The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Educational resources is very rich, but the utilization rate is very low. There is a lot of redundancy and waste., To the whole education it would be a big step forward if We can integrate educational resources with the Internet to achieve the sharing of resources. peer-to-peer technology to share resources solves the problem. But some of the shortcomings of its own bring a number of other issues...
When studying digital ecosystems infrastructures we usually consider the peer-to-peer network and the other elements of the service-oriented infrastructure. This paper opens the discussion on DE infrastructures by considering DEs as regional broadband innovations that should both interact with other innovations, like community networks, and be recreated from participatory projects. We therefore overcome...
Co-intelligence, also known as collective or collaborative intelligence, is the harnessing of human knowledge and intelligence that allows groups of people to act together in ways that seem to be intelligent. Co-intelligence Internet applications such as Wikipedia are the first steps toward developing digital ecosystems that support collective intelligence. Peer-to-peer (P2P) systems are well fitted...
With the rapid development of the Internet, P2P technology has changed the traditional concept of Internet; this technology has become the dominant flow and greatly satisfied the needs of the users. At the same time, P2P worm has become one of the serious threats. This article include characteristics of P2P worms, classification, propagation model, detection and defense mechanism, also analyze some...
In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a Malware propagation model. We give overview of existing models and their weaknesses and introduce a propagation or epidemiological model based on model based on real data and real user behavior in the peer-to-peer network BitTorrent. We describe our...
Peer-to-peer (P2P) systems in general, and BitTorrent (BT) specifically, have been of significant interest to researchers and Internet users alike. Existing models of BT abstract away certain characteristics of the protocol that are important, which we address in this work. We present a simple yet accurate and easily extensible model of BT. The model's accuracy is validated through a rigorous simulation-based...
Personal computers and mobile devices connected in network provide a great potential to build distributed applications which can explore a wide range of available idle resources. They are called peer-to-peer applications (P2P) and play an important role in the evolution of the Internet. Whereas P2P transactions already dominate the worldwide bandwidth it mostly consists of file sharing, leaving out...
Existing approaches for modelling the Internet delay space predict end-to-end delays between two arbitrary hosts as static values. Further, they do not capture the characteristics caused by geographical constraints. Peer-to-peer (P2P) systems are, however, often very sensitive to the underlying delay characteristics of the Internet, since these characteristics directly influence system performance...
The characteristics, such as non-centralized structure, good autonomy and fault tolerance and so on, cause peer-to-peer network to be an effective resources sharing model on the Internet. However, the resource-located problem and the free-riding phenomenon of P2P are the most primary challenges. In this paper, semantic similarity, trust degree and active strength of the peer are fully considered,...
Along with the development of wireless technology and especially 3Gpsilas throw into commercial, the mobile value-added services gradually popular used, such as mobile automatic question and answer (Q/A) system. But the current mobile Q/A system mainly based on FAQ database, the question and answer can not be validated and updated by itself. So this paper attempts to implement a p2p based model updatable...
Decentralized and unstructured peer-to-peer (P2P) network system is becoming one of the most popular file sharing systems on the Internet. Due to its prominent merit, a P2P network becomes an effective distribution channel for selling digital products on the Internet. But there are still many constraints curbing electronic commerce on P2P networks. The main problem is that peers can not get cost-efficient...
The implications of stable epistemologies have been far-reaching and pervasive. The synthesis of red-black trees has been validated in the paper. An atomic tool for investigating Smalltalk (Titi) was described, disconfirming that sensor networks can be made peer-to-peer, stable, and adaptive. Firstly, motivated the need for neural networks, validated the emulation of symmetric encryption. Furthermore,...
The Internet includes thousands of Internet service providers (ISPs) which are interconnected to provide connectivity and service for end-users. Traditionally, the settlement between the ISPs are determined based on bilateral agreements that result from pair-wise negotiations. Although this settlement mechanism is intuitive and easy to implement, it does not encourage network- wide cooperation, as...
Autonomy of peer-to-peer (P2P) systems requires some form of economies. Forwardable storage claims of Samsara can define a common value in computer networks, and possibly be a "commodity money" in P2P systems. However, without managing how far the claims can be forwarded, they would not form an efficient, dependable and sustainable economic chain. We propose to use i-WAT tickets to represent...
In recent years, the upgrade of access networks to broadband networks together with the P2P technology has brought many new applications to the Internet. P2P applications have quickly become the biggest consumer of network resources. ISPs of access networks as well as backbone networks are all wondering how to better manage their network resources. We explore the idea of uplink pricing as a way to...
This paper examines a simple model of how a provider ISP charges customer ISPs by assuming the provider ISP wants to maximize its revenue when customer ISPs have the possibility of setting up peering connections. It is shown that finding the optimal pricing is NP-complete, and APX-complete. Customers can respond to price in many ways, including throttling traffic as well as peering. An algorithm is...
This paper elaborates a vision on a tomorrowpsilas open Internet as a networking and service ecosystem, capable of fostering medium-term coherent innovation and convergence of both Telco and Web worlds. Proposed ecosystem is based on a plurality of components, pervasively distributed over peer-to-peer (low-cost) resources, interacting with each other semantically, to compose services and exchange...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.