• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 460
  • 91
  • 43
  • 34
  • 29
  • 28
  • 27
  • 24
  • 16
  • 13
  • 10
  • 9
  • 9
  • 8
  • 2
  • Tagged with
  • 857
  • 857
  • 317
  • 309
  • 197
  • 142
  • 142
  • 137
  • 137
  • 102
  • 87
  • 81
  • 80
  • 78
  • 72
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
361

A Service Oriented Peer To Peer Web Service Discovery Mechanism With Categorization

Ozorhan, Mustafa Onur 01 March 2010 (has links) (PDF)
This thesis, studies automated methods to achieve web service advertisement and discovery, and presents efficient search and matching techniques based on OWL-S. In the proposed system, the service discovery and matchmaking is performed via a centralized peer-to-peer web service repository. The repository has the ability to run on a software cloud, which improves the availability and scalability of the service discovery. The service advertisement is done semi-automatically on the client side, with an automatic WSDL to OWL-S conversion, and manual service description annotation. An OWL-S based unified ontology -Suggested Upper Merged Ontology- is used during annotation, to enhance semantic matching abilities of the system. The service advertisement and availability are continuously monitored on the client side to improve the accuracy of the query results. User-agents generate query specification using the system ontology, to provide semantic unification between the client and the system during service discovery. Query matching is performed via complex Hilbert Spaces composed of conceptual planes and categorical similarities for each web service. User preferences following the service queries are monitored and used to improve the service match scores in the long run.
362

Credit-Based Incentive Mechanism for Reducing Free-Riding Problem

Chen, Li-chun 26 July 2008 (has links)
Peer-to-Peer (P2P) technology is a kind of decentralized framework which is applied to file sharing and video streaming in Internet predominantly. However, there are some problems, like free-riding, fairness, unexpected fluctuation, in P2P systems. Especially, without free riding controlling, many users stop contributing data and only want to receive data. To avoid these problems, a credit-based incentive mechanism using sneak, public-key cryptography and multi-source technique is proposed to make peers in system have no choice but to share data. In the proposed incentive mechanism, the concept of credit is employed. If a peer can contribute more bandwidth for sharing stream, it is arranged closer to video server, to get more credit in return, have less packet loss risk and receive better stream quality. Free-rider is a peer who denies contributing or contributes less resource than it registers to the system. In the proposed mechanism, free-riders are judged by the credits of each peer. In order to prevent illegal behaviors, the public-key cryptography is used for differentiating real and fake credit, also used for tracing credits. Experimental results show that when 90% peers are zero uploading peers, using the proposed mechanism can reduce 85% of zero uploading peers. When 90% peers are cheating peers, adopting the proposed mechanism can reduce 94% of cheating peers. System utility is usually about 100%. Maximum number of hops to video server is about five to six which is much smaller than without using the proposed mechanism, about 40 hops. The loads in managing system topology and delivering sub-streams are reduced. Besides, the resource of the system is used effectively.
363

Lifetime-Based Scheduling Algorithms for P2P Collaborative File Distribution

Liu, Yun-Chi 06 August 2008 (has links)
Prior researches in P2P file sharing mostly focus on several topics such as the overlay topology, the content searching, the peer discovery, the sharing fairness, incentive mechanisms, except scheduling algorithms for peer-to-peer collaborative file distribution. The scheduling algorithm specifies how file pieces are distributed among peers. When a peer that has the rarest piece leaves, the other peers probably download the incomplete file in the network. Our algorithm is involved in the lifetime of peers in the P2P networks. We first use the distribution of peer¡¦s lifetime and the demand of each peer to decide which peers send which pieces that are rarities, and then also consider the distribution of peer¡¦s lifetime and the demand of each peer to decide which peers receive these pieces. Our goals are to maximize number of peers which have downloaded an entire file before it leaves, to increase the availability of different file pieces, and to minimize the transmission time of the latest completion. Lastly, we show the comparison of the performances of RPF, MDNF, Lifetime-based RPF, and Lifetime-based MDNF algorithms.
364

Application acceleration for wireless and mobile data networks

Zhuang, Zhenyun 27 August 2010 (has links)
This work studies application acceleration for wireless and mobile data networks. The problem of accelerating application can be addressed along multiple dimensions. The first dimension is advanced network protocol design, i.e., optimizing underlying network protocols, particulary transport layer protocol and link layer protocol. Despite advanced network protocol design, in this work we observe that certain application behaviors can fundamentally limit the performance achievable when operating over wireless and mobile data networks. The performance difference is caused by the complex application behaviors of these non-FTP applications. Explicitly dealing with application behaviors can improve application performance for new environments. Along this overcoming application behavior dimension, we accelerate applications by studying specific types of applications including Client-server, Peer-to-peer and Location-based applications. In exploring along this dimension, we identify a set of application behaviors that significantly affect application performance. To accommodate these application behaviors, we firstly extract general design principles that can apply to any applications whenever possible. These design principles can also be integrated into new application designs. We also consider specific applications by applying these design principles and build prototypes to demonstrate the effectiveness of the solutions. In the context of application acceleration, even though all the challenges belong to the two aforementioned dimensions of advanced network protocol design and overcoming application behavior are addressed, application performance can still be limited by the underlying network capability, particularly physical bandwidth. In this work, we study the possibility of speeding up data delivery by eliminating traffic redundancy present in application traffics. Specifically, we first study the traffic redundancy along multiple dimensions using traces obtained from multiple real wireless network deployments. Based on the insights obtained from the analysis, we propose Wireless Memory (WM), a two-ended AP-client solution to effectively exploit traffic redundancy in wireless and mobile environments. Application acceleration can be achieved along two other dimensions: network provision ing and quality of service (QoS). Network provisioning allocates network resources such as physical bandwidth or wireless spectrum, while QoS provides different priority to different applications, users, or data flows. These two dimensions have their respective limitations in the context of application acceleration. In this work, we focus on the two dimensions of overcoming application behavior and Eliminating traffic redundancy to improve application performance. The contribution of this work is as follows. First, we study the problem of application acceleration for wireless and mobile data networks, and we characterize the dimensions along which to address the problem. Second, we identify that application behaviors can significantly affect application performance, and we propose a set of design principles to deal with the behaviors. We also build prototypes to conduct system research. Third, we consider traffic redundancy elimination and propose a wireless memory approach.
365

A Simulation Framework for Efficient Search in P2P Networks with 8-Point HyperCircles

Abbas, Syed Muhammad, Henricsson, Christopher January 2008 (has links)
<p>This report concerns the implementation of a simulation framework to evaluate an emerging peer-to-peer network topology scheme using 8-point hypercircles, entitled HyperCircle. This topology was proposed in order to alleviate some of the drawbacks of current P2P systems evolving in an uncontrolled manner, such as scalability issues, network overload and long search times. The framework is supposed to be used to evaluate the advantages of this new topology. The framework has been built on top of an existing simulator software solution, the selection of which was an important part of the development. Weighing different variables such as scalability and API usability, the selection fell on OverSim, an open-source discreet-event simulator based on OMNET++.</p><p>After formalizing the protocol for easier implementation, as well as extending it for better performance, implementation followed using C++ with OverSim’s API and simulation library. Implemented as a module (alongside other stock modules providing their own protocols such as Chord and Kademlia), it can be used in OverSim to simulate a user-defined network using one of the simulation routine applications provided (or using a custom application written by the user). For the purposes of this thesis, the standard application KBRTestApp was used; an application sending test messages between randomly selected nodes, while adding and removing nodes at specific time intervals. The adding and removing of nodes can be configured with probability parameters.</p><p>Tentative testing shows that this implementation of the HyperCircle protocol has a certain performance gain over the OverSim implementations of the Chord and Kademlia protocols, measurable in the time it takes a message to get from sender to recipient. Further testing is outside the scope of this thesis.</p>
366

Authentication in peer-to-peer systems / Autenticering i peer-to-peer system

Åslund, Jonas January 2002 (has links)
<p>In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between nodes in a peer-to-peer environment where nodes are exchanging information directly with each other requires more planning than in a typical client-server environment where the authentication methods are server-based. The peer-to-peer applications described in this report use authentication methods based on central authorities as well as solutions without central authorities. </p><p>Lack of standards in the way peer-to-peer systems should communicate and apply security lead to a variety of “local” communication and security solutions. These local solutions make different applications incompatible with each other, meaning that a peer using one application will not be able to communicate and exchange information with other peers using some other application.</p>
367

Einführung in P2P-Netzwerke / introduction into peer-to-peer-networks

Merzky, Alexander 13 May 2002 (has links)
The types of communication (central, semi-central, peripheral) Specification of the gnutella-protocol (PING, PONG, QUERY, QUERY-HIT, PUSH - packets) The graphical user interface Limewire and its class structure / Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze und verteilte Systeme der Fakultaet fuer Informatik der TU Chemnitz. Vergleich zentrale, semizentrale und dezentrale Kommunikation, Spezifikation eines P2P-Protokolls des Gnutella-Netzes (PING, PONG, QUERY, QUERY-HIT, PUSH - Pakete) Die graphische Oberflaeche Limewire und deren Struktur
368

Workshop Peer-to-Peer-Computing

Ehrig, Matthias 21 October 2002 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze und verteilte Systeme der Fakultaet fuer Informatik der TU Chemnitz. Vortraege zu verschiedenen Themen der Entwicklung der Informatik und zu Technologien im Rechenzentrum einer Universitaet
369

Peer-To-Peer-Videostreaming

Schreiber, Daniel 14 October 2005 (has links) (PDF)
Für Übertragung von Live-Videodaten an mehrere Empfänger gibt es als etablierte Technologien die Übertragung per Multicast an mehrere Empfänger sowie die Unicast-Übertragung an jeden Empfänger von einem Verteilpunkt aus. Nachteilig ist im ersten Fall, dass viele ISPs kein Multicast unterstützen, im zweiten Fall der hohe Bandbreitenbedarf am Verteilpunkt. Die Unterschiede in der verfügbaren Bandbreite von ISP-Zugängen (DSL, ISDN) und Campusnetzwerken (z.B. Studentennetzen) erfordern es, das Videomaterial in mehreren Qualitätsstufen anzubieten. Im Team wurde ein System entworfen und realisiert, das aus einer Quelle effizient verschiedene Qualitätsstufen des Videomaterials erzeugt ("Videoteil") und dieses mittels Peer-To-Peer-Technologie verteilt ("Netzwerkteil"). Diese Arbeit enthält den den Netzwerkteil.
370

Chord - A Distributed Hash Table

Liao, Yimei 24 July 2006 (has links) (PDF)
An introduction to Chord Algorithm.

Page generated in 0.0711 seconds