نتایج جستجو برای: gnutella

تعداد نتایج: 408  

2003
Massimo Paolucci Katia P. Sycara Takuya Nishimura Naveen Srinivasan

—Mechanisms for Web services Discovery proposed so far have assumed a centralized registry that collects information about all the Web services available at any given time. Centralized registries are performance bottlenecks and may result in single points of failure. In this paper, we propose an alternative architecture based on a P2P connection between Web services and we show how to perform c...

2007
Hao Chen Monica Chew Robert T. Johnson

The advent of grassroots content distribution systems (e.g., Gnutella, FreeNet, Napster, Oceanstore) indicates the need for a distributed data location algorithm [HBMKK00, Cla00, Fan00, K+00a]. In this paper we investigate three methods of data location: distance-vector routing and link-state vector routing using Bloom filters, and a naive cache sharing algorithm. These data location methods ar...

Journal: :CoRR 2004
Choon Hoong Ding Sarana Nutanong Rajkumar Buyya

Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and F...

2005
Sven Kaffille Karsten Loesing Guido Wirtz

This paper proposes a protocol for decentralized service discovery with guarantees. We use a peer-to-peer network based on the distributed hashtable Chord that provides a structured overlay network in order to avoid flooding the whole network. Service descriptions are decomposed into portions which can be efficiently distributed and retrieved. We propose a way to evaluate our protocol by runnin...

2015
Chris Mckean

The peer-to-peer computing model is not new, but has recently become a commonplace among the average computer user due to the introduction of applications like Napster and Gnutella. Along with the freedom of connecting peer-to-peer come security risks. In response to some of these security risks, Intel has released a code library that software developers can use to strengthen the security of, a...

2004
Omer Boyaci

Multicast seemed the only possible technique for one/many-to-many content distribution over many years. However we never had a world-wide content distribution network based on multicasting excluding some small and preconfigured networks such as mbone. Fortunately, today we have lots of content distribution networks such as gnutella, BitTorrent, eDonkey and Napster. All of these networks are bui...

2002
Karl Aberer Manfred Hauswirth

The limitations of client/server systems become evident in an Internetscale distributed environment. P2P systems offer an alternative to traditional client/server systems: Every node acts both as a client and a server and “pays” its participation by providing access to its computing resources. Systems such as Napster and Gnutella have proven their practical applicability. In this article we bri...

2006
Kiran Nagaraja

Trace back to 1999: that was the year Napster took the music world by storm. The application brought together millions of music enthusiasts eager to share and download each other’s song collections. The ease with which two “peers” could share a file was refreshing. At its peak in early 2000, this rage had resulted in a network of about 60 million Napster users. It was also around this time that...

Journal: :Child abuse & neglect 2014
Janis Wolak Marc Liberatore Brian Neil Levine

We used data gathered via investigative "RoundUp" software to measure a year of online child pornography (CP) trafficking activity by U.S. computers on the Gnutella peer-to-peer network. The data include millions of observations of Internet Protocol addresses sharing known CP files, identified as such in previous law enforcement investigations. We found that 244,920 U.S. computers shared 120,41...

2004
Mihail F. Ionescu Naftaly H. Minsky Thu D. Nguyen

We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an application specific communal policy if the community is to operate smoothly and securely. An open question, however, is how can such communal policies be established reliably and in a scalable manner? While some communities c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید