Sciweavers

14054 search results - page 58 / 2811
» P
Sort
View
122
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...
105
Voted
WWW
2004
ACM
16 years 4 months ago
A query algebra for xml p2p databases
This paper describes a query algebra for queries over XML p2p databases that provides explicit mechanisms for modeling data dissemination, replication constraints, and for capturi...
Carlo Sartiani
127
Voted
SAINT
2008
IEEE
15 years 10 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
131
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
A P2P Groupware Framework based on Operational Transformations
- Groupware applications deal with propagation of changes to networked users, consistency maintenance on concurrent access, and provision of awareness. We have built a P2P groupwar...
Leandro Quiroga, Alejandro Fernandez
106
Voted
WETICE
2006
IEEE
15 years 9 months ago
A Trust-enabled P2P Recommender System
In this paper we present a trust-oriented method that can be used when building P2P recommender systems. We discuss its benefits in comparison to centralized solutions, its requir...
Georgios Pitsilis, Lindsay Marshall