Gotowa bibliografia na temat „Peer-to-peer architecture (Computer networks) – Quality control”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Peer-to-peer architecture (Computer networks) – Quality control”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Peer-to-peer architecture (Computer networks) – Quality control"
Alqahtani, Amal, Heba Kurdi i Majed Abdulghani. "HadithTrust: Trust Management Approach Inspired by Hadith Science for Peer-to-Peer Platforms". Electronics 10, nr 12 (16.06.2021): 1442. http://dx.doi.org/10.3390/electronics10121442.
Pełny tekst źródłaAlaya, Bechir, i Rehanullah Khan. "QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives". Computer Journal 63, nr 10 (1.07.2020): 1547–63. http://dx.doi.org/10.1093/comjnl/bxaa060.
Pełny tekst źródłaLou, Xiaosong, i Kai Hwang. "Quality of data delivery in peer-to-peer video streaming". ACM Transactions on Multimedia Computing, Communications, and Applications 8, nr 1S (luty 2012): 1–23. http://dx.doi.org/10.1145/2089085.2089089.
Pełny tekst źródłaGupta, Ankur, i Lalit K. Awasthi. "Toward a Quality-of-Service Framework for Peer-to-Peer Applications". International Journal of Distributed Systems and Technologies 1, nr 3 (lipiec 2010): 1–23. http://dx.doi.org/10.4018/jdst.2010070101.
Pełny tekst źródłaBadis, Lyes, Mourad Amad, Djamil Aïssani i Sofiane Abbar. "P2PCF: A collaborative filtering based recommender system for peer to peer social networks". Journal of High Speed Networks 27, nr 1 (29.03.2021): 13–31. http://dx.doi.org/10.3233/jhs-210649.
Pełny tekst źródłaSizov, V. A., D. M. Malinichev i V. V. Mochalov. "Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System". Open Education 24, nr 2 (22.04.2020): 73–79. http://dx.doi.org/10.21686/1818-4243-2020-2-73-79.
Pełny tekst źródłaYu, Zhen, William Sears i Yong Guan. "PeerCredential: a reputation-based trust framework for Peer-to-Peer applications". International Journal of Information and Computer Security 1, nr 3 (2007): 256. http://dx.doi.org/10.1504/ijics.2007.013955.
Pełny tekst źródłaBEYAH, RAHEEM, RAGHUPATHY SIVAKUMAR i JOHN COPELAND. "GALO: A DEPLOYABLE FRAMEWORK FOR PROVIDING BETTER THAN BEST-EFFORT QUALITY OF SERVICE". Journal of Interconnection Networks 07, nr 03 (wrzesień 2006): 319–51. http://dx.doi.org/10.1142/s0219265906001727.
Pełny tekst źródłaHuang, Junjie, Liang Tan, Sun Mao i Keping Yu. "Blockchain Network Propagation Mechanism Based on P4P Architecture". Security and Communication Networks 2021 (4.08.2021): 1–12. http://dx.doi.org/10.1155/2021/8363131.
Pełny tekst źródłaWang, Longze, Yu Xie, Delong Zhang, Jinxin Liu, Siyu Jiang, Yan Zhang i Meicheng Li. "Credible Peer-to-Peer Trading with Double-Layer Energy Blockchain Network in Distributed Electricity Markets". Electronics 10, nr 15 (28.07.2021): 1815. http://dx.doi.org/10.3390/electronics10151815.
Pełny tekst źródłaRozprawy doktorskie na temat "Peer-to-peer architecture (Computer networks) – Quality control"
Rakotoarivelo, Thierry Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Distributed discovery and management of alternate internet paths with enhanced quality of service". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/27316.
Pełny tekst źródłaLeung, Ka-ho Andrew. "Localized topology control in wireless peer-to peer file sharing networks". Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32048208.
Pełny tekst źródłaLeung, Ka-ho Andrew, i 梁嘉浩. "Localized topology control in wireless peer-to peer file sharing networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32048208.
Pełny tekst źródłaLi, Yui-tung. "RMesh : a low-delay robust mesh for dynamic peer-to-peer streaming network /". View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIY.
Pełny tekst źródłaXie, Wanxia. "Supporting Distributed Transaction Processing Over Mobile and Heterogeneous Platforms". Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/14073.
Pełny tekst źródła"Large deviation analysis of wireless P2P systems". 2012. http://library.cuhk.edu.hk/record=b5549136.
Pełny tekst źródłaLeung, Kam Wong.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2012.
Includes bibliographical references (leaves 50-52).
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Background --- p.2
Chapter 1.1.1 --- Video Streaming --- p.2
Chapter 1.1.2 --- Large Deviations Theory --- p.4
Chapter 1.2 --- Related Works --- p.6
Chapter 2 --- System Model and Assumptions --- p.9
Chapter 2.1 --- System Model --- p.9
Chapter 2.2 --- Assumptions --- p.11
Chapter 2.3 --- Queuing Model --- p.12
Chapter 3 --- Performance of Large Network --- p.16
Chapter 3.1 --- Large Deviation Principle --- p.16
Chapter 3.2 --- Time I.I.D. Channel Model --- p.23
Chapter 3.3 --- Markov Modulated Channel --- p.29
Chapter 3.4 --- Performance Comparison of Channel Model: Time I.I.D. Model vs Markov Modulated Model --- p.31
Chapter 4 --- Simulation Result and Analysis. --- p.35
Chapter 4.1 --- Simulation Settings --- p.35
Chapter 4.2 --- The Performance Bounds of Different Playback Rates --- p.36
Chapter 4.3 --- The Performance Bounds for Different Channel Transition Matrix --- p.37
Chapter 5 --- Conclusion --- p.40
Chapter A --- Appendix --- p.42
Chapter A.1 --- Convexity of decay rate function for time I.I.D Model --- p.42
Chapter A.2 --- Condition for the Chernoff Bound hold --- p.44
Chapter A.3 --- Convergence of the Decay Rate Function --- p.44
Chapter A.4 --- Moment Generating Function of Markov Modulated Sources --- p.46
Chapter A.5 --- Limiting Probability Distribution of Capacity of Markov Channel --- p.47
Chapter A.6 --- Computation: Capacity p.d.f of Two States Markov Modulated Channel --- p.48
Bibliography --- p.50
Książki na temat "Peer-to-peer architecture (Computer networks) – Quality control"
International Workshop on Networked Group Communication (5th 2003 Munich, Germany). Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.
Znajdź pełny tekst źródłaInternational Workshop on Networked Group Communication (5th 2003 Munich, Germany). Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.
Znajdź pełny tekst źródła1965-, Stiller Burkhard, i International Workshop on Internet Charging and QoS Technologies (3rd : 2003 : Munich, Germany), red. Group communications and charges: Technology and business models : 5th COST 264 International Workshop on Networked Group Communications, NGC 2003 and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003 : proceedings. Berlin: Springer, 2003.
Znajdź pełny tekst źródłaUnited States. Congress. House. Committee on Government Reform. Stumbling onto smut: The alarming ease of access to pornography on peer-to-peer networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, March 13, 2003. Washington: U.S. G.P.O., 2003.
Znajdź pełny tekst źródła(Editor), Burkhard Stiller, Georg Carle (Editor), Martin Karsten (Editor) i Peter Reichl (Editor), red. Group Communications and Charges; Technology and Business Models: 5th COST264 International Workshop on Networked Group Communications, NGC 2003, and 3rd ... (Lecture Notes in Computer Science). Springer, 2003.
Znajdź pełny tekst źródłaUS GOVERNMENT. Stumbling Onto Smut: The Alarming Ease of Access to Pornography on Peer-To-Peer Networks: Hearing Before the Committee on Government Reform. Government Printing Office, 2003.
Znajdź pełny tekst źródłaNetwork Economics For Next Generation Networks 6th International Workshop On Internet Charging And Qos Technologies Icqt 2009 Aachen Germany May 1115 2009 Proceedings. Springer, 2009.
Znajdź pełny tekst źródłaCzęści książek na temat "Peer-to-peer architecture (Computer networks) – Quality control"
Ibrohimovna, Malohat, i Sonia Heemstra de Groot. "Fednets". W Digital Rights Management, 534–58. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2136-7.ch025.
Pełny tekst źródłaIbrohimovna, Malohat, i Sonia Heemstra de Groot. "Fednets". W Handbook of Research on P2P and Grid Systems for Service-Oriented Computing, 956–80. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-686-5.ch041.
Pełny tekst źródła