Sciweavers

P2P
2007
IEEE
186views Communications» more  P2P 2007»
15 years 6 months ago
A P2PSIP Demonstrator Powered by OverSim
Ingmar Baumgart, Bernhard Heep, Stephan Krause
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 6 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
P2P
2007
IEEE
161views Communications» more  P2P 2007»
15 years 6 months ago
The BitCod Client: A BitTorrent Clone using Network Coding
Network coding is an emerging field of research with sound and mature theory supporting it. Recent works shows that it has many benefits like improved fault tolerance, higher ...
Danny Bickson, Roy Borer
P2P
2007
IEEE
156views Communications» more  P2P 2007»
15 years 6 months ago
Completeness Estimation of Range Queries in Structured Overlays
Range queries are a very powerful tool in a wide range of data management systems and are vital to a multitude of applications. The hierarchy of structured overlay systems can be ...
Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt
P2P
2007
IEEE
153views Communications» more  P2P 2007»
15 years 6 months ago
On Routing in Distributed Hash Tables
There have been many proposals for constructing routing tables for Distributed Hash Tables (DHT). They can be classified into two groups: A) those that assume that the peers are ...
Fabius Klemm, Sarunas Girdzijauskas, Jean-Yves Le ...
Communications
Top of PageReset Settings