Sciweavers

14054 search results - page 66 / 2811
» P
Sort
View
INFOCOM
2007
IEEE
15 years 5 months ago
Mesh or Multiple-Tree: A Comparative Study of Live P2P Streaming Approaches
Abstract—Existing approaches to P2P streaming can be divided into two general classes: (i) tree-based approaches use pushbased content delivery over multiple tree-shaped overlays...
Nazanin Magharei, Reza Rejaie, Yang Guo
DEXA
2007
Springer
173views Database» more  DEXA 2007»
15 years 5 months ago
A P2P Technique for Continuous k-Nearest-Neighbor Query in Road Networks
Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two li...
Fuyu Liu, Kien A. Hua, Tai T. Do
OTM
2007
Springer
15 years 5 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
VLDB
2007
ACM
154views Database» more  VLDB 2007»
15 years 5 months ago
P2P Authority Analysis for Social Communities
PageRank-style authority analyses of Web graphs are of great importance for Web mining. Such authority analyses also apply to hot “Web 2.0” applications that exhibit a natural...
Josiane Xavier Parreira, Sebastian Michel, Matthia...
DEXAW
2006
IEEE
179views Database» more  DEXAW 2006»
15 years 5 months ago
Opportunistic Networks: Challenges in Specializing the P2P Paradigm
We introduce the notion of opportunistic networks or oppnets, some of which can be considered a subclass of the peer-to-peer (P2P) networks. Initially, a relatively small seed opp...
Leszek Lilien, Zille Huma Kamal, Ajay K. Gupta