Sciweavers

209 search results - page 33 / 42
» p2p 2009
Sort
View
ICPP
2009
IEEE
13 years 8 months ago
Heterogeneity-Aware Erasure Codes for Peer-to-Peer Storage Systems
Peer-to-peer (P2P) storage systems rely on data redundancy to obtain high levels of data availability. Among the existing data redundancy schemes, erasure coding is a widely adopte...
Lluis Pamies-Juarez, Pedro García Ló...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
14 years 5 months ago
On Modeling Clustering Indexes of BT-Like Systems
Abstract—In this paper, we explore the “clustering” phenomenon in BT-like systems. A high clustering implies peers have a high tendency to exchange information with peers of ...
Qiuhui Li, John Chi-Shing Lui
ICIW
2009
IEEE
13 years 8 months ago
A Recommender System for Web Services Discovery in a Distributed Registry Environment
In this paper, we discuss the suitability of using recommendation techniques for Web service discovery in distributed registry environments. The architecture we adopt consists in ...
Mohamed Sellami, Samir Tata, Zakaria Maamar, Bruno...
CISIS
2009
IEEE
14 years 5 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
WETICE
2009
IEEE
14 years 5 months ago
Search Optimizations in Structured Peer-to-Peer Systems
Abstract—DHT systems are structured overlay networks capable of using P2P resources as a scalable platform for very large data storage applications. However, their efficiency ex...
Nuno Lopes, Carlos Baquero