Incentive mechanism for P2P file sharing based on social network and game theory

TY Wu, WT Lee, N Guizani, TM Wang - Journal of Network and Computer …, 2014 - Elsevier
According to statistics, most P2P applications use Gnutella or BitTorrent protocols to combat
free riders. However, BitTorrent restrains free riders using the choking algorithm that chokes …

Collaborative distributed communication in heterogeneous environments: a comprehensive survey

PV Ghate, HK Pati - Journal of Network and Computer Applications, 2016 - Elsevier
This paper presents the different aspects with the help of which the collaborative distributed
communication in heterogeneous devices can be achieved based on existing techniques …

Prevention of software tampering

EB Olson, EK Zinda - US Patent 7,478,233, 2009 - Google Patents
ENCRYPTION MODULE an authentication scheme corresponding to the protection scheme.
Because validation is performed, each node may assume that the message originated from …

A cross-layer approach for real-time multimedia streaming on wireless peer-to-peer ad hoc network

JL Kuo, CH Shih, CY Ho, YC Chen - Ad Hoc Networks, 2013 - Elsevier
Peer-to-peer (P2P) live streaming over mobile ad hoc network (MANET) is a state-of-the-art
technique for wireless multimedia applications, such as entertainments and disaster …

Application programming interface for inviting participants in a serverless peer to peer network

R Rao, EJ Flannery, T Weisberg… - US Patent …, 2011 - Google Patents
5,944,794. A 8/1999 Okamoto et al... 709,225 7,185,194 B2 2/2007 Morikawa et al. T13, 156
5,982,898. A 1 1/1999 Hsu et al........ 713,158 7,197,049 B2 3/2007 Engstrom et al …

Unbounded computing space

LE Olson, EK Zinda - US Patent 7,043,522, 2006 - Google Patents
US PATENT DOCUMENTS 5,136,708 A* 8/1992 Lapourtreet al........... T18, 103 5,812,771 A*
9/1998 Fee et al.................... TO9, 201 5,832,514 A 11/1998 Norin et al. 6,009,456 A 12/1999 …

[PDF][PDF] Peer clustering and firework query model

CH Ng, KC Sia - 2002 - Citeseer
In this paper, we present a new strategy for information retrieval over the peer-to-peer (P2P)
network. To avoid query messages flooding and saving resources in handling irrelevant …

Supporting mobile devices in Gnutella file sharing network with mobile agents

TH Hu, B Thai, A Seneviratne - Proceedings of the Eighth IEEE …, 2003 - ieeexplore.ieee.org
The use of peer to peer file sharing networks such as Gnutella is proliferating on the Internet,
but its use is bandwidth consuming due to the broadcast nature of some peer to peer …

An interested-based architecture for peer-to-peer network systems

WT Chen, CH Chao, JL Chiang - 20th International Conference …, 2006 - ieeexplore.ieee.org
Improving search performance is an important issue in peer-to-peer (P2P) network systems.
Although Distributed Hash Tables (DHTs) route queries more efficiently than flooding does …

Peer assembly inspection

EK Zinda, EB Olson - US Patent 7,634,806, 2009 - Google Patents
A method and system for preventing undesired behaviors by executable code modules in a
peer-to-peer computer system are provided. When a code module is received, an assembly …