P2P Systems
1,859 Followers
Recent papers in P2P Systems
Since the turn of the century, the discipline of design has increasingly focused its attention on its ap- plication to projects and groups of users at a larger scale. Researchers and practitioners have tried to understand how design could... more
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct communication and collaboration between nodes. There are three main families of P2P networks: the... more
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are connecting each other through wireless network. It includes several routing protocols specifically designed for ad-hoc... more
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
This article examines the bitcoin, at present the most popular cryptocurrency. The bitcoin grew on the major pillars of the neoliberal market economy, such as liberalization, deregulation and privatization. But in the end, it turned out... more
Manufacturing in areas of the developing world that lack electricity severely restricts the technical sophistication of what is produced. More than a billion people with no access to electricity still have access to some imported... more
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the... more
In recent years, the increasing concerns around the centralized cloud web services (e.g. privacy, governance, surveillance, security) have triggered the emergence of new distributed technologies, such as IPFS or the Blockchain. These... more
This part of the “Grundrisse” has been object of many different interpretations of what Marx really wanted to say with “general intellect”. Most of these interpretations understand it like a synonym of swarm intelligence or stigmergy. In... more
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
P2P mesh-pull live video streaming applications – such as CoolStreaming, PPLive, and PPStream – have become popular in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks... more
Intelligent products are an undeniable asset for efficient product lifecycle management (PLM), providing ways to capture events related to physical objects at various locations and times. Today and more than ever before, PLM tools and... more
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Cloud... more
P2P applications suffer from free-riding. In economics terminology, free-riding is the rational behavior of the participants. So it’s feasible to use game theory to analyze this problem and design countermeasures. Tit-for-Tat is a... more
What is the participatory map, and when did it emerge? In the online world, we're in the middle of a renaissance of popular cartography, enabled by big data and the comparative cheapness of distributing graphic information on the web.... more
Makerspaces and their various declinations are a widespread initiative of workshops that offer open access to digital and traditional production equipment, with the aim of democratizing access to technologies and supporting bottom-up... more
The classic mutual exclusion problem in distributed systems occurs when only one process should access a shared resource. Various algorithms are proposed in order to solve this problem. When using a permission based approach which consist... more
Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge scenario. The mechanism that leads users to distribute files without the need of centralized servers has achieved wide recognition... more
It is well known that content distribution networks (CDN) are expensive technologies for distributing web contents. Universities and other non-profit organizations do not have enough financial means to deploy large web-servers or to use... more
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
This paper aims to shed light on a transversal phenomenon, as it affects both the scope of the law and the technology, ethics and certain legally recognized rights. This is the impact that the deep packet inspection technology has in the... more
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending... more
Distributed Hash Tables (DHTs) have been used in several applications, but most DHTs have opted to solve lookups with multiple hops, to minimize bandwidth costs while sacrificing lookup latency. This paper presents D1HT, an original DHT... more
In large scale peer-to-peer networks, it is impossible to perform a query request by visiting all peers. There are some works that try to find the location of resources probabilistically (i.e. non-deterministically). They all have used... more
La FAO est convaincue que l’innovation, en général et en particulier dans le domaine de l'agriculture, est la force motrice essentielle pour parvenir à un monde libéré de la faim et de la malnutrition.L'innovation est généralement perçue... more
The massive consumer often has security concerns about Internet transmissions, and the remote access of the IP Camera is also full of challenges from the consumer market for privacy and security. In this context, when the user account of... more
Los sistemas P2P han adquirido en los últimos años una importancia extraordinaria entre los usuarios que comparten obras protegidas por derechos de explotación en exclusiva. El Código penal ha seguido el sentido que le marca la... more
Chapter in the edited volume: Social Media in the Arab World: Communication and Public Opinion in the Gulf States. Published by I.B. Tauris. Elareshi, M., Al Jaber, & K., Gunter, B. (Eds). 2006.
The growth of small devices using as cell phones and smartphones has requested for the development of applications in different areas. The users may perform different tasks in these devices as read e-mails and magazines, make financial... more
7 th International Conference on Data Mining and Database Management Systems (DMDBS 2021) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to... more
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing several... more
An intrusion detection system plays a major role in network security. We propose a model "DB-OLS: An Approach for IDS" which is a Deviation Based-Outlier approach for Intrusion detection using Self Organizing Maps. In this model "Self... more
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols in wireless sensor... more
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous... more
Estas notas que siguen las escribimos al rebufo de las primeras sentencias civiles (1) que, en España, han enjuiciado la responsabilidad de sendos usuarios de redes P2P por sus posibles conductas contrarias a la regulación de la propiedad... more
An introductory conceptual paper presentation for the event organized at FLACSO, September 3, 2015, Quito
Recently there has been an effort to build scalable and reliable application-level multicast solutions that combine the resilience of pure gossip-based with the efficiency of tree-based schemes. However, such solutions assume that... more
Peer-to-peer systems have recently a remarkable success in the social, academic, and commercial communities. A fundamental problem in Peer-to-Peer systems is how to efficiently locate appropriate peers to answer a specific query (Query... more
Commutative Replicated Data Type (CRDT) is a convergence philosophy invented as a new generation of technique that ensures consistency maintenance of replica in collaborative editors without any difficulty over Peer-to-Peer (P2P)... more