Sciweavers

109 search results - page 6 / 22
» Designs and Evaluation of a Tracker in P2P Networks
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
WWW
2007
ACM
14 years 8 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...
WWW
2008
ACM
14 years 8 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...
ESAW
2009
Springer
14 years 2 months ago
Assistance Layer in a P2P Scenario
Abstract. Usually, MAS design and implementation involves a coordination model that structures agent interactions and an infrastructure in charge of enacting it. We propose the ter...
Jordi Campos Miralles, Maite López-Sá...
IWDC
2004
Springer
153views Communications» more  IWDC 2004»
14 years 1 months ago
APPLE: A Novel P2P Based e-Learning Environment
With the rapid development of information technology, dramatic changes have been taken place in the fundamental ways that people acquire and disseminate knowledge. Various e-Learni...
Hai Jin, Zuoning Yin, Xudong Yang, Fucheng Wang, J...