Login / Signup
Fighting peer-to-peer SPAM and decoys with object reputation.
Kevin Walsh
Emin Gün Sirer
Published in:
P2PECON@SIGCOMM (2005)
Keyphrases
</>
peer to peer
object model
object tracking
email
reputation management
spam detection
data objects
d objects
moving objects
multiple objects
spatial relationships
target object
bounding box
trust model
distributed computing
spam filtering
file sharing