Sciweavers

212 search results - page 14 / 43
» A sybilproof distributed identity management for P2P network...
Sort
View
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
14 years 9 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi
DKE
2002
263views more  DKE 2002»
13 years 8 months ago
Data management issues in mobile and peer-to-peer environments
Mobile computing is a revolutionary technology, born as a result of remarkable advance in the development of computer hardware and wireless communication. It enables us to access ...
Budiarto, Shojiro Nishio, Masahiko Tsukamoto
IPPS
2006
IEEE
14 years 2 months ago
Chedar: peer-to-peer middleware
In this paper we present a new peer-to-peer (P2P) middleware called CHEap Distributed ARchitecture (Chedar). Chedar is totally decentralized and can be used as a basis for P2P app...
Annemari Auvinen, Mikko Vapa, Matthieu Weber, Niko...
ICIW
2009
IEEE
14 years 3 months ago
An Architecture for Reliable Mobile Workflow in a Grid Environment
— Mobile peer to peer (P2P) computing is becoming a major revolution in computing owing to advances in computing power, network connectivity and storage capacity of mobile device...
Bill Karakostas, George Fakas
AIMS
2009
Springer
14 years 1 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...