Sciweavers

372 search results - page 52 / 75
» p2p 2008
Sort
View
EDBT
2008
ACM
151views Database» more  EDBT 2008»
14 years 7 months ago
Decentralized managing of replication objects in massively distributed systems
Data replication is a central technique to increase availability and performance of distributed systems. While offering many advantages it also requires more effort for ensuring d...
Daniel Klan, Kai-Uwe Sattler, Katja Hose, Marcel K...
AINA
2008
IEEE
13 years 9 months ago
UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent
BitTorrent is one of the most well known peer-topeer file sharing applications, accounting for a significant proportion of Internet traffic. Current BitTorrent system builds its o...
Wei Li, Shanzhi Chen, Tao Yu
P2P
2008
IEEE
137views Communications» more  P2P 2008»
14 years 1 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
CIC
2003
140views Communications» more  CIC 2003»
13 years 9 months ago
Magic Square: Scalable Peer-to-Peer Lookup Protocol Considering Peer's Characteristics
One of the research problems in P2P computing is to look up and store the resource efficiently. The recent algorithms developed by several research groups for the lookup problem p...
Sun-Mi Park, Il-dong Jung, Dong-joo Song, Young-su...
TON
2008
76views more  TON 2008»
13 years 7 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun