182
click to vote
IPTPS
15 years 10 months ago
2004 Springer
— Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distr...
158
Voted
IPTPS
15 years 10 months ago
2004 Springer
In P2P systems, users often have many choices of peers from whom to download their data. Each user cares primarily about its own response time, which depends on how many other use...
149
click to vote
IPTPS
15 years 10 months ago
2004 Springer
We investigate an approach for routing in p2p networks called neighbor-of-neighbor greedy. We show that this approach may reduce significantly the number of hops used, when routi...
143
click to vote
IPTPS
15 years 10 months ago
2004 Springer
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
143
click to vote
IPTPS
15 years 10 months ago
2004 Springer
Popular P2P file-sharing systems like Gnutella and Kazaa use unstructured network designs. These networks typically adopt flooding-based search techniques to locate files. Whil...
|