Sciweavers

372 search results - page 13 / 75
» p2p 2008
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 7 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
SYRCODIS
2008
104views Database» more  SYRCODIS 2008»
13 years 9 months ago
Search Request Routing in Bittorrent and other P2P based File Sharing Networks
Existing p2p file sharing networks doesn't always give their users abilities to make an effective and fast searches for particular data. In this paper we introduce some impro...
Konstantin Scherbakov
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 2 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
DEXAW
2008
IEEE
129views Database» more  DEXAW 2008»
14 years 2 months ago
SODA: An Algorithm to Guarantee Correctness of Concurrent Transaction Execution in Mobile P2P Databases
This paper proposes an optimistic concurrency control (CC) algorithm, called Sequential Order with Dynamic Adjustment (SODA), that guarantees timely and correct execution of concu...
Zhaowen Xing, Le Gruenwald, K. K. Phang
PVLDB
2010
135views more  PVLDB 2010»
13 years 6 months ago
P2PDocTagger: Content management through automated P2P collaborative tagging
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...
Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong ...