The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid and peer-to-peer technology are widely applied to file sharing system. P2P overlay network topology and search algorithm have always got much attention of researchers. A mismatch between overlay and the Internet infrastructure has critical performance implications in search efficiency. We design a file sharing system named RP(k)C-Grid. It is a hybrid topology overlay network composed of two parts:...
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
The Chord protocol is the best known example of implementation of logarithmic complexity routing for structured peer-to-peer networks. Its routing algorithm, however, does not provide an optimal trade-off between the size of the finger table and the average number of hops to reach destination. Lately, a base-k chord appeared based on the original Chord, the routing perfomence of this system improved...
P2P together with media streaming technology brings a new method for video service. This paper proposes a design to deploy video service on commercial systems with authentication servers. The design combines C/S charging model, and provides video contents in a P2P way. According to the address information registered on authentication servers, a media management server helps new peers to find their...
Current mobile network architecture is constructed through introducing mobile IP protocol on the basis of IP network. On the one hand it cannot break away from the inherent limitation of IP network, such as no strong security, complex forwarding devices, lack of high expansibility and no QoS guarantee. On the other hand it brings some new problems due to the repair to IP network, such as the triangular...
Peer-to-peer (P2P) eCommerce are commonly perceived as an environment offering both opportunities and threats. For peers to be effective they need some mechanism for managing this risk of failure. One way to minimize threats in such an open environment is to exploit reputation to help evaluate the trustworthiness of what and predict the future behaviors of peers. In this study, a set of parameters...
Peer-to-peer (P2P) systems have gained considerable attention in the past few years. Since the popularity distribution of queries follows a zipf-like distribution in a P2P network, the performance can get significant improvement if a simple and effective caching mechanism called hot spots caching mechanism (HSCM) is used, which stores the IP address and port number of the successor node of the key...
In the trust model for P2P network, to get the accurate value of global trust is becoming difficult because of the complex of net environment and the dishonest peers. This article proposed the computation method for the value of globe trust based on the MAX-MIN ant system. Through this advanced ant colony algorithm, search several recommendation paths to compute the best global trust valuation from...
Chord is the most essential and efficient peer-to-peer routing algorithm that, however, cannot reflect the hot resources problem in practical networks. To solve the problem, an optimized Chord algorithm has been put forward in this paper to accelerate locating the hot resources. The optimized Chord algorithm records the access time of resources and categories the resources into three classes. As for...
Government information resource catalog and interchange is becoming a very important domain in IT construction these years. Chinese government has put great attention to this area. This paper outlines specific features and issues of China??s government information resource catalog and exchange. A government information resource and service registry model is presented accordingly, and considerations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.