Search For:

Displaying 1-5 out of 5 total
Is content publishing in BitTorrent altruistic or profit-driven?
Found in: Proceedings of the 6th International COnference (Co-NEXT '10)
By Angel Cuevas, Carmen Guerrero, Michal Kryczka, Reza Rejaie, Ruben Cuevas, Sebastian Kaune
Issue Date:November 2010
pp. 1-12
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content withou...
     
Improving Energy Saving in Time-Division Multiplexing Passive Optical Networks
Found in: IEEE Internet Computing
By S.H.S. Newaz,Angel Cuevas, Gyu Myoung Lee,N. Crespi, Jun Kyun Choi
Issue Date:January 2013
pp. 23-31
This article proposes a time-division multiplexing passive optical network (TDM-PON) architecture in which optical network units (ONUs) enter active mode only when the optical line terminal has traffic to deliver. The authors use a hybrid ONU (H-ONU) equip...
 
socP2P: P2P content discovery enhancement by considering social networks characteristics
Found in: 2012 IEEE Symposium on Computers and Communications (ISCC)
By Reza Farahbakhsh,Noel Crespi,Angel Cuevas,Sraddha Adhikari,Mehdi Mani,Teerapat Sanguankotchakorn
Issue Date:July 2012
pp. 000530-000533
Content management appears as an essential requirement in order to deploy enhanced P2P networks. In P2P networks, the content that is requested by the query node could be located at different locations/nodes; therefore an efficient search mechanism is requ...
   
A Security Pattern for Untraceable Secret Handshakes
Found in: Emerging Security Information, Systems, and Technologies, The International Conference on
By Angel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti
Issue Date:June 2009
pp. 8-14
A security pattern describes a particular recurring security problem that arises in specific contexts and presents a well-proven generic solution for it. This paper describes an Untraceable Secret Handshake, a protocol that allows two users to mutually ver...
 
Improved P2P content discovery by exploiting user social patterns
Found in: 2013 International Conference on Computing, Networking and Communications (ICNC)
By Reza Farahbakhsh,Noel Crespi,Angel Cuevas,Neetya Shrestha,Mehdi Mani,Poompat Saengudomlert
Issue Date:January 2013
pp. 444-448
One of the most challenging issues in Unstructured Peer-to-Peer (P2P) network is to efficiently locate information resources. In this paper we propose a novel concept in which peers exploit social relations in order to improve the search success rate. In s...
 
 1