Sciweavers

8370 search results - page 10 / 1674
» Challenges in P2P Computing
Sort
View
IPTPS
2005
Springer
15 years 3 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...
MUM
2004
ACM
154views Multimedia» more  MUM 2004»
15 years 3 months ago
Plug-and-play application platform: towards mobile peer-to-peer
While peer-to-peer (P2P) has emerged as a new hot communication concept among the Internet users, mobile usage of P2P applications is still taking its first steps. This article fi...
Erkki Harjula, Mika Ylianttila, Jussi Ala-Kurikka,...
DEXAW
2006
IEEE
179views Database» more  DEXAW 2006»
15 years 3 months ago
Opportunistic Networks: Challenges in Specializing the P2P Paradigm
We introduce the notion of opportunistic networks or oppnets, some of which can be considered a subclass of the peer-to-peer (P2P) networks. Initially, a relatively small seed opp...
Leszek Lilien, Zille Huma Kamal, Ajay K. Gupta
USS
2008
14 years 12 months ago
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice
We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We desc...
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamur...