Sciweavers

P2P
2010
IEEE
130views Communications» more  P2P 2010»
13 years 10 months ago
Online Video Using BitTorrent and HTML5 Applied to Wikipedia
—Wikipedia started a project in order to enable users to add video and audio on their Wiki pages. The technical downside of this is that its bandwidth requirements will increase ...
Arno Bakker, Riccardo Petrocco, Michael Dale, Jan ...
P2P
2010
IEEE
207views Communications» more  P2P 2010»
13 years 10 months ago
Local Access to Sparse and Large Global Information in P2P Networks: A Case for Compressive Sensing
—In this paper we face the following problem: how to provide each peer local access to the full information (not just a summary) that is distributed over all edges of an overlay ...
Rossano Gaeta, Marco Grangetto, Matteo Sereno
P2P
2010
IEEE
115views Communications» more  P2P 2010»
13 years 10 months ago
IMP: ISP-Managed P2P
—Internet Service Providers (ISPs) have failed to reduce the cost of peer-to-peer (P2P) traffic. Traffic throttling devices increase user download times, and caches store content...
Shakir James, Patrick Crowley
P2P
2010
IEEE
111views Communications» more  P2P 2010»
13 years 10 months ago
Network Friendly P2P-TV: The Napa-Wine Approach
Luca Abeni, A. Bakay, M. Biazzini, Robert Birke, E...
P2P
2010
IEEE
144views Communications» more  P2P 2010»
13 years 10 months ago
Hivory: Range Queries on Hierarchical Voronoi Overlays
Abstract—The problem of defining a support for multidimensional range queries on P2P overlays is currently an active field of research. Several approaches based on the extensio...
Matteo Mordacchini, Laura Ricci, Luca Ferrucci, Mi...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 10 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
NOMS
2010
IEEE
171views Communications» more  NOMS 2010»
13 years 10 months ago
Operator and radio resource sharing in multi-carrier environments
—Today’s mobile networks prevent users from freely accessing all available networks. Instead, seamless network composition could present a win-win situation for both users and ...
Pongsakorn Teeraparpwong, Per Johansson, Harsha V....
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
13 years 10 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
NOMS
2010
IEEE
163views Communications» more  NOMS 2010»
13 years 10 months ago
DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliability
—PhoneFactor is a two-factor authentication service that combines the knowledge-based authenticator with an objectbased authenticator in which the object-based authenticator has ...
Haiyang Qian, Chandra Sekhar Surapaneni, Marsh Ray...