Amanote Research

Amanote Research

    RegisterSign In

Identification of Malicious Nodes in Peer-To-Peer Streaming: A Belief Propagation-Based Technique

IEEE Transactions on Parallel and Distributed Systems - United States
doi 10.1109/tpds.2012.342
Full Text
Open PDF
Abstract

Available in full text

Categories
HardwareComputational TheorySignal ProcessingArchitectureMathematics
Date

October 1, 2013

Authors
Rossano GaetaMarco Grangetto
Publisher

Institute of Electrical and Electronics Engineers (IEEE)


Related search

Efficient Peer-To-Peer Belief Propagation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Peer-To-Peer Video Streaming

English

PeerShark: Flow-Clustering and Conversation-Generation for Malicious Peer-To-Peer Traffic Identification

EURASIP Journal on Information Security
2014English

On Peer-To-Peer Media Streaming

English

Incorporating Contribution-Awareness Into Mesh-Based Peer-To-Peer Streaming Systems

Peer-to-Peer Networking and Applications
Computer NetworksSoftwareCommunications
2010English

Verifying Data Integrity in Peer-To-Peer Media Streaming

2005English

Layer Allocation Algorithms in Layered Peer-To-Peer Streaming

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Scalable Island Multicast for Peer-To-Peer Streaming

Advances in Multimedia
Computer Science
2007English

A Case for 3D Streaming on Peer-To-Peer Networks

2006English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy