نتایج جستجو برای: file sharing

تعداد نتایج: 140500  

2005
Jian Liang Naoum Naoumov Keith W. Ross

P2P file-sharing systems are susceptible to pollution attacks, whereby corrupted copies of content are aggressively introduced into the system. Recent research indicates that pollution is extensive in several file sharing systems. In this paper we propose an efficient measurement methodology for identifying the sources of pollution and estimating the levels of polluted content. The methodology ...

2009
Immo Grabe Mohammad Mahdi Jaghoori Joachim Klein Sascha Klüppelholz Andries Stam Christel Baier Tobias Blechmann Bernhard K. Aichernig Frank S. de Boer Andreas Griesmayer

This paper is an extended version of the Credo Methodology [16]. Credo offers tools and techniques to model and analyze highly reconfigurable distributed systems. In a previous version we presented an integrated methodology to use the Credo tool suite. Following a compositional, component–based approach to model and analyze distributed systems, we presented a separation of the system into compo...

2012
Taoufik Yeferny Amel Bouzeghoub Khedija Arour

Mobile devices have achieved great progress. They allow user to store more audio, video, text and image data. These devices are also equipped with low radio range technology, like Bluetooth and Wi-Fi, etc. By means of the low radio range technology, they can communicate with each other without using communication infrastructure (e.g. Internet network) and form a mobile ad hoc network (MANET). T...

2003
Dennis Kügler

Peer-to-peer networks are a popular platform for file sharing, but only few of them offer strong anonymity to their users. GNUnet is a new peer-to-peer network that claims to provide practical anonymous and censorship-resistant file sharing. In this paper we show that GNUnet’s performance-enhancing features can be exploited to determine the initiator of a download. We also present an efficient ...

2009
K. Haribabu Chittaranjan Hota Saravana

The test of a peer-to-peer file sharing network is how efficiently the objects are discovered and retrieved. One of the most important factors that contribute towards this is optimal replication of the objects across the network. One of the security threats to replication model is Sybil attack. In this paper we propose an approach that aims at detecting sybil identities in peer-to-peer file sha...

2003
Junseok Hwang Ian MacInnes

This paper examines recent peer to peer initiatives in the context of the business models literature. There are three types of studies on business models: focused studies on success factors, multifactor studies of success and failure, and studies identifying the components of business models. The most common factors used to analyze business models are: revenue sources, potential benefits to act...

2006
Weider D. Yu Yan Chen

Most peer-to-peer file storage sharing systems work on wired networks. Due to the multi-hop wireless communication nature in ad-hoc networks, the development of mobile ad-hoc network file storage sharing system faces many challenges. In this paper, a hypothetical partitionable mobile file system (PMFS) is proposed. This new PMFS is a distributed file storing/sharing system built on partitionabl...

2005
Jörgen Skågeby Daniel Pargman

This paper suggests a relationship model for describing, analyzing and foreseeing conflicts of interest in file-sharing networks. The model includes levels of relationship ranging from the individual (ego), to the small group of close peers (micro), to a larger network of acquaintances (meso) to the anonymous larger network (macro). It is argued that an important focal point for analysis of coo...

Journal: :IEICE Transactions 2010
Masanori Takaoka Masato Uchida Kei Ohnishi Yuji Oie

In this paper, we propose a file replication method to achieve load balancing in terms of write access to storage device (“write storage access load balancing” for short) in unstructured peer-to-peer (P2P) file-sharing networks in which the popularity trend of queried files varies dynamically. The proposed method uses a write storage access ratio as a load balance index value in order to stabil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید