Sciweavers

2912 search results - page 29 / 583
» Overlay Networks - Implementation by Specification
Sort
View
USITS
2003
13 years 9 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
IM
2003
13 years 9 months ago
Peer-to-Peer Overlay Network Management through AGILE
: Currently, state of the art peer-to-peer (P2P) lookup mechanisms actively create and manage a peer application layer overlay network to achieve scalability and efficiency. The pr...
Jan Mischke, Burkhard Stiller
IWQOS
2005
Springer
14 years 1 months ago
Overlay Networks with Linear Capacity Constraints
Abstract. Previous work have assumed an independent model for overlay networks: a graph with independent link capacities. We introduce a model of overlays (LCC-overlay) which incor...
Ying Zhu, Baochun Li
IMC
2005
ACM
14 years 1 months ago
Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems
During recent years, peer-to-peer (P2P) file-sharing systems have evolved in many ways to accommodate growing numbers of participating peers. In particular, new features have cha...
Daniel Stutzbach, Reza Rejaie, Subhabrata Sen
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
13 years 11 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos