Sciweavers

6978 search results - page 112 / 1396
» On Proofs in System P
Sort
View
WWW
2004
ACM
15 years 10 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
PERCOM
2004
ACM
15 years 9 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
ACSAC
2007
IEEE
15 years 4 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
INFOSCALE
2006
ACM
15 years 3 months ago
Analysis and comparison of P2P search methods
The popularity and bandwidth consumption attributed to current Peer-to-Peer file-sharing applications makes the operation of these distributed systems very important for the Inte...
Dimitrios Tsoumakos, Nick Roussopoulos
GI
2004
Springer
15 years 3 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics ...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...