Sciweavers

2287 search results - page 47 / 458
» Peer data exchange
Sort
View
ICCCN
2008
IEEE
14 years 3 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
P2P
2008
IEEE
102views Communications» more  P2P 2008»
14 years 3 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
MMS
2006
13 years 8 months ago
A Generic Agent-based Peer-to-Peer Infrastructure for Social-mobile Applications
: This paper presents a generic agent-based framework for social-mobile applications, which has been developed as part of an ongoing linkage project. The MobiSoft project is driven...
Steffen Kern, Torsten Dettborn, Ronny Eckhaus, Yan...
CAISE
2003
Springer
14 years 2 months ago
Leveraging Web-Services and Peer-to-Peer Networks
Abstract. Peer-oriented computing is an attempt to weave interconnected machines into the fabric of the Internet. Service-oriented computing (exemplified by web-services), on the ...
Mike P. Papazoglou, Bernd J. Krämer, Jian Yan...
EDBT
2008
ACM
123views Database» more  EDBT 2008»
14 years 9 months ago
XML data integration in SixP2P: a theoretical framework
In the paper we discuss the problem of data integration in a P2P environment. In such setting each peer stores schema of its local data, mappings between the schema and schemas of...
Tadeusz Pankowski