Sciweavers

648 search results - page 99 / 130
» Authenticated hash tables
Sort
View
ICPADS
2006
IEEE
14 years 1 months ago
OBN: Peering for Finding Suppliers in P2P On-demand Streaming Systems
A critical issue in peer-to-peer (P2P) streaming systems is to find a peer that can provide required streaming data (eligibility determination) with good quality (quality optimiza...
Chi-Shiang Liao, Wen-Hung Sun, Chung-Ta King, Hung...
INFOCOM
2006
IEEE
14 years 1 months ago
A Comparative Study of the DNS Design with DHT-Based Alternatives
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
Vasileios Pappas, Daniel Massey, Andreas Terzis, L...
IPPS
2006
IEEE
14 years 1 months ago
Using incentives to increase availability in a DHT
Distributed Hash Tables (DHTs) provide a means to build a completely decentralized, large-scale persistent storage service from the individual storage capacities contributed by ea...
Fabio Picconi, Pierre Sens
IPPS
2006
IEEE
14 years 1 months ago
Privacy-aware presence management in instant messaging systems
Information about online presence allows participants of instant messaging (IM) systems to determine whether their prospective communication partners will be able to answer their ...
Karsten Loesing, Markus Dorsch, Martin Grote, Knut...
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
14 years 1 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia