Academic literature on the topic 'Peer-to-peer architecture (Computer networks) – Quality control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Peer-to-peer architecture (Computer networks) – Quality control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Peer-to-peer architecture (Computer networks) – Quality control"

1

Alqahtani, Amal, Heba Kurdi, and Majed Abdulghani. "HadithTrust: Trust Management Approach Inspired by Hadith Science for Peer-to-Peer Platforms." Electronics 10, no. 12 (June 16, 2021): 1442. http://dx.doi.org/10.3390/electronics10121442.

Full text
Abstract:
Peer-to-peer (P2P) platforms are gaining increasing popularity due to their scalability, robustness and self-organization. In P2P systems, peers interact directly with each other to share resources or exchange services without a central authority to manage the interaction. However, these features expose P2P platforms to malicious attacks that reduce the level of trust between peers and in extreme situations, may cause the entire system to shut down. Therefore, it is essential to employ a trust management system that establishes trust relationships among peers. Current P2P trust management syst
APA, Harvard, Vancouver, ISO, and other styles
2

Alaya, Bechir, and Rehanullah Khan. "QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives." Computer Journal 63, no. 10 (July 1, 2020): 1547–63. http://dx.doi.org/10.1093/comjnl/bxaa060.

Full text
Abstract:
Abstract The amount of online video content is exponentially increasing, which spurs its access demands. Providing optimal quality of service (QoS) for this ever-increasing video data is a challenging task due to the number of QoS constraints. The system resources, the distributed system platform and the transport protocol thus all need to collaborate to guarantee an acceptable level of QoS for the optimal video streaming process. In this paper, we present a comprehensive survey on QoS management for the video-on-demand systems. First, we focus on load management and replication algorithms in
APA, Harvard, Vancouver, ISO, and other styles
3

Lou, Xiaosong, and Kai Hwang. "Quality of data delivery in peer-to-peer video streaming." ACM Transactions on Multimedia Computing, Communications, and Applications 8, no. 1S (February 2012): 1–23. http://dx.doi.org/10.1145/2089085.2089089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Ankur, and Lalit K. Awasthi. "Toward a Quality-of-Service Framework for Peer-to-Peer Applications." International Journal of Distributed Systems and Technologies 1, no. 3 (July 2010): 1–23. http://dx.doi.org/10.4018/jdst.2010070101.

Full text
Abstract:
P2P networks have caught the imagination of the research community and application developers with their sheer scalability and fault-tolerance characteristics. However, only content-sharing applications based on the P2P concept have reached the desired level of maturity. The potential of the P2P concept for designing the next-generation of real-world distributed applications can be realized only if a comprehensive framework quantifying the performance related aspects of all classes of P2P applications is available. Researchers have proposed some QoS (Quality-of-Service) parameters for content-
APA, Harvard, Vancouver, ISO, and other styles
5

Badis, Lyes, Mourad Amad, Djamil Aïssani, and Sofiane Abbar. "P2PCF: A collaborative filtering based recommender system for peer to peer social networks." Journal of High Speed Networks 27, no. 1 (March 29, 2021): 13–31. http://dx.doi.org/10.3233/jhs-210649.

Full text
Abstract:
The recent privacy incidents reported in major media about global social networks raised real public concerns about centralized architectures. P2P social networks constitute an interesting paradigm to give back users control over their data and relations. While basic social network functionalities such as commenting, following, sharing, and publishing content are widely available, more advanced features related to information retrieval and recommendation are still challenging. This is due to the absence of a central server that has a complete view of the network. In this paper, we propose a ne
APA, Harvard, Vancouver, ISO, and other styles
6

Sizov, V. A., D. M. Malinichev, and V. V. Mochalov. "Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System." Open Education 24, no. 2 (April 22, 2020): 73–79. http://dx.doi.org/10.21686/1818-4243-2020-2-73-79.

Full text
Abstract:
The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each other, as well as use a single professional thesaurus that allows understanding and describe information security processes.Currently, state information systems with terminal access devices are used to ensure the realization of the legitimate interests of citizens in information interaction with public authorities [1].One of the types of such sy
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Zhen, William Sears, and Yong Guan. "PeerCredential: a reputation-based trust framework for Peer-to-Peer applications." International Journal of Information and Computer Security 1, no. 3 (2007): 256. http://dx.doi.org/10.1504/ijics.2007.013955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

BEYAH, RAHEEM, RAGHUPATHY SIVAKUMAR, and JOHN COPELAND. "GALO: A DEPLOYABLE FRAMEWORK FOR PROVIDING BETTER THAN BEST-EFFORT QUALITY OF SERVICE." Journal of Interconnection Networks 07, no. 03 (September 2006): 319–51. http://dx.doi.org/10.1142/s0219265906001727.

Full text
Abstract:
In this paper we propose a deployable approach to improving QoS by using a generic, extendable, overlay architecture; the Generalized Application Layer Overlay (GALO). The goals of this work are to 1) create an overlay architecture which allows us to sample specific path quality metrics among different paths; 2) utilize the proposed overlay architecture in order to implement our proposed QoS-based routing schemes, Application Layer Switching (ALSW) and Application Layer Striping (ALST). Perhaps the most significant contribution of this research is that we are able to achieve better than best-e
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Junjie, Liang Tan, Sun Mao, and Keping Yu. "Blockchain Network Propagation Mechanism Based on P4P Architecture." Security and Communication Networks 2021 (August 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/8363131.

Full text
Abstract:
Blockchain is a mainstream technology in which many untrustworthy nodes work together to maintain a distributed ledger with advantages such as decentralization, traceability, and tamper-proof. The network layer communication mechanism in its architecture is the core of the networking method, message propagation, and data verification among blockchain nodes, which is the basis to ensure blockchain’s performance and key features. When blocks are propagated in peer-to-peer (P2P) networks with gossip protocol, the high propagation delay of the protocol itself reduces the propagation speed of the b
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Longze, Yu Xie, Delong Zhang, Jinxin Liu, Siyu Jiang, Yan Zhang, and Meicheng Li. "Credible Peer-to-Peer Trading with Double-Layer Energy Blockchain Network in Distributed Electricity Markets." Electronics 10, no. 15 (July 28, 2021): 1815. http://dx.doi.org/10.3390/electronics10151815.

Full text
Abstract:
Blockchain-based peer-to-peer (P2P) energy trading is one of the most viable solutions to incentivize prosumers in distributed electricity markets. However, P2P energy trading through an open-end blockchain network is not conducive to mutual credit and the privacy protection of stakeholders. Therefore, improving the credibility of P2P energy trading is an urgent problem for distributed electricity markets. In this paper, a novel double-layer energy blockchain network is proposed that stores private trading data separately from publicly available information. This blockchain network is based on
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Peer-to-peer architecture (Computer networks) – Quality control"

1

Rakotoarivelo, Thierry Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Distributed discovery and management of alternate internet paths with enhanced quality of service." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/27316.

Full text
Abstract:
The convergence of recent technology advances opens the way to new ubiquitous environments, where network-enabled devices collectively form invisible pervasive computing and networking environments around the users. These users increasingly require extensive applications and capabilities from these devices. Recent approaches propose that cooperating service providers, at the edge of the network, offer these required capabilities (i.e services), instead of having them directly provided by the devices. Thus, the network evolves from a plain communication medium into an endless source of services
APA, Harvard, Vancouver, ISO, and other styles
2

Leung, Ka-ho Andrew. "Localized topology control in wireless peer-to peer file sharing networks." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32048208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leung, Ka-ho Andrew, and 梁嘉浩. "Localized topology control in wireless peer-to peer file sharing networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32048208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Yui-tung. "RMesh : a low-delay robust mesh for dynamic peer-to-peer streaming network /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIY.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xie, Wanxia. "Supporting Distributed Transaction Processing Over Mobile and Heterogeneous Platforms." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/14073.

Full text
Abstract:
Recent advances in pervasive computing and peer-to-peer computing have opened up vast opportunities for developing collaborative applications. To benefit from these emerging technologies, there is a need for investigating techniques and tools that will allow development and deployment of these applications on mobile and heterogeneous platforms. To meet these challenging tasks, we need to address the typical characteristics of mobile peer-to-peer systems such as frequent disconnections, frequent network partitions, and peer heterogeneity. This research focuses on developing the necessary model
APA, Harvard, Vancouver, ISO, and other styles
6

"Large deviation analysis of wireless P2P systems." 2012. http://library.cuhk.edu.hk/record=b5549136.

Full text
Abstract:
Abstract In this thesis, we consider the performance evaluation of peer-to-peer (P2P)streaming over wireless networks. Traditionally, P2P streaming has been implemented and analyzed extensively in wire line networks. As more and more devices are connected to the internet through wireless, however, it is critical to understand how wireless channel variability affects the performance of P2P systems. Weformulate the P2P streaming system as a queuing network, and analyze its performance based onthe large deviation principle. We are interested in characterizing the buffer underow probability, where
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Peer-to-peer architecture (Computer networks) – Quality control"

1

International Workshop on Networked Group Communication (5th 2003 Munich, Germany). Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

International Workshop on Networked Group Communication (5th 2003 Munich, Germany). Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1965-, Stiller Burkhard, and International Workshop on Internet Charging and QoS Technologies (3rd : 2003 : Munich, Germany), eds. Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Congress. House. Committee on Government Reform. Stumbling onto smut: The alarming ease of access to pornography on peer-to-peer networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, March 13, 2003. Washington: U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

(Editor), Burkhard Stiller, Georg Carle (Editor), Martin Karsten (Editor), and Peter Reichl (Editor), eds. Group Communications and Charges; Technology and Business Models: 5th COST264 International Workshop on Networked Group Communications, NGC 2003, and 3rd ... (Lecture Notes in Computer Science). Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

US GOVERNMENT. Stumbling Onto Smut: The Alarming Ease of Access to Pornography on Peer-To-Peer Networks: Hearing Before the Committee on Government Reform. Government Printing Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Network Economics For Next Generation Networks 6th International Workshop On Internet Charging And Qos Technologies Icqt 2009 Aachen Germany May 1115 2009 Proceedings. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Peer-to-peer architecture (Computer networks) – Quality control"

1

Ibrohimovna, Malohat, and Sonia Heemstra de Groot. "Fednets." In Digital Rights Management, 534–58. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2136-7.ch025.

Full text
Abstract:
A personal network (PN) is a network of a user’s personal devices and services, cooperating with each other independently of their geographical location to provide ubiquitous services to the user. PNs can be the producers and consumers of the services, content and resources. They can also export the subsets of their personal resources and services to other PNs. In such cases, PNs may form a group-oriented secure network called a Federation of Personal Networks (Fednet). A Fednet is a temporal, ad-hoc opportunity or purpose driven network of PNs, in which PNs collaborate with each other to share resources and services in a peer-to-peer manner. A Fednet is a pervasive and ubiquitous computing technology that enables the users to enjoy cooperation and promises exciting opportunities for different applications in various fields, such as education, healthcare, entertainment, business and emergency.In this chapter, the authors discuss PN technology expanding on the concept of Fednet. They provide example scenarios for Fednets, showing their potential impact to the quality of life of their users. Furthermore, they present the architecture and lifecycle of a Fednet. They explain the interactions of the main architectural components during its lifecycle and present a framework for the secure access control and management for a Fednet. The framework provides a controlled collaboration of PNs, where each PN controls the access to its resources and services. Finally, the authors provide a brief overview of some of the existing resource sharing group-oriented networks related to Fednets.
APA, Harvard, Vancouver, ISO, and other styles
2

Ibrohimovna, Malohat, and Sonia Heemstra de Groot. "Fednets." In Handbook of Research on P2P and Grid Systems for Service-Oriented Computing, 956–80. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-686-5.ch041.

Full text
Abstract:
A personal network (PN) is a network of a user’s personal devices and services, cooperating with each other independently of their geographical location to provide ubiquitous services to the user. PNs can be the producers and consumers of the services, content and resources. They can also export the subsets of their personal resources and services to other PNs. In such cases, PNs may form a group-oriented secure network called a Federation of Personal Networks (Fednet). A Fednet is a temporal, ad-hoc opportunity or purpose driven network of PNs, in which PNs collaborate with each other to share resources and services in a peer-to-peer manner. A Fednet is a pervasive and ubiquitous computing technology that enables the users to enjoy cooperation and promises exciting opportunities for different applications in various fields, such as education, healthcare, entertainment, business and emergency.In this chapter, the authors discuss PN technology expanding on the concept of Fednet. They provide example scenarios for Fednets, showing their potential impact to the quality of life of their users. Furthermore, they present the architecture and lifecycle of a Fednet. They explain the interactions of the main architectural components during its lifecycle and present a framework for the secure access control and management for a Fednet. The framework provides a controlled collaboration of PNs, where each PN controls the access to its resources and services. Finally, the authors provide a brief overview of some of the existing resource sharing group-oriented networks related to Fednets.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!