Filters








7,694 Hits in 4.7 sec

Self-optimizing Peer-to-Peer Networks with Selfish Processes

Amlan Bhattacharya, Sukumar Ghosh
2007 First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007)  
Request patterns in peer-to-peer networks are not uniform, and the cost of communication depends on the traffic flows among peers.  ...  Since selfish peers may not comply, a penalty mechanism is proposed to discourage selfishness.  ...  A low value of the total cost reflects an efficient network. However, individual processes may have a selfish goal too.  ... 
doi:10.1109/saso.2007.51 dblp:conf/saso/BhattacharyaG07 fatcat:k4355l36mnda7iyhotcwyl7omu

Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks

Y. Hu, M. Feng, L. N. Bhuyan, V. Kalogeraki
2009 IEEE INFOCOM 2009 - The 28th Conference on Computer Communications  
Extensive emulations have been conducted at large scale network scenarios to compare performance of BuSIS with flooding and random walk searches with and without selfish user behaviors.  ...  In this paper, we propose a Budget-based Self-optimized Incentive Search (BuSIS) protocol for unstructured P2P file sharing systems, which is robust to and restricts selfish user behaviors.  ...  We let the same number of new peers enter the network to keep the network size as 5000 peers. The query generation by a peer follows a poisson process with inter generation time of 5 seconds.  ... 
doi:10.1109/infcom.2009.5061939 dblp:conf/infocom/HuFBK09 fatcat:pokgvaeyfnfwnp25nmigkjghsu

Cooperative Content Distribution: Scalability Through Self-Organization [chapter]

Pascal Felber, Ernst W. Biersack
2005 Lecture Notes in Computer Science  
Peer-to-peer networks have often been touted as the ultimate solution to scalability.  ...  We argue that the self-scaling and self-organizing properties of cooperative networks pave the way for cost-effective, yet highly efficient and robust content distribution.  ...  It is therefore necessary to adapt the strategies to the real complexity of the peer-to-peer network in order to optimize content distribution.  ... 
doi:10.1007/11428589_22 fatcat:bjo4l47qczf45kjf3zp2u2ki3a

Attack-resistant cooperation strategies in P2P live streaming social networks

W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
2008 2008 42nd Asilomar Conference on Signals, Systems and Computers  
In peer-to-peer live-streaming social networks, users cooperate with each other to provide a distributed, highly scalable and robust platform for live streaming applications.  ...  We first analyze the Nash equilibrium and the Pareto optimality of 2-person game and then extend to multiuser case.  ...  Peer-to-Peer (P2P) live streaming network [1] , is one of the biggest multimedia social networks on the internet, consisting of self-organizing, distributed systems, with no centralized authority or infrastructure  ... 
doi:10.1109/acssc.2008.5074644 fatcat:fns3rdvwnfguzazga2i7qsz5qq

Attack-Resistant Collaboration in Wireless Video Streaming Social Networks

W S Lin, H V Zhao, K J R Liu
2010 2010 IEEE Global Telecommunications Conference GLOBECOM 2010  
These users are motivated to collaborate with each other to obtain better-quality service. The decisions and actions of users influence the performance of others, hence they form a social network.  ...  Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet.  ...  Peer-to-Peer (P2P) streaming network is one of the largest multimedia social networks on the internet, consisting of self-organized and distributed systems, with no centralized authority or infrastructure  ... 
doi:10.1109/glocom.2010.5685222 dblp:conf/globecom/LinZL10 fatcat:h6zat4ontjaqvanvwpapjtkxie

Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks

W Sabrina Lin, H Vicky Zhao, K J Ray Liu
2010 IEEE Transactions on Image Processing  
Index Terms-Game theory, multimedia social network, peer-topeer video streaming, wireless network.  ...  These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others.  ...  Furthermore, since the peer-to-peer system is fully distributed without any centralized ringleaders, once an attacker is detected, he/she can leave the network and join again with different ID to cause  ... 
doi:10.1109/tip.2010.2045035 pmid:20227979 fatcat:52glhgka3vb73ghe7swb6prdni

Service Discovery and Provision for Autonomic Mobile Computing [chapter]

George C. Polyzos, Christopher N. Ververidis, Elias C. Efstathiou
2006 Lecture Notes in Computer Science  
Service discovery and related service advertisements, redirection and provision decisions are essential processes in networks supporting mobile communications in order for these systems to be self-configurable  ...  with zero or minimal administration overhead.  ...  of selfish peers in the absence of authorities.  ... 
doi:10.1007/11687818_18 fatcat:3x2vevsfk5dffa7pall2m7eqjq

Editorial: Special issue on mobile P2P networking and computing

Li Li, Jiannong Cao, Kurt Tutschku
2009 Peer-to-Peer Networking and Applications  
Today, mobile end devices are one of the major participants in information gathering, processing, dissemi-Peer-to-Peer Netw Appl (  ...  Keywords Mobile P2P networks . Mobile P2P applications . Mobile P2P computing Peer-to-Peer networking first emerged as an overlay technique to support distributed file sharing over the Internet.  ...  approach by studying the selfish behaviour of peers in the MP2P file sharing network.  ... 
doi:10.1007/s12083-009-0040-z fatcat:77as42dxabam5eaz5odl2va3d4

Information Exchange rather than Topology Awareness: Cooperation between P2P Overlay and Traffic Engineering

Jia Zhao, Jianfeng Guan, Changqiao Xu, Wei Su, Hongke Zhang
2014 Mathematical Problems in Engineering  
cost for underlay, and ISP underlay adjusts routing to optimize network cost as well as indicating short delay paths for P2P.  ...  In this paper, we first illustrate the hyperselfish weakness with two dynamic noncooperative game models in which hyperselfish overlay or underlay has to accept a suboptimal profit.  ...  With regard to cooperation in papers [14, 15] , physical path distances are provided for P2P overlay to select closer peers and save network cost.  ... 
doi:10.1155/2014/792563 fatcat:ghg5ju7l65e6jl3s5oqjzyqynm

Swarming on Optimized Graphs for n-Way Broadcast

G. Smaragdakis, N. Laoutaris, P. Michiardi, A. Bestavros, J. W. Byers, M. Roussopoulos
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
In this paper, we show that we can leverage this scale constraint to construct optimized overlay topologies that take into consideration the end-to-end characteristics of the network and as a consequence  ...  Moreover, we show how to modify our swarming protocol to allow it to accommodate selfish nodes.  ...  These peer-set selection policies optimize the connectivity of a given node to the remaining network. One could say that this constitutes selfish behavior.  ... 
doi:10.1109/infocom.2008.37 dblp:conf/infocom/SmaragdakisBLBMR08 fatcat:xlldxvjrszgy3paztip7rk6goe

Reputation and audits for self-organizing storage

Nouha Oualha, Yves Roudier
2008 Proceedings of the workshop on Security in Opportunistic and SOCial networks - SOSOC '08  
Their key operation relies on collecting, processing, and disseminating the feedback about some peers' past behavior in order to boost their cooperation, albeit this is susceptible to collusion and bashing  ...  Additionally, estimating reputation generally relies on a partial assessment of the behavior of peers only, which might delay the detection of selfish peers.  ...  This impact concerns only actively selfish peers: with high replication, it is more difficult to convince rational actively selfish peers to change strategy to cooperation.  ... 
doi:10.1145/1461469.1461472 dblp:conf/securecomm/OualhaR08 fatcat:p3o47crwivdbrd3wtvtjmv7em4

Swarming on Optimized Graphs for n-Way Broadcast

G. Smaragdakis, N. Laoutaris, P. Michiardi, A. Bestavros, J. W. Byers, M. Roussopoulos
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
In this paper, we show that we can leverage this scale constraint to construct optimized overlay topologies that take into consideration the end-to-end characteristics of the network and as a consequence  ...  Moreover, we show how to modify our swarming protocol to allow it to accommodate selfish nodes.  ...  These peer-set selection policies optimize the connectivity of a given node to the remaining network. One could say that this constitutes selfish behavior.  ... 
doi:10.1109/infocom.2007.37 fatcat:vlta55y6vrfqvl7mkltw3koaya

Dissecting Self-* Properties

Andrew Berns, Sukumar Ghosh
2009 2009 Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems  
These attributes are collectively referred to as self-* properties.  ...  These systems have been described with many terms, such as self-healing, self-stabilizing, self-organizing, self-adaptive, selfoptimizing, self-protecting, and self-managing.  ...  For some self-optimizing systems involving selfish processes, no equilibrium configuration is reached [29] .  ... 
doi:10.1109/saso.2009.25 dblp:conf/saso/BernsG09 fatcat:u7esnkvno5dzzpizardhjcaav4

AN EFFICIENT SELFISHNESS CONTROL MECHANISM FOR MOBILE AD HOC NETWORKS

D. RAJALAKSHMI, K. MEENA
2020 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY  
A MANETs (mobile ad hoc network) is a self-organized wireless network.  ...  In real time it's not possible because some selfish nodes it interacts with other nodes partially or it may not share the data entirely.  ...  .  In DCG, network traffic is very worst. PROBLEM DEFINITION It illustrates the issues of selfishness perspective, replica provision in MANET. It can easily identified by peer--peer application.  ... 
doi:10.34218/ijaret.11.7.2020.036 fatcat:jbdw6xo6ozgzppush5hyaqcnq4

Efficient Content Authentication in AdHoc Networks Mitigating DDoS Attacks

Anuj Joshi, Krishna Kant Agrawal
2011 International Journal of Computer Applications  
With the emergence of mobile ad hoc networks it is now possible to access network accessing and communicate data in an area where no fixed infrastructure exists or existing infrastructure is not available  ...  Therefore in order to prevent from various attacks based on the content; it becomes important to have some security solutions.  ...  Similarly in a peer-to-peer system a verification that the node some peer is communicating with really is who it claims to be [5] .  ... 
doi:10.5120/2875-3738 fatcat:lo2x2nh4zfcn3iaknugwyju5vi
« Previous Showing results 1 — 15 out of 7,694 results