Sciweavers

375 search results - page 35 / 75
» p2p 2007
Sort
View
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 3 months ago
Application-Aware Topology Formation Algorithm for Peer-to-Peer Networks
—When constructing an unstructured P2P topology, one should consider the application running on top of it in order to achieve a good performance for the whole P2P system. It is n...
Kin Wah Kwong, Danny H. K. Tsang
LCN
2007
IEEE
14 years 3 months ago
A Prototype Power Management Proxy for Gnutella Peer-to-Peer File Sharing
— In order to be part of a peer-to-peer (P2P) file sharing network a host must be fully powered-on all of the time. In addition to providing a user interface, a P2P host handles ...
Miguel Jimeno, Kenneth J. Christensen
MIDDLEWARE
2007
Springer
14 years 3 months ago
CAESAR: middleware for complex service-oriented peer-to-peer applications
Recent research advances in Peer-to-Peer (P2P) computing have enabled the P2P paradigm to be used for developing complex applications beyond file sharing and data storage. These ...
Lipo Chan, Shanika Karunasekera, Aaron Harwood, Eg...
CSREASAM
2006
13 years 10 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp
PAM
2009
Springer
14 years 3 months ago
Measuring Mobile Peer-to-Peer Usage: Case Finland 2007
We study the development of mobile peer-to-peer (MP2P) traffic and the usage of MP2P applications in Finland during 2005-2007. Research data consists of 1) traffic traces measured ...
Mikko V. J. Heikkinen, Antero Kivi, Hannu Verkasal...