Sciweavers

2287 search results - page 47 / 458
» Peer data exchange
Sort
View
ICCCN
2008
IEEE
15 years 10 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
P2P
2008
IEEE
102views Communications» more  P2P 2008»
15 years 10 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
MMS
2006
15 years 4 months ago
A Generic Agent-based Peer-to-Peer Infrastructure for Social-mobile Applications
: This paper presents a generic agent-based framework for social-mobile applications, which has been developed as part of an ongoing linkage project. The MobiSoft project is driven...
Steffen Kern, Torsten Dettborn, Ronny Eckhaus, Yan...
CAISE
2003
Springer
15 years 9 months ago
Leveraging Web-Services and Peer-to-Peer Networks
Abstract. Peer-oriented computing is an attempt to weave interconnected machines into the fabric of the Internet. Service-oriented computing (exemplified by web-services), on the ...
Mike P. Papazoglou, Bernd J. Krämer, Jian Yan...
EDBT
2008
ACM
123views Database» more  EDBT 2008»
16 years 4 months ago
XML data integration in SixP2P: a theoretical framework
In the paper we discuss the problem of data integration in a P2P environment. In such setting each peer stores schema of its local data, mappings between the schema and schemas of...
Tadeusz Pankowski