نتایج جستجو برای: file sharing

تعداد نتایج: 140500  

Journal: :CoRR 2013
Ruchir Gupta Yatindra Nath Singh

In peer-to-peer file sharing network, it is hard to distinguish between a legitimate newcomer and a whitewasher. This makes whitewashing a big problem in peerto-peer networks. Although the problem of whitewashing can be solved using permanent identities, it may take away the right of anonymity for users. In this paper, we a have proposed a novel algorithm to avoid this problem when network uses...

2006
André Detsch Luciano Paschoal Gaspary Marinho P. Barcellos Ricardo Nabinger Sanchez

The widespread adoption of P2P applications in environments beyond ordinary file sharing demands the fulfillment of several security requirements. Important steps have been taken towards security in P2P systems, with relevant mechanisms being proposed in the past to address specific vulnerabilities. However, existing approaches lack flexibility, since they do not (include enough mechanisms to) ...

Journal: :CoRR 2004
Choon Hoong Ding Sarana Nutanong Rajkumar Buyya

Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and F...

Journal: :JDFSL 2014
Jasmine Eggestein Kenneth J. Knapp

In our digitally connected world, the law is arguably behind the technological developments of the Internet age. While this causes many issues for law enforcement, it is of particular concern in the area of child pornography in the United States. With the wide availability of technologies such as digital cameras, peer-to-peer file sharing, strong encryption, Internet anonymizers and cloud compu...

Journal: :JDIM 2010
Mamoru Kobayashi Jun Kageyama Susumu Shibusawa Tatsuhiro Yonekura

AbstrAct: In peer-to-peer (P2P) networks that support file-sharing services, the level of access demand can vary widely between different files. Since fewer nodes store files for which there is a lower demand, these files are more likely to be lost from the P2P networks if users leave the network or delete the files. File loss can cause users to seek alternatives to P2P services, and lead to de...

2001
Richard Gold Dan Tidhar

We present an architecture for content-based aggregation in peer-to-peer filesharing networks. It is designed to significantly reduce the amount of nodes that have to be queried, by introducing a distributed index into the system. This index allows content to be located in a peer-to-peer network without using broadcast-style techniques. We also show how this index can be created and maintained ...

2008
Shay Horovitz Danny Dolev

Common peer-to-peer (P2P) file sharing clients usually download at an unstable rate and hardly exploit the available bandwidth offered by low rate sources. The characteristic fluctuational throughput of the source peers might be caused by user behavior factors such as running other bandwidth consuming tasks, throttling of download speed by P2P software or even termination of the source. In this...

1993
Peter Reiher Thomas Page Gerald Popek

The Truffles file system supports file sharing between arbitrary users at arbitrary sites connected by a network. Truffles is an interesting example of a service of the future that will automatically allow users to collaborate with other users anywhere in the world in ways not currently possible. These services, and Truffles in particular, have the potential of greatly increasing the workload o...

2003
Mario T. Schlosser Tyson E. Condie Sepandar D. Kamvar

Assessing the performance of peer-to-peer algorithms is impossible without simulations since testing new algorithms by deploying them in an existing P2P network is prohibitively expensive. However, some P2P algorithms are sensitive to the network and traffic models that are used in the simulations. In order to produce realistic results, we therefore require simulations that resemble real-world ...

2011
Stephen S Kirkman Kamyar Dezhgosha

P2P security should be of interest to anyone who wants to protect their personal information and who actively uses the Internet. P2P Security has been a popular research topic for as long as P2P computing came into existence nearly a decade ago. P2P file sharing applications still remain popular and other applications based on P2P networks have gained in popularity. How do you secure your infor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید