The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile computing has many application domains. One important domain is that of mobile applications supporting collaborative work. In a collaborative work, the members of the team has to take decision or solve conflicts in project development (such as delays, changes in project schedule, taskasignment, etc.) and therefore members have to vote. Voting can be done in many ways, and in most works in the...
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform considering as a new parameter the sustained communication time. In our system, we considered four input parameters: Data Download Speed (DDS), Local Score (LS), Number of Interactions (NI) and Sustained Communication Time (SCT) to decide the Peer Reliability (PR)...
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform. In our system, we considered four input parameters: Number of Authentic Files (NAF), Local Score (LS), Number of Interactions (NI) and Security (S) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results...
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform. In our system, we considered three input parameters: Number of Interactions (NI), Security (S), Packet Loss (PL) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay that decides the Peer Reliability (PR). In our system, we considered three input parameters: Number of Interactions (NI), Local Score (LS), Security (S). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system...
P2P (peer-to-peer) streaming systems are getting more and more popular in recent years. P2P streaming architectures can be classified into tree-based and mesh-based. The tree-based architecture has low start-up delay, but is less resilient to node failures compared to the mesh-based architecture, and it would result in a low delivery ratio and unstable quality of received multimedia. In this paper,...
Accurate searching in current structured P2P network is popular, but range query is very difficult and complex. In this paper, based on the Pastry, we propose a resources allocating mechanism for searching the objects among certain ranges in P2P network, and give the searching algorithm in detail. This mechanism does not need change the original P2P infrastructure, the algorithm is simple and easy...
EDonkey network which had a large number of shared resources had become a popular P2P files sharing network. In order to analyzing the characteristics of eDonkey network, this paper provided a method which could prevent the crawler from being added to the blacklist of the server and could break the count restriction of the results when crawler searching something from the server. Then the paper summarized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.