Academic literature on the topic 'Peer-to-peer architecture (Computer networks) – Quality control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Peer-to-peer architecture (Computer networks) – Quality control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Peer-to-peer architecture (Computer networks) – Quality control"
Alqahtani, Amal, Heba Kurdi, and Majed Abdulghani. "HadithTrust: Trust Management Approach Inspired by Hadith Science for Peer-to-Peer Platforms." Electronics 10, no. 12 (June 16, 2021): 1442. http://dx.doi.org/10.3390/electronics10121442.
Full textAlaya, Bechir, and Rehanullah Khan. "QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives." Computer Journal 63, no. 10 (July 1, 2020): 1547–63. http://dx.doi.org/10.1093/comjnl/bxaa060.
Full textLou, Xiaosong, and Kai Hwang. "Quality of data delivery in peer-to-peer video streaming." ACM Transactions on Multimedia Computing, Communications, and Applications 8, no. 1S (February 2012): 1–23. http://dx.doi.org/10.1145/2089085.2089089.
Full textGupta, Ankur, and Lalit K. Awasthi. "Toward a Quality-of-Service Framework for Peer-to-Peer Applications." International Journal of Distributed Systems and Technologies 1, no. 3 (July 2010): 1–23. http://dx.doi.org/10.4018/jdst.2010070101.
Full textBadis, Lyes, Mourad Amad, Djamil Aïssani, and Sofiane Abbar. "P2PCF: A collaborative filtering based recommender system for peer to peer social networks." Journal of High Speed Networks 27, no. 1 (March 29, 2021): 13–31. http://dx.doi.org/10.3233/jhs-210649.
Full textSizov, V. A., D. M. Malinichev, and V. V. Mochalov. "Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System." Open Education 24, no. 2 (April 22, 2020): 73–79. http://dx.doi.org/10.21686/1818-4243-2020-2-73-79.
Full textYu, Zhen, William Sears, and Yong Guan. "PeerCredential: a reputation-based trust framework for Peer-to-Peer applications." International Journal of Information and Computer Security 1, no. 3 (2007): 256. http://dx.doi.org/10.1504/ijics.2007.013955.
Full textBEYAH, RAHEEM, RAGHUPATHY SIVAKUMAR, and JOHN COPELAND. "GALO: A DEPLOYABLE FRAMEWORK FOR PROVIDING BETTER THAN BEST-EFFORT QUALITY OF SERVICE." Journal of Interconnection Networks 07, no. 03 (September 2006): 319–51. http://dx.doi.org/10.1142/s0219265906001727.
Full textHuang, Junjie, Liang Tan, Sun Mao, and Keping Yu. "Blockchain Network Propagation Mechanism Based on P4P Architecture." Security and Communication Networks 2021 (August 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/8363131.
Full textWang, Longze, Yu Xie, Delong Zhang, Jinxin Liu, Siyu Jiang, Yan Zhang, and Meicheng Li. "Credible Peer-to-Peer Trading with Double-Layer Energy Blockchain Network in Distributed Electricity Markets." Electronics 10, no. 15 (July 28, 2021): 1815. http://dx.doi.org/10.3390/electronics10151815.
Full textDissertations / Theses on the topic "Peer-to-peer architecture (Computer networks) – Quality control"
Rakotoarivelo, Thierry Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Distributed discovery and management of alternate internet paths with enhanced quality of service." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/27316.
Full textLeung, Ka-ho Andrew. "Localized topology control in wireless peer-to peer file sharing networks." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32048208.
Full textLeung, Ka-ho Andrew, and 梁嘉浩. "Localized topology control in wireless peer-to peer file sharing networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32048208.
Full textLi, Yui-tung. "RMesh : a low-delay robust mesh for dynamic peer-to-peer streaming network /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIY.
Full textXie, Wanxia. "Supporting Distributed Transaction Processing Over Mobile and Heterogeneous Platforms." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/14073.
Full text"Large deviation analysis of wireless P2P systems." 2012. http://library.cuhk.edu.hk/record=b5549136.
Full textLeung, Kam Wong.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2012.
Includes bibliographical references (leaves 50-52).
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Background --- p.2
Chapter 1.1.1 --- Video Streaming --- p.2
Chapter 1.1.2 --- Large Deviations Theory --- p.4
Chapter 1.2 --- Related Works --- p.6
Chapter 2 --- System Model and Assumptions --- p.9
Chapter 2.1 --- System Model --- p.9
Chapter 2.2 --- Assumptions --- p.11
Chapter 2.3 --- Queuing Model --- p.12
Chapter 3 --- Performance of Large Network --- p.16
Chapter 3.1 --- Large Deviation Principle --- p.16
Chapter 3.2 --- Time I.I.D. Channel Model --- p.23
Chapter 3.3 --- Markov Modulated Channel --- p.29
Chapter 3.4 --- Performance Comparison of Channel Model: Time I.I.D. Model vs Markov Modulated Model --- p.31
Chapter 4 --- Simulation Result and Analysis. --- p.35
Chapter 4.1 --- Simulation Settings --- p.35
Chapter 4.2 --- The Performance Bounds of Different Playback Rates --- p.36
Chapter 4.3 --- The Performance Bounds for Different Channel Transition Matrix --- p.37
Chapter 5 --- Conclusion --- p.40
Chapter A --- Appendix --- p.42
Chapter A.1 --- Convexity of decay rate function for time I.I.D Model --- p.42
Chapter A.2 --- Condition for the Chernoff Bound hold --- p.44
Chapter A.3 --- Convergence of the Decay Rate Function --- p.44
Chapter A.4 --- Moment Generating Function of Markov Modulated Sources --- p.46
Chapter A.5 --- Limiting Probability Distribution of Capacity of Markov Channel --- p.47
Chapter A.6 --- Computation: Capacity p.d.f of Two States Markov Modulated Channel --- p.48
Bibliography --- p.50
Books on the topic "Peer-to-peer architecture (Computer networks) – Quality control"
International Workshop on Networked Group Communication (5th 2003 Munich, Germany). Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.
Find full textInternational Workshop on Networked Group Communication (5th 2003 Munich, Germany). Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.
Find full text1965-, Stiller Burkhard, and International Workshop on Internet Charging and QoS Technologies (3rd : 2003 : Munich, Germany), eds. Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.
Find full textUnited States. Congress. House. Committee on Government Reform. Stumbling onto smut: The alarming ease of access to pornography on peer-to-peer networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, March 13, 2003. Washington: U.S. G.P.O., 2003.
Find full text(Editor), Burkhard Stiller, Georg Carle (Editor), Martin Karsten (Editor), and Peter Reichl (Editor), eds. Group Communications and Charges; Technology and Business Models: 5th COST264 International Workshop on Networked Group Communications, NGC 2003, and 3rd ... (Lecture Notes in Computer Science). Springer, 2003.
Find full textUS GOVERNMENT. Stumbling Onto Smut: The Alarming Ease of Access to Pornography on Peer-To-Peer Networks: Hearing Before the Committee on Government Reform. Government Printing Office, 2003.
Find full textNetwork Economics For Next Generation Networks 6th International Workshop On Internet Charging And Qos Technologies Icqt 2009 Aachen Germany May 1115 2009 Proceedings. Springer, 2009.
Find full textBook chapters on the topic "Peer-to-peer architecture (Computer networks) – Quality control"
Ibrohimovna, Malohat, and Sonia Heemstra de Groot. "Fednets." In Digital Rights Management, 534–58. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2136-7.ch025.
Full textIbrohimovna, Malohat, and Sonia Heemstra de Groot. "Fednets." In Handbook of Research on P2P and Grid Systems for Service-Oriented Computing, 956–80. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-686-5.ch041.
Full text