Sciweavers

8370 search results - page 190 / 1674
» Challenges in P2P Computing
Sort
View
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
15 years 4 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny
PDCAT
2004
Springer
15 years 9 months ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
GRID
2007
Springer
15 years 10 months ago
Multi-state grid resource availability characterization
—The functional heterogeneity of non-dedicated computational grids will increase with the inclusion of resources from desktop grids, P2P systems, and even mobile grids. Machine f...
Brent Rood, Michael J. Lewis
ICDCS
2006
IEEE
15 years 10 months ago
Reputation-Based Scheduling on Unreliable Distributed Infrastructures
This paper presents a design and analysis of scheduling techniques to cope with the inherent unreliability and instability of worker nodes in large-scale donation-based distribute...
Jason D. Sonnek, Mukesh Nathan, Abhishek Chandra, ...
ICMCS
2006
IEEE
138views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
Current peer-to-peer (P2P) streaming systems often assume that hosts are cooperative. However, this may not be true in the open environment of the Internet. In this paper, we disc...
Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqi...