The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-Peer streaming systems (or P2P-TV) have been studied in the literature for some time, and are being considered as the most promising approach to deliver real-time video to large scale users over the Internet. Neighbor selection is one of the key components to construct overlay topology for P2P streaming system. The common QoS-awareness neighbor selection algorithms in existing overlay construction...
In recent year, some popular P2P file-sharing systems have been identified to be polluted by the copyright Industry to control the unauthorized distribution of content. As one of the most common P2P pollution methods, the index poisoning controls the P2P file-sharing by inserting massive numbers of bogus records into the index of the P2P file-sharing system. In this paper, the index poisoning in the...
P2P pollution technology has been used to control the unauthorized distribution of the copyrighted files in recent years. In this paper, two 2 kinds of P2P pollution, the index poisoning and the fake-block-attack, has been discussed. The experiment result of applying them to BitTorrent shows that the effect of controlling file distribution is not satisfactory under some conditions. In order to improve...
Topology mismatching problem between peer-to-peer overlay network and physical underlying network brings great stress to Internet infrastructure. This paper proposes a traffic localizing strategy (TLS), it keeps scalability property of current DHT algorithms and improves system routing performance by partitioning DHT key space associating with local physical information. Experiments based on CAN model...
Along with the development of wireless technology and especially 3Gpsilas throw into commercial, the mobile value-added services gradually popular used, such as mobile automatic question and answer (Q/A) system. But the current mobile Q/A system mainly based on FAQ database, the question and answer can not be validated and updated by itself. So this paper attempts to implement a p2p based model updatable...
Mobile automatic question and answer (QA) system is more and more popular as a mobile value-added business. But the current mobile QA systems always have low query precision and recall ratio. In this paper, a new algorithm by pattern matching in p2p mobile QA system answer extracting process is designed. It expresses the document as triad and extracts the question and answer sentence from the triad...
BitTorrent (BT) is one of the most popular Peer-to- Peer (P2P) protocols for delivering media files in the Internet today. Although BT is quite efficient for sharing and downloading files by using P2P swarming technique, the users have to download almost the whole media file before playing it. This is determined by the Rarest-Block-Download-First strategy of standard BT implementations, which is designed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.