Sciweavers

14054 search results - page 49 / 2811
» P
Sort
View
PE
2006
Springer
127views Optimization» more  PE 2006»
14 years 11 months ago
Cycloid: A constant-degree and lookup-efficient P2P overlay network
There are many structured P2P systems that use DHT technologies to map data items onto the nodes in various ways for scalable routing and location. Most of the systems require O(lo...
Haiying Shen, Cheng-Zhong Xu, Guihai Chen
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
15 years 5 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 3 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CN
2010
149views more  CN 2010»
14 years 11 months ago
A collaborative P2P scheme for NAT Traversal Server discovery based on topological information
In the current Internet picture more than 70% of the hosts are located behind Network Address Translators (NATs). This is not a problem in the client/server paradigm. However, the...
Rubén Cuevas Rumín, Ángel Cue...
WWW
2006
ACM
15 years 12 months ago
The SOWES approach to P2P web search using semantic overlays
Peer-to-peer (P2P) Web search has gained a lot of interest lately, due to the salient characteristics of P2P systems, namely scalability, fault-tolerance and load-balancing. Howev...
Christos Doulkeridis, Kjetil Nørvåg, ...