Sciweavers

6978 search results - page 86 / 1396
» On Proofs in System P
Sort
View
WONS
2012
IEEE
13 years 5 months ago
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
—The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IPbased applications for low-power wireless networks like sensor net...
Marcel Bosling, Torsten Redmann, Jean Tekam, Elias...
ISCC
2008
IEEE
15 years 4 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
ISCC
2006
IEEE
123views Communications» more  ISCC 2006»
15 years 3 months ago
Similarity Search in a Hybrid Overlay P2P Network
P2P systems are increasingly used to discover and share various data between users. The performance of a P2P based information retrieval system is determined by the efficiency of...
Mouna Kacimi, Kokou Yétongnon
GCC
2003
Springer
15 years 3 months ago
SemanticPeer: An Ontology-Based P2P Lookup Service
Locating content efficiently and conveniently is the key issue in P2P systems. In this paper we present SemanticPeer, an Ontology-Based P2P lookup service, to address this problem,...
Jing Tian, Yafei Dai, Xiaoming Li
APWEB
2008
Springer
14 years 12 months ago
Traceable P2P Record Exchange Based on Database Technologies
Information exchanges in P2P networks have become very popular in recent years. However, tracing how data circulates between peers and how data modifications are performed during t...
Fengrong Li, Yoshiharu Ishikawa