Sciweavers

14054 search results - page 58 / 2811
» P
Sort
View
114
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...
96
Voted
WWW
2004
ACM
16 years 3 months ago
A query algebra for xml p2p databases
This paper describes a query algebra for queries over XML p2p databases that provides explicit mechanisms for modeling data dissemination, replication constraints, and for capturi...
Carlo Sartiani
121
Voted
SAINT
2008
IEEE
15 years 9 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
125
Voted
ICDCSW
2007
IEEE
15 years 9 months ago
A P2P Groupware Framework based on Operational Transformations
- Groupware applications deal with propagation of changes to networked users, consistency maintenance on concurrent access, and provision of awareness. We have built a P2P groupwar...
Leandro Quiroga, Alejandro Fernandez
98
Voted
WETICE
2006
IEEE
15 years 8 months ago
A Trust-enabled P2P Recommender System
In this paper we present a trust-oriented method that can be used when building P2P recommender systems. We discuss its benefits in comparison to centralized solutions, its requir...
Georgios Pitsilis, Lindsay Marshall