Sciweavers

14054 search results - page 42 / 2811
» P
Sort
View
TKDE
2010
272views more  TKDE 2010»
14 years 9 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
ICIW
2007
IEEE
15 years 5 months ago
New Topology Management Algorithms for Unstructured P2P Networks
In this paper we present new topology management algorithms used to self-organize the overlay of a peer-topeer network. The algorithms are Node Selection, Node Removal, Overload E...
Annemari Auvinen, Mikko Vapa, Matthieu Weber, Niko...
EUROPAR
2004
Springer
15 years 4 months ago
Large-Scale Deployment in P2P Experiments Using the JXTA Distributed Framework
The interesting properties of P2P systems (high availability despite peer volatility, support for heterogeneous architectures, high scalability, etc.) make them attractive for dist...
Gabriel Antoniu, Luc Bougé, Mathieu Jan, S&...
88
Voted
EUROPAR
2009
Springer
15 years 5 months ago
Uniform Sampling for Directed P2P Networks
Selecting a random peer with uniform probability across a peer-to-peer (P2P) network is a fundamental function for unstructured search, data replication, and monitoring algorithms....
Cyrus P. Hall, Antonio Carzaniga
ICPADS
2007
IEEE
15 years 5 months ago
ECHoP2P: Emergency call handling over peer-to-peer overlays
The impact of the peer-to-peer paradigm increases both in research and in industry. Still, serious applications for P2P-based systems are rare. On the other hand, Emergency Call H...
Kalman Graffi, Aleksandra Kovacevic, Kyra Wulffert...