Abstract—In this paper, we present Network Address Translator (NAT) traversal technique suitable for pure P2P applications, such as a distributed asynchronous Web-Based Training ...
Are P2P systems and applications here to stay? Or are they a bright meteor whose destiny is to disappear soon? In this paper we try to give a positive answer to the first questio...
Renato Lo Cigno, Tommaso Pecorella, Matteo Sereno,...
—P2P streaming has attracted much attention recently with promises for higher revenues and better load distribution. Still, the majority of P2P video streaming systems today empl...
Osama Abboud, Thomas Zinner, Konstantin Pussep, Si...
In this paper we present a trust-oriented method that can be used when building P2P recommender systems. We discuss its benefits in comparison to centralized solutions, its requir...
—P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-leve...
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulo...