The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The resource distribution in P2P network has an obvious scale free character. Using this inherent character to design resource search strategy is great significant for improving searching efficiency and reducing the costs. We analyze the scale free distribution character in P2P network, and propose a reliable random walk search algorithm to achieve high and reliable search efficiency through forwarding...
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and valuable knowledge from these networked data sources. In this paper, we investigate clustering, one of the most important data mining tasks, in one of such networked computing environments, i.e., Peer-to-Peer (P2P) network...
Load balance in P2P storage system will affect availability greatly. Two aspects should be considered in keeping balance: balance in peer space and balance in data replica among peers. This paper focuses on achieving balance in peer space. Peers are categorized by periodicity of availability, and long term peers are organized into virtual balanced binary tree which is improved from P-Grid. Character...
Secure joining process has become the most challenging problem in P2P system. This paper presents a joining process with security in P-Grid system including authentication of entry peer and new peer. The core idea to ensure security authentication is to use multiple consultant peers and a quorum-based method to make a decision. From preliminary analysis of the process, high successful probability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.