Sciweavers

14054 search results - page 124 / 2811
» P
Sort
View
CN
2007
172views more  CN 2007»
15 years 4 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
TKDE
2008
128views more  TKDE 2008»
15 years 4 months ago
A Virtual Ring Method for Building Small-World Structured P2P Overlays
This paper presents a general virtual ring method to design and analyze small-world structured P2P networks on the base es embedded in ID spaces with distance metric. Its basic ide...
Hai Zhuge, Xiaoping Sun
SIGMETRICS
2002
ACM
142views Hardware» more  SIGMETRICS 2002»
15 years 3 months ago
Probabilistic scalable P2P resource location services
Scalable resource discovery services form the core of directory and other middleware services. Scalability requirements preclude centralized solutions. The need to have directory ...
Daniel A. Menascé, Lavanya Kanchanapalli
COMCOM
2008
99views more  COMCOM 2008»
15 years 3 months ago
SPICE: Scalable P2P implicit group messaging
Implicit group messaging (IGM) is a decoupled messaging paradigm for connecting content publishers and consumers over the Internet. Unlike traditional multicast or publish/subscri...
Daniel Cutting, Aaron J. Quigley, Björn Landf...
128
Voted
IEEEHPCS
2010
15 years 2 months ago
No more crash or crunch: Sustainable credit dynamics in a P2P community
Abstract—Many peer-to-peer file sharing communities implement credit policies to incentivise users to contribute upload resources. Such policies implicitly assume a user model -...
Rameez Rahman, David Hales, Tamas Vinko, Johan A. ...