Login / Signup
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring.
Xing Jin
S.-H. Gary Chan
Published in:
ACM Trans. Multim. Comput. Commun. Appl. (2010)
Keyphrases
</>
peer to peer
overlay network
end hosts
node failures
detecting malicious
peer to peer systems
video streaming
real time
detect malicious
distributed hash table
network topology
file sharing
digital libraries
peer to peer networks
load balancing
shortest path
data streams
object oriented