Gossip-based peer sampling
Gossip-based communication protocols are appealing in large-scale distributed applications
such as information dissemination, aggregation, and overlay topology management. This …
such as information dissemination, aggregation, and overlay topology management. This …
Cyclon: Inexpensive membership management for unstructured p2p overlays
S Voulgaris, D Gavidia, M Van Steen - Journal of Network and systems …, 2005 - Springer
Unstructured overlays form an important class of peer-to-peer networks, notably when
content-based searching is at stake. The construction of these overlays, which is essentially …
content-based searching is at stake. The construction of these overlays, which is essentially …
[PDF][PDF] Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
Recent denial of service attacks are mounted by professionals using Botnets of tens of
thousands of compromised machines. To circumvent detection, attackers are increasingly …
thousands of compromised machines. To circumvent detection, attackers are increasingly …
[HTML][HTML] Survey of research towards robust peer-to-peer networks: Search methods
J Risson, T Moors - 2007 - rfc-editor.org
RFC 4981: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks
E Meshkova, J Riihijärvi, M Petrova, P Mähönen - Computer networks, 2008 - Elsevier
Service and resource discovery has become an integral part of modern networked systems.
In this survey we give an overview of the existing solutions for service and resource …
In this survey we give an overview of the existing solutions for service and resource …
From content distribution networks to content networks—issues and challenges
Due to the technical developments in electronics the amount of digital content is
continuously increasing. In order to make digital content respectively multimedia content …
continuously increasing. In order to make digital content respectively multimedia content …
Methods, media and systems for managing a distributed application running in a plurality of digital processing devices
Methods, media and systems for managing a distributed application running in a plurality of
digital processing devices are provided. In some embodiments, a method includes run ning …
digital processing devices are provided. In some embodiments, a method includes run ning …
OpenPubSub: supporting large semantic content spaces in peer-to-peer publish/subscribe systems for the internet of multimedia things
T Zaarour, A Bhattacharya… - IEEE internet of things …, 2022 - ieeexplore.ieee.org
The decentralized and highly scalable nature of structured peer-to-peer networks, based on
distributed hash tables (DHTs), makes them a great fit for facilitating the interaction and …
distributed hash tables (DHTs), makes them a great fit for facilitating the interaction and …
ConnectionScore: a statistical technique to resist application-layer DDoS attacks
H Beitollahi, G Deconinck - Journal of Ambient Intelligence and …, 2014 - Springer
In an application-layer distributed denial of service (DDoS) attack, zombie machines send a
large number of legitimate requests to the victim server. Since these requests have …
large number of legitimate requests to the victim server. Since these requests have …
A unified framework for clustering heterogeneous web objects
We introduce a novel framework for clustering Web data which is often heterogeneous in
nature. As most existing methods often integrate heterogeneous data into a unified feature …
nature. As most existing methods often integrate heterogeneous data into a unified feature …