Sciweavers

372 search results - page 11 / 75
» p2p 2008
Sort
View
CCR
2006
110views more  CCR 2006»
13 years 7 months ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis
PVLDB
2008
112views more  PVLDB 2008»
13 years 7 months ago
P2P logging and timestamping for reconciliation
In this paper, we address data reconciliation in peer-to-peer (P2P) collaborative applications. We propose P2P-LTR (Logging and Timestamping for Reconciliation) which provides P2P...
Mounir Tlili, William Kokou Dedzoe, Esther Pacitti...
ICIW
2008
IEEE
14 years 2 months ago
NAT Traversal for Pure P2P e-Learning System
Abstract—In this paper, we present Network Address Translator (NAT) traversal technique suitable for pure P2P applications, such as a distributed asynchronous Web-Based Training ...
Kazuo Kuramochi, Takao Kawamura, Kazunori Sugahara
PERCOM
2008
ACM
13 years 7 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
ISCC
2008
IEEE
14 years 2 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...