Sciweavers

1162 search results - page 202 / 233
» Evaluation of network impact of content distribution mechani...
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 5 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
ICDCS
2007
IEEE
15 years 6 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 4 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
VTC
2007
IEEE
132views Communications» more  VTC 2007»
15 years 6 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro