Sciweavers

P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 5 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
P2P
2007
IEEE
14 years 5 months ago
The Effect of Viral Media on Business Usage of P2P
P2P file-sharing poses a number of serious problems for business network administrators including: unpredictable network usage, increased vulnerability to security threats and the...
Danny Hughes, James Walkerdine, Kevin Lee
P2P
2007
IEEE
101views Communications» more  P2P 2007»
14 years 5 months ago
Grid Resource Scheduling with Gossiping Protocols
Abstract— Grid resource providers can use gossiping to disseminate their available resource state to remote regions of the grid to attract application load. Pairwise gossiping pr...
Deger Cenk Erdil, Michael J. Lewis
P2P
2007
IEEE
110views Communications» more  P2P 2007»
14 years 5 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
P2P
2007
IEEE
14 years 5 months ago
A Data Placement Scheme with Time-Related Model for P2P Storages
Maintaining desired data availability while minimizing costs is the primary challenge in designing P2P storages. Data placement schemes and data availability calculation methods a...
Jing Tian, Zhi Yang, Yafei Dai
P2P
2007
IEEE
139views Communications» more  P2P 2007»
14 years 5 months ago
A Trust-Based Exchange Framework for Multiple Services in P2P Systems
In this paper we propose fully distributed trustbased policies for p2p systems to regulate the exchange of different type of services and discourage misbehaviour. In a system of p...
Anna Satsiou, Leandros Tassiulas
P2P
2007
IEEE
156views Communications» more  P2P 2007»
14 years 5 months ago
Completeness Estimation of Range Queries in Structured Overlays
Range queries are a very powerful tool in a wide range of data management systems and are vital to a multitude of applications. The hierarchy of structured overlay systems can be ...
Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt
P2P
2007
IEEE
14 years 5 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer
P2P
2007
IEEE
113views Communications» more  P2P 2007»
14 years 5 months ago
Handling Network Partitions and Mergers in Structured Overlay Networks
Structured overlay networks form a major class of peerto-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-s...
Tallat M. Shafaat, Ali Ghodsi, Seif Haridi
P2P
2007
IEEE
107views Communications» more  P2P 2007»
14 years 5 months ago
Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies
Current P2P systems employ tit-for-tat strategies, where peers only upload when they are simultaneously downloading, to avoid free riding. We derive optimal tit-for-tat strategies...
Dimitri do B. DeFigueiredo, Balaji Venkatachalam, ...