Sciweavers

1016 search results - page 45 / 204
» Peering Peer-to-Peer Providers
Sort
View
JSAC
2006
106views more  JSAC 2006»
13 years 10 months ago
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disrup...
Kotikalapudi Sriram, Doug Montgomery, Oliver Borch...
GIS
2009
ACM
14 years 12 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ELPUB
2006
ACM
14 years 4 months ago
Serving Innovation in Scholarly Communication with the Open Platform "Digital Peer Publishing"
The internet causes a continuous emergence of novel forms of scholarly communication and collaboration. Electronic publishing provides a means for representing eventual outcomes o...
Wolfram Horstmann, Peter Reimer, Jochen Schirrwage...
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
14 years 4 months ago
DMW - A Middleware for Digital Rights Management in Peer-to-Peer Networks
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
Praveen Kumar, G. Sridhar, V. Sridhar, R. Gadh
FTDCS
2004
IEEE
14 years 2 months ago
Exploiting Semantic Proximity in Peer-to-Peer Content Searching
A lot of recent work has dealt with improving performance of content searching in peer-to-peer file sharing systems. In this paper we attack this problem by modifying the overlay ...
Spyros Voulgaris, Anne-Marie Kermarrec, Laurent Ma...