Sciweavers

675 search results - page 44 / 135
» Anonymous communication in overlay networks
Sort
View
P2P
2003
IEEE
100views Communications» more  P2P 2003»
15 years 4 months ago
Identity Crisis: Anonymity vs. Reputation in P2P Systems
The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much deb...
Sergio Marti, Hector Garcia-Molina
ICC
2007
IEEE
15 years 5 months ago
Overlay Partition: Iterative Detection and Proactive Recovery
— Overlay networks provide infrastructures for a large variety of Internet applications, like file sharing, online gaming, and multimedia streaming. However, these networks ofte...
Tongqing Qiu, Edward Chan, Guihai Chen
COLCOM
2005
IEEE
15 years 4 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
15 years 5 months ago
Embeddable Overlay Networks
—The accuracy of network coordinate (NC) which is comprehensively applied is suffering seriously from Triangle Inequality Violations (TIVs). A novel approach - Embeddable Overlay...
Eng Keong Lua, Timothy G. Griffin
INFOCOM
2005
IEEE
15 years 4 months ago
On failure detection algorithms in overlay networks
— One of the key reasons overlay networks are seen as an excellent platform for large scale distributed systems is their resilience in the presence of node failures. This resilie...
Shelley Zhuang, Dennis Geels, Ion Stoica, Randy H....