Sciweavers

8370 search results - page 63 / 1674
» Challenges in P2P Computing
Sort
View
WWW
2004
ACM
16 years 4 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
146
Voted
ICDCS
2009
IEEE
15 years 10 months ago
Logoot: A Scalable Optimistic Replication Algorithm for Collaborative Editing on P2P Networks
Massive collaborative editing becomes a reality through leading projects such as Wikipedia. This massive collaboration is currently supported with a costly central service. In ord...
Stéphane Weiss, Pascal Urso, Pascal Molli
DEXA
2009
Springer
201views Database» more  DEXA 2009»
15 years 10 months ago
Dynamic Query Processing for P2P Data Services in the Cloud
With the trend of cloud computing, data and computing are moved away from desktop and are instead provided as a service from the cloud. Data-as-a-service enables access to a wealth...
Pawel Jurczyk, Li Xiong
118
Voted
AINA
2008
IEEE
15 years 10 months ago
A Concept of an Anonymous Direct P2P Distribution Overlay System
The paper introduces a peer-to-peer system called P2PRIV (peer-to-peer direct and anonymous distribution overlay). Basic novel features of P2PRIV are: (i) a peer-to-peer parallel ...
Igor Margasinski, Michal Pióro
134
Voted
LCN
2008
IEEE
15 years 10 months ago
P2P directory search: Signature Array Hash Table
— Bloom filters are a well known data structure for approximate set membership. Bloom filters are space efficient but require many independent hashes and consecutive memory acces...
Miguel Jimeno, Kenneth J. Christensen