نتایج جستجو برای: peer to peer network

تعداد نتایج: 10763561  

2010
Paraskevi Raftopoulou Euripides G. M. Petrakis

In this paper, we study the behaviour of a semantic overlay network that supports full-fledged information retrieval in the presence of peer churn. We adopt a model for peer churn, and study the effect of network dynamics on peer organisation and retrieval performance. Our work is the first to demonstrate the issues involved in the design of semantic overlay networks when introducing peer churn...

2005
Christer Andersson Leonardo A. Martucci Simone Fischer-Hübner

This paper formulates requirements for anonymous overlay networks for enhancing the privacy of mobile ad hoc network users. Besides, it analyzes existing peer-to-peer based anonymous overlay networks and shows that none of them are compliant with those requirements. Finally, it outlines the ongoing design of an anonymous overlay network intended for mobile ad hoc environments.

Journal: :Stud. Inform. Univ. 2009
François Lesueur Ludovic Mé Valérie Viet Triem Tong

Given their fully distributed architecture, P2P networks allow the design of low cost and high availability systems but also pose new security problems. In these collaborative networks, security properties need to be ensured by the participants themselves. In this paper, we propose to detect and exclude misbehaving nodes to allow honest participants to enforce security properties. The proposed ...

2007
Luis Bernardo Rodolfo Oliveira Ricardo Tiago Paulo Pinto

A cross-layering alarm application is proposed for supporting fire fighting operations. It runs on scattered wireless sensor networks (WSN) composed by several isolated WSNs, where sensor nodes can be destroyed by fire. Mobile patrol nodes deploy the alarm monitoring application and collect the alarm records, containing the set of sensor measurements above the threshold values. The application ...

2006
Vincent Gramoli Anne-Marie Kermarrec Achour Mostéfaoui Michel Raynal Bruno Sericola

Distributed systems are now both very large and highly dynamic. Peer to peer overlay networks have been proved efficient to cope with this new deal that traditional approaches can no longer accommodate. While the challenge of organizing peers in an overlay network has generated a lot of interest leading to a large number of solutions, maintaining critical data in such a network remains an open ...

2009
Gareth Tyson Paul Grace Andreas Mauthe Gordon S. Blair Sebastian Kaune

As peer-to-peer systems are evolving from simplistic application specific overlays to middleware platforms hosting a range of potential applications it has become evident that increasingly configurable approaches are required to ensure appropriate overlay support is provided for divergent applications. This is exacerbated by the increasing heterogeneity of networked devices expected to host the...

Journal: :J. Comput. Meth. in Science and Engineering 2009
Sachin Shetty Min Song HouJun Yang Lisa Matthews

In this paper we present a majority-based method to learn Bayesian network structure from databases distributed over a peer-to-peer network. The method consists of a majority learning algorithm and a majority consensus protocol. The majority learning algorithm discovers the local Bayesian network structure based on the local database and updates the structure once new edges are learnt from neig...

Journal: :CoRR 2012
Nitish Balachandran Sugata Sanyal

----------------------------------------------------------------ABSTRACT------------------------------------------------------------------Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attac...

Journal: :Computers and Artificial Intelligence 2005
Weimin Zheng Jinfeng Hu Huanan Zhang

In this paper we propose a new structured overlay network, which is more efficient and scalable than previous ones. We call it Twins, because its routing table consists of two parts, one containing nodes with common prefix and the other containing nodes with common suffix. Twins routes messages to their destinations in just 2 hops even in a very large scale and the overhead is very low. When de...

Journal: :Computer Communications 2010
Jun Lei Xiaoming Fu Dieter Hogrefe

Traditionally, Internet Service Providers (ISPs) have to interconnect with content providers to provide network services to customers. Current business model that connectivity and bandwidth become commodities has motivated ISPs to distribute content and other application-specific services to their customers using their own infrastructure. It is desirable for ISPs to economize existing infrastru...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید