Sciweavers

3083 search results - page 9 / 617
» Active Peer to Peer
Sort
View
IMC
2010
ACM
13 years 5 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
CCS
2006
ACM
13 years 11 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
SIGECOM
2008
ACM
92views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Strong regularities in online peer production
Online peer production systems have enabled people to coactively create, share, classify, and rate content on an unprecedented scale. This paper describes strong macroscopic regul...
Dennis M. Wilkinson
WETICE
2009
IEEE
14 years 2 months ago
Secure Peer Sampling Service: The Mosquito Attack
Peer sampling – the capability of obtaining a random sample from a large population of peers – is a basic building block for the gossip paradigm. Current peer sampling service...
Gian Paolo Jesi, Alberto Montresor
HICSS
2005
IEEE
120views Biometrics» more  HICSS 2005»
14 years 1 months ago
User Motivation and Persuasion Strategy for Peer-to-Peer Communities
In recent years, peer-to-peer systems have become more and more popular, especially with some successful applications like Napter, Kazaa and edoney. However, how to motivate user ...
Ran Cheng, Julita Vassileva