Sciweavers

8370 search results - page 8 / 1674
» Challenges in P2P Computing
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 1 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
P2P
2007
IEEE
15 years 3 months ago
A Data Placement Scheme with Time-Related Model for P2P Storages
Maintaining desired data availability while minimizing costs is the primary challenge in designing P2P storages. Data placement schemes and data availability calculation methods a...
Jing Tian, Zhi Yang, Yafei Dai
IPM
2007
156views more  IPM 2007»
14 years 9 months ago
p2pDating: Real life inspired semantic overlay networks for Web search
We consider a network of autonomous peers forming a logically global but physically distributed search engine, where every peer has its own local collection generated by independe...
Josiane Xavier Parreira, Sebastian Michel, Gerhard...
ICNP
2007
IEEE
15 years 3 months ago
A Simple Model for Analyzing P2P Streaming Protocols
— P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well u...
Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 2 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu