Sciweavers

750 search results - page 53 / 150
» Design choices for content distribution in P2P networks
Sort
View
117
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 6 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
92
Voted
NOSSDAV
2009
Springer
15 years 7 months ago
Zebroid: using IPTV data to support peer-assisted VoD content delivery
P2P file transfers and streaming have already seen a tremendous growth in Internet applications. With the rapid growth of IPTV, the need to efficiently disseminate large volumes ...
Yih-Farn Robin Chen, Rittwik Jana, Daniel Stern, B...
119
Voted
P2P
2010
IEEE
136views Communications» more  P2P 2010»
14 years 10 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
109
Voted
GPC
2008
Springer
15 years 1 months ago
Layered Peer-to-Peer Architecture for Mobile Web Services via Converged Cellular and Ad Hoc Networks
Mobile communication technology is rapidly developed with the enhanced networking capacities as well as the expanding population of mobile subscribers. Providing Web services via ...
Zhonghong Ou, Meina Song, Hui Chen, Junde Song
P2P
2007
IEEE
15 years 6 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer