Artículos de revistas sobre el tema "Peer-to-peer architecture (Computer networks) – Reliability"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Peer-to-peer architecture (Computer networks) – Reliability".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Yu, Zhen, William Sears y Yong Guan. "PeerCredential: a reputation-based trust framework for Peer-to-Peer applications". International Journal of Information and Computer Security 1, n.º 3 (2007): 256. http://dx.doi.org/10.1504/ijics.2007.013955.
Texto completoAlaya, Bechir y Rehanullah Khan. "QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives". Computer Journal 63, n.º 10 (1 de julio de 2020): 1547–63. http://dx.doi.org/10.1093/comjnl/bxaa060.
Texto completoLiu, Yi, Shinji Sakamoto, Keita Matsuo, Makoto Ikeda, Leonard Barolli y Fatos Xhafa. "Improvement of JXTA-Overlay P2P Platform". International Journal of Distributed Systems and Technologies 6, n.º 2 (abril de 2015): 45–62. http://dx.doi.org/10.4018/ijdst.2015040104.
Texto completoGuru, Divya, Supraja Perumal y Vijayakumar Varadarajan. "Approaches towards Blockchain Innovation: A Survey and Future Directions". Electronics 10, n.º 10 (20 de mayo de 2021): 1219. http://dx.doi.org/10.3390/electronics10101219.
Texto completoLiu, Chun-Hung y Jyh-Cherng Gu. "Modeling and Integrating PV Stations into IEC 61850 XMPP Intelligent Edge Computing Gateway". Energies 12, n.º 8 (15 de abril de 2019): 1442. http://dx.doi.org/10.3390/en12081442.
Texto completoHaase, Peter, Ronny Siebes y Frank van Harmelen. "Expertise-based peer selection in Peer-to-Peer networks". Knowledge and Information Systems 15, n.º 1 (24 de enero de 2007): 75–107. http://dx.doi.org/10.1007/s10115-006-0055-1.
Texto completoFerreira, Ronaldo A., Suresh Jagannathan y Ananth Grama. "Locality in structured peer-to-peer networks". Journal of Parallel and Distributed Computing 66, n.º 2 (febrero de 2006): 257–73. http://dx.doi.org/10.1016/j.jpdc.2005.09.002.
Texto completoRooney, S., D. Bauer y R. Deydier. "A federated peer-to-peer network game architecture". IEEE Communications Magazine 42, n.º 5 (mayo de 2004): 114–22. http://dx.doi.org/10.1109/mcom.2004.1299353.
Texto completoLehikoinen, Juha, Ilkka Salminen, Antti Aaltonen, Pertti Huuskonen y Juha Kaario. "Meta-searches in peer-to-peer networks". Personal and Ubiquitous Computing 10, n.º 6 (7 de diciembre de 2005): 357–67. http://dx.doi.org/10.1007/s00779-005-0054-3.
Texto completoWang, Xiaoming, Yueping Zhang, Xiafeng Li y Dmitri Loguinov. "On zone-balancing of peer-to-peer networks". ACM SIGMETRICS Performance Evaluation Review 32, n.º 1 (junio de 2004): 211–22. http://dx.doi.org/10.1145/1012888.1005713.
Texto completoMickens, James W. y Brian D. Noble. "Predicting node availability in peer-to-peer networks". ACM SIGMETRICS Performance Evaluation Review 33, n.º 1 (6 de junio de 2005): 378–79. http://dx.doi.org/10.1145/1071690.1064263.
Texto completoPérez-Miguel, Carlos, Jose Miguel-Alonso y Alexander Mendiburu. "High throughput computing over peer-to-peer networks". Future Generation Computer Systems 29, n.º 1 (enero de 2013): 352–60. http://dx.doi.org/10.1016/j.future.2011.08.011.
Texto completoTaylor, Mark, John Haggerty, David Gresty y Paul Fergus. "Forensic investigation of peer-to-peer networks". Network Security 2010, n.º 9 (septiembre de 2010): 12–15. http://dx.doi.org/10.1016/s1353-4858(10)70115-x.
Texto completoMAIER, RONALD y JOHANNES SAMETINGER. "PEER-TO-PEER INFORMATION WORKSPACES IN INFOTOP". International Journal of Software Engineering and Knowledge Engineering 14, n.º 01 (febrero de 2004): 79–102. http://dx.doi.org/10.1142/s0218194004001531.
Texto completoFerreira, Ronaldo A., Mehmet Koyutürk, Suresh Jagannathan y Ananth Grama. "Semantic indexing in structured peer-to-peer networks". Journal of Parallel and Distributed Computing 68, n.º 1 (enero de 2008): 64–77. http://dx.doi.org/10.1016/j.jpdc.2007.06.003.
Texto completoTIAN, Chun-Qi, Jian-Hui JIANG, Zhi-Guo HU y Feng LI. "A Novel Super-Peer Based Trust Model for Peer-to-Peer Networks". Chinese Journal of Computers 33, n.º 2 (27 de abril de 2010): 345–55. http://dx.doi.org/10.3724/sp.j.1016..2010.00345.
Texto completoYan, Lu y Xinrong Zhou. "On designing peer-to-peer systems over wireless networks". International Journal of Ad Hoc and Ubiquitous Computing 3, n.º 4 (2008): 245. http://dx.doi.org/10.1504/ijahuc.2008.018910.
Texto completoYang, Chunlin y Xiuqi Li. "'Dominating-set-based' searching in peer-to-peer networks". International Journal of High Performance Computing and Networking 3, n.º 4 (2005): 205. http://dx.doi.org/10.1504/ijhpcn.2005.008562.
Texto completoWan, Haoyi, Norihiro Ishikawa y Johan Hjelm. "Autonomous topology optimisation for unstructured Peer-To-Peer networks". International Journal of High Performance Computing and Networking 5, n.º 5/6 (2008): 288. http://dx.doi.org/10.1504/ijhpcn.2008.025541.
Texto completoWatanabe, Kenichi, Tomoya Enokido y Makoto Takizawa. "Trustworthiness of acquaintances in Peer-to-Peer overlay networks". International Journal of High Performance Computing and Networking 6, n.º 2 (2009): 160. http://dx.doi.org/10.1504/ijhpcn.2009.027466.
Texto completoLv, Qin, Pei Cao, Edith Cohen, Kai Li y Scott Shenker. "Search and replication in unstructured peer-to-peer networks". ACM SIGMETRICS Performance Evaluation Review 30, n.º 1 (junio de 2002): 258–59. http://dx.doi.org/10.1145/511399.511369.
Texto completoGupta, Minaxi, Mostafa H. Ammar y Mustaque Ahamad. "Trade-offs between reliability and overheads in peer-to-peer reputation tracking". Computer Networks 50, n.º 4 (marzo de 2006): 501–22. http://dx.doi.org/10.1016/j.comnet.2005.07.006.
Texto completoOZTOPRAK, K. y G. B. AKAR. "Hybrid Fault Tolerant Peer to Peer Video Streaming Architecture". IEICE Transactions on Communications E91-B, n.º 11 (1 de noviembre de 2008): 3627–38. http://dx.doi.org/10.1093/ietcom/e91-b.11.3627.
Texto completoAwan, Asad, Ronaldo A. Ferreira, Suresh Jagannathan y Ananth Grama. "Unstructured peer-to-peer networks for sharing processor cycles". Parallel Computing 32, n.º 2 (febrero de 2006): 115–35. http://dx.doi.org/10.1016/j.parco.2005.09.002.
Texto completoLiu, Lu, Nick Antonopoulos y Stephen Mackin. "Fault-tolerant peer-to-peer search on small-world networks". Future Generation Computer Systems 23, n.º 8 (noviembre de 2007): 921–31. http://dx.doi.org/10.1016/j.future.2007.03.002.
Texto completoShavitt, Y., E. Weinsberg y U. Weinsberg. "Mining Music from Large-Scale, Peer-to-Peer Networks". IEEE Multimedia 18, n.º 1 (enero de 2011): 14–23. http://dx.doi.org/10.1109/mmul.2011.13.
Texto completoJin, Xing y S. H. Gary Chan. "Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring". ACM Transactions on Multimedia Computing, Communications, and Applications 6, n.º 2 (marzo de 2010): 1–18. http://dx.doi.org/10.1145/1671962.1671965.
Texto completoSAGARA, K. "A Distributed Authentication Platform Architecture for Peer-to-Peer Applications". IEICE Transactions on Communications E88-B, n.º 3 (1 de marzo de 2005): 865–72. http://dx.doi.org/10.1093/ietcom/e88-b.3.865.
Texto completoWang, Chia-Wei, Hung-Chang Hsiao, Wen-Hung Sun, Chung-Ta King y Ming-Tsung Sun. "Building a tuple space on structured peer-to-peer networks". Journal of Supercomputing 40, n.º 3 (4 de abril de 2007): 213–27. http://dx.doi.org/10.1007/s11227-006-0026-z.
Texto completoMundinger, Jochen, Richard Weber y Gideon Weiss. "Analysis of peer-to-peer file dissemination". ACM SIGMETRICS Performance Evaluation Review 34, n.º 3 (diciembre de 2006): 12–14. http://dx.doi.org/10.1145/1215956.1215963.
Texto completoChen, Minghua, Miroslav Ponec, Sudipta Sengupta, Jin Li y Philip A. Chou. "Utility maximization in peer-to-peer systems". ACM SIGMETRICS Performance Evaluation Review 36, n.º 1 (12 de junio de 2008): 169–80. http://dx.doi.org/10.1145/1384529.1375477.
Texto completoChan, Yu Wei, Tsung Hsuan Ho, Po Chi Shih y Yeh Ching Chung. "Malugo: A peer-to-peer storage system". International Journal of Ad Hoc and Ubiquitous Computing 5, n.º 4 (2010): 209. http://dx.doi.org/10.1504/ijahuc.2010.032995.
Texto completoPiotrowski, Tadeusz, Suman Banerjee, Sudeept Bhatnagar, Samrat Ganguly y Rauf Izmailov. "Peer-to-peer streaming of stored media". ACM SIGMETRICS Performance Evaluation Review 34, n.º 1 (26 de junio de 2006): 371–72. http://dx.doi.org/10.1145/1140103.1140325.
Texto completoWang, Hong, Hiroyuki Takizawa y Hiroaki Kobayashi. "A dependable Peer-to-Peer computing platform". Future Generation Computer Systems 23, n.º 8 (noviembre de 2007): 939–55. http://dx.doi.org/10.1016/j.future.2007.03.004.
Texto completoHsu, Ching-Hsien, Hai Jin y Franck Cappello. "Special section: Peer-to-peer grid technologies". Future Generation Computer Systems 26, n.º 5 (mayo de 2010): 701–3. http://dx.doi.org/10.1016/j.future.2010.02.005.
Texto completoHong Tang, Yu Yan, Rong Hu y CongCong Xing. "Traffic Modeling and Analysis on BitTorrent-Like Peer-to-Peer Networks". Journal of Convergence Information Technology 8, n.º 4 (28 de febrero de 2013): 173–81. http://dx.doi.org/10.4156/jcit.vol8.issue4.21.
Texto completoZhang, Jianwei, Xinchang Zhang, Meng Sun y Chunling Yang. "Maximizing streaming efficiency of multiple streams in peer-to-peer networks". Journal of Network and Computer Applications 124 (diciembre de 2018): 108–20. http://dx.doi.org/10.1016/j.jnca.2018.09.021.
Texto completoGao, Guoqiang, Ruixuan Li, Kunmei Wen y Xiwu Gu. "Proactive replication for rare objects in unstructured peer-to-peer networks". Journal of Network and Computer Applications 35, n.º 1 (enero de 2012): 85–96. http://dx.doi.org/10.1016/j.jnca.2011.02.007.
Texto completoWai Chen y Shengwei Cai. "Ad hoc peer-to-peer network architecture for vehicle safety communications". IEEE Communications Magazine 43, n.º 4 (abril de 2005): 100–107. http://dx.doi.org/10.1109/mcom.2005.1421912.
Texto completoChan, Mo-Che, Shun-Yun Hu y Jehn-Ruey Jiang. "Secure peer-to-peer 3D streaming". Multimedia Tools and Applications 45, n.º 1-3 (12 de mayo de 2009): 369–84. http://dx.doi.org/10.1007/s11042-009-0294-8.
Texto completoHe, Qiang, Jun Yan, Yun Yang, Ryszard Kowalczyk y Hai Jin. "A Decentralized Service Discovery Approach on Peer-to-Peer Networks". IEEE Transactions on Services Computing 6, n.º 1 (2013): 64–75. http://dx.doi.org/10.1109/tsc.2011.31.
Texto completoHuang, Xin-Li, Fu-Tai Zou y Fan-Yuan Ma. "Targeted Local Immunization in Scale-Free Peer-to-Peer Networks". Journal of Computer Science and Technology 22, n.º 3 (mayo de 2007): 457–68. http://dx.doi.org/10.1007/s11390-007-9046-2.
Texto completoDuke, David. "The Peer-to-Peer Threat". Network Security 2002, n.º 12 (diciembre de 2002): 4. http://dx.doi.org/10.1016/s1353-4858(02)12007-1.
Texto completoTewari, Saurabh y Leonard Kleinrock. "Analysis of search and replication in unstructured peer-to-peer networks". ACM SIGMETRICS Performance Evaluation Review 33, n.º 1 (6 de junio de 2005): 404–5. http://dx.doi.org/10.1145/1071690.1064276.
Texto completoVicter Paul, P., N. Saravanan, S. K. V. Jayakumar, P. Dhavachelvan y R. Baskaran. "QoS enhancements for global replication management in peer to peer networks". Future Generation Computer Systems 28, n.º 3 (marzo de 2012): 573–82. http://dx.doi.org/10.1016/j.future.2011.02.011.
Texto completoYU, Yi-Jiao y Hai JIN. "A Survey on Overcoming Free Riding in Peer-to-Peer Networks". Chinese Journal of Computers 31, n.º 1 (13 de noviembre de 2009): 1–15. http://dx.doi.org/10.3724/sp.j.1016.2008.00001.
Texto completoGkantsidis, Christos, Milena Mihail y Amin Saberi. "Random walks in peer-to-peer networks: Algorithms and evaluation". Performance Evaluation 63, n.º 3 (marzo de 2006): 241–63. http://dx.doi.org/10.1016/j.peva.2005.01.002.
Texto completoGaeta, R. y M. Sereno. "Random graphs as models of hierarchical peer-to-peer networks". Performance Evaluation 64, n.º 9-12 (octubre de 2007): 838–55. http://dx.doi.org/10.1016/j.peva.2007.06.020.
Texto completoLiu, Lei, Xiaobin Hong, Jian Wu y Jintong Lin. "Experimental Investigation of a Peer-to-Peer-Based Architecture for Emerging Consumer Grid Applications". Journal of Optical Communications and Networking 1, n.º 1 (1 de junio de 2009): 57. http://dx.doi.org/10.1364/jocn.1.000057.
Texto completoChen, Haitao. "A Learning-Based Peer-to-Peer Search Algorithm". Journal of Computer Research and Development 42, n.º 9 (2005): 1600. http://dx.doi.org/10.1360/crad20050922.
Texto completo