routing tables for Distributed Hash Tables (DHT). They can be classified into two groups: A) those that assume that the peers are ...
Fabius Klemm, Sarunas Girdzijauskas, Jean-Yves Le ...
P2P
2007
IEEE
146views Communications» more  P2P 2007»
13 years 10 months ago
Modelling Real P2P Networks: The Effect of Altruism
We develop a model of the interaction of rational peers in an incentive-free Peer-to-Peer (P2P) network and use game theoretic analysis to derive results about peer and network be...
Dimitrios K. Vassilakis, Vasilis Vassalos
P2P
2007
IEEE
13 years 10 months ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
P2P
2007
IEEE
117views Communications» more  P2P 2007»
13 years 10 months ago
Globase.KOM - A P2P Overlay for Fully Retrievable Location-based Search
Location based services are becoming increasingly popular as devices that determine geographical position become more available to end users. The main problem of existing solution...
Aleksandra Kovacevic, Nicolas Liebau, Ralf Steinme...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
13 years 10 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
P2P
2007
IEEE
13 years 10 months ago
The Effect of Viral Media on Business Usage of P2P
P2P file-sharing poses a number of serious problems for business network administrators including: unpredictable network usage, increased vulnerability to security threats and the...
Danny Hughes, James Walkerdine, Kevin Lee
P2P
2007
IEEE
101views Communications» more  P2P 2007»
13 years 10 months ago
Grid Resource Scheduling with Gossiping Protocols
Abstract— Grid resource providers can use gossiping to disseminate their available resource state to remote regions of the grid to attract application load. Pairwise gossiping pr...
Deger Cenk Erdil, Michael J. Lewis