Filters








1,741 Hits in 12.2 sec

A Distributed Implementation of the SWAN Peer-to-Peer Look-Up System Using Mobile Agents [chapter]

Erwin Bonsma, Cefn Hoile
Lecture Notes in Computer Science  
ÓÒ Ø Ò × Ö × Ø ÑÔÐ Ñ ÒØ Ø ÓÒ Ó ËÏ AE Ù× Ò Á Ì Ø Ø × Ø ×Ù Ø Ó Ø × Ô Ô Öº ËÓÑ ÔÖ Ð Ñ Ò ÖÝ Ö ×ÙÐØ× ÓÙØ Ø Ô Ö ÓÖÑ Ò Ó Ø ÖÒ Ð ÙÒ Ø ÓÒ Ð ØÝ Ý Û Ý Ó Ø Ö ÒÚ ÖÓÒÑ Òغ ÁÒ Á Ì Ø Ö × ÓÒ ÛÓÖÐ Ô Ö Â Ú Î ÖØÙ Ð Å Ò×Ø  ...  Ö Û ×Ý×Ø Ñ Ò ÓÙÒ Ò Ë Ø ÓÒ º Ò ÐÐÝ¸Ë Ø ÓÒ Ò × Ù×× Ø Ö ×ÙÐØ× Ò ÓÒ ÐÙ Ø Ô Ô Öº ¾ Ì Á Ì ÔÐ Ø ÓÖÑ Ì Á Ì´ ÒØÖ Ð × ÁÒ ÓÖÑ Ø ÓÒ Ó×Ý×Ø Ñ Ì ÒÓÐÓ ×µ ÔÐ Ø ÓÖÑ × ÑÙÐØ ¹ ÒØ ÔÐ Ø ÓÖÑ Ò Â Ú Ø Ø × Ò Ú ÐÓÔ  ... 
doi:10.1007/3-540-45074-2_10 dblp:conf/ap2pc/BonsmaH02 fatcat:mio2j2sk25cmdkqtyig2xx4avu

Using ECA rules to implement mobile query agents for fast-evolving pure P2P database systems

Verena Kantere, Aris Tsois
2005 Proceedings of the 6th international conference on Mobile data management - MEM '05  
Furthermore, the proposed mobile agent system architecture offers a number of advantages due to the performance and scalability that can be achieved using Active Databases.  ...  We are interested in P2P networks where peers are mobile and own a database. In this dynamic context the usage of a Mobile Agent framework appears very promising.  ...  As already stated, we propose the mobile agents to be implemented through ECA rules. Therefore, each mobile query agent is defined using a number of ECA rules and a number of datasets.  ... 
doi:10.1145/1071246.1071271 dblp:conf/mdm/KantereT05 fatcat:y6tugeoccjavjc7trulol7dwwy

Approach of Association Rules Mining for Service Discovery in Mobile Adhoc Network

Ashish T.Bhole, Shital Ranade
2012 International Journal of Computer Applications  
The Service Discovery in Mobile Ad hoc Networks (MANET) is a difficult task because of the changing nature of such networks. Different services are available in MANET considering time and location.  ...  Consequently, Service Discovery (SD) in the network a perquisite for efficient usage of network resources is a complex problem.  ...  For discovery, Konark uses a completely distributed, peer-to-peer mechanism that provides each device the ability to advertise and discover services in the network.  ... 
doi:10.5120/6286-8473 fatcat:5v2w473pwzgehek2uqustz5mja

Emergent Properties & Security

Nathaniel Husted, Steven Myers
2014 Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14  
We conclude by arguing that more focus needs to be given to the emergent perspective in information security, especially as we move forward to the Internet of Things and a world full of cyber-physical  ...  attacks and defenses that make use of such concepts, and discuss the tools currently available to understand this field.  ...  A second method is to distribute the C&C infrastructure in a Peer-to-Peer (P2P) fashion.  ... 
doi:10.1145/2683467.2683468 dblp:conf/nspw/HustedM14 fatcat:fuy6d7my6rfzrckcqhte6kfy3i

Autonomic Computing for Pervasive ICT — A Whole-System Perspective [chapter]

M Shackleton, F Saffre, R Tateson, E Bonsma, C Roadknight
2006 Computer Communications and Networks  
The design heuristics that we derive (which are often nature-inspired) are illustrated in the context of a number of examples that show how the use of the appropriate principles can lead to the inherent  ...  In this paper we outline a number of design principles that can be applied to create systems that are autonomic in their operation.  ...  Acknowledgements The authors wish to thank other members of BT's Future Technologies Group at Adastral Park for their suggestions and feedback, which have contributed to the research described here in  ... 
doi:10.1007/978-1-84628-429-8_19 fatcat:r7t4fdanbjexpj65kxrxndn6cu

Content Sharing for Mobile Devices [article]

Rudi Ball
2008 arXiv   pre-print
As load on centralised systems increases, we present a novel decentralised peer-to-peer approach dubbed the Market Contact Protocol (MCP) to achieve cost effective, scalable and efficient content sharing  ...  The MCP is shown in conclusion to be a powerful means by which to share content in a massively mobile ad-hoc environment.  ...  Motivation for using the Peer-to-Peer Methodology In the context of P2P issues of cost arrive for each component of the system as is common with distributed systems.  ... 
arXiv:0809.4395v1 fatcat:cxybzlhqgvhipk2j6j4uyrbxny

Autonomic Computing for Pervasive ICT — A Whole-System Perspective

M Shackleton, F Saffre, R Tateson, E Bonsma, C Roadknight
2004 BT technology journal  
The design heuristics that we derive (which are often nature-inspired) are illustrated in the context of a number of examples that show how the use of the appropriate principles can lead to the inherent  ...  In this paper we outline a number of design principles that can be applied to create systems that are autonomic in their operation.  ...  Acknowledgements The authors wish to thank other members of BT's Future Technologies Group at Adastral Park for their suggestions and feedback, which have contributed to the research described here in  ... 
doi:10.1023/b:bttj.0000047132.31406.7f fatcat:chxztjs6mfcmpg4f5ruwpy2ipm

Understanding Blockchain [chapter]

Nishith Pathak, Anurag Bhandari
2018 IoT, AI, and Blockchain for .NET  
It has become growing popular because of its irrefutable security and ability to provide complete solution to digital identity issues. It is a digital ledger in a peer to peer network.  ...  Blockchain is one of the most important technical invention in the recent years. Blockchain is a transparent money exchange system that has transformed the way a business is conducted.  ...  With the use of wallet software, users can electronically transfer bitcoins using a computer, mobile or a web application.  ... 
doi:10.1007/978-1-4842-3709-0_7 fatcat:csyu5nsvwnhihk3rs2pvk5zfai

A taxonomy of peer-to-peer desktop grid paradigms

Han Zhao, Xinxin Liu, Xiaolin Li
2010 Cluster Computing  
The taxonomy is expected to be used as a survey of the stateof-the-art, a design map, a guideline for novice researchers, a common vocabulary, or a design space for simulation and benchmark, and to be  ...  The emerging convergence of grid and peer-to-peer (P2P) computing technologies further opens new opportunities for enabling P2P Desktop Grid systems.  ...  Acknowledgement The authors would like to thank the editors and referees for their valuable suggestions, which have significantly helped improve the quality and presentation of this paper.  ... 
doi:10.1007/s10586-010-0138-3 fatcat:ena6nwlb7bcwzobygzo456g6lq

Blockchain Applications in the Agri-Food Domain: The First Wave

Giorgio Alessandro Motta, Bedir Tekinerdogan, Ioannis N. Athanasiadis
2020 Frontiers in Blockchain  
This study aims to investigate the application potential of blockchain technology in the agri-food industry, by following a case study approach focused on the early adopter companies.  ...  We identified and studied six case studies, in which blockchain has been used to address issues of trust and transparency, and to facilitate information sharing among agri-food chain stakeholders.  ...  Blockchain is a decentralized or distributed network that uses individual nodes to store and distribute the information directly to each connected peer (Lansiti and Lakhani, 2017) .  ... 
doi:10.3389/fbloc.2020.00006 fatcat:q7p7xlkh4vfylakq2ptwlixhly

SENSTRAC: Scalable Querying of SENSor Networks from Mobile Platforms Using TRACking-Style Queries

Stefan Pleisch, Ken Birman
2006 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems  
a research effort in the area of scalable distributed systems.  ...  He is also known for his work on peer-to-peer protocols that use epidemic (gossip) communication.  ...  Acknowledgements The authors are very grateful to Rimon Barr for his help on JiST/SWANS, Robbert van Renesse for many discussions on routing in sensor networks and on pub/sub, and Rohan Murty for his implementation  ... 
doi:10.1109/mobhoc.2006.278569 dblp:conf/mass/PleischB06 fatcat:itaet33trzgddb3s4rnhcsbftq

SENSTRAC: scalable querying of sensor networks from mobile platforms using tracking-style queries

Stefan Pleisch, Kenneth P Birman
2008 International Journal of Sensor Networks (IJSNet)  
a research effort in the area of scalable distributed systems.  ...  He is also known for his work on peer-to-peer protocols that use epidemic (gossip) communication.  ...  Acknowledgements The authors are very grateful to Rimon Barr for his help on JiST/SWANS, Robbert van Renesse for many discussions on routing in sensor networks and on pub/sub, and Rohan Murty for his implementation  ... 
doi:10.1504/ijsnet.2008.019009 fatcat:55if5jha3jb27anc6tkbzrf7wq

PeopleNet

Mehul Motani, Vikram Srinivasan, Pavan S. Nuggehalli
2005 Proceedings of the 11th annual international conference on Mobile computing and networking - MobiCom '05  
It uses the infrastructure to propagate queries of a given type to users in specific geographic locations, called bazaars.  ...  We identify three metrics for system performance: (i) probability of a match, (ii) time to find a match and (iii) number of matches found by a query.  ...  We would like to thank Tan Huan Terng for running the Repast simulations, Raghuraman Ramanan for the implementation on mobile phones and Khoo Teck Ping for the Bluetooth penetration experiments.  ... 
doi:10.1145/1080829.1080855 dblp:conf/mobicom/MotaniSN05 fatcat:d3tromkw2vakpajzyyiawvudc4

Impact of transmission power on TCP performance in vehicular ad hoc networks

Andrew Chen, Behrooz Khorashadi, Dipak Ghosal, Chen-nee Chuah
2007 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services  
As a result, the dynamics of VANET are different from generic mobile ad hoc networks.  ...  A higher number of hops results in higher losses due to interference and loss of connectivity, which causes TCP to throttle back the sending rate unnecessarily.  ...  In addition to safety and traffic applications, VANETs can be used to provide users with infotainment applications such as on-board Internet access or a platform for peer-to-peer file distribution networks  ... 
doi:10.1109/wons.2007.340476 fatcat:bs5toruwrnaijmhlykgxwownze

IRRODL Volume 15, Number 3

Various Authors
2014 International Review of Research in Open and Distance Learning  
Abstract In this paper, DeLone and McLean's updated information system model was used to evaluate the success of an e-Learning system and its courses in a transitional country like Serbia.  ...  The results from different courses were used to illustrate the implementation and evaluation of these success metrics for both online and traditional students.  ...  Acknowledgements The authors would like to thank the sponsorship from the Ministry of Science and Technology, Taiwan, under the project code of NSC 102-2511-S-007 -001 -MY3.  ... 
doi:10.19173/irrodl.v15i3.1941 fatcat:dwv6ehw7yragfnn2djqmcwj4o4
« Previous Showing results 1 — 15 out of 1,741 results