• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,583
Next 10 →

The Index Poisoning Attack in P2P File Sharing Systems

by Jian Liang - In INFOCOM , 2006
"... Abstract — P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus records into the index for a set of targeted titles. As a result, when a user searches for a targeted title, the inde ..."
Abstract - Cited by 51 (0 self) - Add to MetaCart
Abstract — P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus records into the index for a set of targeted titles. As a result, when a user searches for a targeted title

Analyzing the Dynamics and Resource Usage of P2P File Sharing by a Spatio-temporal Model

by Riikka Susitaival, Samuli Aalto, Jorma Virtamo
"... resource usage of P2P  file  sharing  by  a  spatiotemporal  model. In Proceedings of the ..."
Abstract - Cited by 7 (3 self) - Add to MetaCart
resource usage of P2P  file  sharing  by  a  spatiotemporal  model. In Proceedings of the

Monitoring Challenges and Approaches for P2P File-Sharing Systems

by Danny Hughes
"... Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University o ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University

Challenges and directions for monitoring P2P file sharing networks

by Michael Piatek, Tadayoshi Kohno, Arvind Krishnamurthy - In 3rd USENIX Workshop on Hot Topics in Security (HotSec ’08 , 2008
"... Abstract — We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We describe simple techniques for implicating arbitrary network endpoints in illegal content sharing and demonstrate ..."
Abstract - Cited by 37 (1 self) - Add to MetaCart
and demonstrate the effectiveness of these techniques experimentally, attracting real DMCA complaints for nonsense devices, e.g., IP printers and a wireless access point. We then step back and evaluate the challenges and possible future directions for pervasive monitoring in P2P file sharing networks. 1

Efficient parallelized network coding for P2P file sharing applications

by Karam Park, Joon-sang Park, Won W. Ro - In Proceedings of the 4th International Conference on Advances in Grid and Pervasive Computing, GPC ’09 , 2009
"... Abstract. In this paper, we investigate parallel implementation techniques for network coding to enhance the performance of Peer-to-Peer (P2P) file sharing applications. It is known that network coding mitigates peer/piece selection problems in P2P file sharing systems; however, due to the decoding ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract. In this paper, we investigate parallel implementation techniques for network coding to enhance the performance of Peer-to-Peer (P2P) file sharing applications. It is known that network coding mitigates peer/piece selection problems in P2P file sharing systems; however, due to the decoding

Incentives for p2p file sharing in mobile ad hoc networks

by Afzal Mawji , Hossam Hassanein - In CCNC
"... Abstract-P2P overlay networks are a natural fit for MANETs because both are decentralized and have dynamic topologies. Most nodes in P2P file sharing networks are freeloaders, nodes that do not contribute to the network. In order to have a useful P2P network, it is important that nodes not only sha ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract-P2P overlay networks are a natural fit for MANETs because both are decentralized and have dynamic topologies. Most nodes in P2P file sharing networks are freeloaders, nodes that do not contribute to the network. In order to have a useful P2P network, it is important that nodes not only

AN INTERCONNECTION SYSTEM FOR P2P FILE SHARING NETWORKS

by J. Lloret, C. Palau, J. M. Jimenez, M. Esteve, Key Words
"... Currently there are a lot of public P2P file sharing networks in existence. Some of them have millions of online users. There is a need for a system that allows searching files in every P2P network and downloading from every P2P network. To our knowledge, there is not any interconnection system in e ..."
Abstract - Add to MetaCart
Currently there are a lot of public P2P file sharing networks in existence. Some of them have millions of online users. There is a need for a system that allows searching files in every P2P network and downloading from every P2P network. To our knowledge, there is not any interconnection system

Robust Super-Peer-Based P2P File-Sharing Systems

by Jenn-wei Lin, Ming-feng Yang , 2009
"... This paper presents an efficient approach for improving file availability in super-peer-based peer-to-peer (P2P) file-sharing systems. In the super-peer-based P2P file-sharing system, peers are organized into multiple groups. In each group, there is a special peer called super-peer to serve the regu ..."
Abstract - Add to MetaCart
This paper presents an efficient approach for improving file availability in super-peer-based peer-to-peer (P2P) file-sharing systems. In the super-peer-based P2P file-sharing system, peers are organized into multiple groups. In each group, there is a special peer called super-peer to serve

On the Penetration of Business Networks by P2P File Sharing (DRAFT)

by Kevin Lee, Danny Hughes, James Walkerdine
"... P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Because of these problems, the majority of businesses attempt to restrict the use of P2P software, but how successf ..."
Abstract - Add to MetaCart
P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Because of these problems, the majority of businesses attempt to restrict the use of P2P software, but how

Constructing Fair-Exchange P2P File Market

by Min Zuo, Jianhua Li
"... Abstract. P2P is a promising technology to construct the underlying supporting layer of a Grid. It is known that contribution from all the peers is vital for the sustainability of a P2P community, but peers are often selfish and unwilling to contribute. In this paper we describe how to construct a f ..."
Abstract - Add to MetaCart
fair file-exchanging P2P community. We name this community a P2P file market. Our scheme forces peers to contribute by a micropayment-based incentive mechanism. 1
Next 10 →
Results 11 - 20 of 3,583
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University