Sciweavers

372 search results - page 11 / 75
» p2p 2008
Sort
View
132
Voted
CCR
2006
110views more  CCR 2006»
15 years 3 months ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis
124
Voted
PVLDB
2008
112views more  PVLDB 2008»
15 years 3 months ago
P2P logging and timestamping for reconciliation
In this paper, we address data reconciliation in peer-to-peer (P2P) collaborative applications. We propose P2P-LTR (Logging and Timestamping for Reconciliation) which provides P2P...
Mounir Tlili, William Kokou Dedzoe, Esther Pacitti...
136
Voted
ICIW
2008
IEEE
15 years 10 months ago
NAT Traversal for Pure P2P e-Learning System
Abstract—In this paper, we present Network Address Translator (NAT) traversal technique suitable for pure P2P applications, such as a distributed asynchronous Web-Based Training ...
Kazuo Kuramochi, Takao Kawamura, Kazunori Sugahara
170
Voted
PERCOM
2008
ACM
15 years 3 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
ISCC
2008
IEEE
15 years 10 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...