173
click to vote
IPTPS
15 years 9 months ago
2004 Springer
— Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distr...
151
click to vote
IPTPS
15 years 9 months ago
2004 Springer
In P2P systems, users often have many choices of peers from whom to download their data. Each user cares primarily about its own response time, which depends on how many other use...
141
click to vote
IPTPS
15 years 9 months ago
2004 Springer
We investigate an approach for routing in p2p networks called neighbor-of-neighbor greedy. We show that this approach may reduce significantly the number of hops used, when routi...
136
click to vote
IPTPS
15 years 9 months ago
2004 Springer
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
135
click to vote
IPTPS
15 years 9 months ago
2004 Springer
—This paper describes a new peer-to-peer protocol that integrates DHT routing, aggregation, allto-all multicast, as well as both topic- and content-based publish/subscribe. In sp...
|