Sciweavers

167 search results - page 31 / 34
» About the Lifespan of Peer to Peer Networks
Sort
View
CCS
2009
ACM
14 years 8 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 1 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
COORDINATION
2004
Springer
14 years 24 days ago
A Lightweight Coordination Middleware for Mobile Computing
This paper presents Limone, a new coordination model that facilitates rapid application development over ad hoc networks consisting of logically mobile agents and physically mobile...
Chien-Liang Fok, Gruia-Catalin Roman, Gregory Hack...
AIEDU
2010
13 years 4 months ago
Supporting Collaborative Learning and E-Discussions Using Artificial Intelligence Techniques
An emerging trend in classrooms is the use of networked visual argumentation tools that allow students to discuss, debate, and argue with one another in a synchronous fashion about...
Bruce M. McLaren, Oliver Scheuer, Jan Miksatko
IPTPS
2005
Springer
14 years 27 days ago
Dynamic Load Balancing in Distributed Hash Tables
In Peer-to-Peer networks based on consistent hashing and ring topology each server is responsible for an interval chosen (pseudo-)randomly on a circle. The topology of the network...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...