Sciweavers

548 search results - page 24 / 110
» Secure peer sampling
Sort
View
ECAI
2004
Springer
14 years 3 months ago
Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining
Spontaneous formation of peer-to-peer agent-based data mining systems seems a plausible scenario in years to come. However, the emergence of peer-to-peer environments further exace...
Josenildo Costa da Silva, Matthias Klusch, Stefano...
ISWC
2003
IEEE
14 years 3 months ago
Peer-to-Peer Policy Management System for Wearable Mobile Devices
Wearable computing devices are obviously made all the more powerful due to their ability to be innately mobile. With this in mind, spontaneous peer-to-peer networks may emerge amo...
Michael Massimi, Ursula Wolz
SIGMETRICS
2008
ACM
13 years 9 months ago
A view-probability-matrix approach to the modelling of gossiping protocols
This paper addresses the quantitative analysis of gossiping protocols. In contrast to existing approaches which are entirely based on the simulation of the individual nodes' ...
Thomas Krieger, Martin Riedl, Johann Schuster, Mar...
INFOCOM
2011
IEEE
13 years 1 months ago
Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints
— We consider a peer-to-peer network where nodes can send and receive files amongst their peers. File requests are generated randomly, and each new file can correspond to a dif...
Michael J. Neely, Leana Golubchik
SPW
2004
Springer
14 years 3 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander