Sciweavers

1493 search results - page 297 / 299
» Self-Organization in Overlay Networks
Sort
View
CEAS
2008
Springer
13 years 8 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 6 months ago
Architecture for Cooperative Prefetching in P2P Video-on- Demand System
Most P2P VoD schemes focused on service architectures and overlays optimization without considering segments rarity and the performance of prefetching strategies. As a result, the...
Ubaid Abbasi, Toufik Ahmed
CORR
2010
Springer
338views Education» more  CORR 2010»
13 years 6 months ago
Optimal Distributed P2P Streaming under Node Degree Bounds
We study the problem of maximizing the broadcast rate in peer-to-peer (P2P) systems under node degree bounds, i.e., the number of neighbors a node can simultaneously connect to is ...
Shaoquan Zhang, Ziyu Shao, Minghua Chen
CORR
2010
Springer
224views Education» more  CORR 2010»
13 years 6 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam
JSA
2008
136views more  JSA 2008»
13 years 6 months ago
Evaluation and optimization of a peer-to-peer video-on-demand system
Video-on-demand (VoD) is increasingly popular with internet users. However, VoD is costly due to the load placed on video servers. Peer-to-peer (P2P) techniques are an approach to...
Bin Cheng, Xiuzheng Liu, Zheng Zhang, Hai Jin, Lex...