Sciweavers

3083 search results - page 10 / 617
» Active Peer to Peer
Sort
View
ICPADS
2005
IEEE
14 years 1 months ago
On the Connectedness of Peer-to-Peer Overlay Networks
Peer-to-Peer (P2P) applications typically use overlay networks to forward the content queries. However, due to the distributed fashion of the overlay establishment, the overlay ne...
Weisheng Si, MingChu Li
CORR
2007
Springer
96views Education» more  CORR 2007»
13 years 7 months ago
Understanding the Properties of the BitTorrent Overlay
—In this paper, we conduct extensive simulations to understand the properties of the overlay generated by BitTorrent. We start by analyzing how the overlay properties impact the ...
Anwar Al Hamra, Arnaud Legout, Chadi Barakat
EDM
2010
152views Data Mining» more  EDM 2010»
13 years 9 months ago
Peer Production of Online Learning Resources: A Social Network Analysis
This paper describes methods for collecting user activity data in a peer production educational system, the Instructional Architect (IA), and then takes a social network perspectiv...
Beijie Xu, Mimi Recker
IJET
2010
72views more  IJET 2010»
13 years 6 months ago
Peer Assessment System for Modern Learning Settings: Towards a Flexible E-Assessment System
- According to the rapid changes in our life styles and in order to cope with the new requirements for modern learning settings and activities, several applications have been devel...
Mohammad Al-Smadi, Christian Guetl, Frank Kappe
PERCOM
2008
ACM
14 years 7 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar