Filters








852 Hits in 5.8 sec

Proximity-Aware Superpeer Overlay Topologies [chapter]

Gian Paolo Jesi, Alberto Montresor, Ozalp Babaoglu
2006 Lecture Notes in Computer Science  
This paper presents SG-2, a novel protocol for building and maintaining proximity-aware superpeer topologies.  ...  Instead, a dynamically changing overlay topology is maintained and control is completely decentralized.  ...  Our solution, called SG-2, is a self-organizing, decentralized protocol capable of building and maintaining superpeer-based, proximity-aware overlay topologies.  ... 
doi:10.1007/11767886_4 fatcat:odpb4xvsf5banlhgzlf3snkflu

Proximity-Aware Superpeer Overlay Topologies

Gian Jesi, Alberto Montresor, Ozalp Babaoglu
2007 IEEE Transactions on Network and Service Management  
This paper presents SG-2, a novel protocol for building and maintaining proximity-aware superpeer topologies.  ...  Instead, a dynamically changing overlay topology is maintained and control is completely decentralized.  ...  Our solution, called SG-2, is a self-organizing, decentralized protocol capable of building and maintaining superpeer-based, proximity-aware overlay topologies.  ... 
doi:10.1109/tnsm.2007.070904 fatcat:oizwnmpeqncbrdr3biqvav5mry

Cuckoo

Tianyin Xu, Yang Chen, Jin Zhao, Xiaoming Fu
2010 Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement - HotPlanet '10  
In this paper, we present a decentralized, socio-aware microblogging system named Cuckoo.  ...  However, it is not trivial to decentralize microblogging services in a peer-to-peer fashion. The challenges first derive from the heterogeneity of the inherent online social network (OSN) features.  ...  In this position paper, we present a decentralized, socio-aware microblogging system, named Cuckoo.  ... 
doi:10.1145/1834616.1834622 dblp:conf/mobisys/XuCZF10 fatcat:wrxt2fpjuvekxhn4fsushqtz3e

An Efficient Topology Search Mechanism for Unstructured PeerTo-Peer Networks

B. Vijayanandh
2014 IOSR Journal of Computer Engineering  
The resultant networks may not perform searches efficiently and effectively because existing overlay topology construction algorithms often create unstructured P2P networks without performance guarantees  ...  Based on such sharing pattern, we present a novel overlay construction algorithm to enhance the efficiency and effectiveness of searches in unstructured P2P networks.  ...  Future Works Moreover, In future the work may continue to find that together with a similarity-aware overlay topology, the search protocol we have suggested in this paper, which takes advantage of the  ... 
doi:10.9790/0661-16358386 fatcat:pk4rafjwgfci5pdt4r5qo2lpdu

Socially-Aware Distributed Hash Tables for Decentralized Online Social Networks [article]

Muhammad Anis Uddin Nasir, Sarunas Girdzijauskas, Nicolas Kourtellis
2015 arXiv   pre-print
In particular, we propose a gossip-based algorithm to place users in a DHT, while maximizing the social awareness among them.  ...  In our work, we design a socially-aware distributed hash table (DHTs) for efficient implementation of DOSNs.  ...  Further, these nodes create a DHT overlay by constructing pointers to their immediate neighbors and by creating long range links to other nodes in the overlay, following the symphony protocol [15] .  ... 
arXiv:1508.05591v3 fatcat:m2jriajd2jbalnqvu7liyqeeu4

Socially-aware distributed hash tables for decentralized online social networks

Muhammad Anis Uddin Nasir, Sarunas Girdzijauskas, Nicolas Kourtellis
2015 2015 IEEE International Conference on Peer-to-Peer Computing (P2P)  
In particular, we propose a gossip-based algorithm to place users in a DHT, while maximizing the social awareness among them.  ...  In our work, we design a socially-aware distributed hash table (DHTs) for efficient implementation of DOSNs.  ...  Further, these nodes create a DHT overlay by constructing pointers to their immediate neighbors and by creating long range links to other nodes in the overlay, following the symphony protocol [15] .  ... 
doi:10.1109/p2p.2015.7328524 dblp:conf/p2p/NasirGK15 fatcat:m24udjpfnrgplnh6qgyn3re3ju

Alleviating the topology mismatch problem in distributed overlay networks: A survey

Vassilis Moustakas, Hüseyin Akcan, Mema Roussopoulos, Alex Delis
2016 Journal of Systems and Software  
In this paper, we survey over a decade's worth of research efforts aimed at alleviating the topology mismatch problem in both structured and unstructured P2P systems.  ...  One major weakness, identified early on, is the topology mismatch problem between the overlay network and the underlying IP topology.  ...  CTAG, exploits this observation to construct topology-aware unstructured overlays.  ... 
doi:10.1016/j.jss.2015.11.038 fatcat:ghyhlwk2e5hl3akiydfnwyctlu

Data Dissemination in Opportunistic Networks [article]

Radu Ciobanu, Ciprian Dobre
2012 arXiv   pre-print
In such networks data dissemination is done using forwarding and is usually based on a publish/subscribe model.  ...  We present the categories of a proposed taxonomy that captures the capabilities of data dissemination techniques used in such networks.  ...  Of the protocols we analyzed, ContentPlace chooses a stateless approach, while the Socio-Aware Overlay uses a hybrid representation of a node's state.  ... 
arXiv:1202.2571v1 fatcat:kgct5ehxvzgg5olehlncxr6tru

2019 Index IEEE Transactions on Computational Social Systems Vol. 6

2019 IEEE Transactions on Computational Social Systems  
., +, TCSS Oct. 2019 870-878 Cryptographic protocols A Fair Blockchain Based on Proof of Credit.  ...  Li, A., +, TCSS Oct. 2019 1106-1114 Corrections to "Requirements Socio-Technical Graphs for Managing Practi- tioners' Traceability Questions".  ... 
doi:10.1109/tcss.2020.2973787 fatcat:avfkhqjr3vgdvnwjey5jcgrgvq

Towards the Comprehensive Design of Energy Infrastructures

Daniel Scholten, Rolf Künneke
2016 Sustainability  
Energy sector liberalization, for example, opened up energy markets for a variety of actors, unbundled existing incumbents, and led to diverging economic interests among actors, creating a more decentralized  ...  robust network topology, and control system design to handle flows and eventualities.  ...  In the case of the electricity sector, a change towards a strong decentralized provision of electric power by sustainable means of energy production requires such a fundamental re-orientation.  ... 
doi:10.3390/su8121291 fatcat:ztmi6hvz4rfwtfilgf37xtbyom

Dynamic Mission Planning for Communication Control in Multiple Unmanned Aircraft Teams

Andrew N. Kopeikin, Sameera S. Ponda, Luke B. Johnson, Jonathan P. How
2013 Unmanned Systems  
Furthermore, certain functions of the system, such as launching a weapon, may only be authorized by a human operator due to socio-technical reasons.  ...  This thesis therefore turns to the Consensus-Based Bundle Algorithm (CBBA), a decentralized market based task allocation protocol that provides provably good solutions for heterogeneous decentralized multi-task  ... 
doi:10.1142/s2301385013500039 fatcat:vqka7eioirc5rjqelb36rc6j5u

Between the "Battlefield" Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict

Artur De Matos Alves
2015 Canadian Journal of Communication  
évaluation théorique des discours sur le cyberconflit, et de leur rapport à la perception actuelle de l'état du cyberespace.  ...  This article proposes a theoretical assessment of discourses on cyberconflict, and of their relation to the current perception of the state of cyberspace.  ...  strategic aspect of the topology of networked cyberspace.  ... 
doi:10.22230/cjc.2015v40n3a2742 fatcat:wufcl6mn6rg7tkscj4yaxeplzq

Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

S.S. Manvi, M. S. Kakkasageri, Jeremy Pitt
2009 Mobile Information Systems  
A two-tier agent architecture is employed comprising of the following: 1) 'lightweight', network-facing, mobile agents; 2) 'heavyweight', application-facing, norm-aware agents.  ...  The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model.  ...  All of the above are socio-legal concepts and are amenable to normative specification, and these specifications can be used by norm-aware agents.  ... 
doi:10.1155/2009/518042 fatcat:eh437czmyzd3fbo23yl2ysoyse

Social Engineering Attacks Prevention: A Systematic Literature Review

Wenni Syafitri, Zarina Shukur, Umi A. Mokhtar, Rossilawati Sulaiman, Muhammad Azwan Ibrahim
2022 IEEE Access  
From the review, we found the protocol to effectively prevent social engineering attacks, such as health campaigns, the vulnerability of social engineering victims, and co-utile protocol, which can manage  ...  The current research explains user studies, constructs, evaluation, concepts, frameworks, models, and methods to prevent social engineering attacks.  ...  The decentralization of social network interactions, such as a peer-to-peer model, and explicit reciprocity of information disclosure, was used as the co-utile protocol.  ... 
doi:10.1109/access.2022.3162594 fatcat:y2t4jlbfprfyzfjdfro5r2wyt4

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures.  ...  Even, federated privately run social networks require a few enthusiasts that serve the community and have, through that, access to the data they manage.  ...  In addition, users without friends or with friends that are often online cannot maintain the availability of their data. 3) Cuckoo: Cuckoo [267] , [268] is a socio-aware online microblogging system  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty
« Previous Showing results 1 — 15 out of 852 results