Peer to Peer
634 Followers
Recent papers in Peer to Peer
We collected mobility traces of 84,208 avatars spanning 22 regions over two months in Second Life, a popular networked virtual en- vironment. We analyzed the traces to characterize the dynamics of the avatars mobility and behavior, both... more
The novelty of the peer-to-peer (P2P) paradigm relies on two main concepts: cooperation among users and resource sharing. There are many applications based on peer-to-peer paradigm, but the most popular one is the file sharing. We can... more
Purpose – This article examines peer-to-peer sharing platform business models, their sources of competitive advantage, and the roles, motivations, and behaviors of key actors in their ecosystems. Design/methodology/approach – This paper... more
Structured peer-to-peer (P2P) networks is becoming popular for their advantages of high scalability and good performance. These networks are based on the Distributed Hash Tale or DHT mechanism to establish and maintain a certain topology.... more
With the rise of peer-to-peer (P2P) file sharing applications there has been an increasing interest in understanding the popularity and use of P2P. In this study, we look at P2P use on the University of Southern California’s campus... more
With the increasing popularity of the World Wide Web, end-user applications are moving from the desktop to the browser. More and more applications that we have come to know as desktop applications are now making their way into the web.... more
Eigenvector computations are an important building block for computing authority, trust, and reputation scores in social networks and other graphs. In peer-to-peer networks or other forms of decentralized settings (such as multi-agent... more
The communication as we know it is about to change, the simple peer-to-peer voice type of calls being replaced by a mix of different media belonging to the same session. Networkbased speech processing technologies are increasingly used,... more
— many file sharing systems exists today. The abundance of content on the web is in itself a huge problem to comprehend. The existence and wide scale use of peer-to-peer file sharing systems, which let users share files, folders,... more
Existing approaches for modelling the Internet delay space predict end-to-end delays between two arbitrary hosts as static values. Further, they do not capture the characteristics caused by geographical constraints. Peer-to-peer (P2P)... more
The extraction and recognition of facial expression has been the topic of various researches subject to enable smooth interaction between computer and their users. In this way, computers in the future will be able to offer advice in... more
Peer-to-peer (P2P) overlay networks have recently become one of the hottest topics in OS research. These networks bring with them the promise of harnessing idle storage and network resources from client machines that voluntarily join the... more
Web 2.0 is the adoption of open technologies and architectural frameworks to facilitate participative computing. Web 2.0 has the potential to deliver rich peer-to-peer interactions among users, enable collaborative value creation across... more
to design a community healthcare information network for all 450,000 citizen in the State of Geneva, Switzerland, connecting public and private healthcare professionals. Requirements include the decentralized storage of information at the... more
Spam is one of the major problems of today email systems. While many solutions have been proposed to automatically detect and filter spam, spammers are getting more and more technically sophisticated and aware of internal workings of... more
In recent times, coupled with the emergence of the new cloud paradigm, a number of security related issues have emerged. Therefore, trust and reputation management has become unavoidable challenge in this new cloud computing paradigm.... more
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible... more
Web services have the potential to dramatically reduce the complexities and costs of software integration projects. The most obvious and perhaps most significant difference between Web services and traditional applications is that Web... more
The use of peer-to-peer (P2P) applications is growing dramatically, which results in several serious problems such as the network congestion and traffic hindrance. In this paper, a method is proposed to identify the P2P traffic based on... more
A peer-to-peer database management system(P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e.... more
Peer-to-Peer (P2P) networks offer reliable and efficient services in different application scenarios. In particular, structured P2P protocols (like Chord [1]) have to handle changes in the overlay topology fast and with as little... more
Today, research in electronic negotiations focuses on negotiation protocols that support the negotiation of only a few properties. These protocols are mainly designed for automated negotiations between software agents. However, for... more
In this work, we address the problem of locally estimating the size of a Peerto-Peer (P2P) network using local information. We present a novel approach for estimating the size of a peer-to-peer (P2P) network, fitting the sum of new... more
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental evaluation. VoroNet differs from previous overlay networks... more
Internet was designed for network services without any intention for secure communication. Exponential growth of internet and its users have developed an era of global competition and rivalry. Denial of service attack by multiple nodes is... more
This paper presents a framework for multimodal human-robot interaction. The proposed framework is being implemented in a personal robot called Maggie, developed at RoboticsLab of the University Carlos III of Madrid for social interaction... more
The paper describes a novel social network-based open educational resource for learning foreign languages in real time from native speakers, based on the predefined teaching materials. This virtual learning platform, named i2istudy,... more
The interrelatedness between computer systems, networks, code, and traditional law and legal frameworks continues to pose a number of important and vexed questions. This report will consider one area of the relationship: legal recognition... more
Already a popular application in the Internet, IPTV is becoming, among the service providers, a preferred alternative to conventional broadcasting technologies. Since many of the existing deployments have been done within the safe harbor... more
A lot of attention has recently been focused oti Peer-topeer file sharing systems. Cniitella is CI fully distribiited peer-to-peer protocol, without the need for N central entity. This increcises the reliability of the system by... more
... 5: Scalable Video Coding (in integrated form with ITU-T Rec. H.264 | ISO/IEC 14996-10). JointVideo Team (JVT), Doc. JVT-R201, Jan. 2006. 4. Luby, M., Stockhammer, T., Watson, M., Gasiba, T., and Xu, W. Raptor Codes for Reliable... more
People continuously try to improve their quality of life and technologies have an important role on it. Money transaction between mobile devices is bored and a difficult operation to perform since there is not a simple and safe way to do... more
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides... more
The peer-to-peer (P2P) Internet online hybrid test system has been developed for the seismic simulation of a structure. In this study, the stability and accuracy of the system are investigated analytically by studying the spectral radius... more
Expressing and recognizing emotional behavior of human play an important role in communication systems. Facial expression analysis is the most expressive way to display human emotion. Three types of facial emotion are recognized and... more
Collaborative Filtering (CF) technique has been proved to be one of the most successful techniques in recommender systems in recent years. However, most existing CF based recommender systems worked in a centralized way and suffered from... more