


default search action
Peer-to-Peer Networking and Applications, Volume 7
Volume 7, Number 1, March 2014
- Chow-Sing Lin, Meng-Jia Yan:

Dynamic peer buffer adjustment to improve service availability on peer-to-peer on-demand streaming networks. 1-15 - Wei-Ming Chen, Hsin-Hung Chiang, Kai-Di Chang, Han-Chieh Chao

, Jiann-Liang Chen:
Backup routing firewall mechanism in P2P environment. 16-23 - Yu-Yi Chen:

A design of IPTV conditional access mechanism based on P2P network. 24-30 - Chunhsien Sung, Po-Hsian Huang:

Copyright infringement and users of P2P networks in multimedia applications: The case of the U.S. Copyright regime. 31-40 - Ming Rong, Feng Xu, Jin Zhao, Xin Wang:

GMaker: A video recommendation module for peer-assisted VoD. 41-52 - Yu-Hsin Cheng, Deng-Jyi Chen:

A novel method for delivering multimedia e-advertisement data base on use multi-path and multi-seed peer-to-peer-like approach. 53-65 - Hamideh Babaei, Mahmood Fathy, Reza Berangi, Morteza Romoozi:

The impact of mobility models on the performance of P2P content discovery protocols over mobile ad hoc networks. 66-85 - Arezou Soltani Panah

, Siavash Khorsandi:
A dynamic coalition formation game for search efficient adaptive overlay construction in unstructured peer-to-peer networks. 86-99
Volume 7, Number 2, June 2014
- Abbas Bradai, Ubaid Abbasi, Raul Landa, Toufik Ahmed

:
An efficient playout smoothing mechanism for layered streaming in P2P networks. 101-117 - Jennifer S. Raj

, Rajaguru Harikumar
:
A dynamic overlay approach for mobility maintenance in personal communication networks. 118-128 - Mullur Pushpalatha, T. Rama Rao, Revathi Venkataraman

:
Applicability of sub graph centrality to improve data accessibility among peers in MANETs. 129-146 - Keqin Li:

On the expected file download time of the random time-based switching algorithm in P2P networks. 147-158 - Salah Noori Saleh, Maryam Feily, Sureswaran Ramadass, Alireza Shahrestani:

Semi-Fluid content distribution model for fast data dissemination in heterogeneous overlay networks. 159-174 - Xin Cong, Kai Shuang, Sen Su, Fangchun Yang:

An efficient server bandwidth costs decreased mechanism towards mobile devices in cloud-assisted P2P-VoD system. 175-187 - Sheng-Wei Wang

, Yi-Chen Cheng:
General packet induced queueing schemes for reducing packet delays in ADSL routers with peer-to-peer file sharing applications. 188-198 - Hoda Mashayekhi

, Jafar Habibi:
L-overlay: A layered data management scheme for peer-to-peer computing. 199-212
Volume 7, Number 3, September 2014
- Xu Li, Xiaodong Lin, Wenye Wang

, Nathalie Mitton:
PPNA special issue on "the green, reliability and security of machine-to-machine communications". 213-214 - Suguo Du, Xiaolong Li, Junbo Du, Haojin Zhu

:
An attack-and-defence game for security assessment in vehicular ad hoc networks. 215-228 - Zhen Huang, Sushmita Ruj

, Marcos Antonio Cavenaghi, Milos Stojmenovic, Amiya Nayak
:
A social network approach to trust management in VANETs. 229-242 - Marcus Autenrieth, Hannes Frey:

PaderMAC: Energy-efficient machine to machine communication for cyber-physical systems. 243-254 - Anfeng Liu, Deyu Zhang, Penghui Zhang, Guohua Cui, Zhigang Chen:

On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability. 255-273 - Chao Ma, Jianhua He

, Hsiao-Hwa Chen, Zuoyin Tang
:
Uncoordinated coexisting IEEE 802.15.4 networks for machine to machine communications. 274-284 - Di Wu, Xiaojing Wang, Limin Sun, Yan Ling, Dongxia Zhang:

Identity privacy-based reliable routing method in VANETs. 285-294
Volume 7, Number 4, December 2014
- Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi

:
Group formation with neighbor similarity trust in P2P E-commerce. 295-310 - Pierre K. Y. Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Modeling the initial stage of a file sharing process on a BitTorrent network. 311-319 - Hongling Jiang, Xiuli Shao:

Detecting P2P botnets by discovering flow dependency in C&C traffic. 320-331 - Chunqi Tian, Baijian Yang

:
A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. 332-345 - Theerasak Thapngam, Shui Yu

, Wanlei Zhou
, S. Kami Makki:
Distributed Denial of Service (DDoS) detection by traffic pattern analysis. 346-358 - Dmitry G. Korzun

, Andrei V. Gurtov
:
Hierarchical architectures in structured peer-to-peer overlay networks. 359-395 - Peng Yang, Lisong Xu:

An ISP-friendly inter-overlay coordination framework for multiple coexisting P2P systems. 396-409 - Zoran Kotevski

, Pece Mitrevski
:
Hybrid fluid modeling approach for performance analysis of P2P live video streaming systems. 410-426 - Stéphane Caron, Frédéric Giroire, Dorian Mazauric, Julian Monteiro

, Stéphane Pérennes:
P2P storage systems: Study of different placement policies. 427-443 - Ghulam Memon, Jun Li, Reza Rejaie:

Tsunami: A parasitic, indestructible botnet on Kad. 444-455 - Jiangchuan Liu, Ke Xu, Yongqiang Xiong, Dongchao Ma, Kai Shuang:

Peer-to-peer as an infrastructure service. 456-458 - Xin Liu, Haiyang Wang, Lei Zhang:

On the collaboration of different peer-to-peer traffic management schemas. 459-468 - Wei Huang, Chuan Wu, Zongpeng Li, Francis C. M. Lau:

The performance and locality tradeoff in bittorrent-like file sharing systems. 469-484 - Bin Huang, Zhigang Sun, Hongyi Chen, Jianbiao Mao, Ziwen Zhang:

BufferBank: A distributed cache infrastructure for peer-to-peer application. 485-496 - Ssu-Hsuan Lu, Kuan-Ching Li

, Kuan-Chou Lai, Yeh-Ching Chung:
A scalable P2P overlay based on arrangement graph with minimized overhead. 497-510 - Dongchao Ma, Xiaoliang Wang, Wenlong Chen, Shen Yang, Li Ma:

A research on dynamic allocation of network resources based on P2P traffic planning. 511-524 - Yusuo Hu, Danqi Wang, Hui Zhong, Feng Wu:

SocialTrust: Enabling long-term social cooperation in peer-to-peer services. 525-538 - Xiaowei Chen, Xiaowen Chu

, Zongpeng Li:
Improving sustainability of BitTorrent darknets. 539-554 - Bo-Chun Wang, Alix L. H. Chow, Leana Golubchik:

A comprehensive study of the use of advertisements as incentives in P2P streaming systems. 555-571 - Heng He, Ruixuan Li, Zhiyong Xu, Weijun Xiao:

An efficient ECC-based mechanism for securing network coding-based P2P content distribution. 572-589 - Amr Alasaad, Sathish Gopalakrishnan, Victor C. M. Leung

:
Modelling and performance analysis of content sharing and distribution in community networks with infrastructure support. 590-610 - Editor's Note: Special issue on Technologies and Theories in P2P Converged Ubiquitous Networks. 611

- Soobok Shin, Taeshik Shon, Hongjin Yeh, Kangseok Kim:

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment. 612-619 - Sadiq Almuairfi

, Prakash Veeraraghavan
, Naveen K. Chilamkurti, Doo-Soon Park:
Anonymous proximity mobile payment (APMP). 620-627 - Yungho Choi

, Lark-Kyo Kim, Hyung Keun Ahn
, Neungsoo Park:
Router architecture evaluation for security network. 628-635 - Kitae Jeong:

Security analysis of block cipher Piccolo suitable for wireless sensor networks. 636-644 - Shu-Chiung Lin, Patrick S. Chen, Chia-Ching Chang:

A novel method of mining network flow to detect P2P botnets. 645-654 - Ren-Junn Hwang, Loang-Shing Huang:

The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks. 655-664 - Yung-Joon Jung, Donghyouk Lim, Yongbon Koo, Eun-Ser Lee, Hoon Choi

:
A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems. 665-675 - Wei-Jen Wang, Cheng-Ta Huang

, Cheng-Hsing Yang, Shiuh-Jeng Wang:
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems. 676-686 - Dimitrios Damopoulos, Georgios Kambourakis

, Stefanos Gritzalis
, Sang Oh Park:
Exposing mobile malware from the inside (or what is your mobile app really doing?). 687-697 - Kübra Kalkan, Albert Levi

:
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks. 698-709 - Joy Iong-Zong Chen, Chu-Hsing Lin:

Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN. 710-722 - Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang:

Image reversibility in data embedding on the basis of blocking-predictions. 723-736 - Joon-Sang Park

, Seung Jun Baek:
Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks. 737-742 - Kwantae Cho, Dong Hoon Lee:

Low-priced and efficient replica detection framework for wireless sensor networks. 743-749

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














