Sciweavers

372 search results - page 39 / 75
» p2p 2008
Sort
View
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
14 years 1 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
COMCOM
2008
83views more  COMCOM 2008»
13 years 7 months ago
Hierarchical multidimensional search in peer-to-peer networks
We propose a P2P search solution, called EZSearch, that enables efficient multidimensional search for remotely located contents that best match the search criteria. EZSearch is a h...
Duc A. Tran, T. Nguyen
ICIW
2008
IEEE
14 years 2 months ago
Governed Content Distribution on DHT Based Networks
Abstract—Peer-to-Peer (P2P) systems are widely used for sharing digital items without structured metadata and in absence of any kind of digital rights management applied to the d...
Walter Allasia, Francesco Gallo, Marco Milanesio, ...
CONCURRENCY
2008
99views more  CONCURRENCY 2008»
13 years 7 months ago
TRIBLER: a social-based peer-to-peer system
Most current P2P file sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them. However, social phenomena...
Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno ...
IPPS
2008
IEEE
14 years 2 months ago
ContinuStreaming: Achieving high playback continuity of Gossip-based Peer-to-Peer streaming
Gossip-based Peer-to-Peer(P2P) streaming has been proved to be an effective and resilient method to stream qualified media contents in dynamic and heterogeneous network environme...
Zhenhua Li, Jiannong Cao, Guihai Chen