• No results found

mobile peer-to-peer system

Analysis of File Dynamics and De-Duplication in Mobile Adhoc Networks for Reducing Query Delay

Analysis of File Dynamics and De-Duplication in Mobile Adhoc Networks for Reducing Query Delay

... purpose system for looking and transferring files tailored to each the characteristics of MANETs and therefore the necessities of P2P file ...leverage peer quality to achieve knowledge in different ...

11

A Survey on Mobile Peer-to-Peer Video Streaming Over Wi-Fi Network

A Survey on Mobile Peer-to-Peer Video Streaming Over Wi-Fi Network

... the mobile operating ...the mobile space, Google purchased Android and took over its development work (as well as its development ...own mobile operating ...

6

When Peer to Peer comes Face to Face: Collaborative Peer to Peer Computing in Mobile Ad hoc Networks

When Peer to Peer comes Face to Face: Collaborative Peer to Peer Computing in Mobile Ad hoc Networks

... hoc mobile information systems. Such a system consists of a decentralized and self-organizing network of autonomous, mobile devices that interact as ...with mobile devices and identify ...

15

Dynamic verification and control of mobile peer-to-peer systems

Dynamic verification and control of mobile peer-to-peer systems

... P2P system is affected by the events that occur during its ...external peer (i.e., peer _A in the rule) sends a request message to the current peer for a piece of information _i ...external ...

11

Mobile Web Service Discovery in Peer to Peer Networks

Mobile Web Service Discovery in Peer to Peer Networks

... the Mobile Host to the P2P network, many of the current P2P technologies like Gnutella [19], Napster and Magi [21] are studied in ...neutral system for P2P ...

12

Towards Peer-to-Peer Long-Lived Mobile Web Services

Towards Peer-to-Peer Long-Lived Mobile Web Services

... Factory provides a way of doing some work and the po- tential for getting that work done [3]. Factory is a focal point in the entire asynchronous system and could be seen as a manager. It creates instance ...

5

Use of context-awareness in mobile peer-to-peer networks

Use of context-awareness in mobile peer-to-peer networks

... In [6] we describe an architecture for introducing dy- namic grouping in a peer-to-peer network with a flat rout- ing space. The approach described in that paper allows us to introduce hierarchy and route ...

6

IJCSMC, Vol. 2, Issue. 12, December 2013, pg.338 – 343 RESEARCH ARTICLE A Context Aware Framework at Transport Layer to Improve QoS in Mobile Applications

IJCSMC, Vol. 2, Issue. 12, December 2013, pg.338 – 343 RESEARCH ARTICLE A Context Aware Framework at Transport Layer to Improve QoS in Mobile Applications

... In peer to peer system, mobile systems interact with other nearby ...layer system as well as it store in context service provider servers if desired by ...proposed system ...

6

Exploring Mobile Peer-to-Peer Payment Adoption: The Effects of SNS and Native Mobile Banking Apps Usage

Exploring Mobile Peer-to-Peer Payment Adoption: The Effects of SNS and Native Mobile Banking Apps Usage

... on mobile payment consumer adoption and attempt to understand the underlying reasons which can explain adoption behavior based on factors such as the preferences of ...information system theories such as ...

9

Peer to Peer Secure Communication in Mobile Environment: A Novel Approach

Peer to Peer Secure Communication in Mobile Environment: A Novel Approach

... Android[5] software platform incorporates a Linux kernel that is responsible for providing the base functionalities like memory management, processing, networking, storage, etc. to the system, a middleware layer ...

6

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

... from Mobile Switching Centre (MSC) to base stations, and base station to ...a system with weaker security is undesirable but dictated by commercial ...

8

IDA-Pay: a secure and efficient micro-payment system based on Peer-to-Peer NFC technology for Android mobile devices

IDA-Pay: a secure and efficient micro-payment system based on Peer-to-Peer NFC technology for Android mobile devices

... This paper is organized as follows. In section II, an overview about NFC technology and standards is given. Section III reports the state of the art related to security issues in NFC mobile payments. Presentation ...

9

Comparison of Linux and Symbian Based Implementations of Mobile Peer-to-Peer Environment

Comparison of Linux and Symbian Based Implementations of Mobile Peer-to-Peer Environment

... The main component of Linux implementation of PeerHood is the Peerhood daemon, PHD. PHD is the component, which takes care of all the functions of PeerHood, such as device and service discovery and connection ...

5

Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments

Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments

... control system for mobile peer-to-peer collaborative ...of peer-to- peer systems or for mobile environments and do not con- sider highly distributed enterprise ...control ...

6

Mobile Peer-to-peer Collaborative Framework and Applications

Mobile Peer-to-peer Collaborative Framework and Applications

... of mobile devices can be categorised in many ways, but it is hard to find one taxonomy that covers everything - as the functionality and abilities of the mobile devices tend to ...popular mobile ...

26

Design and feasibility of mobile peer to peer payment systems

Design and feasibility of mobile peer to peer payment systems

... o n e - way f u n c t i o n s [ 9 0 ] A one-way function is a function f with which it is easy to compute f ( a ) = b given f and a, but it is computationally infeasible to compute the inverse f −1 ( b ) = a given f and ...

131

Kosha: A Peer-to-Peer Enhancement for the Network File System

Kosha: A Peer-to-Peer Enhancement for the Network File System

... existing system, main- taining its integrity invariants as nodes fail and recover, and scaling the number of nodes over many orders of magni- tude is fully ...

11

Authority System to Prevent Privacy Protection in Peer-to-Peer Network System

Authority System to Prevent Privacy Protection in Peer-to-Peer Network System

... a peer endpoint address. When a peer requests to download a file, it first queries the indexes that match a given file ...the peer needs to refresh the token ...The peer signature is signed ...

6

Calculating the Availability of Nodes in a Peer-to-Peer Backup System

Calculating the Availability of Nodes in a Peer-to-Peer Backup System

... in peer-to-peer backup systems compared to other similar services such as peer-to-peer le ...backup system, by denition, is expected to be more reliable and available than a le sharing ...

75

Deleting Files in the Celeste Peer-to-Peer Storage System

Deleting Files in the Celeste Peer-to-Peer Storage System

... for use with Byzantine nodes, Celeste takes extra measures to prevent malicious nodes from jeopardizing the system. One easy attack on the deletion algorithm can be realized by a malicious node M as follows: M ...

25

Show all 10000 documents...

Related subjects