Sciweavers

226 search results - page 8 / 46
» p2p 2010
Sort
View
COMCOM
2010
133views more  COMCOM 2010»
14 years 9 months ago
Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism
In recent years, IPTV has received an increasing amount of interest from the industry, commercial providers and the research community, alike. In this context, standardization bod...
Iván Vidal, Jaime García-Reinoso, An...
IJIPT
2010
91views more  IJIPT 2010»
14 years 7 months ago
Detecting and blocking P2P botnets through contact tracing chains
: Peer-to-peer (P2P) botnets have recently become serious security threats on the internet. It is difficult to detect the propagation of P2P botnets by isolated monitoring on indiv...
Zhiyong Huang, Xiaoping Zeng, Yong Liu
89
Voted
DPD
2006
123views more  DPD 2006»
14 years 9 months ago
Reducing network traffic in unstructured P2P systems using Top-k queries
A major problem of unstructured P2P systems is their heavy network traffic. This is caused mainly by high numbers of query answers, many of which are irrelevant for users. One solu...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
TCSV
2010
14 years 4 months ago
Solving Streaming Capacity Problems in P2P VoD Systems
Abstract--Peer-to-peer (P2P) video-on-demand (VoD) is a popular Internet service for a large number of concurrent users. Streaming capacity in a P2P VoD system is defined as the ma...
Yifeng He, Ling Guan
TKDE
2010
272views more  TKDE 2010»
14 years 7 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta