• No results found

Mobile Peer to Peer

Dynamic verification and control of mobile peer-to-peer systems

Dynamic verification and control of mobile peer-to-peer systems

... external peer (i.e., peer _A in the rule) sends a request message to the current peer for a piece of information _i ...external peer _A must have been authenticated at the recipient before the ...

11

Design and feasibility of mobile peer to peer payment systems

Design and feasibility of mobile peer to peer payment systems

... our mobile payment application: anonymity in between payer and payee is not a design goal of our ...Indeed, mobile payments discussed so far happen face-to-face and are mutually authenticated out of ...

131

Efficient Virtual Social Media for Location Based Services over Mobile Peer to Peer Networks

Efficient Virtual Social Media for Location Based Services over Mobile Peer to Peer Networks

... most mobile devices have GPS capabilities, mobile users can obtain location information ...as mobile users increase, mobile social media services are developing ...Location-based mobile ...

5

A Survey on Mobile Peer-to-Peer Video Streaming Over Wi-Fi Network

A Survey on Mobile Peer-to-Peer Video Streaming Over Wi-Fi Network

... ABSTRACT: In Today‟s technical era smart phones have become basic necessity in our life. Android technology is the latest and fastest growing O.S that comes in almost all the phones. Because of such a high end technology ...

6

Use of context-awareness in mobile peer-to-peer networks

Use of context-awareness in mobile peer-to-peer networks

... of mobile ad-hoc networks [4, 13, 2] in order to support data sharing among roaming peers and to exploit peer resources when ...possible. Mobile devices have usually very limited capabilities and ...

6

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

... Due to the dual trends of increasing cellular network transmission capacity and coverage as well as improv- ing computational capacity, storage and intelligence of mobile handsets, mobile ...

8

Investigating peer-to-peer worm behavior

Investigating peer-to-peer worm behavior

... In previous chapter, the research problem, research questions and research objective of the research are clearly discussed. In literature review, the related work of the research will be discussed. The objective of this ...

24

A Peer to Peer Supply Chain Network

A Peer to Peer Supply Chain Network

... Kazaa is a peer to peer protocol that performs both searching and downloading via other nodes in the network. Where faster computers with higher bandwidth connections to the Internet are detected, these are ...

87

Survey on Peer to Peer Network Security

Survey on Peer to Peer Network Security

... to peer networks have grown in a significant way to attract the internet ...this peer to peer networks and the computer configuration on these networks is very ...one peer fails it doesn’t ...

11

Dependability within Peer to Peer Systems

Dependability within Peer to Peer Systems

... Direct communication architectures (a) represent those in which all peers can communicate directly with each other and hence are also directly aware of each other. The main disadvantage of this architecture is its lack ...

5

Investigation of Peer Grouping Methods in Peer to Peer Computing Networks

Investigation of Peer Grouping Methods in Peer to Peer Computing Networks

... Peer groups are the fundamental building block of pure P2P systems. In this paper we discuss various possible grouping strategies which may be used in design of pure P2P computing systems. We classify these ...

5

On the Performance of Peer Selection Strategies in Stochastic Peer-to-Peer Networks

On the Performance of Peer Selection Strategies in Stochastic Peer-to-Peer Networks

... the peer caches the object in its datastore, and passes the object to the upstream (downstream) requester which then creates a new entry in its routing table associating the object source with the requested ...at ...

100

Comparative analysis of Peer to Peer Networks

Comparative analysis of Peer to Peer Networks

... By analyzing the literature, one can say that huge work has been done in the field of P2P networks. The enormous growth of P2Pnetworks is proving the fact that they are becoming the most important tool in the prospect of ...

15

Incentives in peer-to-peer and grid networking

Incentives in peer-to-peer and grid networking

... use peer-to-peer architectures in non peer-to- peer areas which have a peer structure but are dominated by either centralized approaches or by the requirement of a cooperative ...

6

A Peer-to-Peer Reputation Evaluation System

A Peer-to-Peer Reputation Evaluation System

... Under service differentiation schemes like ours, it is still difficult to say whether a free-riding peer will change his behavior or not because of the complexity of human decision. Heterogeneous peers have ...

10

Censorship Resistant Peer-to-Peer Networks

Censorship Resistant Peer-to-Peer Networks

... Abstract: We present a censorship resistant peer-to-peer network for accessing n data items in a network of n nodes. Each search for a data item in the network takes O(log n) time and requires at most O(log ...

23

Subjectivity in the ecologies of peer to peer production

Subjectivity in the ecologies of peer to peer production

... there is Dr. Marcin Jakubowski’s work as Director for Permaculture and Open Manufacturing, which is the basis for his Factor E Farm Project using peer production methodologies. Factor E Farm is an experiment of ...

15

Performance Modelling of Peer to Peer Routing

Performance Modelling of Peer to Peer Routing

... Peer-to-peer routing has now been used for several years in a diverse range of applications. Despite the age of many such protocols, little work has gone into providing their for- malised models. Existing ...

8

Peer to Peer Networks including JXTA

Peer to Peer Networks including JXTA

... peers, peer groups, pipes, codats and peer group ...and peer group discovery, peer group membership, peer group pipes and codat ...

32

Replication Node Detection in Mobile Sensor Networks Based Routing For Peer To Peer Data Sharing

Replication Node Detection in Mobile Sensor Networks Based Routing For Peer To Peer Data Sharing

... 2. M. R. Ghafouri Fard,”Angle of Arrival Localization for Wireless Sensor Networks,” Ravi chander Janapati, H.C. So, W.K. Ma, Y.T. Chan, „„Received Signal Strength Based Mobile Positioning via Constrained Weighted ...

5

Show all 10000 documents...

Related subjects