Sciweavers

784 search results - page 22 / 157
» An analytic framework for modeling peer to peer networks
Sort
View
MIDDLEWARE
2007
Springer
14 years 1 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
CCGRID
2002
IEEE
14 years 17 days ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos
CN
2000
69views more  CN 2000»
13 years 7 months ago
Hierarchical source routing using implied costs
Based on a loss network model, we present an adaptive source routing scheme for a large, hierarchically organized network. To represent the ``available'' capacity of a p...
Michael Montgomery, Gustavo de Veciana
SAC
2010
ACM
14 years 2 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
TKDE
2010
272views more  TKDE 2010»
13 years 6 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta