Sciweavers

372 search results - page 7 / 75
» p2p 2008
Sort
View
TKDE
2010
272views more  TKDE 2010»
13 years 6 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
AINA
2008
IEEE
14 years 2 months ago
FAN: A Scalable Flabellate P2P Overlay Supporting Multi-Dimensional Attributes
Wei Song, Ruixuan Li, Zhengding Lu, Guangcan Yu
COLCOM
2008
IEEE
14 years 2 months ago
An Undo Framework for P2P Collaborative Editing
Abstract. Existing Peer to Peer (P2P) collaborative editing systems do not allow any user to undo any modification. However, in such systems, users are not aware of others’ modi...
Stéphane Weiss, Pascal Urso, Pascal Molli
SIGMETRICS
2008
ACM
13 years 7 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
P2P
2008
IEEE
135views Communications» more  P2P 2008»
14 years 2 months ago
Popularity-Aware Prefetch in P2P Range Caching
Unstructured peer-to-peer infrastructure has been widely employed to support large-scale distributed applications. Many of these applications, such as locationbased services and m...
Qiang Wang, Khuzaima Daudjee, M. Tamer Özsu