Sciweavers

372 search results - page 6 / 75
» p2p 2008
Sort
View
CN
2010
77views more  CN 2010»
13 years 6 months ago
Preventing DDoS attacks on internet servers exploiting P2P systems
Xin Sun, Ruben Torres, Sanjay G. Rao
P2P
2008
IEEE
14 years 2 months ago
P2P Information Retrieval and Filtering with MAPS
In this demonstration paper we present MAPS, a novel system that combines approximate information retrieval and filtering functionality in a peer-to-peer setting. In MAPS, a user...
Christian Zimmer, Johannes Heinz, Christos Tryfono...
AIMS
2008
Springer
13 years 9 months ago
A Distributed Certification System for Structured P2P Networks
In this paper, we present a novel distributed certification system in which signing a certificate needs the collaboration of a fixed ratio of the nodes, hence a varying number of n...
François Lesueur, Ludovic Mé, Val&ea...
ICYCS
2008
IEEE
14 years 2 months ago
Propagation Model of Active Worms in P2P Networks
P2P worms pose heavy threatens to P2P networks. P2P worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentiall...
Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, L...
CONCURRENCY
2008
82views more  CONCURRENCY 2008»
13 years 6 months ago
Segregation and scheduling for P2P applications with the interceptor middleware system
Very large size Peer-to-Peer systems are often required to implement efficient and scalable services, but usually they can be built only by assembling resources contributed by man...
Cosimo Anglano