Sciweavers

648 search results - page 50 / 130
» Authenticated hash tables
Sort
View
ISPA
2005
Springer
14 years 3 months ago
A Generic Approach to Make Structured Peer-to-Peer Systems Topology-Aware
Abstract. With the help of distributed hash tables, the structured peerto-peer system has a short routing path and good extensibility. However, the mismatch between the overlay and...
Tongqing Qiu, Fan Wu, Guihai Chen
MIDDLEWARE
2004
Springer
14 years 3 months ago
Meghdoot: Content-Based Publish/Subscribe over P2P Networks
Publish/Subscribe systems have become a prevalent model for delivering data from producers (publishers) to consumers (subscribers) distributed across wide-area networks while decou...
Abhishek Gupta, Ozgur D. Sahin, Divyakant Agrawal,...
IEEEAMS
2003
IEEE
14 years 3 months ago
Rich and Scalable Peer-to-Peer Search with SHARK
SHARK is a novel concept and middleware service for search in peer-to-peer (P2P) networks. Rather than flooding a network like Gnutella or imposing numerical IDs on objects like d...
Jan Mischke, Burkhard Stiller
AICT
2006
IEEE
102views Communications» more  AICT 2006»
13 years 12 months ago
Publishing, Retrieving and Streaming Lectures via Application Level Multicast
Structured peer-to-peer overlay network is an efficient solution for querying and retrieving resources spread between the peers. Unfortunately, key based routing of Distributed Ha...
Marco Milanesio, Giancarlo Ruffo
CNSR
2005
IEEE
100views Communications» more  CNSR 2005»
13 years 12 months ago
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks
Distributed Hash Tables (DHTs) promise to manage huge sets of key-value pairs in a Peer-to-Peer manner. The Content-Addressable Network (CAN) is a prominent variant of DHT. A crit...
Thomas Reidemeister, Klemens Böhm, Paul A. S....