Sciweavers

648 search results - page 103 / 130
» Authenticated hash tables
Sort
View
MUM
2004
ACM
118views Multimedia» more  MUM 2004»
14 years 1 months ago
A mediation framework for multimedia delivery
We present a conceptual mediation framework that features three layers of mediators: presence, integration, and homogenization layers that work together in a peer-to-peer (p2p) ma...
Onyeka Ezenwoye, Raimund K. Ege, Li Yang, Qasem Kh...
SIGIR
2004
ACM
14 years 1 months ago
Bookmark-driven Query Routing in Peer-to-Peer Web Search
: We consider the problem of collaborative Web search and query routing strategies in a peer-to-peer (P2P) environment. In our architecture every peer has a full-fledged search en...
Matthias Bender, Sebastian Michel, Gerhard Weikum,...
WIDM
2004
ACM
14 years 1 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...
GC
2004
Springer
14 years 1 months ago
Verifying a Structured Peer-to-Peer Overlay Network: The Static Case
Abstract. Structured peer-to-peer overlay networks are a class of algorithms that provide efficient message routing for distributed applications using a sparsely connected communic...
Johannes Borgström, Uwe Nestmann, Luc Onana A...
IPTPS
2004
Springer
14 years 1 months ago
The Case for a Hybrid P2P Search Infrastructure
Popular P2P file-sharing systems like Gnutella and Kazaa use unstructured network designs. These networks typically adopt flooding-based search techniques to locate files. Whil...
Boon Thau Loo, Ryan Huebsch, Ion Stoica, Joseph M....