Sciweavers

1250 search results - page 171 / 250
» Membership-concealing overlay networks
Sort
View
NOSSDAV
2005
Springer
14 years 3 months ago
Natural selection in peer-to-peer streaming: from the cathedral to the bazaar
Success of peer-to-peer applications in many cases is attributed to user altruism, where a user contributes some of its own resources to facilitate performance of other users. Thi...
Vivek Shrivastava, Suman Banerjee
BROADNETS
2005
IEEE
14 years 4 months ago
QoS Provisioning via admission control in cellular/wireless LAN interworking
— It is widely recognized that the next-generation wireless networks will integrate heterogeneous wireless technologies. The complementary characteristics of cellular networks an...
Wei Song, Weihua Zhuang
IPTPS
2004
Springer
14 years 3 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
OPODIS
2004
13 years 11 months ago
Self-optimizing DHTs Using Request Profiling
S (in alphabetic order by speaker surname) Speaker: Uri Abraham (Ben-Gurion University) Title: Self-Stabilizing TimeStamps : Speaker: Anish Arora (Ohio State) Title: Self-Stabilizi...
Alina Bejan, Sukumar Ghosh
IPTPS
2004
Springer
14 years 3 months ago
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting
Abstract— Content sharing is a popular usage of peerto-peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-pe...
Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang...