Sciweavers

8370 search results - page 127 / 1674
» Challenges in P2P Computing
Sort
View
NSDI
2008
15 years 6 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
IJNSEC
2007
157views more  IJNSEC 2007»
15 years 3 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
138
Voted
HIPC
2007
Springer
15 years 10 months ago
Structuring Unstructured Peer-to-Peer Networks
Flooding is a fundamental building block of unstructured peer-to-peer (P2P) systems. In this paper, we investigate techniques to improve the performance of flooding. In particular...
Stefan Schmid, Roger Wattenhofer
138
Voted
VLSID
2002
IEEE
128views VLSI» more  VLSID 2002»
16 years 4 months ago
System-Level Point-to-Point Communication Synthesis using Floorplanning Information
: In this paper, we present a point-to-point (P2P) communication synthesis methodology for SystemOn-Chip (SOC) design. We consider real-time systems where IP selection, mapping and...
Jingcao Hu, Yangdong Deng, Radu Marculescu
EDBT
2008
ACM
149views Database» more  EDBT 2008»
16 years 4 months ago
A probabilistic trust model for semantic peer to peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...