A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Peer from the West Indies (David Pitt)
1979
BMJ (Clinical Research Edition)
David Pitt was made a life peer in 1975. He does not think anyone should accept a peerage unless he or she intends to take an active part in the House of Lords, so he gave up the GLC. ...
After 16 years at County Hall there is little that David Pitt doesn't know about London. ...
doi:10.1136/bmj.2.6203.1486
fatcat:h35xrgkfzfgxdf3coxl6shzsb4
Observations on the Dynamic Evolution of Peer-to-Peer Networks
[chapter]
2002
Lecture Notes in Computer Science
Having done so, we analyze the Chord peer-to-peer protocol. ...
A fundamental theoretical challenge in peer-to-peer systems is proving statements about the evolution of the system while nodes are continuously joining and leaving. ...
INTRODUCTION Peer-to-peer (P2P) routing protocols like Chord, Pastry, CAN, and Tapestry induce a connected overlay network across the Internet, with a rich structure that enables efficient key lookups. ...
doi:10.1007/3-540-45748-8_2
fatcat:2vhokcmlubhb7dnwq4axdhboji
Exploring preservation services in a mediated peer to peer federation
[article]
2017
Figshare
• Identify DPN's role in the transactions
• Establish workflows for content registration and metadata exchange
• Evaluate sustainability of the models
Peer Scenarios
Peer to Peer
• Depositor ...
-David Rosenthal "Traditional business models relied on planning, which in turn assumes either that the future will be like today or that we are good at forecasting. Neither has proved true." ...
doi:10.6084/m9.figshare.5415148.v1
fatcat:4pllox536raabew44elmxwkduy
New Directions in Peer-to-Peer Malware
2008
2008 IEEE Sarnoff Symposium
Peer to Peer Networks The use of Peer-to-peer mechanisms for command and control introduce an entirely new topology and communication flow than previous models. ...
Not only have their tools evolved from single-purpose programs run manually to attack from one host to one other host, but have now evolved into feature-rich distributed peer-to-peer networks of bots ( ...
doi:10.1109/sarnof.2008.4520101
fatcat:nvxzinprwjc5plw64rkpwovh7i
29. Peer-to-Peer Market Management
[chapter]
2005
Lecture Notes in Computer Science
This chapter focuses on the economic aspects of Peer-to-Peer networks. ...
It has been observed in Peer-to-Peer file sharing applications, that in the absence of appropriate economic and social mechanisms, Peer-to-Peer systems can suffer from the behavior of selfish peers, which ...
Peer-to-Peer Market Management
. Peer-to-Peer Market Management ...
doi:10.1007/11530657_29
fatcat:uwrjoqoqmvgujdofoyegvh35qy
Asynchronous resource discovery in peer-to-peer networks
2007
Computer Networks
The resource discovery problem arises in the context of peer to peer (P2P) networks, where at any point of time a peer may be placed at or removed from any location over a general purpose network (e.g. ...
The routing information needed for a vertex to reach another peer is that peer's identifier (e.g., IP address). ...
Introduction The resource discovery problem arises in the context of peer-to-peer (P2P) networks, where at any point in time, a new peer may be placed at any location over a generalpurpose network (e.g ...
doi:10.1016/j.comnet.2006.02.005
fatcat:7ci3hiix6nazfa63vzk32bkz4e
Peer-to-Peer Carsharing
2014
Transportation Research Record
a peer-to-peer vehicle. ...
The top three reasons for using peer-to-peer carsharing are convenience and availability, monetary savings, and expanded mobility options. ...
Would people consider participating in peer-to-peer carsharing? What aspects of peer-to-peer carsharing elicit the most concern from respondents? ...
doi:10.3141/2416-04
fatcat:wzfldtbknzbxpleecrnazpqgqu
Security properties in an open peer-to-peer network
[article]
2010
arXiv
pre-print
Thus, the SELinux system of the requesting peer is automatically configured with respect to the required peer-to-peer security properties. ...
That paper proposes a novel architecture that eases the administration of a peer-to-peer network. ...
No.3, October 2009 This paper was supported by the work of several engineering students in computer sciences for their master degree from Ensi of Bourges, France: Virginie Klein, Fabien Le Solliec, David ...
arXiv:1004.0772v1
fatcat:m6gub4f2pfexndd5nlhep6tn4a
A peer-to-peer service architecture for the Smart Grid
2014
14-th IEEE International Conference on Peer-to-Peer Computing
Moreover a Peer Service can be setup to provide an entry point to the set of target peers. ...
Along the way, each of these peers will decrement the value of the hops parameter in the message and forward it to their own set of peers, previously obtained from the Peer Service, or retrieve this information ...
doi:10.1109/p2p.2014.6934315
dblp:conf/p2p/CamposMPR14
fatcat:xegg52wkrndw5jwadxgx5jcyqa
Emergent Group Level Selection in a Peer-to-Peer Network
2006
ComPlexUs
Many peer-to-peer (P2P) applications benefi t from node specialization: for example, the use of supernodes, the semantic clustering of media fi les or the distribution of different computing tasks among ...
Peers within the tribes pool their specialisms, sharing tasks and working altruistically as a team -or 'tribe' -even though their individual behaviour is selfi sh. ...
Simplexus Peer-to-peer (P2P) networks such as Kazaa, Gnutella or Bittorrent now account for more than a third of everything that happens on the Internet. ...
doi:10.1159/000094193
fatcat:yubncjomdzd4foyfjju7ofrz7y
Peer-to-Peer Trading in Electricity Networks: An Overview
[article]
2020
arXiv
pre-print
As such, this article provides a comprehensive review of the state-of-the-art in research on peer-to-peer energy trading techniques. ...
By doing so, we provide an overview of the key features of peer-to-peer trading and its benefits of relevance to the grid and prosumers. ...
As such, first, the background of peer-to-peer trading in energy networks has been discussed with specific emphasize on features of peer-topeer networks, market structure for peer-to-peer trading, and ...
arXiv:2001.06882v1
fatcat:gsqgn42ktbhnza2wlafc6naoly
Statistical privacy-preserving message dissemination for peer-to-peer networks
[article]
2021
arXiv
pre-print
To tackle this problem, we transform a discrete-time protocol for contact networks over infinite trees into a computer network protocol for peer-to-peer networks. ...
Peer-to-peer networks are modeled as organically growing graphs. We show that the distribution of shortest paths in such a network can be modeled using a normal distribution 𝒩(μ,σ^2). ...
Structured peer-to-peer networks tightly control their overlay, while unstructured peer-to-peer networks have peers join the network on loose rules. ...
arXiv:2102.01615v3
fatcat:azoe6gy4x5grzlyyxsykw4qxcu
Training peer reviewers
2006
Nature
MOVERS ■ David A. Mackey is an associate professor of ophthalmology at the University of Melbourne, Australia. ...
The peer-review process provides an opportunity for clinicians and scientists to train their fellows and postgraduate students as part of a one-on-one journal-club exercise. ...
doi:10.1038/nj7113-880b
pmid:17106961
fatcat:rxqqin4okrfofcop2jy5cgx6ju
LiveShift: Peer-to-Peer Live Streaming with Distributed Time-Shifting
2008
2008 Eighth International Conference on Peer-to-Peer Computing
While video is transmitted through the peer-to-peer network in a live fashion, all peers participate in a distributed storage. ...
While video is transmitted through the peer-to-peer network in a live fashion, all peers participate in a distributed storage. ...
Channel switching is possible. 14 peers are deployed in EMANICSLab, which is based on MyPLC [2] , while 2 peers are deployed on notebook computers, showing a streaming peer and a receiving peer. ...
doi:10.1109/p2p.2008.49
dblp:conf/p2p/HechtBMHS08
fatcat:zugr5j2uwrdvje2pwevix7irsu
Analysis of the evolution of peer-to-peer systems
2002
Proceedings of the twenty-first annual symposium on Principles of distributed computing - PODC '02
In this paper, we give a theoretical analysis of peer-to-peer (P2P) networks operating in the face of concurrent joins and unexpected departures. ...
INTRODUCTION Peer-to-peer (P2P) systems are distributed systems without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality. ...
doi:10.1145/571825.571863
dblp:conf/podc/Liben-NowellBK02
fatcat:cut2my744newbp4rwohaegws7i
« Previous
Showing results 1 — 15 out of 239,157 results