Sciweavers

32 search results - page 5 / 7
» Foresighted Resource Reciprocation Strategies in P2P Network...
Sort
View
AIMS
2009
Springer
14 years 6 days ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
P2P
2005
IEEE
14 years 1 months ago
Quantifying Agent Strategies under Reputation
Our research proposes a simple buyer/seller game that captures the incentives dictating the interaction between peers in resource trading peer-to-peer networks. We prove that for ...
Sergio Marti, Hector Garcia-Molina
P2P
2008
IEEE
14 years 1 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
IPPS
2006
IEEE
14 years 1 months ago
Model-based evaluation of search strategies in peer-to-peer networks
This paper exploits a previously developed analytical modeling framework to compare several variations of the basic flooding search strategy in unstructured decentralized peer-to...
Rossano Gaeta, Matteo Sereno
NCA
2005
IEEE
14 years 1 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan