Sciweavers

COMCOM
2008
70views more  COMCOM 2008»
13 years 11 months ago
Partial read from peer-to-peer databases
Farnoush Banaei Kashani, Cyrus Shahabi
COMCOM
2008
72views more  COMCOM 2008»
13 years 11 months ago
Stochastic analysis of the interplay between object maintenance and churn
Due to the prevalence of peer dynamics (i.e., churn), object maintenance becomes a fundamental issue in peer-to-peer storage systems. Although quite a few prototypes have been des...
Di Wu, Ye Tian, Kam-Wing Ng, Anwitaman Datta
COMCOM
2008
145views more  COMCOM 2008»
13 years 11 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COMCOM
2008
110views more  COMCOM 2008»
13 years 11 months ago
Guest editors' introduction: Foundation of peer-to-peer computing
Javed I. Khan, Adam Wierzbicki
COMCOM
2008
84views more  COMCOM 2008»
13 years 11 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse
COMCOM
2008
55views more  COMCOM 2008»
13 years 11 months ago
A framework for P2P application development
James Walkerdine, Danny Hughes, Paul Rayson, John ...
COMCOM
2008
127views more  COMCOM 2008»
13 years 11 months ago
A dynamic routing protocol for keyword search in unstructured peer-to-peer networks
The idea of building query-oriented routing indices has changed the way of improving keyword search efficiency from the basis as it can learn the content distribution from the que...
Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Y...
COMCOM
2008
99views more  COMCOM 2008»
13 years 11 months ago
Efficiently reconfigurable backbones for wireless sensor networks
We present the definition and performance evaluation of a protocol for building and maintaining a connected backbone among the nodes of a wireless sensor networks (WSN). Building ...
Stefano Basagni, Chiara Petrioli, Roberto Petrocci...
COMCOM
2008
154views more  COMCOM 2008»
13 years 11 months ago
Analysis of hybrid P2P overlay network topology
Modeling peer-to-peer (P2P) networks is a challenge for P2P researchers. In this paper, we provide a detailed analysis of large-scale hybrid P2P overlay network topology, using Gn...
Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan