• No results found

[PDF] Top 20 Dynamic verification and control of mobile peer-to-peer systems

Has 10000 "Dynamic verification and control of mobile peer-to-peer systems" found on our website. Below are the top 20 most common "Dynamic verification and control of mobile peer-to-peer systems".

Dynamic verification and control of mobile peer-to-peer systems

Dynamic verification and control of mobile peer-to-peer systems

... external peer (i.e., peer _A in the rule) sends a request message to the current peer for a piece of information _i ...external peer _A must have been authenticated at the recipient before the ... See full document

11

Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments

Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments

... access control system for mobile peer-to-peer collaborative ...access control systems relevant for the investigated research area are build for either personal usage of ... See full document

6

Towards Peer-to-Peer Long-Lived Mobile Web Services

Towards Peer-to-Peer Long-Lived Mobile Web Services

... such dynamic change in requirements, a client should be able to send control messages to the service instance and on the other hand, the service instance should be capable of updating itself at ... See full document

5

When Peer to Peer comes Face to Face: Collaborative Peer to Peer Computing in Mobile Ad hoc Networks

When Peer to Peer comes Face to Face: Collaborative Peer to Peer Computing in Mobile Ad hoc Networks

... and peer-to- peer computing deal with similar issues, namely discovery, routing and information dissemination, there is not much overlap in the ...current peer-to-peer systems are ... See full document

15

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

... could control the network, and every node in the network acts as a peer which is unaware of other ...such systems are usually forwarded to random neighbors ... See full document

8

Dynamic Search In Un-Structured Peer-To-Peer Networks

Dynamic Search In Un-Structured Peer-To-Peer Networks

... P2P systems centralized, decentralized structured and decentralized unstructured (Figure ...a peer can search for the location of a desired content from an index ...creates systems susceptible to ... See full document

8

Peer to Peer Mobile Coupons: Adding Incentives without Sacrificing Security

Peer to Peer Mobile Coupons: Adding Incentives without Sacrificing Security

... must control the amount of the published e-coupon, hence, in this kind of research prevent double-redemption is the preferential considering and then control the amount of the redeemed e-coupon smaller than ... See full document

8

Peer-to-peer form based web information systems

Peer-to-peer form based web information systems

... agement Systems (WfMS) ...(1) control flow (or pro- cess), (2) resource (or organization), (3) data (or in- formation), (4) task (or function), and (5) operation (or application) perspectives ... See full document

10

Design and feasibility of mobile peer to peer payment systems

Design and feasibility of mobile peer to peer payment systems

... our mobile payment application: anonymity in between payer and payee is not a design goal of our ...Indeed, mobile payments discussed so far happen face-to-face and are mutually authenticated out of ... See full document

131

Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

... P2P systems “the economically and technologically opti- mal vehicles for digital content distribution” (Wood, 2010, ...sharing systems, this address has been used openly and directly exposed, thus raising ... See full document

15

The Benefits of Network Coding for Peer-to-Peer Storage Systems

The Benefits of Network Coding for Peer-to-Peer Storage Systems

... Most systems use a timeout heuristic: when a node has not responded to network-level probes after some period of time t, it is considered to have failed ...storage systems’ behavior, we use the same ... See full document

6

Peer-to-peer systems have attracted considerable attention

Peer-to-peer systems have attracted considerable attention

... Abstract—Reputation aggregation in peer to peer networks is generally a very time and resource consuming process. Moreover, most of the methods consider that a node will have same reputation with all the ... See full document

14

Time Variant Peer Node Heterogeneous Peer to Peer Networks using Dynamic Warping Algorithm

Time Variant Peer Node Heterogeneous Peer to Peer Networks using Dynamic Warping Algorithm

... heterogeneous peer networks. Peer node time variant capacity is measured using Dynamic Time Warping (DTW) algorithm to evaluate the magnitude of load-demand balance factors of peer ...DTW, ... See full document

5

Peer-to-Peer Lending Industry and Risk Control Measures

Peer-to-Peer Lending Industry and Risk Control Measures

... Peer-to-peer lending (P2PL), the idea of lending money to unacquainted individuals via online platforms or off-line networks with a focus on “disintermediation”, has been one of the essential protagonists ... See full document

48

Peer-To-Peer Self Organizing Confidence Model Systems

Peer-To-Peer Self Organizing Confidence Model Systems

... attackers Peer- 2-Peer Self-Organizing Confidence Model Systems integrate both service and direction-based attacks in most ...about Peer-2- Peer Self-Organizing Confidence Model ... See full document

5

Maintaining Trust Relationships between Peer – To – Peer Systems

Maintaining Trust Relationships between Peer – To – Peer Systems

... calculate the trustworthiness of a stranger by recommendation from trusted third party. After calculating the recommendation trust metric, a recommendation value of recommender is updated. Three parameters namely weight, ... See full document

7

A Study on Peer to Peer Allocation for File Sharing Systems

A Study on Peer to Peer Allocation for File Sharing Systems

... That enthused peer-to-peer organization plan is file contribution. Users incredibly frequently need to deal out their files to others as expediently and as powerfully as potential for instance associates on ... See full document

5

Towards A Lightweight Incentive Scheme for Peer to Peer Systems

Towards A Lightweight Incentive Scheme for Peer to Peer Systems

... In this system, peers act rationally and try to optimize their own payoff. Time is modeled in rounds. In each round peers are interacting as clients and servers. Accordingly, there exist the four following actions: ... See full document

19

A Semantic Search Algorithm for Peer to Peer Open Hypermedia Systems

A Semantic Search Algorithm for Peer to Peer Open Hypermedia Systems

... [16], peer-to-peer search techniques are highly effective in systems with dynamic ...in peer-to-peer networks - that of service discovery, has been addressed in ... See full document

12

DDLS: Extending Open Hypermedia Systems into Peer to Peer Environments

DDLS: Extending Open Hypermedia Systems into Peer to Peer Environments

... Suppose there is a research community in which people sharing similar knowledge background maintain network accessible resources, or documents, for resource sharing- based collaboration within the community. Upon the ... See full document

181

Show all 10000 documents...