Filters








347,364 Hits in 5.5 sec

On Distributed Rating Systems for Peer-to-Peer Networks

Y. Tian, D. Wu, K.-W. Ng
2007 Computer journal  
In recent years, many distributed rating systems have been proposed against the increasing misbehaviors of peers in peer-to-peer (P2P) networks.  ...  There is also a lack of systematic analysis and evaluation for understanding the systems. In this paper, we first present a framework of stochastic analytical model for evaluating P2P rating systems.  ...  A typical ON DISTRIBUTED RATING SYSTEMS FOR P2P NETWORKS Page 3 of 19 strategy for them is to issue favorable ratings mutually.  ... 
doi:10.1093/comjnl/bxm045 fatcat:jheeedweunaaln2zoguzdpvwle

Exploring the Sustainability of Credit-incentivized Peer-to-Peer Content Distribution

Xuanjia Qiu, Wei Huang, Chuan Wu, Zongpeng Li, Francis C.M. Lau
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
Credits condensation puts system sustainability on the line: many peers gradually run out of credits and cannot keep up a decent download rate.  ...  Credit-based incentives were proposed to incite peer contributions in P2P content distribution systems. Their effectiveness was extensively analyzed from a game theory perspective.  ...  The threshold for average wealth that leads to condensation depends on the maximum rate peers are willing to spend credits.  ... 
doi:10.1109/icdcsw.2012.40 dblp:conf/icdcsw/QiuHWLL12 fatcat:ixp646hahfb4vpkipcxi4ublv4

Modeling User Behavior in P2P Systems [chapter]

Konstantin Pussep, Christof Leng, Sebastian Kaune
2010 Modeling and Tools for Network Simulation  
For example, churn, which describes peers connecting to and disconnecting from the system, has a severe impact on data availability and consistency, while resource distribution and popularity have a significant  ...  For peer-to-peer systems, simulations are often the most reasonable approach, simply because P2P systems are both inherently large-scale and complex.  ...  Here additionally to the churn the arrival process, i.e., with which rate and distribution the peers connect to the system is considered.  ... 
doi:10.1007/978-3-642-12331-3_20 fatcat:ijqrxqzgora6tdfpb5dapug7fi

On the Privacy of Peer-Assisted Distribution of Security Patches

D. Wu, C. Tang, P. Dhungel, N. Saxena, K. W. Ross
2010 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)  
Using analytical models and simulation, we show that, honeypots do not completely solve the privacy problem; in contrast, an anonymizing network turns out to be more suitable for security patch distribution  ...  Because centralized distribution of patches may not scale well, peer-to-peer (P2P) approaches have recently been suggested.  ...  ACKNOWLEDGEMENTS This work has been in part supported by NFS grant CNS-0917767, the Fundamental Research Funds for the Central Universities, Sun Yat-Sen University (grant no. 2009-35000-3161425/09LGPY56  ... 
doi:10.1109/p2p.2010.5569988 dblp:conf/p2p/WuTDSR10 fatcat:fi2wx2j5bfekrcsbr2cxmthkny

P2P network system for private live-streaming distribution

Takayuki Hisada, Yusuke Hirota, Hideki Tode, Koso Murakami
2011 International Journal of Multimedia Intelligence and Security  
This paper proposes P2P live-streaming system suitable for private distribution. This system constructs distribution network considering transmission bandwidth of each node.  ...  A set of the selected broadband nodes plays a role of virtual distributor with large amount of transmission bandwidth and provides contents to peers instead of origin.  ...  Network architecture Coolstreaming configures one network to distribute one content.  ... 
doi:10.1504/ijmis.2011.040928 fatcat:wmugct2mhjbozlfpgqhyp2cina

VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks

Huanyu Zhao, Xiaolin Li
2009 2009 Proceedings of 18th International Conference on Computer Communications and Networks  
VectorTrust remains robust and tolerant to malicious peers and malicious behaviors.  ...  In this paper, we propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores.  ...  Trust Vector and Trust Overlay Network VectorTrust system is built on a trust overlay network on the top of a P2P network.  ... 
doi:10.1109/icccn.2009.5235290 dblp:conf/icccn/ZhaoL09 fatcat:fwbxj45565b43jcf4nhzigu5be

VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks

Huanyu Zhao, Xiaolin Li
2011 Journal of Supercomputing  
VectorTrust remains robust and tolerant to malicious peers and malicious behaviors.  ...  In this paper, we propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores.  ...  Trust Vector and Trust Overlay Network VectorTrust system is built on a trust overlay network on the top of a P2P network.  ... 
doi:10.1007/s11227-011-0576-6 fatcat:xy5yc6sdcvawjo2y2b35fgnmti

Enabling adaptive video streaming in P2P systems [Peer-to-Peer Multimedia Streaming]

Dan Jurca, Jacob Chakareski, Jean-Paul Wagner, Pascal Frossard
2007 IEEE Communications Magazine  
This article presents an overview of application and network layer mechanisms that enable successful streaming frameworks in peer-to-peer systems.  ...  Peer-to-peer (P2P) systems are becoming increasingly popular due to their ability to deliver large amounts of data at a reduced deployment cost.  ...  peers and mesh overlay for massive parallel content distribution among peers.  ... 
doi:10.1109/mcom.2007.374427 fatcat:6b3kgcbckffyjoong7h3yx3zae

H-Trust: A Group Trust Management System for Peer-to-Peer Desktop Grid

Huanyu Zhao, Xiaolin Li
2009 Journal of Computer Science and Technology  
Peer-to-Peer Desktop Grid (P2PDG) has emerged as a pervasive cyber-infrastructure tackling many large-scale applications with high impacts.  ...  Simulation results demonstrate that H-Trust is robust and can identify and isolate malicious peers in large scale systems even when a large portion of peers are malicious.  ...  In each service cycle, a peer in the network may be actively submitting a job. When distributing a job, a peer waits for incoming responses, selects a most reputable peer to distribute the job.  ... 
doi:10.1007/s11390-009-9275-7 fatcat:56d7fwvcubfybfvzhp3c2kbizu

Collusive Piracy Prevention in P2P Content Delivery Networks

Xiaosong Lou, Kai Hwang
2009 IEEE transactions on computers  
We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus.  ...  Such online piracy has hindered the use of open P2P networks for commercial content delivery.  ...  This result reinforces Theorem 1, namely, the poisoning rate is irrelevant to the piracy rate r r on the eMule network.  ... 
doi:10.1109/tc.2009.26 fatcat:hjrci3k2jnh27gk3ab2qasjmyy

Trusted P2P Group Interaction

Rachid Anane, Steven Marrocco, Behzad Bordbar
2009 2009 2nd International Conference on Computer Science and its Applications  
Most implementations rely on a carefully designed formula for expressing and recording the historical performance of peers and for determining the level of trust that should govern the nature of their  ...  local trust and distributed trust, second, group management and third, system configuration and parameter tuning.  ...  Distributed trust When a peer is relatively unknown to the local peer a distributed trust is required for it.  ... 
doi:10.1109/csa.2009.5404307 dblp:conf/IEEEcsa/AnaneMB09 fatcat:x4bjpl7szjdyzgq47fct3vwwpu

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System [chapter]

Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth
2005 Lecture Notes in Computer Science  
A more serious type of attack is when malicious peers exploit file sharing networks to distribute viruses and Trojan horses.  ...  Mandragore, a Gnutella worm, registers itself as an active peer in the network, and in response to intercepted queries, provides a renamed copy of itself for download [5] .  ...  For simplicity, we assume that every peer in the network makes one transaction in each query cycle. We model the distribution of files and query responses using a Zipf distribution.  ... 
doi:10.1007/11576259_10 fatcat:lqbfe2tnhrdrfdybnrjzsp2frm

Proportional Replication in Peer-to-Peer Networks

S. Tewari, L. Kleinrock
2006 Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications  
We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages.  ...  Analytical models are provided for computing the steady-state network-wide replica distribution and the transient period for LRU.  ...  For example, peer-to-peer networking can be used to offload load from the service provider video server in a video-on-demand service.  ... 
doi:10.1109/infocom.2006.132 dblp:conf/infocom/TewariK06 fatcat:vzmh3yr6wrgbbbqfxdowckzsoi

Performance Modeling of BitTorrent Peer-to-Peer File Sharing Networks [article]

Kunjie Xu
2013 arXiv   pre-print
This paper presents a comprehensive survey of analytical performance modeling techniques for BitTorrent networks.  ...  The widespread popularity of BitTorrent has attracted a great deal of attention from networking researchers who conducted various performance studies on it.  ...  BitTorrent (BT) [1] is today's one of the most popular peer-to-peer file sharing protocols used for distributing large amount of data.  ... 
arXiv:1311.1195v1 fatcat:chx4nnn3avephcvxrojnmonlke

On the Degree Distribution of Faulty Peer-to-Peer Overlays [article]

Stefano Ferretti
2013 arXiv   pre-print
We define a distributed protocol peers execute for managing the overlay and reacting to node faults.  ...  From the study of the degree distribution, it is possible to estimate other important metrics of the peer-to-peer overlay, such as the diameter of the network.  ...  The interest on scale-free networks in this work relates to the fact that several peer-to-peer systems are indeed scale-free networks. Gnutella is a main example [2] .  ... 
arXiv:1105.0545v4 fatcat:mkx6xhh3evfmlfmqx2znzp7vsy
« Previous Showing results 1 — 15 out of 347,364 results