Sciweavers

372 search results - page 6 / 75
» p2p 2008
Sort
View
CN
2010
77views more  CN 2010»
14 years 10 months ago
Preventing DDoS attacks on internet servers exploiting P2P systems
Xin Sun, Ruben Torres, Sanjay G. Rao
P2P
2008
IEEE
15 years 6 months ago
P2P Information Retrieval and Filtering with MAPS
In this demonstration paper we present MAPS, a novel system that combines approximate information retrieval and filtering functionality in a peer-to-peer setting. In MAPS, a user...
Christian Zimmer, Johannes Heinz, Christos Tryfono...
AIMS
2008
Springer
15 years 1 months ago
A Distributed Certification System for Structured P2P Networks
In this paper, we present a novel distributed certification system in which signing a certificate needs the collaboration of a fixed ratio of the nodes, hence a varying number of n...
François Lesueur, Ludovic Mé, Val&ea...
ICYCS
2008
IEEE
15 years 6 months ago
Propagation Model of Active Worms in P2P Networks
P2P worms pose heavy threatens to P2P networks. P2P worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentiall...
Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, L...
CONCURRENCY
2008
82views more  CONCURRENCY 2008»
14 years 10 months ago
Segregation and scheduling for P2P applications with the interceptor middleware system
Very large size Peer-to-Peer systems are often required to implement efficient and scalable services, but usually they can be built only by assembling resources contributed by man...
Cosimo Anglano