Sciweavers

167 search results - page 13 / 34
» About the Lifespan of Peer to Peer Networks
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
An adaptive stabilization framework for distributed hash tables
Distributed Hash Tables (DHT) algorithms obtain good lookup performance bounds by using deterministic rules to organize peer nodes into an overlay network. To preserve the invaria...
Gabriel Ghinita, Yong Meng Teo
ICDCSW
2002
IEEE
14 years 11 days ago
Peer-to-Peer for Collaborative Applications
Peer-to-peer systems recently captured the attention of practitioners and researchers as they provide an attractive alternative to client-server architectures. Peerto-peer enables...
Gianpaolo Cugola, Gian Pietro Picco
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 1 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
CCGRID
2007
IEEE
14 years 1 months ago
Design of a Scalable Peer-to-Peer Information System Using the GT4 Index Service
Grid applications need efficient access to information about available resources and services. Typically, this access is provided by information services that are often organized ...
Shishir Bharathi, Ann L. Chervenak
ICDM
2003
IEEE
141views Data Mining» more  ICDM 2003»
14 years 21 days ago
Association Rule Mining in Peer-to-Peer Systems
We extend the problem of association rule mining – a key data mining problem – to systems in which the database is partitioned among a very large number of computers that are ...
Ran Wolff, Assaf Schuster