Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
228
search results - page 4 / 46
»
p2p 2005
Sort
relevance
views
votes
recent
update
View
thumb
title
139
Voted
P2P
2005
IEEE
110
views
Communications
»
more
P2P 2005
»
Presence-Based Availability and P2P Systems
15 years 9 months ago
Download
www.cs.washington.edu
The availability of a P2P service is a function of the individual peers’ availabilities, and it is often desirable to estimate how available a particular P2P service will be giv...
Richard J. Dunn, John Zahorjan, Steven D. Gribble,...
claim paper
Read More »
91
Voted
ICDCS
2005
IEEE
85
views
Distributed And Parallel Com...
»
more
ICDCS 2005
»
Supporting Complex Multi-Dimensional Queries in P2P Systems
15 years 9 months ago
Download
www.eecs.umich.edu
Bin Liu, Wang-Chien Lee, Dik Lun Lee
claim paper
Read More »
107
Voted
NCA
2005
IEEE
78
views
Computer Networks
»
more
NCA 2005
»
Dynamic Quorums for DHT-based P2P Networks
15 years 9 months ago
Download
www.dis.uniroma1.it
Roberto Baldoni, Leonardo Querzoni, Antonino Virgi...
claim paper
Read More »
97
click to vote
CAEPIA
2005
Springer
86
views
Artificial Intelligence
»
more
CAEPIA 2005
»
Coalition Formation in P2P File Sharing Systems
15 years 9 months ago
Download
www.lcc.uma.es
María-Victoria Belmonte, Ricardo Conejo, M....
claim paper
Read More »
127
Voted
ISPA
2005
Springer
115
views
Distributed And Parallel Com...
»
more
ISPA 2005
»
The Application of Collaborative Filtering for Trust Management in P2P Communities
15 years 9 months ago
Download
www.philosophicalturn.net
The open and anonymous nature of P2P services opens the door to malicious peers who cause the loss of trust by providing corrupted data or
Min Zuo, Kai Wang, Jianhua Li
claim paper
Read More »
« Prev
« First
page 4 / 46
Last »
Next »