Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years the demand for video streaming services has escalated resulting in high bandwidth costs of the service providers. To address this challenge a number of recent research efforts have focused on offloading media servers using P2P architectures, however they all fall under the assumption that the participating peers are in general cooperative. Ignoring security issues can significantly...
A large variety of content sharing applications rely, at least partially, on gossip-based dissemination protocols. However, these protocols are subject to various types of faults, among which selfish behaviours performed by nodes that benefit from the system without contributing their fair share to it. Accountability mechanisms (e.g., PeerReview, AVMs, FullReview), which require that nodes log their...
Deploying cache has been generally adopted by Internet service providers (ISPs) to mitigate P2P traffic in recent years. Most traditional caching algorithms are designed for locality-unaware P2P networks, which mainly consider the requested frequency of contents as the principle of caching policies. However, in more prevalent locality-aware conditions with biased neighbor-selection policies, the existing...
As more devices gain Internet connectivity, more information needs to be exchanged between them. For instance, cloud servers might disseminate instructions to clients, or sensors in the Internet of Things might send measurements to each other. In such scenarios, information spreads faster when users have an incentive to contribute data to others. While many works have considered this problem in peer-to-peer...
Wireless Mesh Networks (WMN) usually extend Internet access to unconnected mesh devices by extending the reach of wired access. Typically, in community WiFi networks, the gateway routers see no benefit for providing Internet access to the network other than having the capability of reaching other mesh devices. In this paper, we explore a WMN approach where all mesh devices are home gateway router...
In this paper, we present a dynamic framework for P2P video streaming using dynamic adaptive streaming over HTTP (DASH). DASH is a very popular standard and is expected to dominate the adaptive streaming market. Our proposed framework defines several components; DASH Session Coordinator (DSC), Intelligent Content Server (ICS), and Adaptive Streaming Client (ASC). Each component has a defined set of...
In advanced Peer-to-Peer delivery systems, each user downloads a video stream and at the same time uploads the same stream to other users. In live streaming, scalable video streaming is also proposed to allow partial decoding of the video streaming at a reduced resolution, frame-rate or quality, adapting to different display requirements and receptions conditions of heterogeneous receivers. In live...
Content distribution applications allows personal computers to search and download the digital content from the Internet. This can be done with help of P2P (Peer-to-Peer) mechanism. In P2P network, efficient mechanism is needed to locate the content. One mechanism is to form P2P Group based on the similarity interest among the peer. In this paper, a fuzzy based conceptual analysis of P2P group management...
Enabling Strong basic security mechanisms in publish/subscribe system is challenging task. Such Systems are loosely coupled and have content based routing, So provision of Authentication and confidentiality is difficult to achieve. With the help of identity based Encryption this paper provides more advanced approach to enable Authentication and Confidentiality in broker-less publish/subscribe systems...
In Mobile Peer-to-Peer networks (MP2P), the network state information is difficult to measure accurately, and application requirement on quality of service (QoS) and trust is also hard to exactly express. Therefore, trust QoS routing scheme should be based on the fuzzy information. In this paper, we propose a trust QoS routing scheme based on interval matching. It applies the interval form to denote...
As peer to peer systems work in open environment, they are highly susceptible to malicious activities. Formation of trust relations between the peers help to minimize the impact of such attacks. This paper proposes a collaborative trust based model that works on reputation and recommendations metrics to increase trustworthiness amongst the peers for reliable services. Under this model, evaluator contacts...
Recent studies suggest nodes in practical networks are more likely to communicate with nearby nodes than far away nodes, which is referred to as proximity preference. In this paper, we model proximity preference by assuming the probability of communication follows a power law distribution with respect to distance and analyze its influence on the throughput of a hybrid network. Moreover, L-maximum-hop...
Live video streaming over internet is becoming popular more and more. Current commercial live video streaming systems are based either on a typical client-server (cloud) or on a peer-to-peer (P2P) architecture. The former is preferred for stability and QoS, provided that the system is not stretched beyond the server's bandwidth capacity, while the latter is scalable with small bandwidth and management...
Among the different types of tumor in human body, brain tumor is one of the most life-threatening diseases and it should be detected accurately in early stage for proper treatment. Recently magnetic resonance imaging (MRI) is found to be efficient in detecting tumor as it does not need any opening on the human body. Presence of tumor in brain may be detected by segmenting the captured MR images. Tumor...
In recent times Internet of Things (IoT) has gained popularity because of its characteristics in connecting and providing communication among various physical objects and devices enabling collection of diverse data that help making smart and educated decisions which in turn help making human life simple, safe and efficient. Traditional Wireless Sensor Networks (WSNs) are now becoming mainstream data...
Media Streaming is a multimedia that is sent over a network and played as it is being received by the end users. With large volumes of multimedia data in P2P systems, locating data needs to address a multi-modal retrieval. There are a lot of challenges in achieving QoS in P2P systems such as churn in the systems, free riding problems, bottlenecks etc. In this paper, to achieve high QoS for live media...
The Internet of Things (IoT) is the next generation technology which is expected to bring a major revolution in the art of creating smarter environments. In order to uniquely identify each device in smart environment, a new protocol using IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) has been developed which supports management of sleep cycles of device for power management. However...
The general method available for comparison between the Distributed Hash Table (DHT) based structured overlay networks are average latency per successful lookup and percentage of successful lookups. For a DHT based lookup service with lookup retries for failed lookups, both average latency per successful lookup as well as percentage of successful lookups are key to evaluate the performance. Although,...
The ever increasing demand for mobile devices especially smartphones poses newer challenges concerning data management in wireless environment. These devices have lot of constraints such as limited memory, small display size, battery power and intermittent wireless connectivity to the network. Data management and multimodal aspect of data needs to be addressed in such an environment. Caching is one...
The double-digit growth of the number of mobile broadband subscribers has led to the exponential growth of the mobile traffic in the last several years. A major part of the mobile traffic is the duplication of the downloading the popular contents. A cache-enabled mobile network in which the popular contents are replicated at the radio access network (RAN) helps to reduce the transit traffic on the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.