Sciweavers

372 search results - page 19 / 75
» p2p 2008
Sort
View
DSRT
2008
IEEE
14 years 2 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
SAINT
2008
IEEE
14 years 2 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
COMCOM
2008
154views more  COMCOM 2008»
13 years 7 months ago
Analysis of hybrid P2P overlay network topology
Modeling peer-to-peer (P2P) networks is a challenge for P2P researchers. In this paper, we provide a detailed analysis of large-scale hybrid P2P overlay network topology, using Gn...
Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan
OPODIS
2008
13 years 9 months ago
Degree 3 Suffices: A Large-Scale Overlay for P2P Networks
Most peer-to-peer (P2P) networks proposed until now have either logarithmic degree and logarithmic dilation or constant degree and logarithmic dilation. In the latter case (which i...
Marcin Bienkowski, André Brinkmann, Mirosla...
COMCOM
2008
138views more  COMCOM 2008»
13 years 7 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...