Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2017
If It’s Convenient: Leveraging Context in Peer-to-Peer Variable Service Transaction Recommendations
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 1, Issue 3Article No.: 48, Pages 1–28https://doi.org/10.1145/3130913Peer-to-Peer Variable Service Transaction (P2P-VST) systems enable people to offer and receive help with a wide range of task types. However, such services are hampered by the difficulty of finding relevant and convenient opportunities for transactions ...
- research-articleSeptember 2017
Towards an Optimized Scheme for Mobile Subscribers Based on Cloud Computing
Procedia Computer Science (PROCS), Volume 112, Issue CSeptember 2017, Pages 751–760https://doi.org/10.1016/j.procs.2017.08.165Recently, deploying the publish/subscribe model over Peer-to-Peer networks have been widely used for mobile applications. However, transfer delay and network load remain the challenging issues to consider for mobile subscribers because of their dynamic ...
- ArticleOctober 2014
Overnesia: A Resilient Overlay Network for Virtual Super-Peers
SRDS '14: Proceedings of the 2014 IEEE 33rd International Symposium on Reliable Distributed SystemsOctober 2014, Pages 281–290https://doi.org/10.1109/SRDS.2014.40Unstructured P2P networks have been widely used to implement resource location systems that support complex queries semantics. Unfortunately these systems usually rely on search algorithms based on some variant of flooding, which generate a significant ...
- ArticleNovember 2013
Auction-Based Resource Allocation in Digital Ecosystems
MOBILWARE '13: Proceedings of the 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and ApplicationsNovember 2013, Pages 176–183The proliferation of portable devices (PDAs, smartphones, digital multimedia players, and so forth) allows mobile users to carry around a pool of computing, storage and communication resources. Sharing these resources with other users ("Digital ...
- ArticleJune 2013
Dragonfly: Cloud Assisted Peer-to-Peer Architecture for Multipoint Media Streaming Applications
CLOUD '13: Proceedings of the 2013 IEEE Sixth International Conference on Cloud ComputingJune 2013, Pages 269–276https://doi.org/10.1109/CLOUD.2013.60Technology trends are not only transforming the hardware landscape of end-user devices but are also dramatically changing the types of software applications that are deployed on these devices. With the maturity of cloud computing during the past few ...
- articleJuly 2012
Query Adaptation Techniques in Temporal-DHT for P2P Media Streaming Applications
International Journal of Multimedia Data Engineering & Management (IJMDEM-IGI), Volume 3, Issue 3July 2012, Pages 45–65https://doi.org/10.4018/jmdem.2012070103Peer-to-Peer P2P-based approach for on-demand video streaming systems P2P-VoD characterized by asynchronous user-interactivity has proven to be practical and effective in recent years with real-world Internet-scale deployment Huang, Li, & Ross, 2007. ...
- ArticleOctober 2011
Using Bio-inspired Models to Design Peer-to-Peer Overlays
3PGCIC '11: Proceedings of the 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet ComputingOctober 2011, Pages 248–252https://doi.org/10.1109/3PGCIC.2011.45Peer-to-peer systems are subject to frequent changes, fact which makes the resource management a very complex task. With the aim of reaching extreme scalability, centralized models no longer represent feasible solutions. Thus, we need to build flexible, ...
- ArticleJuly 2010
Effective Data Dissemination for Large-Scale Complex Critical Infrastructures
DEPEND '10: Proceedings of the 2010 Third International Conference on DependabilityJuly 2010, Pages 64–69https://doi.org/10.1109/DEPEND.2010.18Large-scale complex infrastructures are emerging as new computing platforms for the federation of world-wide mission critical systems over the Internet. However, standard approaches to data dissemination are still not adequate to the scale of these ...
- articleAugust 2009
Recommendation Retrieval in Reputation Assessment for Peer-to-Peer Systems
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 244August, 2009, Pages 13–25https://doi.org/10.1016/j.entcs.2009.07.035Recommendation-based reputation assessment in peer-to-peer systems relies on recommendations in predicting the reputation of peers. In this paper, we discuss the effectiveness and cost metrics in the recommendation retrieval. We evaluate the following ...
- ArticleJuly 2009
Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management
NCA '09: Proceedings of the 2009 Eighth IEEE International Symposium on Network Computing and ApplicationsJuly 2009, Pages 36–43https://doi.org/10.1109/NCA.2009.8A distributed hash table (DHT) with replicated objects enjoys improved performance and fault-tolerance but calls for effective replica management. This paper deals with proximity-aware distributed mutual exclusion (PADME) for P2P replica management on a ...
- ArticleFebruary 2009
Analyzing and Implementing Peer-to-Peer Systems with the PeerSE Experiment Environment
PDP '09: Proceedings of the 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based ProcessingFebruary 2009, Pages 311–315https://doi.org/10.1109/PDP.2009.37This paper introduces the PeerSE Experiment Environment(EE) including concepts for a simulation-based analysis and implementation of P2P systems. The PeerSE EE supports a comparative analysis of P2P system models to identify models fulfilling given ...
- ArticleDecember 2008
Competition vs. Fairness - Analyzing Structured Networks by Means of User Experiments
WI-IAT '08: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01December 2008, Pages 897–905https://doi.org/10.1109/WIIAT.2008.9We investigate how to ensure efficiency (in the economic sense of the word) in structured networks, with a focus on heterogeneity. A network is structured if the network designer has predefined some relationships between individuals (aka. nodes). ...
- articleDecember 2008
TR-clustering: Alleviating the impact of false clustering on P2P overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 52, Issue 17December, 2008, Pages 3185–3204https://doi.org/10.1016/j.comnet.2008.08.011Designing topologically-aware overlays is a recurrent subject in peer-to-peer research. Although there exists a plethora of approaches, Internet coordinate systems such as GNP (which attempt to predict the pair-wise O(N^2) latencies between N nodes ...
- research-articleApril 2008
peerTalk: A Peer-to-Peer Multiparty Voice-over-IP System
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 19, Issue 4April 2008, Pages 515–528https://doi.org/10.1109/TPDS.2007.70766Multi-party voice-over-IP (MVoIP) services allow a group of people to freely communicate with each other via Internet, which have many important applications such as on-line gaming and tele-conferencing. In this paper, we present a peer-to-peer MVoIP ...
- ArticleOctober 2007
A Comparative Study of Hierarchical DHT Systems
LCN '07: Proceedings of the 32nd IEEE Conference on Local Computer NetworksOctober 2007, Pages 325–333https://doi.org/10.1109/LCN.2007.7Much research in the last few years has been devoted to development of efficient structured peer-to-peer (P2P) overlay networks, which offer distributed hash table (DHT) functionality. Most of these systems have been devised as flat, non-hierarchical ...
- ArticleApril 2006
Censorship-Resistant and Anonymous P2P Filesharing
ARES '06: Proceedings of the First International Conference on Availability, Reliability and SecurityApril 2006, Pages 58–65https://doi.org/10.1109/ARES.2006.41We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Instead, only fragments that do not contain any information about the original ...
- research-articleApril 2005
Fluid Stochastic Petri Nets for Computing Transfer Time Distributions in Peer-to-Peer File Sharing Applications
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 128, Issue 4April, 2005, Pages 79–99https://doi.org/10.1016/j.entcs.2005.01.014This paper presents an application of the Fluid Stochastic Petri Net (FSPN) formalism for the analysis of the transfer time distribution in peer-to-peer (P2P) file sharing applications.The transfer of the resource follows a successful search; the ...
- ArticleJune 2003
On Optimal Update Policies and Cluster Sizes for 2-Tier Distributed Systems
WETICE '03: Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative EnterprisesJune 2003, Page 101We try to analyze a generic model for 2-tier distributed systems,exploring the possibility of optimal cluster sizes from aninformation management perspective, such that the overall costfor updating and searching information may be minimized byadopting a ...