The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Visualization tools make it easier for users to observe the status of the wireless sensor networks (WSNs). So far, developers of WSNs have created various visualization tools under certain project/research backgrounds. These tools, however, are limited in certain application scenarios, since the underlying packet formats are hard coded into the programs. For this purpose, we present NetViewer, a universal...
In recent year, some popular P2P file-sharing systems have been identified to be polluted by the copyright Industry to control the unauthorized distribution of content. As one of the most common P2P pollution methods, the index poisoning controls the P2P file-sharing by inserting massive numbers of bogus records into the index of the P2P file-sharing system. In this paper, the index poisoning in the...
P2P pollution technology has been used to control the unauthorized distribution of the copyrighted files in recent years. In this paper, two 2 kinds of P2P pollution, the index poisoning and the fake-block-attack, has been discussed. The experiment result of applying them to BitTorrent shows that the effect of controlling file distribution is not satisfactory under some conditions. In order to improve...
Caching can improve the browser's efficiency, this paper proposes one distributed sharing model of the browser cache: each end-host's address and the Web site URL address are mapped to the identical key space, the storing information of the shared cache mapped to key k is saved on the same key k mapped end-host; it also presents a distributed lookup protocol with a constant O(1) hop per lookup request,...
Topology mismatching problem between peer-to-peer overlay network and physical underlying network brings great stress to Internet infrastructure. This paper proposes a traffic localizing strategy (TLS), it keeps scalability property of current DHT algorithms and improves system routing performance by partitioning DHT key space associating with local physical information. Experiments based on CAN model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.