Search For:

Displaying 1-18 out of 18 total
Peer-to-Peer: Is Deviant Behavior the Norm on P2P File-Sharing Networks?
Found in: IEEE Distributed Systems Online
By Daniel Hughes, James Walkerdine, Geoff Coulson, Stephen Gibson
Issue Date:February 2006
pp. 1
The anonymity that peer-to-peer networks afford their users is thought to weaken the social pressures that inhibit deviant behavior, such as distributing illegal pornography. Empirical evidence suggests that this belief might be inaccurate and that a small...
 
Free Riding on Gnutella Revisited: The Bell Tolls?
Found in: IEEE Distributed Systems Online
By Daniel Hughes, Geoff Coulson, James Walkerdine
Issue Date:June 2005
pp. 1
Individuals who use peer-to-peer (P2P) file-sharing networks such as Gnutella face a social dilemma. They must decide whether to contribute to the common good by sharing files or to maximize their personal experience by free riding, downloading files while...
 
Who Am I? Analyzing Digital Personas in Cybercrime Investigations
Found in: Computer
By Awais Rashid,Alistair Baron,Paul Rayson,Corinne May-Chahal,Phil Greenwood,James Walkerdine
Issue Date:April 2013
pp. 54-61
The Isis toolkit offers the sophisticated capabilities required to analyze digital personas and provide investigators with clues to the identity of the individual or group hiding behind one or more personas.
 
Specifying and Constructing a Fault-Tolerant Composite Service
Found in: Web Services, European Conference on
By V.O. Onditi, Glen Dobson, John Hutchinson, James Walkerdine, Pete Sawyer
Issue Date:November 2008
pp. 135-142
This paper proposes a means to specify the semantics of fault tolerant web services at an abstract level using semantics adapted from queuing system theory. A framework that supports the implementation of specified fault-tolerance is also described. Based ...
 
Migrating to SOAs by Way of Hybrid Systems
Found in: IT Professional
By John Hutchinson, Gerald Kotonya, James Walkerdine, Peter Sawyer, Glen Dobson, Victor Onditi
Issue Date:January 2008
pp. 34-42
A progressive-evolution strategy for migrating systems to service-oriented architectures should minimize the risk to investments in existing software systems while letting businesses exploit the benefits of services.
 
The Effect of Viral Media on Business Usage of P2P
Found in: Peer-to-Peer Computing, IEEE International Conference on
By Danny Hughes, James Walkerdine, Kevin Lee
Issue Date:September 2007
pp. 249-250
P2P file-sharing poses a number of serious problems for business network administrators including: unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Due to these problems, most businesses attempt to re...
 
Evolving Existing Systems to Service-Oriented Architectures: Perspective and Challenges
Found in: Web Services, IEEE International Conference on
By John Hutchinson, Gerald Kotonya, James Walkerdine, Peter Sawyer, Glen Dobson, Victor Onditi
Issue Date:July 2007
pp. 896-903
No summary available.
 
On the Penetration of Business Networks by P2P File Sharing
Found in: Internet Monitoring and Protection, International Conference on
By Kevin Lee, Danny Hughes, James Walkerdine
Issue Date:July 2007
pp. 23
P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Due to these problems, many businesses take measures to restrict the us...
 
An Open Tracing System for P2P File Sharing Systems
Found in: Internet and Web Applications and Services, International Conference on
By Danny Hughes, James Walkerdine, Kevin Lee
Issue Date:May 2007
pp. 3
This paper describes the Open P2P tracing system which aims to improve the research community?s understanding of P2P file sharing systems by providing continuous and up-to-date traffic data which is anonymized and made freely accessible to all interested p...
 
A Faceted Approach to Service Specification
Found in: Internet and Web Applications and Services, International Conference on
By James Walkerdine, John Hutchinson, Pete Sawyer, Glen Dobson, Victor Onditi
Issue Date:May 2007
pp. 20
Service-centric computing is developing and maturing rapidly as a paradigm for developing distributed systems. In recent years there has been a rapid growth in the number and types of processes being proposed to support aspects of SOC. Many of these proces...
 
Towards Secure Mobile P2P Systems
Found in: Internet and Web Applications and Services, International Conference on
By James Walkerdine, Simon Lock
Issue Date:May 2007
pp. 6
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additional issues that need to be considered, especially for when considering system s...
 
Is a Dominant Service-Centric Sector Good for Diversity of Provision?
Found in: Service-Oriented Computing: Consequences for Engineering Requirements
By John Hutchinson, Pete Sawyer, James Walkerdine
Issue Date:September 2006
pp. 7
An obvious assumption underpinning the immense interest in service-oriented computing is that it is an inherently Good Thing, by which we mean that robust processes and tools for developing service-based systems will bring benefits for service providers an...
 
Monitoring Challenges and Approaches for P2P File-Sharing Systems
Found in: Internet Surveillance and Protection, International Conference on
By Danny Hughes, James Walkerdine, Kevin Lee
Issue Date:August 2006
pp. 18
Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 200...
 
P2P-4-DL: Digital Library over Peer-to-Peer
Found in: Peer-to-Peer Computing, IEEE International Conference on
By James Walkerdine, Paul Rayson
Issue Date:August 2004
pp. 264-265
No summary available.
   
Dependability Properties of P2P Architectures
Found in: Peer-to-Peer Computing, IEEE International Conference on
By James Walkerdine, Lee Melville, Ian Sommerville
Issue Date:September 2002
pp. 173
No summary available.
   
Collaborative privacy management for third-party applications in online social networks
Found in: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM '12)
By Awais Rashid, Phil Greenwood, Georgios Larkou, James Walkerdine, Pauline Anthonysamy
Issue Date:April 2012
pp. 1-4
Privacy control mechanisms for online social networks (OSNs) offer little by way of managing access to a user's personal information by third-party applications (TPAs). Most OSNs provide an "accept all or nothing" mechanism for managing permissions from TP...
     
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
Found in: Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7 (OZCHI '09)
By James Walkerdine, Margaret Brennan, Matt Jones, Patrick G. Watson, Penny Duquenoy
Issue Date:November 2009
pp. 313-316
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or intervention has become the norm in public infrastructure projects, partially und...
     
Architecting secure mobile P2P systems
Found in: Proceedings of the 1st international workshop on Software architectures and mobility (SAM '08)
By James Walkerdine, Peter Phillips, Simon Lock
Issue Date:May 2008
pp. 1-1
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additional issues that need to be considered during the development process, and in pa...
     
 1