Sciweavers

100 search results - page 12 / 20
» An Analytical Model of a BitTorrent Peer
Sort
View
P2P
2010
IEEE
136views Communications» more  P2P 2010»
13 years 5 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
CCGRID
2003
IEEE
14 years 28 days ago
Criticality-based Analysis and Design of Unstructured Peer-to-Peer Networks as "Complex Systems"
— Due to enormous complexity of the unstructured peer-to-peer networks as large-scale, self-configure, and dynamic systems, the models used to characterize these systems are eit...
Farnoush Banaei Kashani, Cyrus Shahabi
IPPS
2006
IEEE
14 years 1 months ago
Modeling malware propagation in Gnutella type peer-to-peer networks
A key emerging and popular communication paradigm, primarily employed for information dissemination, is peer-to-peer (P2P) networking. In this paper, we model the spread of malwar...
Krishna K. Ramachandran, Biplab Sikdar
NSDI
2004
13 years 9 months ago
Efficient Routing for Peer-to-Peer Overlays
Most current peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes. This design assumes that routing info...
Anjali Gupta, Barbara Liskov, Rodrigo Rodrigues
TPDS
2010
194views more  TPDS 2010»
13 years 6 months ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh