Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,692
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Peer-to-Peer Systems
other
Editor(s):
Peter Druschel
,
Frans Kaashoek
,
Antony Rowstron
Publication date
(Online):
October 10 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Network and Systems Medicine
Author and book information
Book
ISBN (Print):
978-3-540-44179-3
ISBN (Electronic):
978-3-540-45748-0
Publication date (Print):
2002
Publication date (Online):
October 10 2002
DOI:
10.1007/3-540-45748-8
SO-VID:
ccc13f6e-93e7-4022-95b7-3a1942cd4a58
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 45
Routing Algorithms for DHTs: Some Open Questions
pp. 53
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
pp. 85
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
pp. 94
Can Heterogeneity Make Gnutella Scalable?
pp. 121
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
pp. 130
Mnemosyne: Peer-to-Peer Steganographic Storage
pp. 155
Serving DNS Using a Peer-to-Peer Lookup Service
pp. 203
Peer-to-Peer Caching Schemes to Address Flash Crowds
pp. 242
Complex Queries in DHT-based Peer-to-Peer Networks
pp. 251
The Sybil Attack
pp. 261
Security Considerations for Peer-to-Peer Distributed Hash Tables
pp. 270
Dynamically Fault-Tolerant Content Addressable Networks
pp. 306
Dynamic Replica Placement for Scalable Content Delivery
pp. 328
Erasure Coding Vs. Replication: A Quantitative Comparison
Similar content
1,692
Self-Organizing Peer-To-Peer Middleware for Healthcare Monitoring in Real-Time
Authors:
Hyun Kim
,
Hyeong Gon Jo
,
Soon Ju Kang
HistoViewer: an interactive e-learning platform facilitating group and peer group learning.
Authors:
Bjoern Sander
,
Mariola Monika Golas
Effects of Peer-Facilitated, Video-Based and Combined Peer-and-Video Education on Anxiety Among Patients Undergoing Coronary Angiography : Randomised controlled trial
Authors:
Hosein Habibzadeh
,
Zahra D. Milan
,
Moloud Radfar
…
See all similar
Cited by
3
Evolving attackers against wireless sensor networks using genetic programming
Authors:
Kinga Mrugala
,
Nilufer Tuptuk
,
Stephen Hailes
Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance
Authors:
Moritz Platt
,
Peter McBurney
Secure and Trustable Distributed Aggregation based on Kademlia
Authors:
Stéphane Grumbach
,
Robert Riemann
See all cited by