Ruling out PTAS for graph min-bisection, dense k-subgraph, and bipartite clique
S Khot - SIAM Journal on Computing, 2006 - SIAM
Assuming that NP \not⊆ ϵ>0 BPTIME (2^n^ϵ), we show that graph min-bisection, dense k-
subgraph, and bipartite clique have no polynomial time approximation scheme (PTAS). We …
subgraph, and bipartite clique have no polynomial time approximation scheme (PTAS). We …
Functional and performance analysis of discrete event network simulation tools
A Musa, I Awan - Simulation Modelling Practice and Theory, 2022 - Elsevier
Researchers have used the simulation technique to develop new networks and test, modify,
and optimize existing ones. The scientific community has developed a wide range of …
and optimize existing ones. The scientific community has developed a wide range of …
[PDF][PDF] A survey of peer-to-peer network simulators
As scientists, our research must be tested and evaluated in order for it to be shown to be
valid. Part of this process includes providing reproducible results so that peers are able to …
valid. Part of this process includes providing reproducible results so that peers are able to …
Efficient search in unstructured peer-to-peer networks
The last few years have witnessed the appearance of a growing number of peer-to-peer
(P2P) file sharing systems. Such systems make it possible to harness the resources of large …
(P2P) file sharing systems. Such systems make it possible to harness the resources of large …
GPS: a general peer-to-peer simulator and its use for modeling BitTorrent
W Yang, N Abu-Ghazaleh - 13th IEEE International Symposium …, 2005 - ieeexplore.ieee.org
Peer-to-Peer (P2P) systems have become popular over the past few years. However, their
large scale and the open nature of the system makes studying them challenging. This paper …
large scale and the open nature of the system makes studying them challenging. This paper …
R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks
C Tian, B Yang - Future Generation Computer Systems, 2011 - Elsevier
Peer-to-peer (P2P) networking is widely used to exchange, contribute, or obtain files from
any participating user. Building trust relationships between peers in a large-scale distributed …
any participating user. Building trust relationships between peers in a large-scale distributed …
An evaluation framework for reputation management systems
Reputation management (RM) is employed in distributed and peer-to-peer networks to help
users compute a measure of trust in other users based on initial belief, observed behavior …
users compute a measure of trust in other users based on initial belief, observed behavior …
Adaptive peer-to-peer topologies
T Condie, SD Kamvar… - … Conference on Peer-to …, 2004 - ieeexplore.ieee.org
We present a peer-level protocol for forming adaptive, self-organizing topologies for data-
sharing P2P networks. This protocol is based on the idea that a peer should directly connect …
sharing P2P networks. This protocol is based on the idea that a peer should directly connect …
A modular paradigm for building self-organizing peer-to-peer applications
Abstract Peer-to-peer (P2P) technology has undergone rapid growth, producing new
protocols and applications, many of which enjoy considerable commercial success and …
protocols and applications, many of which enjoy considerable commercial success and …
The design and evaluation of a self-organizing superpeer network
P Garbacki, DHJ Epema… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Superpeer architectures exploit the heterogeneity of nodes in a peer-to-peer (P2P) network
by assigning additional responsibilities to higher capacity nodes. In the design of a …
by assigning additional responsibilities to higher capacity nodes. In the design of a …