Sciweavers

130 search results - page 9 / 26
» A Simple Model for Analyzing P2P Streaming Protocols
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JSAC
2007
128views more  JSAC 2007»
13 years 7 months ago
Understanding the Power of Pull-Based Streaming Protocol: Can We Do Better?
— Most of the real deployed peer-to-peer streaming systems adopt pull-based streaming protocol. In this paper, we demonstrate that, besides simplicity and robustness, with proper...
Meng Zhang, Qian Zhang, Lifeng Sun, Shiqiang Yang
P2P
2008
IEEE
14 years 2 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack
JSA
2008
81views more  JSA 2008»
13 years 7 months ago
Improving stability for peer-to-peer multicast overlays by active measurements
The instability of the tree-like multicast overlay caused by nodes' abrupt departures is considered as one of the major problems for peer-to-peer (P2P) multicast systems. In ...
Ye Tian, Di Wu, Guangzhong Sun, Kam-Wing Ng
INFOCOM
2008
IEEE
14 years 2 months ago
On Reducing Mesh Delay for Peer-to-Peer Live Streaming
—Peer-to-peer (P2P) technology has emerged as a promising scalable solution for live streaming to large group. In this paper, we address the design of overlay which achieves low ...
Dongni Ren, Y.-T. Hillman Li, Shueng-Han Gary Chan