Skip to main content
We collected mobility traces of 84,208 avatars spanning 22 regions over two months in Second Life, a popular networked virtual en- vironment. We analyzed the traces to characterize the dynamics of the avatars mobility and behavior, both... more
    • by 
    •   6  
      Second LifeVirtual EnvironmentMobile Peer-to-Peer NetworkPeer to Peer
The novelty of the peer-to-peer (P2P) paradigm relies on two main concepts: cooperation among users and resource sharing. There are many applications based on peer-to-peer paradigm, but the most popular one is the file sharing. We can... more
    • by 
    •   10  
      Computer ScienceResource sharingHybridFile Sharing
Purpose – This article examines peer-to-peer sharing platform business models, their sources of competitive advantage, and the roles, motivations, and behaviors of key actors in their ecosystems. Design/methodology/approach – This paper... more
    • by 
    •   10  
      Social NetworksEcosystem ServicesSocial NetworkingPeer-to-Peer
Structured peer-to-peer (P2P) networks is becoming popular for their advantages of high scalability and good performance. These networks are based on the Distributed Hash Tale or DHT mechanism to establish and maintain a certain topology.... more
    • by 
    •   5  
      Distributed Hash TablePerformance ImprovementPeer to PeerATC
With the rise of peer-to-peer (P2P) file sharing applications there has been an increasing interest in understanding the popularity and use of P2P. In this study, we look at P2P use on the University of Southern California’s campus... more
    • by 
    •   2  
      File SharingPeer to Peer
With the increasing popularity of the World Wide Web, end-user applications are moving from the desktop to the browser. More and more applications that we have come to know as desktop applications are now making their way into the web.... more
    • by 
    •   8  
      User InterfaceWeb ProgrammingWeb ApplicationData storage
Eigenvector computations are an important building block for computing authority, trust, and reputation scores in social networks and other graphs. In peer-to-peer networks or other forms of decentralized settings (such as multi-agent... more
    • by 
    •   8  
      Link analysisMobile Peer-to-Peer NetworkSocial TaggingTrust and Reputation Systems
The communication as we know it is about to change, the simple peer-to-peer voice type of calls being replaced by a mix of different media belonging to the same session. Networkbased speech processing technologies are increasingly used,... more
    • by 
    •   11  
      Computer ScienceSignal ProcessingSpeech SynthesisSpeech Processing
— many file sharing systems exists today. The abundance of content on the web is in itself a huge problem to comprehend. The existence and wide scale use of peer-to-peer file sharing systems, which let users share files, folders,... more
    • by 
    •   3  
      Peer to PeerRecommendation SystemsCourse-content Recommendation
    • by  and +1
    •   7  
      Young PeopleLibrary and Information StudiesSocial ContextCluster Analysis
Existing approaches for modelling the Internet delay space predict end-to-end delays between two arbitrary hosts as static values. Further, they do not capture the characteristics caused by geographical constraints. Peer-to-peer (P2P)... more
    • by 
    •   6  
      Computer ScienceModelling and Simulation of communication networksPeer to PeerLarge Scale
The extraction and recognition of facial expression has been the topic of various researches subject to enable smooth interaction between computer and their users. In this way, computers in the future will be able to offer advice in... more
    • by 
    •   8  
      PsychologyUser InterfaceFacial expressionSocial status
Peer-to-peer (P2P) overlay networks have recently become one of the hottest topics in OS research. These networks bring with them the promise of harnessing idle storage and network resources from client machines that voluntarily join the... more
    • by 
    •   6  
      Peer to PeerStorage systemWide Area NetworkLoad Balance
Web 2.0 is the adoption of open technologies and architectural frameworks to facilitate participative computing. Web 2.0 has the potential to deliver rich peer-to-peer interactions among users, enable collaborative value creation across... more
    • by 
    •   16  
      Information ScienceInformation TechnologyKnowledge ManagementSocial Networking
to design a community healthcare information network for all 450,000 citizen in the State of Geneva, Switzerland, connecting public and private healthcare professionals. Requirements include the decentralized storage of information at the... more
    • by 
    •   15  
      Medical InformaticsComputer SecurityInformation AccessLibrary and Information Studies
Spam is one of the major problems of today email systems. While many solutions have been proposed to automatically detect and filter spam, spammers are getting more and more technically sophisticated and aware of internal workings of... more
    • by 
    •   8  
      Computer SciencePeer-to-PeerShared KnowledgeSpam Filtering
In recent times, coupled with the emergence of the new cloud paradigm, a number of security related issues have emerged. Therefore, trust and reputation management has become unavoidable challenge in this new cloud computing paradigm.... more
    • by 
    •   8  
      Information SecurityComputer NetworksTrust ManagementComputer Security
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible... more
    • by 
    •   9  
      SecurityPeer-to-PeerP2p(peer-2-Peer) NetworksPhysical Therapy
Web services have the potential to dramatically reduce the complexities and costs of software integration projects. The most obvious and perhaps most significant difference between Web services and traditional applications is that Web... more
    • by 
    •   10  
      XMLWeb ServicesData CommunicationNotes
The use of peer-to-peer (P2P) applications is growing dramatically, which results in several serious problems such as the network congestion and traffic hindrance. In this paper, a method is proposed to identify the P2P traffic based on... more
    • by 
    •   9  
      LawMachine LearningGovernmentPeer to Peer
This paper presents the use of a novel Peer to Peer (P2P) infrastructure in order to provide rapid broad digital content exchange, digital rights protection and efficient transaction management through watermarking technologies. Copyright... more
    • by  and +1
    •   13  
      Distributed ComputingWatermarkingDigital Image ProcessingDigital Content
A peer-to-peer database management system(P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e.... more
    • by 
    •   7  
      Pairing-based cryptographyDATABASE MANAGEMENT SYSTEMPeer to PeerData Exchange
Peer-to-Peer (P2P) networks offer reliable and efficient services in different application scenarios. In particular, structured P2P protocols (like Chord [1]) have to handle changes in the overlay topology fast and with as little... more
    • by 
    •   4  
      Mobile DevicePeer to PeerNetwork structureCommunication Cost
    • by 
    •   9  
      EngineeringData acquisitionTrend AnalysisPeer to Peer
    • by 
    •   9  
      Web IntelligenceReputationDistributed ProcessingMulti Agent Systems
Today, research in electronic negotiations focuses on negotiation protocols that support the negotiation of only a few properties. These protocols are mainly designed for automated negotiations between software agents. However, for... more
    • by 
    •   10  
      EngineeringTechnologyComputer NetworksCommunication Management
Query processing in traditional information management systems has moved from an exact match model to more flexible paradigms allowing cooperative retrieval by aggregating the database objects' degree of match for each different query... more
    • by  and +1
    •   17  
      Information RetrievalStatisticsInformation ManagementSpine
Traditional vehicle collision warning and avoidance systems do not perform well in the perpendicular path intersection case. One major reason is that the threat detection systems they use require line-of-sight. Recently we have designed... more
    • by  and +1
    •   6  
      Software ArchitectureSystem DesignData SharingAd hoc network
In this work, we address the problem of locally estimating the size of a Peerto-Peer (P2P) network using local information. We present a novel approach for estimating the size of a peer-to-peer (P2P) network, fitting the sum of new... more
    • by 
    •   11  
      MathematicsComputer ScienceGrid ComputingSocial Networks
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental evaluation. VoroNet differs from previous overlay networks... more
    • by 
    •   8  
      Long RangeTheoretical AnalysisPeer to PeerExperimental Evaluation
Internet was designed for network services without any intention for secure communication. Exponential growth of internet and its users have developed an era of global competition and rivalry. Denial of service attack by multiple nodes is... more
    • by 
    •   18  
      Computer ScienceDistributed ComputingSecurityDistributed Denial of Service Attack
    • by 
    •   6  
      Interaction DesignSocial InteractionEveryday LifeFace to Face
This paper presents a framework for multimodal human-robot interaction. The proposed framework is being implemented in a personal robot called Maggie, developed at RoboticsLab of the University Carlos III of Madrid for social interaction... more
    • by 
    •   6  
      Social InteractionControl systemHuman Robot InteractionPeer to Peer
The paper describes a novel social network-based open educational resource for learning foreign languages in real time from native speakers, based on the predefined teaching materials. This virtual learning platform, named i2istudy,... more
    • by 
    •   6  
      Educational TechnologyComputer Supported Collaborative Learning CSCLCollaborative LearningPeer to Peer
    • by 
    •   18  
      PsychologyCognitive SciencePeer Support (Learning and Teaching)Child Development
The interrelatedness between computer systems, networks, code, and traditional law and legal frameworks continues to pose a number of important and vexed questions. This report will consider one area of the relationship: legal recognition... more
    • by 
    •   19  
      Computer ScienceDistributed ComputingQuantum ComputingArtificial Intelligence
    • by 
    •   12  
      Management Information SystemsSystems ThinkingLaw and EconomicsSystem Dynamics Modeling
Already a popular application in the Internet, IPTV is becoming, among the service providers, a preferred alternative to conventional broadcasting technologies. Since many of the existing deployments have been done within the safe harbor... more
    • by 
    •   9  
      EngineeringTechnologyComputer NetworksVideo Quality
A lot of attention has recently been focused oti Peer-topeer file sharing systems. Cniitella is CI fully distribiited peer-to-peer protocol, without the need for N central entity. This increcises the reliability of the system by... more
    • by 
    •   3  
      File SharingPeer to PeerOverlay Network
    • by 
    •   9  
      Computer NetworksCommunication NetworksHardwareMobile Peer-to-Peer Network
... 5: Scalable Video Coding (in integrated form with ITU-T Rec. H.264 | ISO/IEC 14996-10). JointVideo Team (JVT), Doc. JVT-R201, Jan. 2006. 4. Luby, M., Stockhammer, T., Watson, M., Gasiba, T., and Xu, W. Raptor Codes for Reliable... more
    • by 
    •   16  
      Computer ScienceMobile Ad Hoc NetworksVideo CodingChannel Coding
People continuously try to improve their quality of life and technologies have an important role on it. Money transaction between mobile devices is bored and a difficult operation to perform since there is not a simple and safe way to do... more
    • by 
    •   16  
      Quality of lifeMobile CommerceMobile CommunicationMobile Computing
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides... more
    • by 
    •   8  
      Distributed ComputingComputer SoftwareMobile Peer-to-Peer NetworkTheoretical Analysis
The peer-to-peer (P2P) Internet online hybrid test system has been developed for the seismic simulation of a structure. In this study, the stability and accuracy of the system are investigated analytically by studying the spectral radius... more
    • by 
    •   11  
      Civil EngineeringEarthquake EngineeringFinite element methodStability
Expressing and recognizing emotional behavior of human play an important role in communication systems. Facial expression analysis is the most expressive way to display human emotion. Three types of facial emotion are recognized and... more
    • by 
    •   4  
      Face DetectionPeer to PeerFacial Expression RecognitionBezier Curves
The goal of this study was to examine sexual harassment in early adolescence. Available data indicate that peer to peer sexual harassment is prevalent in high school and is associated with psychosocial problems for both victims and... more
    • by  and +1
    •   16  
      Social ChangePsychologyCognitive ScienceAdolescent
    • by 
    •   16  
      Information SystemsInternet StudiesEthnographyDigital Media
This study deals with the problem of maintaining large hierarchy folder replicated in a distributed environment. It was found that this problem afflicted a number of important applications, such as synchronization of Hierarchy Folders... more
    • by  and +1
    •   10  
      Web searchOpen SourceAlgorithm DesignWeb Caching
Nowadays, real-time editing systems are catching on. Tools such as Etherpad or Google Docs enable multiple authors at dispersed locations to collaboratively write shared documents. In such systems, a replication mechanism is required to... more
    • by  and +1
    •   6  
      Collaborative WritingReal TimePeer to PeerBenchmark
Collaborative Filtering (CF) technique has been proved to be one of the most successful techniques in recommender systems in recent years. However, most existing CF based recommender systems worked in a centralized way and suffered from... more
    • by 
    •   9  
      Routing algorithmCollaborative FilteringMathematical SciencesDistributed Hash Table
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy