نتایج جستجو برای: peers

تعداد نتایج: 20923  

2009
Chi-Wen Lo Chia-Wen Lin Yung-Chang Chen Jen-Yu Yu

P2P live video streaming is an emerging technique for video-ondemand services. In a P2P network, the bandwidth, memory, and computation ability of peers are redistributed to provide large-scale services. The key concept of P2P streaming is that each peer should forward the received data to its neighboring peers. However, peers might unexpectedly join and leave the P2P network, namely, peer chur...

2015
Carlos Canal Gwen Salaün

Software Adaptation is a non-intrusive solution for composing black-box components or services (peers) whose individual functionality is as required for the new system, but that present interface mismatch, which leads to deadlock or other undesirable behaviour when combined. Adaptation techniques aim at automatically generating new components called adapters. All the interactions among peers pa...

2007
Cameron Dale Jiangchuan Liu Bo Li

Though many have explored BitTorrent networks theoretically or experimentally, few have examined the graph topology underlying the connections made between peers in a BitTorrent system. Also, many have looked at the presence of scale-free and small-world characteristics in various peerto-peer network topologies, but not specifically at BitTorrent, the most popular peer-to-peer system. This pape...

2007
Loubna Mekouar Youssef Iraqi Raouf Boutaba

In Peer-to-Peer (P2P) file sharing systems, peers spend a significant amount of time looking for relevant and interesting files. However, the files available for download represent on one hand a rich collection for different needs and preferences and on the other hand a struggle for the peers to find files that they like. In this paper, we propose new recommender schemes based on collaborative ...

2015
M. Anitha

In a file sharing peer-to peer system trust is essential to attain enhanced cooperation between peers. Reputation is utilized in reputation-based peer-to-peer systems to form trust between peers. Commonly in these systems, extremely reputable peers will be chosen to upload requested files and thus diminishing malicious uploads in the system considerably. Conversely, malicious peers should be en...

Journal: :علوم رفتاری 0
جعفر انیسی jafar anisi behavioral sciences research center, baqiyatallah (a.s.) university of medical sciences, tehran, i.r. iran.مرکز تحقیقات علوم رفتاری، دانشگاه علوم پزشکی بقیه اله(عج)، تهران - ایران سیدحسین سلیمی hossein salimi مرکز تحقیقات علوم رفتاری، دانشگاه علوم پزشکی بقیه اله(عج) سیدمحمود میرزمانی mahmood mirzamani مرکز تحقیقات علوم رفتاری، دانشگاه علوم پزشکی بقیه اله(عج) فاطمه رئیسی fateme raeesi ‏‎ مرکز تحقیقات علوم رفتاری، دانشگاه علوم پزشکی بقیه اله(عج) مژگان نیکنام mojgan niknam مرکز تحقیقات علوم رفتاری، دانشگاه علوم پزشکی بقیه اله(عج)

introduction: adolescence is concerned as a developmental and crucial process. the majority of adolescents are experienced less or more some difficulties in emotional, behavioral, and social domains. the present study is focused on the girl adolescents’ behavioral problems. methods: the sample included 1879 girls with a range age of 11-21 years. participants were randomly selected from 10 provi...

2002
Dongyan Xu Mohamed Hefeeda Susanne E. Hambrusch Bharat K. Bhargava

In this paper, we study a peer-to-peer media streaming system with the following characteristics: (1) its streaming capacity grows dynamically; (2) peers do not exhibit serverlike behavior; (3) peers are heterogeneous in their bandwidth contribution; and (4) each streaming session may involve multiple supplying peers. Based on these characteristics, we investigate two problems: (1) how to assig...

Journal: :Computer Networks 2006
Loubna Mekouar Youssef Iraqi Raouf Boutaba

In this paper, we propose a reputation management scheme for partially decentralized peer-to-peer systems. The reputation scheme helps to build trust among peers based on their past experiences and feedback from other peers. Two selection advisor algorithms are proposed for helping peers to select the most trustworthy peer to download from. The proposed algorithms can detect malicious peers sen...

Journal: :American Economic Review 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید