Sciweavers

P2P
2008
IEEE
14 years 6 months ago
Query Workload Driven Summarization for P2P Query Routing
Linh Thai Nguyen, Wai Gen Yee, Ophir Frieder
P2P
2008
IEEE
109views Communications» more  P2P 2008»
14 years 6 months ago
LiveShift: Peer-to-Peer Live Streaming with Distributed Time-Shifting
Fabio Victora Hecht, Thomas Bocek, Cristian Morari...
P2P
2008
IEEE
122views Communications» more  P2P 2008»
14 years 6 months ago
CYBER: A CommunitY-Based sEaRch engine
Yingguang Li, Lidan Shou, Kian-Lee Tan
P2P
2008
IEEE
137views Communications» more  P2P 2008»
14 years 6 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
P2P
2008
IEEE
135views Communications» more  P2P 2008»
14 years 6 months ago
Popularity-Aware Prefetch in P2P Range Caching
Unstructured peer-to-peer infrastructure has been widely employed to support large-scale distributed applications. Many of these applications, such as locationbased services and m...
Qiang Wang, Khuzaima Daudjee, M. Tamer Özsu
P2P
2008
IEEE
184views Communications» more  P2P 2008»
14 years 6 months ago
Ad Hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Hasan Guclu, Durgesh Kumari, Murat Yuksel
P2P
2008
IEEE
14 years 6 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
P2P
2008
IEEE
14 years 6 months ago
Playing with the Bandwidth Conservation Law
We investigate performance bounds of P2P systems by application of the law of bandwidth conservation. This approach is quite general and allows us to consider various sharing syst...
Farid Benbadis, Fabien Mathieu, Nidhi Hegde, Diego...
P2P
2008
IEEE
14 years 6 months ago
Peer-to-Peer Traffic in Operator Networks
Ayodele Damola, Victor Souza, Per Karlsson, Howard...
P2P
2008
IEEE
14 years 6 months ago
Designs and Evaluation of a Tracker in P2P Networks
The ”tracker” of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server t...
Adele Lu Jia, Dah-Ming Chiu