Sciweavers

1926 search results - page 77 / 386
» From P to MP Systems
Sort
View
P2P
2006
IEEE
119views Communications» more  P2P 2006»
15 years 3 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
GCC
2004
Springer
15 years 3 months ago
EM Medical Image Reconstruction in a Peer-to-Peer Systems
Medical image reconstruction remains a topic of interest to medical researchers. Although the algorithms have become more mature, one particular challenge has persisted over the de...
Jun Ni, Tao He, Xiang Li, Shaowen Wang, Ge Wang
P2P
2006
IEEE
15 years 3 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 11 months ago
SPRITE: A Learning-Based Text Retrieval System in DHT Networks
In this paper, we propose SPRITE (Selective PRogressive Index Tuning by Examples), a scalable system for text retrieval in a structured P2P network. Under SPRITE, each peer is res...
Yingguang Li, H. V. Jagadish, Kian-Lee Tan
IPTPS
2005
Springer
15 years 3 months ago
Brushwood: Distributed Trees in Peer-to-Peer Systems
There is an increasing demand for locality-preserving distribution of complex data structures in peer-to-peer systems. Current systems either do not preserve object locality or su...
Chi Zhang, Arvind Krishnamurthy, Randolph Y. Wang