[BOOK][B] Peer-to-peer computing: Principles and applications

QH Vu, M Lupu, BC Ooi - 2010 - Springer
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a
potential technology for redesigning distributed architectures and, consequently, distributed …

Peer-to-peer information retrieval: An overview

AS Tigelaar, D Hiemstra, D Trieschnigg - ACM Transactions on …, 2012 - dl.acm.org
Peer-to-peer technology is widely used for file sharing. In the past decade a number of
prototype peer-to-peer information retrieval systems have been developed. Unfortunately …

Revisiting search task difficulty: Behavioral and individual difference measures

J Gwizdka - Proceedings of the American Society for …, 2008 - Wiley Online Library
Search task characteristics are recognized as important factors that affect search process
and its outcomes. We examine the relationships among operational measures of searcher's …

Scalable peer-to-peer web retrieval with highly discriminative keys

I Podnar, M Rajman, T Luu, F Klemm… - 2007 IEEE 23rd …, 2006 - ieeexplore.ieee.org
The suitability of peer-to-peer (P2P) approaches for full-text Web retrieval has recently been
questioned because of the claimed unacceptable bandwidth consumption induced by …

[PDF][PDF] Peer-to-peer information search: Semantic, social, or spiritual?

M Bender, T Crecelius, M Kacimi, S Michel… - IEEE Data Eng. Bull …, 2007 - Citeseer
We consider the network structure and query processing capabilities of social communities
like bookmarks and photo sharing communities such as del. icio. us or flickr. A common …

A Distributed Information Retrieval Approach for Copyright Protection

S Benbelgacem, L Guezouli, R Seghir - Proceedings of the 3rd …, 2020 - dl.acm.org
Developments in telecommunications technology has opened up the possibility of
circumventing intellectual property in the digital world, outside the legal and technical …

SemreX: Efficient search in a semantic overlay for literature retrieval

H **, H Chen - Future generation computer systems, 2008 - Elsevier
The World Wide Web is growing at such a pace that even the biggest centralized search
engines are able to index only a small part of the available documents on the Internet. The …

Alert verification based on attack classification in collaborative intrusion detection

M **ao, D **ao - Eighth ACIS International Conference on …, 2007 - ieeexplore.ieee.org
The traditional intrusion detection system has the disadvantages of alert flooding and high
false positive due to weak collaboration-awareness. The collaborative intrusion detection …

Sampling according to the multivariate normal density

R Kannan, G Li - … of 37th Conference on Foundations of …, 1996 - ieeexplore.ieee.org
This paper deals with the normal density of n dependent random variables. This is a function
of the form: ce (-x/sup T/Ax) where A is an n/spl times/n positive definite matrix, a: is the n …

Towards access control aware p2p data management systems

R Narendula, Z Miklós, K Aberer - Proceedings of the 2009 EDBT/ICDT …, 2009 - dl.acm.org
P2P data management systems provide a scalable alternative to centralized architectures.
Their adoption, however, is limited by the lack of possibility to control the access to the …