Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2023
Decentralized Photo Sharing via Named Data Networking
ACM ICN '23: Proceedings of the 10th ACM Conference on Information-Centric NetworkingPages 118–120https://doi.org/10.1145/3623565.3623755The semantic naming and data-centric security paradigm of Named Data Networking opens up new possibilities for building decentralized applications. In this poster, we identify some factors that lead to centralization and non-interoperability of cloud ...
- research-articleAugust 2020
A Secure File Sharing System Based on IPFS and Blockchain
IECC '20: Proceedings of the 2nd International Electronics Communication ConferencePages 96–100https://doi.org/10.1145/3409934.3409948There is a great interest in many approaches towards blockchain in providing a solution to record transactions in a decentralized way. However, there are some limitations when storing large files or documents on the blockchain. In order to meet the ...
- posterSeptember 2019
ndnShare: File Sharing Application Based on NFD-Android
ICN '19: Proceedings of the 6th ACM Conference on Information-Centric NetworkingPages 165–166https://doi.org/10.1145/3357150.3357416NDN proposes a data-centric communication model which makes it possible to fetch data identified by a name carried in Interest packets. We developed a file sharing application, called ndnShare, for mobile devices. It supports the name-based information ...
- research-articleJune 2019
A Simulation Framework for Peer-to-Peer File Sharing in Named Data Networking
WNS3 '19: Proceedings of the 2019 Workshop on ns-3Pages 57–64https://doi.org/10.1145/3321349.3321357Peer-to-peer file sharing envisions a data-centric dissemination model, where files consisting of multiple data pieces can be downloaded from any peer that can offer the data or from multiple peers simultaneously. This objective, implemented at the ...
- research-articleJanuary 2019
Overcoming Free-Riding Behavior in Peer-to-Peer Networks Using Points System Approach
Procedia Computer Science (PROCS), Volume 151, Issue CPages 1060–1065https://doi.org/10.1016/j.procs.2019.04.150AbstractPeer-to-peer (P2P) networks play an important role in communication and resource sharing. In recent years, the importance of(P2P) networks has increased due to their scalability and simple, cost-efficient model. P2P file-sharing systems with ...
-
- research-articleApril 2018
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage
CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing SystemsPaper No.: 543, Pages 1–12https://doi.org/10.1145/3173574.3174117Users have accumulated years of personal data in cloud storage, creating potential privacy and security risks. This agglomeration includes files retained or shared with others simply out of momentum, rather than intention. We presented 100 online-survey ...
- tutorialSeptember 2017
Systems Applications of Social Networks
ACM Computing Surveys (CSUR), Volume 50, Issue 5Article No.: 63, Pages 1–42https://doi.org/10.1145/3092742The aim of this article is to provide an understanding of social networks as a useful addition to the standard toolbox of techniques used by system designers. To this end, we give examples of how data about social links have been collected and used in ...
- research-articleMay 2016
Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsPages 101–112https://doi.org/10.1145/2858036.2858170People share personal content online with varied audiences, as part of tasks ranging from conversational-style content sharing to collaborative activities. We use an interview- and diary-based study to explore: 1) what factors impact channel choice for ...
- research-articleApril 2016
Mobile platform support for remote music play
SAC '16: Proceedings of the 31st Annual ACM Symposium on Applied ComputingPages 566–571https://doi.org/10.1145/2851613.2851711Along with the development of mobile devices, it became convenient to produce and consume media contents and accordingly, various media applications have been developed. Proliferation of media contents and the desire to share them with others necessitate ...
- articleMarch 2016
A mathematical model for file fragment diffusion and a neural predictor to manage priority queues over BitTorrent
International Journal of Applied Mathematics and Computer Science (IJAMCS), Volume 26, Issue 1Pages 147–160https://doi.org/10.1515/amcs-2016-0010AbstractBitTorrent splits the files that are shared on a P2P network into fragments and then spreads these by giving the highest priority to the rarest fragment. We propose a mathematical model that takes into account several factors such as the peer ...
- articleJanuary 2016
A teamwork approach to improving the downloading time in BitTorrent-like systems
International Journal of Computational Science and Engineering (IJCSE), Volume 12, Issue 4Pages 319–329https://doi.org/10.1504/IJCSE.2016.076939It is well known that the content distribution system based on peer-to-peer P2P networks has become the primary means for the majority of internet users to share their files, and that BitTorrent BT, as the most popular technology in P2P systems, ...
- research-articleOctober 2015
Social-P2P: An Online Social Network Based P2P File Sharing System
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 26, Issue 10Pages 2874–2889https://doi.org/10.1109/TPDS.2014.2359020A peer-to-peer (P2P) file sharing system provides a platform that enables a tremendous number of nodes to share their files. Retrieving desired files efficiently and trustworthily is critical in such a large and jumbled system. However, the issues of ...
- research-articleAugust 2015
A Social Network Based Reputation System for Cooperative P2P File Sharing
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 26, Issue 8Pages 2140–2153https://doi.org/10.1109/TPDS.2014.2346192Current reputation systems for peer-to-peer (P2P) file sharing networks suffer from high overhead on reputation querying. Also, purely relying on a threshold to detect malicious nodes may make a high-reputed node be reluctant to further increase its ...
- Work in ProgressApril 2015
HoverLink: Joint Interactions using Hover Sensing Capability
CHI EA '15: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing SystemsPages 1651–1656https://doi.org/10.1145/2702613.2732822Users often connect two mobile devices at close range to transfer files such as pictures and movies from one device to another. In this paper, we present HoverLink, a new form of joint interactions on two mobile touchscreen devices such as smartphones ...
- research-articleSeptember 2014
Remote monitoring and rehabilitation for patients with neurological diseases
- C. Ferraris,
- R. Nerino,
- A. Chimienti,
- G. Pettiti,
- D. Pianu,
- G. Albani,
- C. Azzaro,
- L. Contin,
- V. Cimolin,
- A. Mauro
BodyNets '14: Proceedings of the 9th International Conference on Body Area NetworksPages 76–82https://doi.org/10.4108/icst.bodynets.2014.257005In this paper we present an upper-limb tele-rehabilitation solution suitable for patients suffering motor impairments due to neurological diseases (e.g. Parkinson's disease). The solution is based on patient subsystems connected to a clinician subsystem ...
- ArticleMay 2014
Influences of Facebook Torrent Dissemination in BitTorrent Swarms
SBRC '14: Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed SystemsPages 258–265https://doi.org/10.1109/SBRC.2014.31Bittorrent is one of the most popular file sharing applications on the Internet. It is well-known that its success mainly depends on its user cooperation. Systems with a small number of altruist users or without incentive mechanisms are fated to ...
- ArticleDecember 2013
Tree-Based Consistency Maintenance Scheme for Peer-to-Peer File Sharing Systems
CANDAR '13: Proceedings of the 2013 First International Symposium on Computing and NetworkingPages 187–193https://doi.org/10.1109/CANDAR.2013.34In this paper, we propose a new consistency maintenance scheme for P2P file sharing systems which allow end-users to update shared files. The basic idea of the proposed scheme is to construct a static tree for each file to efficiently propagate the ...
- research-articleMay 2013
On the Presence of Child Sex Abuse in BitTorrent Networks
IEEE Internet Computing (IEEECS_INTERNET), Volume 17, Issue 3Pages 60–66https://doi.org/10.1109/MIC.2013.2Peer-to-peer networks' widespread use makes multimedia files available to users worldwide. However, such networks are often used to spread illegal material while the data source and acquiring users remain anonymous. This article analyzes activity ...
- posterFebruary 2013
Sonoba: on-the-spot information sharing
CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work companionPages 283–286https://doi.org/10.1145/2441955.2442021Various services for sharing data among people are available on the Web. However, we can share data only when we know the network accounts or when we have a shared common repository; and sharing data with new acquaintances is not easy. We will introduce ...
- ArticleOctober 2012
Local Cloud Storage: Temporal Local File Sharing with Previously Paired Wireless Memories and Cross-Layer Simultaneous Data Transmission Mechanism
CIT '12: Proceedings of the 2012 IEEE 12th International Conference on Computer and Information TechnologyPages 640–646https://doi.org/10.1109/CIT.2012.136In this paper, we propose a novel file-sharing system called Local Cloud Storage (LCS), based on the leading-edge device called "wireless memory" such as Eye-Fi and Flash Air. Most interesting point is that wireless configuration of multiple devices is ...