Sciweavers

8370 search results - page 124 / 1674
» Challenges in P2P Computing
Sort
View
111
Voted
CISIS
2009
IEEE
15 years 10 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
CONEXT
2006
ACM
15 years 7 months ago
On the benefits of synchronized playout in peer-to-peer streaming
In this paper we examine the impact of the adopted playout policy on the overall performance of a P2P streaming system. It is argued and showed that adopting (popular) playout pol...
Constantinos Vassilakis, Nikolaos Laoutaris, Ioann...
124
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
130
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
FLoD: A Framework for Peer-to-Peer 3D Streaming
—Interactive 3D content on Internet has yet become popular due to its typically large volume and the limited network bandwidth. Progressive content transmission, or 3D streaming,...
Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-...
DBISP2P
2004
Springer
111views Database» more  DBISP2P 2004»
15 years 9 months ago
Processing and Optimization of Complex Queries in Schema-Based P2P-Networks
Peer-to-Peer infrastructures are emerging as one of the important data management infrastructures in the World Wide Web. So far, however, most work has focused on simple P2P networ...
Hadhami Dhraief, Alfons Kemper, Wolfgang Nejdl, Ch...