Sciweavers

663 search results - page 34 / 133
» From P2P to reliable semantic P2P systems
Sort
View
TKDE
2010
272views more  TKDE 2010»
13 years 6 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
INFOCOM
2006
IEEE
14 years 1 months ago
"Take One Get One Free": Leveraging P2P Networks for Content Promotion
— The nature of digital content is undergoing a radical transformation due to the growing infusion of user-generated content. Users that generate content have a strong motivation...
Himabindu Pucha, Sabyasachi Roy, Y. Charlie Hu
SIGMOD
2005
ACM
108views Database» more  SIGMOD 2005»
14 years 7 months ago
Guaranteeing Correctness and Availability in P2P Range Indices
New and emerging P2P applications require sophisticated range query capability and also have strict requirements on query correctness, system availability and item availability. W...
Prakash Linga, Adina Crainiceanu, Johannes Gehrke,...
ISPAN
2005
IEEE
14 years 1 months ago
P2P Architecture for Self-Atomic Memory
We propose an architecture for self-adjusting and self-healing atomic memory in highly dynamic systems exploiting peer-to-peer (p2p) techniques. Our approach, named SAM, brings to...
Emmanuelle Anceaume, Maria Gradinariu, Vincent Gra...
MUE
2009
IEEE
144views Multimedia» more  MUE 2009»
14 years 2 months ago
Maxtream: Stabilizing P2P Streaming by Active Prediction of Behavior Patterns
In theory, peer-to-peer (P2P) based streaming designs and simulations provide a promising alternative to serverbased streaming systems both in cost and scalability. In practice ho...
Shay Horovitz, Danny Dolev