Sciweavers

1250 search results - page 52 / 250
» Membership-concealing overlay networks
Sort
View
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
15 years 3 months ago
Analysis of Overlay Network Impact on Dependability
Recently, peer-to-peer systems have become widely accepted and are probably the most recognizable examples of distributed applications. As they are maturing and their functionalit...
Piotr Karwaczynski, Jan Kwiatkowski
DBISP2P
2006
Springer
71views Database» more  DBISP2P 2006»
15 years 1 months ago
Oscar: Small-World Overlay for Realistic Key Distributions
Abstract. The research on P2P systems which support skewed key distributions has rapidly advanced in the recent years. Yet, the assumptions on the skews we are dealing with remaine...
Sarunas Girdzijauskas, Anwitaman Datta, Karl Abere...
INFOCOM
2002
IEEE
15 years 2 months ago
Routing in Overlay Multicast Networks
— Multicast services can be provided either as a basic network service or as an application-layer service. Higher level multicast implementations often provide more sophisticated...
Sherlia Shi, Jonathan S. Turner
CN
2006
74views more  CN 2006»
14 years 9 months ago
Measurement-based optimal routing on overlay architectures for unicast sessions
We propose a measurement-based routing algorithm to load-balance intradomain traffic along multiple paths for multiple unicast sources. Multiple paths are established using overla...
Tuna Güven, Richard J. La, Mark A. Shayman, B...
CN
2007
115views more  CN 2007»
14 years 9 months ago
Parallel overlays for high data-rate multicast data transfer
Recently a number of application-layer multicast (ALM) protocols have been proposed as a promising alternative to deploying multicast services in the unicast-only Internet. Curren...
Ka Ki To, Jack Y. B. Lee