Sciweavers

1062 search results - page 12 / 213
» Models and Languages for Overlay Networks
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 7 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
13 years 11 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
CONEXT
2008
ACM
13 years 9 months ago
EGOIST: overlay routing using selfish neighbor selection
A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals ...
Georgios Smaragdakis, Vassilis Lekakis, Nikolaos L...
MMS
2007
13 years 9 months ago
An Experimental Frame for Evaluating Service Trading Overlays in Mobile ad-hoc Networks
Abstract: For evaluating dynamics of mobile ad-hoc networks at least three different layers have to be distinguished: the application layer, the protocol layer, and the network lay...
Mathias Röhl, Adelinde M. Uhrmacher, Birgitta...
COLCOM
2005
IEEE
14 years 1 months ago
Symbiotic multi-path routing with attractor selection
In this paper we discuss the effects of symbiosis when using an attractor selection model for multi-path routing in an overlay network. Attractor selection is a biologically inspi...
Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata