183
click to vote
IPTPS
15 years 10 months ago
2004 Springer
— Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distr...
159
click to vote
IPTPS
15 years 10 months ago
2004 Springer
In P2P systems, users often have many choices of peers from whom to download their data. Each user cares primarily about its own response time, which depends on how many other use...
149
click to vote
IPTPS
15 years 10 months ago
2004 Springer
We investigate an approach for routing in p2p networks called neighbor-of-neighbor greedy. We show that this approach may reduce significantly the number of hops used, when routi...
146
click to vote
IPTPS
15 years 10 months ago
2004 Springer
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
146
click to vote
IPTPS
15 years 10 months ago
2004 Springer
Abstract— Content sharing is a popular usage of peerto-peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-pe...
|