Filters








635 Hits in 7.6 sec

A Concept of an Anonymous Direct P2P Distribution Overlay System

Igor Margasinski, Michal Pioro
2008 22nd International Conference on Advanced Information Networking and Applications (aina 2008)  
The paper introduces a peer-to-peer system called P2PRIV (peer-to-peer direct and anonymous distribution overlay).  ...  Basic novel features of P2PRIV are: (i) a peer-to-peer parallel content exchange architecture, and (ii) separation of the anonymization process from the transport function.  ...  Notice, that in our solution the anonymization process is separated from the content transport, in contrast to classical schemes.  ... 
doi:10.1109/aina.2008.117 dblp:conf/aina/MargasinskiP08 fatcat:3kl3q7vwjng4tc5oc6gx43ihuu

Overlay Structure for Large Scale Content Sharing: Leveraging Geography as the Basis for Routing Locality [article]

Shah Asaduzzaman, Gregor v. Bochmann
2009 arXiv   pre-print
In this paper we place our arguments on two related issues in the design of generalized structured peer-to-peer overlays.  ...  First, we argue that for the large-scale content-sharing applications, lookup and content transport functions need to be treated separately.  ...  Low latency path of transport is desirable and may even be necessary in some applications, although it comes secondary to the resource efficiency in case of bulk-transport applications.  ... 
arXiv:0903.4113v1 fatcat:pym5gof6kbfrbb5eosnz4ootnu

A locality preserving routing overlay using geographic coordinates

Shah Asaduzzaman, Gregor v. Bochmann
2009 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA)  
Moreover, the proposed scheme facilitates certain geographical search applications that are difficult to realize in a Pastry overlay.  ...  The performance results show that proposed overlay has significantly better stretch and route-convergence characteristics compared to a regular Pastry network.  ...  For this, the stretch of the overlay paths is measured as the ratio of the latency of the overlay route to the direct end-to-end latency.  ... 
doi:10.1109/imsaa.2009.5439468 fatcat:wv3exhl335fu3hpltpk4ddq5na

Path Selection in Streaming Video Over Multioverlay Application Layer Multicast

Yang Y Lin, Jack Y B Lee
2010 IEEE transactions on circuits and systems for video technology (Print)  
However Internet measurement experiments revealed that RTT is far from an accurate estimator of bandwidth availability and as such, may lead to sub-optimal performance in the constructed ALM overlays.  ...  The efficiency of an ALM network depends on its data distribution overlay, which is constructed based on metrics such as round-trip time (RTT) measurement between peers.  ...  Acknowledgment The authors would like to thank the Associate Editor and the anonymous reviewers for their helpful suggestions to improve the paper.  ... 
doi:10.1109/tcsvt.2010.2051280 fatcat:x6dahrnpsnavnonjmecdyg74bm

A state management and persistency architecture for peer-to-peer massively multi-user virtual environments

John Gilmore
2013 ACM SIGMultimedia Records  
Acknowledgements I would like to express my sincere gratitude to the following people and organisations:  ...  The super peers storage provides for low latency data storage and the overlay storage provides security and reliability.  ...  is designed for the low latency storage of small game objects.  ... 
doi:10.1145/2484912.2484917 fatcat:zugdcqbgn5dsdfftiayngsouwm

On the design of autonomic, decentralized VPNs

David Isaac Wolinsky, Kyungyong Lee, P. Oscar Boykin, Renato Figueiredo
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
existing P2P approaches rely on a centralized infrastructure but allow users to bypass it to form direct low-latency, highthroughput links between peers.  ...  Decentralized and P2P (peer-to-peer) VPNs (virtual private networks) have recently become quite popular for connecting users in small to medium collaborative environments, such as academia, businesses,  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers as well as Pierre St. Juste for their useful comments and feedback.  ... 
doi:10.4108/icst.collaboratecom.2010.43 dblp:conf/colcom/WolinskyLBF10 fatcat:2t76ggyn45atjpgnknez3kee5u

A transport layer abstraction for peer-to-peer networks

R.A. Ferreira, C. Grothoff, P. Ruth
2003 CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.  
We describe how a peer-to-peer framework can hide diversity and obstacles in the underlying Internet and provide peer-to-peer applications with abstractions that hide transport specific details.  ...  We present the details of an implementation of a transport service based on SMTP. Small-scale benchmarks are used to compare transport services over UDP, TCP, and SMTP.  ...  The authors would like to thank Krista Bennett whose careful editing made many improvements in the text.  ... 
doi:10.1109/ccgrid.2003.1199393 dblp:conf/ccgrid/FerreiraGR03 fatcat:q33tqqfxyzcjpohz6xd75l6ehi

Medical Tele-Diagnosis Robot (MTR) - Internet Based Communication & Navigation System

Muralindran Mariappan, Vigneswaran Ramu, Brendan Khoo Teng Thiam, Thayabaren Ganesan, Manimehala Nadarajan
2014 Applied Mechanics and Materials  
advantage of the highly-parallel processors in the graphics processing unit.  ...  to avoid any danger to humans and the robot in terms of obstacle avoidance and robot tilt angle safety.  ...  This is because private health informat ion is stored distributedly in anonymous group members (peers) where it is vulnerable to unauthorized disclosure, altering and sabotaging of important informat ion  ... 
doi:10.4028/www.scientific.net/amm.490-491.1177 fatcat:qwhxxntzdvcm7nu2g6twcw2lqq

LaMRD: Location-Aware and Decentralized Multi-Layer Resource Discovery for IoT

Mohammed B. M. Kamel, Peter Ligeti, Christoph Reich
2021 Acta Cybernetica  
LaMRD is based on structured peer-to-peer (p2p) scheme and follows the general system trend of fog computing.  ...  The resources are registered in LaMRD based on their locations which results in a low added overhead in the registration and discovery processes.  ...  IoT gateways) represent the peers in the P2P overlay.  ... 
doi:10.14232/actacyb.289938 fatcat:wod57yad6bdxji4to5lneac42e

A survey and comparison of peer-to-peer overlay network schemes

Eng Keong Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim
2005 IEEE Communications Surveys and Tutorials  
However, this algorithm requires pair-wise probing between peers to determine latencies, and it is unlikely to scale to a large number of peers in the overlay.  ...  Keys are mapped by the overlay network protocol to a unique live peer in the overlay network.  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their valuable comments.  ... 
doi:10.1109/comst.2005.1610546 fatcat:wbzstyu4yzddfbw4zmu5r3yzxm

Current challenges and future trends in the field of communication architectures for microgrids

Silvia Marzal, Robert Salas, Raúl González-Medina, Gabriel Garcerá, Emilio Figueres
2018 Renewable & Sustainable Energy Reviews  
It is concluded that a new generation of peer-to-peer communication systems is required towards a dynamic smart microgrid.  ...  To reach this goal, it´s mandatory to know which bandwidth and which latency ( delay) can tolerate each microgrid application [22], [23], i.e., each microgrid function has its own latency and bandwidth  ...  The research conducted up to date has produced important advances in communications achieving a decentralized and adaptable microgrid, having established a significant basis for the future deployment of  ... 
doi:10.1016/j.rser.2017.10.101 fatcat:njkgodm4ijhntfej3cndi3o26q

Privacy in VoIP Networks: Flow Analysis Attacks and Defense

Mudhakar Srivatsa, Arun Iyengar, Ling Liu, Hongbo Jiang
2011 IEEE Transactions on Parallel and Distributed Systems  
In this paper we propose novel flow analysis attacks that demonstrate the vulnerabilities of peer-to-peer VoIP networks to privacy attacks.  ...  This paper proposes practical solutions to address these challenges using a quantifiable k-anonymity metric and a privacy-aware VoIP route setup and route maintenance protocols.  ...  Tarzan [15] presents an anonymizing network layer using a gossip-based peer-to-peer protocol.  ... 
doi:10.1109/tpds.2010.122 fatcat:dt4eiu373fhotnhudr7lnejpsm

PROD: Relayed file retrieving in overlay networks

Zhiyong Xu, Dan Stefanescu, Honggang Zhang, Laxmi Bhuyan, Jizhong Han
2008 Proceedings, International Parallel and Distributed Processing Symposium (IPDPS)  
In this paper, we propose a novel and efficient algorithm -PROD to improve the file retrieving performance in DHT based overlay networks.  ...  In P2P file sharing systems, a file request takes two steps. First, a routing message is generated by the client (request initiator) and spread to the overlay network.  ...  We would also like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1109/ipdps.2008.4536289 dblp:conf/ipps/XuSZBH08 fatcat:eavajqghsrh5vjguxqrljgyfdy

A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security

Michele Amoretti
2009 Recent Patents on Computer Science  
In distributed computing, the peer-to-peer paradigm enables two or more entities to collaborate spontaneously in an overlay network of equals (peers) by using appropriate information and communication  ...  Users of the peer-to-peer system join and leave the network randomly, which makes the overlay network dynamic and unstable in nature.  ...  Parallel & Distributed Computing Parallel and distributed applications based on the P2P paradigm split a large task into smaller sub-pieces that can execute in parallel over a number of independent peer  ... 
doi:10.2174/2213275910902030195 fatcat:mcqbamtd25acnmxbem4q77c5ze

A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security

Michele Amoretti
2010 Recent Patents on Computer Science  
In distributed computing, the peer-to-peer paradigm enables two or more entities to collaborate spontaneously in an overlay network of equals (peers) by using appropriate information and communication  ...  Users of the peer-to-peer system join and leave the network randomly, which makes the overlay network dynamic and unstable in nature.  ...  Parallel & Distributed Computing Parallel and distributed applications based on the P2P paradigm split a large task into smaller sub-pieces that can execute in parallel over a number of independent peer  ... 
doi:10.2174/1874479610902030195 fatcat:aiqdocqnffdhvetgzssktiqnja
« Previous Showing results 1 — 15 out of 635 results