• No results found

unstructured peer-to-peer searching

A Random Walker Cloning Method Based Searching  In Peer To Peer (P2p) Network

A Random Walker Cloning Method Based Searching In Peer To Peer (P2p) Network

... an unstructured protocol with a DHT-based overlay structure, QRank determines appropriate search approaches based on different objective data or files ...for searching unpopular objects due to its efficient ...

6

Survey of Various Search Mechanisms in Unstructured Peer to Peer Networks

Survey of Various Search Mechanisms in Unstructured Peer to Peer Networks

... the peer discovery (location of resource) and content look- ...mechanisms. Searching for the location of a resource includes aspects such as the query- forwarding method, the set of nodes that receive ...

5

Comparative analysis of Peer to Peer Networks

Comparative analysis of Peer to Peer Networks

... of peer let downs and linking ...with unstructured nature, they have the chance of getting preference in case of file-sharing on any cloud computing [98], and other ...keyword searching, content ...

15

AN IMPRESSIVE FILE SHARING IN PASSION - CLUSTERED PEER-TO-PEER SYSTEM USING PROXIMITY- CONSCIOUSNESS.

AN IMPRESSIVE FILE SHARING IN PASSION - CLUSTERED PEER-TO-PEER SYSTEM USING PROXIMITY- CONSCIOUSNESS.

... present unstructured P2P system, there is no responsibility assignment for each ...super peer can solve the issues related to the client relation with the super peer, issues associated with the file ...

5

Textual Based Retrieval System with Bloom in Unstructured Peer-to-Peer Networks

Textual Based Retrieval System with Bloom in Unstructured Peer-to-Peer Networks

... an unstructured P2P network, if a peer wants to find out a desired data in the network, the query is flooded through the network which finds many peers that share their ...any peer searching ...

5

Improved Search Efficiency in Unstructured Peer to Peer Networks Using Search Result Path Caching

Improved Search Efficiency in Unstructured Peer to Peer Networks Using Search Result Path Caching

... efficient searching algorithm. Peer-to-Peer (P2P) systems have gained tremendous queried resources and to route the message to the target momentum in recent ...of unstructured networks based ...

7

Peer selection technique for efficient searching and streaming in P2P network

Peer selection technique for efficient searching and streaming in P2P network

... streaming peer can be a source, destination or ...[13]. Peer can store the full content or part of a given content. If peer play the role of destination peer then it is the client who make the ...

5

Investigation of Peer Grouping Methods in Peer to Peer Computing Networks

Investigation of Peer Grouping Methods in Peer to Peer Computing Networks

... Peer groups are the fundamental building block of pure P2P systems. In this paper we discuss various possible grouping strategies which may be used in design of pure P2P computing systems. We classify these ...

5

On the Performance of Peer Selection Strategies in Stochastic Peer-to-Peer Networks

On the Performance of Peer Selection Strategies in Stochastic Peer-to-Peer Networks

... downloading peer in the previous section demon- strates how spatial heterogeneity and temporal correlation in service capacities of the peers affect the file download ...downloading peer is not able to get ...

100

A Peer to Peer Reference Architecture

A Peer to Peer Reference Architecture

... new peer connects to the central server to join the overlay ...connecting peer with information (e.g., availability of peer and peer address) about other peers in which the connecting ...

10

Comparative analysis of P2P architectures for energy trading and sharing

Comparative analysis of P2P architectures for energy trading and sharing

... structured, unstructured, super-peer and hybrid ...cover unstructured or hybrid P2P ...decentralized unstructured P2P model for a hydrogen energy ...

21

Peer to Peer Grids and Collaboration

Peer to Peer Grids and Collaboration

... The more you know about an object, the easier it is to build a collaborative system It is hard to share a general program as properties are not explicit You put in GXOS metadata precisel[r] ...

49

Towards Secure Mobile P2P Systems

Towards Secure Mobile P2P Systems

... The rapid growth of mobile devices with ever increasing functionality has brought with it the possibility of mobile Peer-to-Peer (P2P) systems. More recently, advances in wireless networking and mobile ...

6

Evaluating the Performance and Delay in Unstructured Peer to Peer Networks

Evaluating the Performance and Delay in Unstructured Peer to Peer Networks

... Liu et al. [14], [3], [15] present deterministic algorithms for the topology mismatch problem between unstructured P2P networks and underlying networks. To optimize the P2P network topology (denoted by G), the ...

5

Dependability within Peer to Peer Systems

Dependability within Peer to Peer Systems

... Peer addressing - Due to the rapid uptake of the Internet it is no longer feasible to guarantee every host with a fixed IP address. Dynamic IP's are seen as a possible solution; however within P2P systems their ...

5

Incentives in peer-to-peer and grid networking

Incentives in peer-to-peer and grid networking

... use peer-to-peer architectures in non peer-to- peer areas which have a peer structure but are dominated by either centralized approaches or by the requirement of a cooperative ...

6

Peer to Peer Networks including JXTA

Peer to Peer Networks including JXTA

... peers, peer groups, pipes, codats and peer group ...and peer group discovery, peer group membership, peer group pipes and codat ...

32

Peer to Peer Grids and Collaborative Environments

Peer to Peer Grids and Collaborative Environments

... We will use events and messages interchangeably An event is a time stamped message Our systems are built from clients, servers and “event brokers” These are logical functions – a given c[r] ...

51

Survey on Peer to Peer Network Security

Survey on Peer to Peer Network Security

... P2P networks also represent privacy and identity issues. With respect to privacy, a peer's data stream may be accorded by neighboring peers who help in transmitting the data. A direct instance is that of VoIP ...

11

A Peer to Peer Supply Chain Network

A Peer to Peer Supply Chain Network

... Kazaa is a peer to peer protocol that performs both searching and downloading via other nodes in the network. Where faster computers with higher bandwidth connections to the Internet are detected, ...

87

Show all 10000 documents...

Related subjects