Sciweavers

178 search results - page 11 / 36
» Presence-Based Availability and P2P Systems
Sort
View
88
Voted
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
15 years 6 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
SEKE
2007
Springer
15 years 5 months ago
Managing XML Versions and Replicas in a P2P Context
Peer-to-Peer (P2P) systems seek to provide sharing of computational resources, which may be duplicated or versioned over several peers. Duplicate resources (i.e. replicas) are the...
Deise de Brum Saccol, Nina Edelweiss, Renata de Ma...
P2P
2006
IEEE
122views Communications» more  P2P 2006»
15 years 5 months ago
2Fast : Collaborative Downloads in P2P Networks
P2P systems that rely on the voluntary contribution of bandwidth by the individual peers may suffer from freeriding. To address this problem, mechanisms enforcing fairness in band...
Pawel Garbacki, Alexandru Iosup, Dick H. J. Epema,...
91
Voted
ICNP
2003
IEEE
15 years 5 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
SIGCOMM
2010
ACM
14 years 12 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...