Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
We present collaborative peer-to-peer algorithms for the problem of approximating frequency counts for popular items distributed across the peers of a large-scale network. Our alg...
Abstract— We present on-line tunable diagnostic and membership protocols for generic time-triggered (TT) systems to detect crashes, send/receive omission faults and network parti...
This paper explores the potential for use of an unaugmented commodity technology—the mobile phone— as a health promotion tool. We describe a prototype application that tracks t...
Ian Anderson, Julie Maitland, Scott Sherwood, Loui...
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...