Sciweavers

92 search results - page 9 / 19
» Centralized Security Labels in Decentralized P2P Networks
Sort
View
JNW
2006
120views more  JNW 2006»
13 years 8 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
ECAI
2008
Springer
13 years 10 months ago
A probabilistic trust model for semantic peer-to-peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
EDBT
2008
ACM
151views Database» more  EDBT 2008»
14 years 8 months ago
Decentralized managing of replication objects in massively distributed systems
Data replication is a central technique to increase availability and performance of distributed systems. While offering many advantages it also requires more effort for ensuring d...
Daniel Klan, Kai-Uwe Sattler, Katja Hose, Marcel K...
SIGCOMM
2003
ACM
14 years 1 months ago
Peer-to-peer information retrieval using self-organizing semantic overlay networks
Content-based full-text search is a challenging problem in Peer-toPeer (P2P) systems. Traditional approaches have either been centralized or use flooding to ensure accuracy of th...
Chunqiang Tang, Zhichen Xu, Sandhya Dwarkadas
WWW
2004
ACM
14 years 9 months ago
Pride: peer-to-peer reputation infrastructure for decentralized environments
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In the absence of any common goals shared by the nodes ...
Prashant Dewan, Partha Dasgupta