Sciweavers

212 search results - page 17 / 43
» A sybilproof distributed identity management for P2P network...
Sort
View
P2P
2005
IEEE
112views Communications» more  P2P 2005»
14 years 2 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
WETICE
2005
IEEE
14 years 2 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
14 years 2 months ago
A Peer-to-Peer Architecture to Enable Versatile Lookup System Design
The resource lookup requirements in applications such as web caching, web content search, content distribution, resource sharing, network monitoring and management, and e-commerce...
Vivek Sawant, Jasleen Kaur
DBISP2P
2004
Springer
111views Database» more  DBISP2P 2004»
14 years 2 months ago
Processing and Optimization of Complex Queries in Schema-Based P2P-Networks
Peer-to-Peer infrastructures are emerging as one of the important data management infrastructures in the World Wide Web. So far, however, most work has focused on simple P2P networ...
Hadhami Dhraief, Alfons Kemper, Wolfgang Nejdl, Ch...
IC
2007
13 years 10 months ago
Resource Matching in a Peer-to-Peer Computational Framework
- The rise in high speed networks has led to an increased interest in the development of grid computing frameworks; the ubiquity of the broadband Internet connection has fostered w...
Daniel Santoni, Michael Katchabaw