Sciweavers

1016 search results - page 45 / 204
» Peering Peer-to-Peer Providers
Sort
View
75
Voted
JSAC
2006
106views more  JSAC 2006»
14 years 11 months ago
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disrup...
Kotikalapudi Sriram, Doug Montgomery, Oliver Borch...
GIS
2009
ACM
16 years 5 days ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ELPUB
2006
ACM
15 years 5 months ago
Serving Innovation in Scholarly Communication with the Open Platform "Digital Peer Publishing"
The internet causes a continuous emergence of novel forms of scholarly communication and collaboration. Electronic publishing provides a means for representing eventual outcomes o...
Wolfram Horstmann, Peter Reimer, Jochen Schirrwage...
87
Voted
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
15 years 4 months ago
DMW - A Middleware for Digital Rights Management in Peer-to-Peer Networks
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
Praveen Kumar, G. Sridhar, V. Sridhar, R. Gadh
FTDCS
2004
IEEE
15 years 2 months ago
Exploiting Semantic Proximity in Peer-to-Peer Content Searching
A lot of recent work has dealt with improving performance of content searching in peer-to-peer file sharing systems. In this paper we attack this problem by modifying the overlay ...
Spyros Voulgaris, Anne-Marie Kermarrec, Laurent Ma...