Artficial Immune Systems and Their Applications
Artficial Immune Systems and Their Applications
Mastering Jxta: Building Java Peer-to-Peer Applications
Mastering Jxta: Building Java Peer-to-Peer Applications
Role-based access control for collaborative enterprise in peer-to-peer computing environments
Proceedings of the eighth ACM symposium on Access control models and technologies
Consistency Maintenance In Peer-to-Peer File Sharing Networks
WIAPP '03 Proceedings of the The Third IEEE Workshop on Internet Applications
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Meghdoot: content-based publish/subscribe over P2P networks
Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware
FS: An In-Kernel Integrity Checker and Intrusion Detection File System
LISA '04 Proceedings of the 18th USENIX conference on System administration
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
An innate immune system for the protection of computer networks
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
An analysis of how antivirus methodologies are utilized in protecting computers from malicious code
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
IMSCCS '06 Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences - Volume 1 (IMSCCS'06) - Volume 01
Hi-index | 0.00 |
Peer-to-peer (P2P) fi le-sharing systems are characterized by highly replicated content that is distributed among nodes with enormous aggregate resources for storage and communication. File consistency is often compromised by undesirable changes, which should be detected and corrected in a timely fashion. The artifi cial immune system (AIS) is a novel evolutionary paradigm inspired by aspects of the biological immune system (BIS), such as protection, decentralization, autonomy, and anomaly detection. The AIS paradigm suggests a wide variety of mechanisms for solving complex computer problems. In this paper, we propose the ImmunoJXTA framework for fi le consistency management and fi le recovery using the main aspects of AIS in P2P systems. We implemented ImmunoJXTA on the JXTA P2P framework to recover distributed inconsistent fi les between peers effi ciently. Promising results are achieved from experimental runs of the proposed framework.