Journal articles on the topic 'Peer-to-peer architecture (Computer networks) – Reliability'

To see the other types of publications on this topic, follow the link: Peer-to-peer architecture (Computer networks) – Reliability.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Peer-to-peer architecture (Computer networks) – Reliability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yu, Zhen, William Sears, and Yong Guan. "PeerCredential: a reputation-based trust framework for Peer-to-Peer applications." International Journal of Information and Computer Security 1, no. 3 (2007): 256. http://dx.doi.org/10.1504/ijics.2007.013955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alaya, Bechir, and Rehanullah Khan. "QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives." Computer Journal 63, no. 10 (July 1, 2020): 1547–63. http://dx.doi.org/10.1093/comjnl/bxaa060.

Full text
Abstract:
Abstract The amount of online video content is exponentially increasing, which spurs its access demands. Providing optimal quality of service (QoS) for this ever-increasing video data is a challenging task due to the number of QoS constraints. The system resources, the distributed system platform and the transport protocol thus all need to collaborate to guarantee an acceptable level of QoS for the optimal video streaming process. In this paper, we present a comprehensive survey on QoS management for the video-on-demand systems. First, we focus on load management and replication algorithms in content delivery networks and peer-to-peer (P2P) networks for their shortcomings. We also address the problem of admission control and resource allocation with the objectives of congestion avoidance and frame-loss reduction. Besides, we introduce and discuss various replication schemes. For both the client–server architecture and P2P networks, we highlight the need for a specific storage management policy to preserve system reliability and content availability. We also focus on content distribution and streaming protocols scaling. We deduce that content availability is linked to the characteristics and the performance of the streaming protocols. Finally, we create a comparison table that presents the different contributions of the discussed approaches as well as their limitations. We believe that such a comprehensive survey provides useful insights and contributes to the related domains.
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Yi, Shinji Sakamoto, Keita Matsuo, Makoto Ikeda, Leonard Barolli, and Fatos Xhafa. "Improvement of JXTA-Overlay P2P Platform." International Journal of Distributed Systems and Technologies 6, no. 2 (April 2015): 45–62. http://dx.doi.org/10.4018/ijdst.2015040104.

Full text
Abstract:
JXTA-Overlay is a middleware built on top of the JXTA specification, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, the authors improve the reliability of our JXTA-Overlay P2P platform by implementing a new fuzzy-based Peer Reliability (PR) system. In the system, the authors considered three input parameters: Local Score (LS), Security (S) and Number of Interactions (NI). They evaluate JXTA-Overlay platform for medical applications and reliability. The experimental results show that by using JXTA-Overlay is possible to decide the situation of the patients. The simulation results have shown that the proposed system has a good performance and can choose reliable peers to connect in JXTA-Overlay platform.
APA, Harvard, Vancouver, ISO, and other styles
4

Guru, Divya, Supraja Perumal, and Vijayakumar Varadarajan. "Approaches towards Blockchain Innovation: A Survey and Future Directions." Electronics 10, no. 10 (May 20, 2021): 1219. http://dx.doi.org/10.3390/electronics10101219.

Full text
Abstract:
A blockchain is a decentralized peer to peer platform which provides security services based on some key concepts, namely authentication, confidentiality, integrity and authorization. It is the process of recording and keeping track of the resources without the intervention of a centralized authority. This paper provides an overview of blockchains, the structure of blockchains, consensus algorithms, etc., It compares the algorithms based on their utility and limitations. Though blockchains provide secure communication, there are some minimal data leaks which are discussed. Various security issues in blockchains are discussed such as denial of service attacks, etc., In addition to security, some other blockchain challenges are presented like scalability, reliability, interoperability, privacy and consensus mechanisms for integration with AI, IoT and edge computing. This paper also explains about the importance of blockchains in the fields of smart healthcare, smart grid, and smart financial systems. Overall, this paper gives the glimpse of various protocols, algorithms, applications, challenges and opportunities that are found in the blockchain domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Chun-Hung, and Jyh-Cherng Gu. "Modeling and Integrating PV Stations into IEC 61850 XMPP Intelligent Edge Computing Gateway." Energies 12, no. 8 (April 15, 2019): 1442. http://dx.doi.org/10.3390/en12081442.

Full text
Abstract:
Distributed energy resources (DERs) are being widely interconnected to electrical power grids. The dispersed and intermittent generational mixes bring technical and economic challenges to the power systems in terms of stability, reliability, and interoperability. In practice, most of the communication technologies in DER are provided by proprietary communication protocols, which are not designed for the prevention of cyber security over a wide area network, and methodology of DER integration is not unified. This has made it technically difficult for power utilities and aggregators to monitor and control the DER systems after they are interconnected with the electrical grids. Moreover, peer to peer communication between DER systems as well as local intelligent computation is required to reduce decision latency and enhance the stability of the smart grid or microgrid. In this paper, the first, novel architecture of IEC 61850 XMPP (extensible messaging and presence protocol) of the edge computing gateway, involving advanced concepts and technologies, was developed and completely studied to counter the abovementioned challenges. The results show that the proposed architecture can enhance the DER system’s effective integration, security in data communication and transparency for interoperability. The novel and advanced concepts involve first modeling the topology of the photovoltaic (PV) station to IEC 61850 information models according to the IEC 61850-7-4 logical nodes and the DER-specific logical nodes defined in IEC 61850-7-420. This guarantees the interoperability between DER and DER, DER and utility and DER and the energy service operator. The second step was to map the information models to IEC 61850-8-2 XMPP for the specific communication protocol in DER applications. XMPP protocol, a publish/subscribe communication mechanism, is recommended in DER applications because of its characteristics of cybersecurity and authenticated encryption. After that we enabled the edge computing capability for data processing and the analytics of the DER side for time-critical missions. The aggregated data was then sent to the control center in the cloud. By applying the edge computing architecture, the system reduced decision latency, improved data privacy and enhanced security. The goal of this paper was to introduce the practical methodologies of these novel concepts to academics and industrial engineers.
APA, Harvard, Vancouver, ISO, and other styles
6

Haase, Peter, Ronny Siebes, and Frank van Harmelen. "Expertise-based peer selection in Peer-to-Peer networks." Knowledge and Information Systems 15, no. 1 (January 24, 2007): 75–107. http://dx.doi.org/10.1007/s10115-006-0055-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferreira, Ronaldo A., Suresh Jagannathan, and Ananth Grama. "Locality in structured peer-to-peer networks." Journal of Parallel and Distributed Computing 66, no. 2 (February 2006): 257–73. http://dx.doi.org/10.1016/j.jpdc.2005.09.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rooney, S., D. Bauer, and R. Deydier. "A federated peer-to-peer network game architecture." IEEE Communications Magazine 42, no. 5 (May 2004): 114–22. http://dx.doi.org/10.1109/mcom.2004.1299353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lehikoinen, Juha, Ilkka Salminen, Antti Aaltonen, Pertti Huuskonen, and Juha Kaario. "Meta-searches in peer-to-peer networks." Personal and Ubiquitous Computing 10, no. 6 (December 7, 2005): 357–67. http://dx.doi.org/10.1007/s00779-005-0054-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Xiaoming, Yueping Zhang, Xiafeng Li, and Dmitri Loguinov. "On zone-balancing of peer-to-peer networks." ACM SIGMETRICS Performance Evaluation Review 32, no. 1 (June 2004): 211–22. http://dx.doi.org/10.1145/1012888.1005713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mickens, James W., and Brian D. Noble. "Predicting node availability in peer-to-peer networks." ACM SIGMETRICS Performance Evaluation Review 33, no. 1 (June 6, 2005): 378–79. http://dx.doi.org/10.1145/1071690.1064263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Pérez-Miguel, Carlos, Jose Miguel-Alonso, and Alexander Mendiburu. "High throughput computing over peer-to-peer networks." Future Generation Computer Systems 29, no. 1 (January 2013): 352–60. http://dx.doi.org/10.1016/j.future.2011.08.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Taylor, Mark, John Haggerty, David Gresty, and Paul Fergus. "Forensic investigation of peer-to-peer networks." Network Security 2010, no. 9 (September 2010): 12–15. http://dx.doi.org/10.1016/s1353-4858(10)70115-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

MAIER, RONALD, and JOHANNES SAMETINGER. "PEER-TO-PEER INFORMATION WORKSPACES IN INFOTOP." International Journal of Software Engineering and Knowledge Engineering 14, no. 01 (February 2004): 79–102. http://dx.doi.org/10.1142/s0218194004001531.

Full text
Abstract:
Knowledge workers collaborate in teams, networks and communities in order to accomplish knowledge processes. They have to be supported with adequate organizational as well as information and communication technological (ICT) infrastructures. From an ICT perspective, requirements have changed when compared to more traditional (office) work due to the considerably higher complexity of data, the focus on communication across the boundaries of corporate ICT infrastructures and the mobility of knowledge workers. This requires the systematic handling of context and substantially extended functionality for collaboration in the knowledge workers' personal workspaces. In this paper, we outline typical knowledge processes and discuss ICT support for the personal management of information, of web content, of collaboration and of knowledge. We present Infotop, a tool that supports the creation and management of shared-context information workspaces and organizes knowledge resources in a peer-to-peer (p2p) architecture. We show how Infotop can be used to support typical knowledge work processes and discuss its dimensions, its user interface, its shared context workspaces, its architecture, and some thoughts on a prototype implementation currently under development.
APA, Harvard, Vancouver, ISO, and other styles
15

Ferreira, Ronaldo A., Mehmet Koyutürk, Suresh Jagannathan, and Ananth Grama. "Semantic indexing in structured peer-to-peer networks." Journal of Parallel and Distributed Computing 68, no. 1 (January 2008): 64–77. http://dx.doi.org/10.1016/j.jpdc.2007.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

TIAN, Chun-Qi, Jian-Hui JIANG, Zhi-Guo HU, and Feng LI. "A Novel Super-Peer Based Trust Model for Peer-to-Peer Networks." Chinese Journal of Computers 33, no. 2 (April 27, 2010): 345–55. http://dx.doi.org/10.3724/sp.j.1016..2010.00345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Yan, Lu, and Xinrong Zhou. "On designing peer-to-peer systems over wireless networks." International Journal of Ad Hoc and Ubiquitous Computing 3, no. 4 (2008): 245. http://dx.doi.org/10.1504/ijahuc.2008.018910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, Chunlin, and Xiuqi Li. "'Dominating-set-based' searching in peer-to-peer networks." International Journal of High Performance Computing and Networking 3, no. 4 (2005): 205. http://dx.doi.org/10.1504/ijhpcn.2005.008562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wan, Haoyi, Norihiro Ishikawa, and Johan Hjelm. "Autonomous topology optimisation for unstructured Peer-To-Peer networks." International Journal of High Performance Computing and Networking 5, no. 5/6 (2008): 288. http://dx.doi.org/10.1504/ijhpcn.2008.025541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Watanabe, Kenichi, Tomoya Enokido, and Makoto Takizawa. "Trustworthiness of acquaintances in Peer-to-Peer overlay networks." International Journal of High Performance Computing and Networking 6, no. 2 (2009): 160. http://dx.doi.org/10.1504/ijhpcn.2009.027466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lv, Qin, Pei Cao, Edith Cohen, Kai Li, and Scott Shenker. "Search and replication in unstructured peer-to-peer networks." ACM SIGMETRICS Performance Evaluation Review 30, no. 1 (June 2002): 258–59. http://dx.doi.org/10.1145/511399.511369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Gupta, Minaxi, Mostafa H. Ammar, and Mustaque Ahamad. "Trade-offs between reliability and overheads in peer-to-peer reputation tracking." Computer Networks 50, no. 4 (March 2006): 501–22. http://dx.doi.org/10.1016/j.comnet.2005.07.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

OZTOPRAK, K., and G. B. AKAR. "Hybrid Fault Tolerant Peer to Peer Video Streaming Architecture." IEICE Transactions on Communications E91-B, no. 11 (November 1, 2008): 3627–38. http://dx.doi.org/10.1093/ietcom/e91-b.11.3627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Awan, Asad, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Grama. "Unstructured peer-to-peer networks for sharing processor cycles." Parallel Computing 32, no. 2 (February 2006): 115–35. http://dx.doi.org/10.1016/j.parco.2005.09.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Lu, Nick Antonopoulos, and Stephen Mackin. "Fault-tolerant peer-to-peer search on small-world networks." Future Generation Computer Systems 23, no. 8 (November 2007): 921–31. http://dx.doi.org/10.1016/j.future.2007.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Shavitt, Y., E. Weinsberg, and U. Weinsberg. "Mining Music from Large-Scale, Peer-to-Peer Networks." IEEE Multimedia 18, no. 1 (January 2011): 14–23. http://dx.doi.org/10.1109/mmul.2011.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Jin, Xing, and S. H. Gary Chan. "Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring." ACM Transactions on Multimedia Computing, Communications, and Applications 6, no. 2 (March 2010): 1–18. http://dx.doi.org/10.1145/1671962.1671965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

SAGARA, K. "A Distributed Authentication Platform Architecture for Peer-to-Peer Applications." IEICE Transactions on Communications E88-B, no. 3 (March 1, 2005): 865–72. http://dx.doi.org/10.1093/ietcom/e88-b.3.865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Chia-Wei, Hung-Chang Hsiao, Wen-Hung Sun, Chung-Ta King, and Ming-Tsung Sun. "Building a tuple space on structured peer-to-peer networks." Journal of Supercomputing 40, no. 3 (April 4, 2007): 213–27. http://dx.doi.org/10.1007/s11227-006-0026-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mundinger, Jochen, Richard Weber, and Gideon Weiss. "Analysis of peer-to-peer file dissemination." ACM SIGMETRICS Performance Evaluation Review 34, no. 3 (December 2006): 12–14. http://dx.doi.org/10.1145/1215956.1215963.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Chen, Minghua, Miroslav Ponec, Sudipta Sengupta, Jin Li, and Philip A. Chou. "Utility maximization in peer-to-peer systems." ACM SIGMETRICS Performance Evaluation Review 36, no. 1 (June 12, 2008): 169–80. http://dx.doi.org/10.1145/1384529.1375477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chan, Yu Wei, Tsung Hsuan Ho, Po Chi Shih, and Yeh Ching Chung. "Malugo: A peer-to-peer storage system." International Journal of Ad Hoc and Ubiquitous Computing 5, no. 4 (2010): 209. http://dx.doi.org/10.1504/ijahuc.2010.032995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Piotrowski, Tadeusz, Suman Banerjee, Sudeept Bhatnagar, Samrat Ganguly, and Rauf Izmailov. "Peer-to-peer streaming of stored media." ACM SIGMETRICS Performance Evaluation Review 34, no. 1 (June 26, 2006): 371–72. http://dx.doi.org/10.1145/1140103.1140325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Hong, Hiroyuki Takizawa, and Hiroaki Kobayashi. "A dependable Peer-to-Peer computing platform." Future Generation Computer Systems 23, no. 8 (November 2007): 939–55. http://dx.doi.org/10.1016/j.future.2007.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hsu, Ching-Hsien, Hai Jin, and Franck Cappello. "Special section: Peer-to-peer grid technologies." Future Generation Computer Systems 26, no. 5 (May 2010): 701–3. http://dx.doi.org/10.1016/j.future.2010.02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hong Tang, Yu Yan, Rong Hu, and CongCong Xing. "Traffic Modeling and Analysis on BitTorrent-Like Peer-to-Peer Networks." Journal of Convergence Information Technology 8, no. 4 (February 28, 2013): 173–81. http://dx.doi.org/10.4156/jcit.vol8.issue4.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Jianwei, Xinchang Zhang, Meng Sun, and Chunling Yang. "Maximizing streaming efficiency of multiple streams in peer-to-peer networks." Journal of Network and Computer Applications 124 (December 2018): 108–20. http://dx.doi.org/10.1016/j.jnca.2018.09.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gao, Guoqiang, Ruixuan Li, Kunmei Wen, and Xiwu Gu. "Proactive replication for rare objects in unstructured peer-to-peer networks." Journal of Network and Computer Applications 35, no. 1 (January 2012): 85–96. http://dx.doi.org/10.1016/j.jnca.2011.02.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wai Chen and Shengwei Cai. "Ad hoc peer-to-peer network architecture for vehicle safety communications." IEEE Communications Magazine 43, no. 4 (April 2005): 100–107. http://dx.doi.org/10.1109/mcom.2005.1421912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chan, Mo-Che, Shun-Yun Hu, and Jehn-Ruey Jiang. "Secure peer-to-peer 3D streaming." Multimedia Tools and Applications 45, no. 1-3 (May 12, 2009): 369–84. http://dx.doi.org/10.1007/s11042-009-0294-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

He, Qiang, Jun Yan, Yun Yang, Ryszard Kowalczyk, and Hai Jin. "A Decentralized Service Discovery Approach on Peer-to-Peer Networks." IEEE Transactions on Services Computing 6, no. 1 (2013): 64–75. http://dx.doi.org/10.1109/tsc.2011.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Huang, Xin-Li, Fu-Tai Zou, and Fan-Yuan Ma. "Targeted Local Immunization in Scale-Free Peer-to-Peer Networks." Journal of Computer Science and Technology 22, no. 3 (May 2007): 457–68. http://dx.doi.org/10.1007/s11390-007-9046-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Duke, David. "The Peer-to-Peer Threat." Network Security 2002, no. 12 (December 2002): 4. http://dx.doi.org/10.1016/s1353-4858(02)12007-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tewari, Saurabh, and Leonard Kleinrock. "Analysis of search and replication in unstructured peer-to-peer networks." ACM SIGMETRICS Performance Evaluation Review 33, no. 1 (June 6, 2005): 404–5. http://dx.doi.org/10.1145/1071690.1064276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Victer Paul, P., N. Saravanan, S. K. V. Jayakumar, P. Dhavachelvan, and R. Baskaran. "QoS enhancements for global replication management in peer to peer networks." Future Generation Computer Systems 28, no. 3 (March 2012): 573–82. http://dx.doi.org/10.1016/j.future.2011.02.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

YU, Yi-Jiao, and Hai JIN. "A Survey on Overcoming Free Riding in Peer-to-Peer Networks." Chinese Journal of Computers 31, no. 1 (November 13, 2009): 1–15. http://dx.doi.org/10.3724/sp.j.1016.2008.00001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gkantsidis, Christos, Milena Mihail, and Amin Saberi. "Random walks in peer-to-peer networks: Algorithms and evaluation." Performance Evaluation 63, no. 3 (March 2006): 241–63. http://dx.doi.org/10.1016/j.peva.2005.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gaeta, R., and M. Sereno. "Random graphs as models of hierarchical peer-to-peer networks." Performance Evaluation 64, no. 9-12 (October 2007): 838–55. http://dx.doi.org/10.1016/j.peva.2007.06.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Lei, Xiaobin Hong, Jian Wu, and Jintong Lin. "Experimental Investigation of a Peer-to-Peer-Based Architecture for Emerging Consumer Grid Applications." Journal of Optical Communications and Networking 1, no. 1 (June 1, 2009): 57. http://dx.doi.org/10.1364/jocn.1.000057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Haitao. "A Learning-Based Peer-to-Peer Search Algorithm." Journal of Computer Research and Development 42, no. 9 (2005): 1600. http://dx.doi.org/10.1360/crad20050922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography