Academia.eduAcademia.edu

P2P/Overlay Networks

description602 papers
group18,387 followers
lightbulbAbout this topic
P2P (Peer-to-Peer) networks are decentralized communication models where each participant (peer) acts as both a client and a server, sharing resources directly with others. Overlay networks are virtual networks built on top of existing networks, facilitating efficient data routing and resource sharing among peers, often enhancing scalability and resilience.
lightbulbAbout this topic
P2P (Peer-to-Peer) networks are decentralized communication models where each participant (peer) acts as both a client and a server, sharing resources directly with others. Overlay networks are virtual networks built on top of existing networks, facilitating efficient data routing and resource sharing among peers, often enhancing scalability and resilience.
Practical implementation of new P2P streaming systems requires a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at relieving this burden, and... more
Uitgave van Koninklijke Van Gorcum BV (Assen) namens het Nederlands Instituut voor Internationale Betrekkingen 'Clingendael' (Postbus 93080, 2509 AB Den Haag), dat samenwerkt met het Koninklijk Instituut voor Internationale Betrekkingen,... more
Landslides are one of the most prevalent catastrophes in the world, which can be caused by a variety of factors, human-related and natural. This study looks at the landslides that severely damaged Taliye village in the Raigad area of... more
Both Mobile Ad Hoc Networks (MANETs) and Peer-to-Peer (P2P) Overlay Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a distributed environment. Nevertheless, MANETs are... more
Adequately supporting applications with Quality-of-service (QoS) requirements is a challenging task, particularly in the Internet. In great part, this is due to the fact that the provisioning of end-toend QoS to traffic that traverses... more
Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public... more
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any... more
In this paper, a new Use-based usage CONtrol (UseCON) approach that supports recording of usages with the help of a new entity, named use, is presented. Uses provide information for the latest state (requested, active, denied, completed... more
The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the... more
Usage CONtrol (UCON) is a next generation access control model enhanced with capabilities presented in trust and digital rights management. However, modern computing environments are usually introducing complex usage scenarios. Such a... more
Recent government-led efforts and industry-sponsored privacy initiatives in the healthcare sector have received heightened publicity. The current set of privacy laws and regulations mandate that all parties involved in the delivery of... more
This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication performance, robustness, and security. The infrastructure combines adaptive... more
In today’s digital arena security of the computer systems is one of the most important factors for users and businesses, as an attack on a system via the internet (cyber-attack) may cause heavy data loss and considerable harm to... more
Web services security has been a challenging issue in recent years because current security mechanisms, such as conventional firewalls, are not sufficient for protecting service-oriented systems from XML-based attacks. In order to provide... more
This research investigation explores the security landscape in terms of Operating Systems (OS) security and the two dominant mobile operating systems, Android and Apple iOS, in response to the escalating concerns surrounding data privacy... more
ÖZET: Amaç: Bu çalışmanın amacı sosyal medya bağımlığı ile gıda ürünü satın alma niyeti arasında duygusal yemenin aracılık yönünü ortaya koymaktır. Tasarım/Metodoloji/Yaklaşım: Bu araştırmada ekonomik ve zamansal koşullar... more
Network Virtualization (NV) techniques enable high scalability and isolation by abstracting physical resources to provide a logical network representation that can coexist with a physical networking framework. Traditional NV is prone to... more
In today’s digital arena security of the computer systems is one of the most important factors for users and businesses, as an attack on a system via the internet (cyber-attack) may cause heavy data loss and considerable harm to... more
Die Geschichte dieses Buches beginnt für mich in einem Büro im Gebäude am Herrengarten in Siegen. Als studentische Hilfskraft im Projekt A01 des Sonderforschungsbereichs 1187 "Medien der Kooperation" war ich zunächst hauptsächlich für... more
Now a days P2P networks are widely used for voice and video communications and also in many transactions like file sharing. In P2P networks DHT (Distributed Hash Table) oriented routing protocols gives an efficient way to search the... more
Приговор савести односи се на институцију одбијања учешћа у оружаним сукобима из разлога који могу бити узроковани верским, моралним, политичким или неким другим убеђењима. Њега прати захтев за алтернативним обликом служења војне обавезе.... more
This paper briefly discusses the various attendance monitoring technologies from manual to automated monitoring systems. Also, the Authors discussed on the impacts through strengthening the key features in contributing a more timely and... more
Veštačka inteligencija, kao najaktuelnija tehnologija savremenog doba, predstavlja skup algoritama, tj. softverskih alata koji, primenjeni na određeni hardver, omogućavaju da razni uređaji postanu „pametni”, odnosno da budu u stanju da... more
Although, the Internet had existed for many decades as the ARPANET since 1969, it was only after 1991 when the British MIT professor, Sir Tim Beners-Lee, invented the World Wide Web (WWW), which also runs on the Internet that the Internet... more
Abstract In this research, Cleeve Corporation is utilized as a case study to explore the multifaceted challenges that modern organizations face in the realm of cybersecurity. In September 2023, Cleeve Corporation, a prominent global... more
The deal was great for telephone companies -long-distance companies will see big savings on access charges paid to local companies and local companies will get to increase charges to all consumers. While long-distance companies agreed to... more
Cyberterrorism poses a significant and evolving threat in the digital age. Cyberterrorism has emerged as a grave concern in the contemporary world, with potential impacts on national security and global stability. This paper delves into... more
With rapid increase in population and urbanization, the use of automobiles is increasing rapidly. Along with this automobile thefts are increasing at an alarming rate all over the world. So to escape from these thieves most of the vehicle... more
This study provides a detailed statistical analysis of over 40,000 wallets active on the Base network, emphasizing performance metrics and demographic trends. Data on wallet activity, token balances, and transaction histories were... more
Information systems and data are necessary resources for several companies and individuals, but they likewise encounter numerous risks and dangers that can threaten their protection and value. Information security and information... more
The (s,t) expected-hop-count (EHC) in a wireless communication network (WCN), modeled as a graph with probabilistic node failures, is the expected number of operational nodes that a message must traverse from a node s to reach its... more
The legislation "puts into place virtually every cost-control reform proposed by physicians, economists, and health policy experts."-Peter Orszag and Ezekiel Emanuel' "The job of figuring how to cover uninsured people used up all the... more
Absensi kehadiran radio frequency identification (RFID) adalah sistem otomasi yang menggunakan (RFID) untuk memantau dan mencatat kehadiran individu. Teknologi RFID memungkinkan perangkat membaca dan menyimpan data melalui sinyal radio,... more
Modernization of Medicare (CMS) leveraging Microsoft Technologies The Centers for Medicare and Medicaid Services (CMS) has undergone significant transformations in the 21 st century. Presently, CMS is moving towards modernizing its... more
This paper examines the transformative role of Big Data Analytics (BDA) in enhancing payment accuracy and fraud detection within the Centers for Medicare & Medicaid Services (CMS). By integrating advanced analytical techniques, this study... more
The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides... more
With the current growth in Peer-to-Peer (P2P) computing, data management in P2P systems has become a very important issue, yet from literature little research effort has been dedicated to this field. Data management in P2P systems covers... more
Abstrak : Dalam percobaan ini dilakukan pembuatan sistem instrumentasi untuk pengukuran posisi linier menggunakan linear slider potentiometer berbasis PC. Proses akusisi, pengolahan dan tampilan data dilakukan oleh perangkat lunak yang... more
Web Services make it easy for organisations to participate in real time communication. The inevitable challenge facing organisations today is to implement adequate Web Services security. The attacks on Web Services might cause halt of the... more
Summary Web Services make it easy for organisations to participate in real time communication. The inevitable challenge facing organisations today is to implement adequate Web Services security. The attacks on Web Services might cause... more
smart objects through an overlay networking architecture
Network characteristics in the Internet of Things (large scale networks, more dynamic and more heterogeneous) increase the complexity in the design and provision of advanced services, making the traditional approaches inefficient or even... more
Kontrol kehadiran sangat penting karena selain berkaitan dengan tunjangan pegawai juga berfungsi sebagai kontrol pembinaan disiplin pegawai. Selama beberapa tahun terakhir, Badan Kepegawaian dan Pengembangan Sumber Daya Manusia (BKP-SDM)... more
Fingerprint attendance system aims to automate the attendance management procedure of an educational institution using biometric technology. This system takes attendance electronically with the help of a fingerprint device and the records... more
his is the tenth issue of the series on Network and Service Management, which is typically published twice a year. It was originally published in April and October, but since last year it is published in July and December. The series... more
Download research papers for free!