Abstract
No abstract available.
RFC Downloads
ZIP
Cited By
- Matoušek P, Ryšavý O and Grégr M Security Monitoring of IoT Communication Using Flows Proceedings of the 6th Conference on the Engineering of Computer Based Systems, (1-9)
- Cardoso I, Barraca J, Gonçalves C and Aguiar R (2016). Seamless integration of cloud and fog networks, Networks, 26:6, (435-460), Online publication date: 1-Nov-2016.
- Ho C, Ramachandran K, Almeroth K and Belding-Royer E A scalable framework for wireless network monitoring Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (93-101)
- Roughgarden T Stackelberg scheduling strategies Proceedings of the thirty-third annual ACM symposium on Theory of computing, (104-113)
- Cohrs D and Miller B Specification and verification of network managers for large internets Symposium proceedings on Communications architectures & protocols, (33-44)
- Cohrs D and Miller B (1989). Specification and verification of network managers for large internets, ACM SIGCOMM Computer Communication Review, 19:4, (33-44), Online publication date: 1-Aug-1989.
Recommendations
A connection management protocol for promoting cooperation in Peer-to-Peer networks
The existence of a high degree of free riding in Peer-to-Peer (P2P) networks is an important threat that should be addressed while designing P2P protocols. In this paper we propose a connection-based solution that will help to reduce the free riding ...