Peer-to-Peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for Multiplayer Onl...
Hai Jin, Hong Yao, Xiaofei Liao, Sirui Yang, Wei L...
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Currently there are a wide variety of devices with different screen resolutions, color support, processing power, and network connectivity, capable of receiving streaming video fr...
Vidyut Samanta, Ricardo V. Oliveira, Advait Dixit,...
Collaborative filtering requires a centralized rating database. However, within a peer-to-peer network such a centralized database is not readily available. In this paper, we pro...
Jun Wang, Johan A. Pouwelse, Reginald L. Lagendijk...
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...