Sciweavers

EUROPAR
2007
Springer
14 years 5 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
IPPS
2007
IEEE
14 years 5 months ago
VoroNet: A scalable object network based on Voronoi tessellations
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental...
Olivier Beaumont, Anne-Marie Kermarrec, Loris Marc...
ICON
2007
IEEE
14 years 5 months ago
"Free-riding" traffic problem in routing overlay networks
—In this paper, we discuss the “free-riding” traffic problem in routing overlay networks, which is mainly caused by a policy mismatch between the overlay routing and the und...
Go Hasegawa, Masayoshi Kobayashi, Masayuki Murata,...
GLOBECOM
2007
IEEE
14 years 5 months ago
Using Type-of-Relationship (ToR) Graphs to Select Disjoint Paths in Overlay Networks
— Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid ro...
Sameer Qazi, Tim Moors
GLOBECOM
2007
IEEE
14 years 5 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 5 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
IPPS
2008
IEEE
14 years 6 months ago
PROD: Relayed file retrieving in overlay networks
— To share and exchange the files among Internet users, Peerto-Peer (P2P) applications build another layer of overlay networks on top of the Internet Infrastructure. In P2P fil...
Zhiyong Xu, D. Stefanescu, Honggang Zhang, Laxmi N...
ISCC
2009
IEEE
262views Communications» more  ISCC 2009»
14 years 6 months ago
Babelchord: a social tower of DHT-based overlay networks
Chord is a protocol to distribute and retrieve information at large scale. It builds a large but rigid overlay network without taking into account the social nature and the underl...
Luigi Liquori, Cédric Tedeschi, Francesco B...
ICAC
2009
IEEE
14 years 6 months ago
Knowledge delivery mechanism for autonomic overlay network management
The complexity of current computing networks and the required fluidity of their operation requires autonomy to be central to the design and implementation of a managed overlay net...
Dominic Jones, John Keeney, David Lewis, Declan O'...
SOSP
2005
ACM
14 years 8 months ago
Implementing declarative overlays
Overlay networks are used today in a variety of distributed systems ranging from file-sharing and storage systems to communication infrastructures. However, designing, building a...
Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein...