A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
On Distributed Rating Systems for Peer-to-Peer Networks
2007
Computer journal
In recent years, many distributed rating systems have been proposed against the increasing misbehaviors of peers in peer-to-peer (P2P) networks. ...
There is also a lack of systematic analysis and evaluation for understanding the systems. In this paper, we first present a framework of stochastic analytical model for evaluating P2P rating systems. ...
A typical ON DISTRIBUTED RATING SYSTEMS FOR P2P NETWORKS Page 3 of 19 strategy for them is to issue favorable ratings mutually. ...
doi:10.1093/comjnl/bxm045
fatcat:jheeedweunaaln2zoguzdpvwle
Exploring the Sustainability of Credit-incentivized Peer-to-Peer Content Distribution
2012
2012 32nd International Conference on Distributed Computing Systems Workshops
Credits condensation puts system sustainability on the line: many peers gradually run out of credits and cannot keep up a decent download rate. ...
Credit-based incentives were proposed to incite peer contributions in P2P content distribution systems. Their effectiveness was extensively analyzed from a game theory perspective. ...
The threshold for average wealth that leads to condensation depends on the maximum rate peers are willing to spend credits. ...
doi:10.1109/icdcsw.2012.40
dblp:conf/icdcsw/QiuHWLL12
fatcat:ixp646hahfb4vpkipcxi4ublv4
Modeling User Behavior in P2P Systems
[chapter]
2010
Modeling and Tools for Network Simulation
For example, churn, which describes peers connecting to and disconnecting from the system, has a severe impact on data availability and consistency, while resource distribution and popularity have a significant ...
For peer-to-peer systems, simulations are often the most reasonable approach, simply because P2P systems are both inherently large-scale and complex. ...
Here additionally to the churn the arrival process, i.e., with which rate and distribution the peers connect to the system is considered. ...
doi:10.1007/978-3-642-12331-3_20
fatcat:ijqrxqzgora6tdfpb5dapug7fi
On the Privacy of Peer-Assisted Distribution of Security Patches
2010
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)
Using analytical models and simulation, we show that, honeypots do not completely solve the privacy problem; in contrast, an anonymizing network turns out to be more suitable for security patch distribution ...
Because centralized distribution of patches may not scale well, peer-to-peer (P2P) approaches have recently been suggested. ...
ACKNOWLEDGEMENTS This work has been in part supported by NFS grant CNS-0917767, the Fundamental Research Funds for the Central Universities, Sun Yat-Sen University (grant no. 2009-35000-3161425/09LGPY56 ...
doi:10.1109/p2p.2010.5569988
dblp:conf/p2p/WuTDSR10
fatcat:fi2wx2j5bfekrcsbr2cxmthkny
P2P network system for private live-streaming distribution
2011
International Journal of Multimedia Intelligence and Security
This paper proposes P2P live-streaming system suitable for private distribution. This system constructs distribution network considering transmission bandwidth of each node. ...
A set of the selected broadband nodes plays a role of virtual distributor with large amount of transmission bandwidth and provides contents to peers instead of origin. ...
Network architecture Coolstreaming configures one network to distribute one content. ...
doi:10.1504/ijmis.2011.040928
fatcat:wmugct2mhjbozlfpgqhyp2cina
VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks
2009
2009 Proceedings of 18th International Conference on Computer Communications and Networks
VectorTrust remains robust and tolerant to malicious peers and malicious behaviors. ...
In this paper, we propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores. ...
Trust Vector and Trust Overlay Network VectorTrust system is built on a trust overlay network on the top of a P2P network. ...
doi:10.1109/icccn.2009.5235290
dblp:conf/icccn/ZhaoL09
fatcat:fwbxj45565b43jcf4nhzigu5be
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks
2011
Journal of Supercomputing
VectorTrust remains robust and tolerant to malicious peers and malicious behaviors. ...
In this paper, we propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores. ...
Trust Vector and Trust Overlay Network VectorTrust system is built on a trust overlay network on the top of a P2P network. ...
doi:10.1007/s11227-011-0576-6
fatcat:xy5yc6sdcvawjo2y2b35fgnmti
Enabling adaptive video streaming in P2P systems [Peer-to-Peer Multimedia Streaming]
2007
IEEE Communications Magazine
This article presents an overview of application and network layer mechanisms that enable successful streaming frameworks in peer-to-peer systems. ...
Peer-to-peer (P2P) systems are becoming increasingly popular due to their ability to deliver large amounts of data at a reduced deployment cost. ...
peers and mesh overlay for massive parallel content distribution among peers. ...
doi:10.1109/mcom.2007.374427
fatcat:6b3kgcbckffyjoong7h3yx3zae
H-Trust: A Group Trust Management System for Peer-to-Peer Desktop Grid
2009
Journal of Computer Science and Technology
Peer-to-Peer Desktop Grid (P2PDG) has emerged as a pervasive cyber-infrastructure tackling many large-scale applications with high impacts. ...
Simulation results demonstrate that H-Trust is robust and can identify and isolate malicious peers in large scale systems even when a large portion of peers are malicious. ...
In each service cycle, a peer in the network may be actively submitting a job. When distributing a job, a peer waits for incoming responses, selects a most reputable peer to distribute the job. ...
doi:10.1007/s11390-009-9275-7
fatcat:56d7fwvcubfybfvzhp3c2kbizu
Collusive Piracy Prevention in P2P Content Delivery Networks
2009
IEEE transactions on computers
We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. ...
Such online piracy has hindered the use of open P2P networks for commercial content delivery. ...
This result reinforces Theorem 1, namely, the poisoning rate is irrelevant to the piracy rate r r on the eMule network. ...
doi:10.1109/tc.2009.26
fatcat:hjrci3k2jnh27gk3ab2qasjmyy
Trusted P2P Group Interaction
2009
2009 2nd International Conference on Computer Science and its Applications
Most implementations rely on a carefully designed formula for expressing and recording the historical performance of peers and for determining the level of trust that should govern the nature of their ...
local trust and distributed trust, second, group management and third, system configuration and parameter tuning. ...
Distributed trust When a peer is relatively unknown to the local peer a distributed trust is required for it. ...
doi:10.1109/csa.2009.5404307
dblp:conf/IEEEcsa/AnaneMB09
fatcat:x4bjpl7szjdyzgq47fct3vwwpu
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
[chapter]
2005
Lecture Notes in Computer Science
A more serious type of attack is when malicious peers exploit file sharing networks to distribute viruses and Trojan horses. ...
Mandragore, a Gnutella worm, registers itself as an active peer in the network, and in response to intercepted queries, provides a renamed copy of itself for download [5] . ...
For simplicity, we assume that every peer in the network makes one transaction in each query cycle. We model the distribution of files and query responses using a Zipf distribution. ...
doi:10.1007/11576259_10
fatcat:lqbfe2tnhrdrfdybnrjzsp2frm
Proportional Replication in Peer-to-Peer Networks
2006
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications
We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages. ...
Analytical models are provided for computing the steady-state network-wide replica distribution and the transient period for LRU. ...
For example, peer-to-peer networking can be used to offload load from the service provider video server in a video-on-demand service. ...
doi:10.1109/infocom.2006.132
dblp:conf/infocom/TewariK06
fatcat:vzmh3yr6wrgbbbqfxdowckzsoi
Performance Modeling of BitTorrent Peer-to-Peer File Sharing Networks
[article]
2013
arXiv
pre-print
This paper presents a comprehensive survey of analytical performance modeling techniques for BitTorrent networks. ...
The widespread popularity of BitTorrent has attracted a great deal of attention from networking researchers who conducted various performance studies on it. ...
BitTorrent (BT) [1] is today's one of the most popular peer-to-peer file sharing protocols used for distributing large amount of data. ...
arXiv:1311.1195v1
fatcat:chx4nnn3avephcvxrojnmonlke
On the Degree Distribution of Faulty Peer-to-Peer Overlays
[article]
2013
arXiv
pre-print
We define a distributed protocol peers execute for managing the overlay and reacting to node faults. ...
From the study of the degree distribution, it is possible to estimate other important metrics of the peer-to-peer overlay, such as the diameter of the network. ...
The interest on scale-free networks in this work relates to the fact that several peer-to-peer systems are indeed scale-free networks. Gnutella is a main example [2] . ...
arXiv:1105.0545v4
fatcat:mkx6xhh3evfmlfmqx2znzp7vsy
« Previous
Showing results 1 — 15 out of 347,364 results