Sciweavers

648 search results - page 103 / 130
» Authenticated hash tables
Sort
View
MUM
2004
ACM
118views Multimedia» more  MUM 2004»
15 years 10 months ago
A mediation framework for multimedia delivery
We present a conceptual mediation framework that features three layers of mediators: presence, integration, and homogenization layers that work together in a peer-to-peer (p2p) ma...
Onyeka Ezenwoye, Raimund K. Ege, Li Yang, Qasem Kh...
140
Voted
SIGIR
2004
ACM
15 years 10 months ago
Bookmark-driven Query Routing in Peer-to-Peer Web Search
: We consider the problem of collaborative Web search and query routing strategies in a peer-to-peer (P2P) environment. In our architecture every peer has a full-fledged search en...
Matthias Bender, Sebastian Michel, Gerhard Weikum,...
WIDM
2004
ACM
15 years 10 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...
138
Voted
GC
2004
Springer
15 years 10 months ago
Verifying a Structured Peer-to-Peer Overlay Network: The Static Case
Abstract. Structured peer-to-peer overlay networks are a class of algorithms that provide efficient message routing for distributed applications using a sparsely connected communic...
Johannes Borgström, Uwe Nestmann, Luc Onana A...
IPTPS
2004
Springer
15 years 10 months ago
The Case for a Hybrid P2P Search Infrastructure
Popular P2P file-sharing systems like Gnutella and Kazaa use unstructured network designs. These networks typically adopt flooding-based search techniques to locate files. Whil...
Boon Thau Loo, Ryan Huebsch, Ion Stoica, Joseph M....