Sciweavers

1529 search results - page 4 / 306
» Energy-Based Models of P Systems
Sort
View
KES
2005
Springer
14 years 26 days ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel
INFOCOM
2010
IEEE
13 years 5 months ago
Understanding Sub-stream Scheduling in P2P Hybrid Live Streaming Systems
—The P2P pull-push hybrid architecture has achieved great success in delivering live video traffic over the Internet. However, a formal study on the sub-stream scheduling proble...
Zhenjiang Li, Danny H. K. Tsang, Wang-Chien Lee
SIGMETRICS
2006
ACM
14 years 1 months ago
Fluid modeling of pollution proliferation in P2P networks
P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsu...
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith...
INFOCOM
2010
IEEE
13 years 5 months ago
Collaborative Measurements of Upload Speeds in P2P Systems
—In this paper, we study the theory of collaborative upload bandwidth measurement in peer-to-peer environments. A host can use a bandwidth estimation probe to determine the bandw...
John R. Douceur, James W. Mickens, Thomas Moscibro...
PDCAT
2005
Springer
14 years 26 days ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski