default search action
Peer-to-Peer Networking and Applications, Volume 7
Volume 7, Number 1, March 2014
- Chow-Sing Lin, Meng-Jia Yan:
Dynamic peer buffer adjustment to improve service availability on peer-to-peer on-demand streaming networks. 1-15 - Wei-Ming Chen, Hsin-Hung Chiang, Kai-Di Chang, Han-Chieh Chao, Jiann-Liang Chen:
Backup routing firewall mechanism in P2P environment. 16-23 - Yu-Yi Chen:
A design of IPTV conditional access mechanism based on P2P network. 24-30 - Chunhsien Sung, Po-Hsian Huang:
Copyright infringement and users of P2P networks in multimedia applications: The case of the U.S. Copyright regime. 31-40 - Ming Rong, Feng Xu, Jin Zhao, Xin Wang:
GMaker: A video recommendation module for peer-assisted VoD. 41-52 - Yu-Hsin Cheng, Deng-Jyi Chen:
A novel method for delivering multimedia e-advertisement data base on use multi-path and multi-seed peer-to-peer-like approach. 53-65 - Hamideh Babaei, Mahmood Fathy, Reza Berangi, Morteza Romoozi:
The impact of mobility models on the performance of P2P content discovery protocols over mobile ad hoc networks. 66-85 - Arezou Soltani Panah, Siavash Khorsandi:
A dynamic coalition formation game for search efficient adaptive overlay construction in unstructured peer-to-peer networks. 86-99
Volume 7, Number 2, June 2014
- Abbas Bradai, Ubaid Abbasi, Raul Landa, Toufik Ahmed:
An efficient playout smoothing mechanism for layered streaming in P2P networks. 101-117 - Jennifer S. Raj, Rajaguru Harikumar:
A dynamic overlay approach for mobility maintenance in personal communication networks. 118-128 - Mullur Pushpalatha, T. Rama Rao, Revathi Venkataraman:
Applicability of sub graph centrality to improve data accessibility among peers in MANETs. 129-146 - Keqin Li:
On the expected file download time of the random time-based switching algorithm in P2P networks. 147-158 - Salah Noori Saleh, Maryam Feily, Sureswaran Ramadass, Alireza Shahrestani:
Semi-Fluid content distribution model for fast data dissemination in heterogeneous overlay networks. 159-174 - Xin Cong, Kai Shuang, Sen Su, Fangchun Yang:
An efficient server bandwidth costs decreased mechanism towards mobile devices in cloud-assisted P2P-VoD system. 175-187 - Sheng-Wei Wang, Yi-Chen Cheng:
General packet induced queueing schemes for reducing packet delays in ADSL routers with peer-to-peer file sharing applications. 188-198 - Hoda Mashayekhi, Jafar Habibi:
L-overlay: A layered data management scheme for peer-to-peer computing. 199-212
Volume 7, Number 3, September 2014
- Xu Li, Xiaodong Lin, Wenye Wang, Nathalie Mitton:
PPNA special issue on "the green, reliability and security of machine-to-machine communications". 213-214 - Suguo Du, Xiaolong Li, Junbo Du, Haojin Zhu:
An attack-and-defence game for security assessment in vehicular ad hoc networks. 215-228 - Zhen Huang, Sushmita Ruj, Marcos Antonio Cavenaghi, Milos Stojmenovic, Amiya Nayak:
A social network approach to trust management in VANETs. 229-242 - Marcus Autenrieth, Hannes Frey:
PaderMAC: Energy-efficient machine to machine communication for cyber-physical systems. 243-254 - Anfeng Liu, Deyu Zhang, Penghui Zhang, Guohua Cui, Zhigang Chen:
On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability. 255-273 - Chao Ma, Jianhua He, Hsiao-Hwa Chen, Zuoyin Tang:
Uncoordinated coexisting IEEE 802.15.4 networks for machine to machine communications. 274-284 - Di Wu, Xiaojing Wang, Limin Sun, Yan Ling, Dongxia Zhang:
Identity privacy-based reliable routing method in VANETs. 285-294
Volume 7, Number 4, December 2014
- Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi:
Group formation with neighbor similarity trust in P2P E-commerce. 295-310 - Pierre K. Y. Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Modeling the initial stage of a file sharing process on a BitTorrent network. 311-319 - Hongling Jiang, Xiuli Shao:
Detecting P2P botnets by discovering flow dependency in C&C traffic. 320-331 - Chunqi Tian, Baijian Yang:
A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. 332-345 - Theerasak Thapngam, Shui Yu, Wanlei Zhou, S. Kami Makki:
Distributed Denial of Service (DDoS) detection by traffic pattern analysis. 346-358 - Dmitry G. Korzun, Andrei V. Gurtov:
Hierarchical architectures in structured peer-to-peer overlay networks. 359-395 - Peng Yang, Lisong Xu:
An ISP-friendly inter-overlay coordination framework for multiple coexisting P2P systems. 396-409 - Zoran Kotevski, Pece Mitrevski:
Hybrid fluid modeling approach for performance analysis of P2P live video streaming systems. 410-426 - Stéphane Caron, Frédéric Giroire, Dorian Mazauric, Julian Monteiro, Stéphane Pérennes:
P2P storage systems: Study of different placement policies. 427-443 - Ghulam Memon, Jun Li, Reza Rejaie:
Tsunami: A parasitic, indestructible botnet on Kad. 444-455 - Jiangchuan Liu, Ke Xu, Yongqiang Xiong, Dongchao Ma, Kai Shuang:
Peer-to-peer as an infrastructure service. 456-458 - Xin Liu, Haiyang Wang, Lei Zhang:
On the collaboration of different peer-to-peer traffic management schemas. 459-468 - Wei Huang, Chuan Wu, Zongpeng Li, Francis C. M. Lau:
The performance and locality tradeoff in bittorrent-like file sharing systems. 469-484 - Bin Huang, Zhigang Sun, Hongyi Chen, Jianbiao Mao, Ziwen Zhang:
BufferBank: A distributed cache infrastructure for peer-to-peer application. 485-496 - Ssu-Hsuan Lu, Kuan-Ching Li, Kuan-Chou Lai, Yeh-Ching Chung:
A scalable P2P overlay based on arrangement graph with minimized overhead. 497-510 - Dongchao Ma, Xiaoliang Wang, Wenlong Chen, Shen Yang, Li Ma:
A research on dynamic allocation of network resources based on P2P traffic planning. 511-524 - Yusuo Hu, Danqi Wang, Hui Zhong, Feng Wu:
SocialTrust: Enabling long-term social cooperation in peer-to-peer services. 525-538 - Xiaowei Chen, Xiaowen Chu, Zongpeng Li:
Improving sustainability of BitTorrent darknets. 539-554 - Bo-Chun Wang, Alix L. H. Chow, Leana Golubchik:
A comprehensive study of the use of advertisements as incentives in P2P streaming systems. 555-571 - Heng He, Ruixuan Li, Zhiyong Xu, Weijun Xiao:
An efficient ECC-based mechanism for securing network coding-based P2P content distribution. 572-589 - Amr Alasaad, Sathish Gopalakrishnan, Victor C. M. Leung:
Modelling and performance analysis of content sharing and distribution in community networks with infrastructure support. 590-610 - Editor's Note: Special issue on Technologies and Theories in P2P Converged Ubiquitous Networks. 611
- Soobok Shin, Taeshik Shon, Hongjin Yeh, Kangseok Kim:
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment. 612-619 - Sadiq Almuairfi, Prakash Veeraraghavan, Naveen K. Chilamkurti, Doo-Soon Park:
Anonymous proximity mobile payment (APMP). 620-627 - Yungho Choi, Lark-Kyo Kim, Hyung Keun Ahn, Neungsoo Park:
Router architecture evaluation for security network. 628-635 - Kitae Jeong:
Security analysis of block cipher Piccolo suitable for wireless sensor networks. 636-644 - Shu-Chiung Lin, Patrick S. Chen, Chia-Ching Chang:
A novel method of mining network flow to detect P2P botnets. 645-654 - Ren-Junn Hwang, Loang-Shing Huang:
The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks. 655-664 - Yung-Joon Jung, Donghyouk Lim, Yongbon Koo, Eun-Ser Lee, Hoon Choi:
A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems. 665-675 - Wei-Jen Wang, Cheng-Ta Huang, Cheng-Hsing Yang, Shiuh-Jeng Wang:
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems. 676-686 - Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis, Sang Oh Park:
Exposing mobile malware from the inside (or what is your mobile app really doing?). 687-697 - Kübra Kalkan, Albert Levi:
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks. 698-709 - Joy Iong-Zong Chen, Chu-Hsing Lin:
Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN. 710-722 - Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Image reversibility in data embedding on the basis of blocking-predictions. 723-736 - Joon-Sang Park, Seung Jun Baek:
Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks. 737-742 - Kwantae Cho, Dong Hoon Lee:
Low-priced and efficient replica detection framework for wireless sensor networks. 743-749
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.