Sciweavers

2912 search results - page 86 / 583
» Overlay Networks - Implementation by Specification
Sort
View
LCN
2006
IEEE
14 years 4 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...
ICAS
2005
IEEE
109views Robotics» more  ICAS 2005»
14 years 3 months ago
Proactive Route Maintenance and Overhead Reduction for Application Layer Multicast
— The purpose of this study is to maintain efficient backup routes for restoring overlay trees. In most conventional methods, after a node leaves the trees, its children start se...
Tetsuya Kusumoto, Yohei Kunichika, Jiro Katto, Sak...
IPPS
2008
IEEE
14 years 4 months ago
Self-optimizing distributed trees
We present a novel protocol for restructuring a treebased overlay network in response to the workload of the application running over it. Through low-cost restructuring operations...
Michael K. Reiter, Asad Samar, Chenxi Wang
SIGOPSE
2004
ACM
14 years 3 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
EUC
2008
Springer
13 years 12 months ago
RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances
We present RT-P2P, a real-time peer-to-peer (P2P) system that allows application-level end-to-end timing requirements to be satisfied in P2P systems. P2P systems are fundamentally...
Fei Huang, Binoy Ravindran, E. Douglas Jensen