Sciweavers

3130 search results - page 548 / 626
» Collusion without communication
Sort
View
P2P
2009
IEEE
122views Communications» more  P2P 2009»
16 years 4 days ago
Virtual Direction Routing for Overlay Networks
The enormous interest for peer-to-peer systems in recent years has prompted research into finding scalable and robust seeding and searching methods to support these overlay netwo...
Bow-Nan Cheng, Murat Yuksel, Shivkumar Kalyanarama...
P2P
2009
IEEE
143views Communications» more  P2P 2009»
16 years 4 days ago
SimGrid: a Generic Framework for Large-Scale Distributed Experiments
Distributed computing is a very broad and active research area comprising fields such as cluster computing, computational grids, desktop grids and peer-to-peer (P2P) systems. Unf...
Martin Quinson
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
16 years 2 days ago
A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks
This paper offers a local distributed algorithm for expectation maximization in large peer-to-peer environments. The algorithm can be used for a variety of well-known data mining...
Kanishka Bhaduri, Ashok N. Srivastava
ICIW
2009
IEEE
16 years 2 days ago
QoSMap: Achieving Quality and Resilience through Overlay Construction
We describe QoSMap, an overlay construction mechanism which computes high quality overlay networks for applications having stringent constraints on hop-degrading QoS metrics and p...
Jawwad Shamsi, Monica Brockmeyer
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
16 years 19 hour ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin