default search action
Peer-to-Peer Networking and Applications, Volume 8
Volume 8, Number 1, January 2015
- Aditya Kurve, Christopher Griffin, David J. Miller, George Kesidis:
Optimizing cluster formation in super-peer networks via local incentive design. 1-21 - Ching-Sheng Wang, Chien-Liang Chen, Der-Jiunn Deng:
P2P-based mobile navigation system with location service. 22-31 - Qing-Chao Cai, Kwok-Tung Lo:
A multi-faced measurement study on a large private BitTorrent community. 32-48 - Jianming Lv, Zhiwen Yu, Tieying Zhang:
Towards an immunity based distributed algorithm to detect harmful files shared in P2P networks. 49-62 - Subhrangsu Mandal, Sandip Chakraborty, Sushanta Karmakar:
Distributed deterministic 1-2 skip list for peer-to-peer system. 63-86 - Abdulkader Benchi, Pascale Launay, Frédéric Guidec:
A P2P tuple space implementation for disconnected MANETs. 87-102 - Jian Wang, Xiaoming Hu, Xiaolin Xu, Yinchun Yang:
A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges. 103-110 - Zhu Ren, Peng Cheng:
Energy management for event capture in rechargeable sensor network with limited capacitor size. 111-119 - Mohammad Shojafar, Jemal H. Abawajy, Zia Delkhah, Ali Ahmadi, Zahra Pooranian, Ajith Abraham:
An efficient and distributed file search in unstructured peer-to-peer networks. 120-136 - Chunxi Li, Yishuai Chen, Baoxian Zhang, Cheng Li, Changjia Chen:
Peer startup process and initial offset placement in peer-to-peer (P2P) live streaming systems. 137-155 - Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang:
Improving lookup reliability in Kad. 156-170 - Elnaz Mojahedi, Mohammad Abdollahi Azgomi:
Modeling the propagation of topology-aware P2P worms considering temporal parameters. 171-180
Volume 8, Number 2, March 2015
- Joohee Kim, Maral Mesmakhosroshahi:
Stereo-based region of interest generation for real-time pedestrian detection. 181-188 - Evangelos Pournaras, Martijn Warnier, Frances M. T. Brazier:
Peer-to-peer aggregation for dynamic adjustments in power demand. 189-202 - Jingyu Wang, Jianxin Liao, Tonghong Li, Jing Wang:
On the collaborations of multiple selfish overlays using multi-path resources. 203-215 - Tingting Yang, Chengzhe Lai, Rongxing Lu, Rong Jiang:
EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks. 216-228 - Christof Leng:
Large scale arbitrary search with rendezvous search systems. 229-240 - S.-H. Gary Chan, Mea Wang, Jacob Chakareski, Bin Wei:
Guest Editorial: Special Issue on P2P Cloud Systems. 241-243 - Jacob Chakareski:
Cost and profit driven cloud-P2P interaction. 244-259 - Konstantinos Deltouzos, Ilias Gkortsilas, Nikolaos Efthymiopoulos, Spyros G. Denazis:
Liquidstream II - Scalable P2P overlay optimization with adaptive minimal server assistance for stable and efficient video on demand. 260-275 - Eliya Buyukkaya, Maha Abdallah, Gwendal Simon:
A survey of peer-to-peer overlay approaches for networked virtual environments. 276-300 - Hanna Kavalionak, Emanuele Carlini, Laura Ricci, Alberto Montresor, Massimo Coppola:
Integrating peer-to-peer and cloud computing for massively multiuser online games. 301-319 - Jian Zhao, Chuan Wu, Xiaojun Lin:
Locality-aware streaming in hybrid P2P-cloud CDN systems. 320-335
Volume 8, Number 3, May 2015
- Fangai Liu, Tianlai Li, Changming Xing:
A hierarchical HRRP(k) network and its application. 337-351 - Ofer Hermoni, Niv Gilboa, Eyal Felstaine, Shlomi Dolev:
Rendezvous tunnel for anonymous publishing. 352-366 - Shihabur Rahman Chowdhury, Arup Raton Roy, Maheen Shaikh, Khuzaima Daudjee:
A taxonomy of decentralized online social networks. 367-383 - Odysseas Papapetrou, Wolf Siberski, Stefan Siersdorfer:
Efficient model sharing for scalable collaborative classification. 384-398 - Jiayi Liu, Shakeel Ahmad, Eliya Buyukkaya, Raouf Hamzaoui, Gwendal Simon:
Resource allocation in underprovisioned multioverlay peer-to-peer live video sharing services. 399-413 - Jun-Li Kuo, Chen-Hua Shih, Cheng-Yuan Ho, Yaw-Chung Chen:
Advanced bootstrap and adjusted bandwidth for content distribution in peer-to-peer live streaming. 414-431 - Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zheng:
Analysis of user's behavior and resource characteristics for private trackers. 432-446 - Spiridoula V. Margariti, Vassilios V. Dimakopoulos:
On probabilistic flooding search over unstructured peer-to-peer networks. 447-458 - Ke Xu, Xin Liu, Zhen Ma, Yifeng Zhong, Wenlong Chen:
Exploring the policy selection of the P2P VoD system: A simulation-based research. 459-473 - Dan Huang, Min Zhang, Yi Zheng, Changjia Chen, Yan Huang:
Pre-allocation based flash crowd mitigation algorithm for large-scale content delivery system. 493-500 - Xin Cong, Kai Shuang, Sen Su, Fangchun Yang, Lingling Zi:
SBDP: Bandwidth prediction mechanism towards server demands in P2P-VoD system. 501-511 - Tarciana Silva, Carlos Kamienski, Stenio Fernandes, Djamel Fawzi Hadj Sadok:
A flexible DHT-based directory service for information management. 512-531 - Huanlin Liu, Gao-xiang Chen, Yong Chen, Qian-Bin Chen:
A trust-based P2P resource search method integrating with Q-learning for future Internet. 532-542 - Fraser Cadger, Kevin Curran, Jose A. Santos, Sandra Moffett:
Towards a location and mobility-aware routing protocol for improving multimedia streaming performance in MANETs. 543-554
Volume 8, Number 4, July 2015
- Jungsoo Han:
Distributed hybrid P2P networking systems. 555-556 - Seokhoon Kim:
QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks. 557-566 - Hangki Joh, Intae Ryoo:
A hybrid Wi-Fi P2P with bluetooth low energy for optimizing smart device's communication property. 567-577 - Seung-Bo Park, Kyungyong Chung:
Annotation alignment method on P2P-TV system. 578-586 - Si-Jung Kim, Bong-Han Kim:
Key exchange process of PIM-SM-based for Multiple Group Communication in P2P. 587-595 - Seok-Jae Moon, Chang-Pyo Yoon:
Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. 596-609 - Kapsu Kim, Myunghui Hong, Kyungyong Chung, Sang-Yeob Oh:
Estimating unreliable objects and system reliability in P2P networks. 610-619 - Yong-Ho Kim, Jae Hoon Sun:
Extracting real IP address used to connect to P2P messenger using ARIT agent. 620-630 - SungHyun Yun, Heuiseok Lim, Kyungyong Chung:
The biometric signature delegation scheme to balance the load of digital signing in hybrid P2P networks. 631-640 - Editor's Note: Special issue on advanced P2P security and privacy. 641
- Ming He, Zhenghu Gong, Lin Chen, Hong Wang, Fan Dai, Zhihong Liu:
Securing network coding against pollution attacks in P2P converged ubiquitous networks. 642-650 - Dan Zhao, Chunqing Wu, Xiaofeng Hu, Hongjun Liu:
LSC2: An extended link state protocol with centralized control. 651-663 - Cándido Caballero-Gil, Pino Caballero-Gil, Jezabel Molina-Gil:
Merging sub-networks in VANETs by using the IEEE 802.11xx protocols. 664-673 - Soobok Shin, Hongjin Yeh, Kangseok Kim:
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. 674-683 - Gunhee Lee, Wonil Kim, Kangseok Kim, Sangyoon Oh, Dong-Kyoo Kim:
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks. 684-693 - Jung-Taek Seo, Seokjun Lee, Taeshik Shon:
A study on memory dump analysis based on digital forensic tools. 694-703 - Jongsu Park, Yong-Surk Lee:
Network processor architecture with flow-based dynamic bandwidth control for efficient QoS provisioning. 704-715 - Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. 716-732
Volume 8, Number 5, September 2015
- Sanmin Liu, Zhixin Sun:
Active learning for P2P traffic identification. 733-740 - Khedija Arour, Taoufik Yeferny:
Learning model for efficient query routing in P2P information retrieval systems. 741-757 - Rui Santos Cruz, Mário Serafim Nunes:
A P2P streaming architecture supporting scalable media. 758-776 - Le Chen, Rongxing Lu, Zhenfu Cao, Khalid Nawaf Alharbi, Xiaodong Lin:
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications. 777-792 - Bojan Marinkovic, Vincenzo Ciancaglini, Zoran Ognjanovic, Paola Glavan, Luigi Liquori, Petar Maksimovic:
Analyzing the exhaustiveness of the Synapse protocol. 793-806 - Adán G. Medrano-Chávez, Elizabeth Pérez Cortés, Miguel López-Guerrero:
A performance comparison of Chord and Kademlia DHTs in high churn scenarios. 807-821 - Bo Zhang, S.-H. Gary Chan, Gene Cheung:
Peer-to-peer error recovery for wireless video broadcasting. 822-834 - Sang-Soo Yeo, Yu Chen, Cho-Li Wang:
Cloud, grid, P2P and internet computing: Recent trends and future directions. 835-837 - Hilal Jan, Anand Paul, Abid Ali Minhas, Awais Ahmad, Sohail Jabbar, Mucheol Kim:
Dependability and reliability analysis of intra cluster routing technique. 838-850 - Chun-Wei Lin, Wensheng Gan, Tzung-Pei Hong, Sang Oh Park, Bo-Wei Chen:
Peer-to-peer usage analysis in dynamic databases. 851-862 - Seungmin Rho, Hangbae Chang, Sanggeun Kim, Yang Sun Lee:
An efficient peer-to-peer and distributed scheduling for cloud and grid computing. 863-871 - Jonghan Lee, Kyumin Cho, ChangYong Lee, Seungjoo Kim:
VoIP-aware network attack detection based on statistics and behavior of SIP traffic. 872-880 - Wenbo Shi, Neeraj Kumar, Peng Gong, Naveen K. Chilamkurti, Hangbae Chang:
On the security of a certificateless online/offline signcryption for Internet of Things. 881-885 - Kyuhwan Lee, JungYul Choi, JoongSoo Ma:
Performance evaluation for delay time estimation in IEEE 802.16m sleep mode. 886-895 - Amol Jaikar, Seo-Young Noh:
Cost and performance effective data center selection system for scientific federated cloud. 896-902 - Hang Tu, Neeraj Kumar, Naveen K. Chilamkurti, Seungmin Rho:
An improved authentication protocol for session initiation protocol using smart card. 903-910 - Muhammad Yasin, Junaid Ahmad Qureshi, Firdous Kausar, Jongsung Kim, Jungtaek Seo:
A granular approach for user-centric network analysis to identify digital evidence. 911-924
Volume 8, Number 6, November 2015
- Hua Li, Bin Hu, Cailian Chen, Xinping Guan, Cunqing Hua:
Relay selection for peer-to-peer cooperative OFDMA with channel distribution uncertainty. 925-937 - Huseyin Guler, Berkant Barla Cambazoglu, Öznur Özkasap:
Task allocation in volunteer computing networks under monetary budget constraints. 938-951 - Wenlong Chen, Yubao Liu, Haiyang Wang:
On storage partitioning of internet routing tables: A P2P-based enhancement for scalable routers. 952-964 - Sahar Mohamed Ghanem, Mohamed A. Ismail, Samia G. Omar:
VITAL: Structured and clustered super-peer network for similarity search. 965-991 - Zhi Yang, Yuanjian Xing, Chi Chen, Jilong Xue, Yafei Dai:
Understanding the performance of offline download in real p2p networks. 992-1007 - Ahmad Jafarabadi, Mohammad Abdollahi Azgomi:
A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. 1008-1022 - Hongwei Li, Haojin Zhu, Bong Jun Choi:
Guest editorial: Security and privacy of P2P networks in emerging smart city. 1023-1024 - Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen:
A full lifecycle privacy protection scheme for sensitive data in cloud computing. 1025-1037 - Hai-Jiang Xie, Jizhong Zhao:
A lightweight identity authentication method by exploiting network covert channel. 1038-1047 - Qiyi Han, Hong Wen, Mengyin Ren, Bin Wu, Shengqiang Li:
A topological potential weighted community-based recommendation trust model for P2P networks. 1048-1058 - Haomiao Yang, Hyunsung Kim, Kambombo Mtonga:
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. 1059-1069 - Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. 1070-1081 - Mi Wen, Jingsheng Lei, Zhongqin Bi, Jing Li:
EAPA: An efficient authentication protocol against pollution attack for smart grid. 1082-1089 - Xiaomei Zhang, Xiaolei Dong, Naixue Xiong, Jie Wu, Xiuqi Li:
Fault-aware flow control and multi-path routing in VANETs. 1090-1107 - Yipin Sun, Bofeng Zhang, Baokang Zhao, Xiangyu Su, Jinshu Su:
Mix-zones optimal deployment for protecting location privacy in VANET. 1108-1121 - Le Chen, Rongxing Lu, Zhenfu Cao:
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. 1122-1132 - Jun Wu, Mianxiong Dong, Kaoru Ota, Lin Liang, Zhenyu Zhou:
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. 1133-1142
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.