Sciweavers

8370 search results - page 160 / 1674
» Challenges in P2P Computing
Sort
View
KIVS
2005
Springer
15 years 9 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
EUROPAR
2006
Springer
15 years 7 months ago
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids
Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions s...
Ala Rezmerita, Tangui Morlier, Vincent Néri...
AINA
2008
IEEE
15 years 6 months ago
UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent
BitTorrent is one of the most well known peer-topeer file sharing applications, accounting for a significant proportion of Internet traffic. Current BitTorrent system builds its o...
Wei Li, Shanzhi Chen, Tao Yu
CCGRID
2008
IEEE
15 years 6 months ago
A Decentralized and Cooperative Workflow Scheduling Algorithm
In the current approaches to workflow scheduling, there is no cooperation between the distributed workflow brokers and as a result, the problem of conflicting schedules occur. To o...
Rajiv Ranjan, Mustafizur Rahman 0003, Rajkumar Buy...
CCS
2008
ACM
15 years 6 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov