Sciweavers

784 search results - page 85 / 157
» An analytic framework for modeling peer to peer networks
Sort
View
TC
2010
13 years 7 months ago
The Design and Evaluation of a Self-Organizing Superpeer Network
—Superpeer architectures exploit the heterogeneity of nodes in a peer-to-peer (P2P) network by assigning additional responsibilities to higher capacity nodes. In the design of a ...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
IICS
2009
Springer
14 years 3 months ago
Splitting Overlay Network for Peer-to-Peer-based Massively Multiplayer Online Games
: Massively Multiplayer Online Games (MMOGs) gradually become one of the most popular internet applications. Traditional client-server architecture is widely used in MMOGs’ deplo...
Cheng Liu, Wentong Cai
PPNA
2011
13 years 3 months ago
Evaluation framework for adaptive context-aware routing in large scale mobile peer-to-peer systems
The proliferation of novel wireless network technologies creates new opportunities for complex peerto-peer information dissemination systems. A key challenge that remains in this a...
Ansar-Ul-Haque Yasar, Davy Preuveneers, Yolande Be...
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
ICDCSW
2005
IEEE
14 years 2 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer