Sciweavers

301 search results - page 20 / 61
» p2p 2006
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
ICPADS
2006
IEEE
15 years 3 months ago
OBN: Peering for Finding Suppliers in P2P On-demand Streaming Systems
A critical issue in peer-to-peer (P2P) streaming systems is to find a peer that can provide required streaming data (eligibility determination) with good quality (quality optimiza...
Chi-Shiang Liao, Wen-Hung Sun, Chung-Ta King, Hung...
78
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
CN
2006
82views more  CN 2006»
14 years 9 months ago
Event-condition-action rules on RDF metadata in P2P environments
RDF is one of the technologies proposed to realise the vision of the Semantic Web and it is being increasingly used in distributed web-based applications. The use of RDF in applic...
George Papamarkos, Alexandra Poulovassilis, Peter ...
ICDE
2006
IEEE
192views Database» more  ICDE 2006»
15 years 11 months ago
MAPLE: A Mobile Scalable P2P Nearest Neighbor Query System for Location-based Services
In this demonstration we present MAPLE, a scalable peer-to-peer Nearest Neighbor (NN) query system for mobile environments. MAPLE is designed for the efficient sharing of query re...
Wei-Shinn Ku, Roger Zimmermann, Chi-Ngai Wan, Haoj...