Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The novelty of the peer-to-peer (P2P) paradigm relies on two main concepts: cooperation among users and resource sharing. There are many applications based on peer-to-peer paradigm, but the most popular one is the file sharing. We can... more
    • by 
    •   10  
      Computer ScienceResource sharingHybridFile Sharing
    • by  and +1
    •   9  
      Distributed ComputingMultimedia Peer-to-Peer Streaming SystemDesign and DevelopmentInnovation Network
Abstract Summary form only given. In a broadcasting problem, a message is sent from a source to all the other nodes in the network. Blind flooding is a classical mechanism for broadcasting, where each node retransmits received message to... more
    • by 
    •   15  
      Computer ScienceGraph TheoryGeneral RelativityRouting
    • by 
    •   8  
      Computer SciencePeer-to-PeerShared KnowledgeSpam Filtering
This paper presents the use of a novel Peer to Peer (P2P) infrastructure in order to provide rapid broad digital content exchange, digital rights protection and efficient transaction management through watermarking technologies. Copyright... more
    • by  and +1
    •   13  
      Distributed ComputingWatermarkingDigital Image ProcessingDigital Content
Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central... more
    • by 
    •   12  
      Static AnalysisEncryptionDatabasesSecurity Engineering
    • by 
    •   9  
      Computer NetworksCommunication NetworksHardwareMobile Peer-to-Peer Network
    • by 
    •   16  
      Quality of lifeMobile CommerceMobile CommunicationMobile Computing
    • by 
    •   11  
      Information SystemsMarketingVoipBusiness and Management
    • by 
    •   3  
      Target TrackingAnalytical ModelPeer to Peer Computing
    • by 
    •   11  
      Mobile Ad Hoc NetworksGroup communicationMobile CommunicationMiddleware
In this paper, we propose a Progressive Differential Thresholding (PDT) framework for coordinated network anomaly detection. Under the proposed framework, nodes present on a packet's path progressively encode their opinion (malicious or... more
    • by 
    •   11  
      Computational ComplexityComplexity TheoryAnomaly DetectionSpatial Distribution
    • by 
    •   12  
      Static AnalysisEncryptionDatabasesSecurity Engineering
    • by 
    •   15  
      Medical ImagingDigital imagingOpen SourceDigital
    • by 
    •   7  
      Community DetectionUser profilePeer to PeerExperimental Evaluation
    • by 
    •   11  
      SecurityPerformanceTrust ManagementCryptography
    • by 
    •   7  
      Access ControlIntelligent Transport SystemSafetyAd Hoc Networks
    • by 
    •   12  
      Distributed ComputingDistributed SystemProbabilityInformation Processing
    • by 
    •   10  
      Static AnalysisSecurity EngineeringWeb Application SecurityDynamic Analysis
    • by 
    •   14  
      Approximation TheoryWireless Sensor NetworksProbabilityProbabilistic Logic
In mobile IP based networks, most of the packet drops occur due to mobile handoff from one sub-network to another sub-network or larger delays in between sender and receiver due to encapsulation and tunnelling of packets. Packet loss... more
    • by 
    •   12  
      Congestion ControlMobile CommunicationMobile IPRoute Optimization
    • by 
    •   12  
      SociologyComputer ArchitectureStatisticsNepal
    • by 
    •   6  
      Computer ArchitectureEmbedded SystemsField-Programmable Gate ArraysVirtual Reality
    • by 
    •   7  
      Service DesignMiddlewareData storagePeer to Peer
    • by 
    •   5  
      Autonomic ComputingAggregatesSituated KnowledgeManagement System
In this paper, we propose a decentralized self-adaptive management framework that infers the current context of the hosting environment and dynamically decides what management strategy should be used in order to minimize the cost and... more
    • by 
    •   13  
      Computer ScienceComputer ArchitectureInformation ManagementData Collecting and Analyzing
The phenomenon of churn degrades the lookup performance of DHT-based P2P systems greatly. To date, a number of approaches have been proposed to handle it from both the system side and the client side. However, there lacks theoretical... more
    • by 
    •   4  
      Theoretical AnalysisPerforationPeer to Peer ComputingParameter Optimization
    • by 
    •   15  
      Distributed ComputingGrid ComputingSoftware DevelopmentResource sharing
    • by 
    •   4  
      File SharingBittorrentPeer to Peer ComputingInternet
The information-centric networking (ICN) concept is a significant common approach of several future Internet research activities. The approach leverages in-network caching, multiparty communication through replication, and interaction... more
    • by 
    •   10  
      Distributed ComputingInformation ManagementNetwork SecurityFuture Internet
    • by  and +1
    •   12  
      Information SystemsDistributed ComputingData ManagementMiddleware
    • by  and +1
    •   6  
      Distributed ComputingScale-Free NetworksKnowledge EngineeringAnalytical Model
    • by 
    •   9  
      Distributed ProcessingData PrivacyMobile Peer-to-Peer NetworkTrust and Reputation Systems
    • by 
    •   7  
      Dynamic Decision MakingSecurity RequirementsLevels of AbstractionRich Internet Application
    • by 
    •   40  
      EngineeringTechnologySignal ProcessingWireless Communications
    • by 
    •   43  
      Information SystemsEngineeringComputer ArchitectureDistributed Computing
    • by 
    •   8  
      Grid ComputingPeer-to-PeerData acquisitionFree Riding
    • by 
    •   12  
      Resource AllocationContent Delivery NetworkClient ServerDelivery System
In this paper we address the problem of efficient layered video streaming over peer-to-peer networks and we propose a new receiver-driven streaming mechanism. The main design goal of our new layered video requesting policy is to optimize... more
    • by 
    •   18  
      Resource AllocationOptimizationVideo StreamingScalable Video Coding
    • by 
    •   13  
      Distributed ComputingDistributed SystemComputer SoftwareParallel & Distributed Computing
The common goals of the Grid and peer-to-peer communi- ties have brought them in close proximity. Both the technologies overlay a collaborative resource-sharing infrastructure on existing (public) net- works. In realizing this shared... more
    • by 
    •   5  
      Grid ComputingResource sharingPeer to PeerFault Tolerant
We aim to support spontaneous and opportunistic human behavior by taking advantage of an emerging environment for mobile ubiquitous multimedia applications enabled by the fusion of adhoc networks, peer-to-peer computing, and media-rich... more
    • by  and +4
    •   7  
      User InterfaceMobile Ad Hoc NetworkHuman behaviorMobile Device
    • by  and +1
    •   8  
      Community DetectionSensor NetworkClustered DataRouting Protocol
    • by 
    •   16  
      Computer ScienceComputational ModelingPerformance EvaluationProtocols
This paper addresses issues pertaining to the necessity of uti- lizing formal verification methods in the design of protocols for peer-to-peer multimedia systems. These systems require sophisticated communication protocols, and these... more
    • by 
    •   12  
      Computer VisionAutomataGesture RecognitionProtocols
    • by 
    •   13  
      Grid ComputingResource AllocationCloud ComputingResource Discovery
    • by 
    •   8  
      Distributed ComputingGrid ComputingComputational ModelingComputer Networks
    • by 
    •   8  
      Distributed ComputingComputer SoftwareBandwidth AllocationAnonymous Communication
    • by 
    •   6  
      ProtocolsPeer-to-Peer SystemsComputer Network SecurityBittorrent
EigenTrust (ET) is a renowned algorithm for reputation management in adversarial P2P systems. It incorporates the opinions of all peers in the network to compute a global trust score for each peer based on its past behavior, and relies on... more
    • by 
    •   12  
      Computational ModelingPositron Emission TomographySocial Networking ServicesComputer Model