Sciweavers

113 search results - page 6 / 23
» Conformon P Systems and Topology of Information Flow
Sort
View
AINA
2004
IEEE
13 years 11 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
GCC
2003
Springer
14 years 18 days ago
An Improved Network Broadcasting Method Based on Gnutella Network
Peer-to-peer networking is a hot buzzword that has been sweeping through the computing industry over the past year or so. Gnutella, as one of the first operational pure P2P systems...
Zupeng Li, Xiubin Zhao, Daoyin Huang, Jianhua Huan...
MUE
2007
IEEE
97views Multimedia» more  MUE 2007»
14 years 1 months ago
NTS6: IPv6 based Network Topology Service System of CERNET2
In this paper, we propose NTS6, an IPv6 based Network Topology Service system, which provides a Query and Response Service of Network Topology Information between any pair of host...
Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing D...
JSAC
2007
104views more  JSAC 2007»
13 years 7 months ago
Characterizing Peer-to-Peer Streaming Flows
— The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming serve...
Chuan Wu, Baochun Li, Shuqiao Zhao
ERSHOV
2006
Springer
13 years 11 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska