A research on dynamic allocation of network resources based on P2P traffic planning (English)
- New search for: Ma, D.
- New search for: Ma, D.
In:
PEER TO PEER NETWORKING AND APPLICATIONS
;
7
, 4
;
511-524
;
2014
-
ISSN:
- Article (Journal) / Print
-
Title:A research on dynamic allocation of network resources based on P2P traffic planning
-
Contributors:Ma, D. ( author )
-
Published in:PEER TO PEER NETWORKING AND APPLICATIONS ; 7, 4 ; 511-524
-
Publisher:
- New search for: SPRINGER SCIENCE + BUSINESS MEDIA
-
Publication date:2014-01-01
-
Size:14 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 025.04
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 025.04 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 7, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 295
-
Group formation with neighbor similarity trust in P2P E-commerceMusau, Felix / Wang, Guojun / Abdullahi, Muhammad Bashir et al. | 2011
- 311
-
Modeling the initial stage of a file sharing process on a BitTorrent networkLai, Pierre K. Y. / Chow, K. P. / Hui, Lucas C. K. / Yiu, S. M. et al. | 2011
- 320
-
Detecting P2P botnets by discovering flow dependency in C&C trafficJiang, Hongling / Shao, Xiuli et al. | 2012
- 332
-
A D-S evidence theory based fuzzy trust model in file-sharing P2P networksTian, Chunqi / Yang, Baijian et al. | 2012
- 346
-
Distributed Denial of Service (DDoS) detection by traffic pattern analysisThapngam, Theerasak / Yu, Shui / Zhou, Wanlei / Makki, S. Kami et al. | 2012
- 359
-
Hierarchical architectures in structured peer-to-peer overlay networksKorzun, Dmitry / Gurtov, Andrei et al. | 2013
- 396
-
An ISP-friendly inter-overlay coordination framework for multiple coexisting P2P systemsYang, Peng / Xu, Lisong et al. | 2013
- 410
-
Hybrid fluid modeling approach for performance analysis of P2P live video streaming systemsKotevski, Zoran / Mitrevski, Pece et al. | 2013
- 427
-
P2P storage systems: Study of different placement policiesCaron, Stéphane / Giroire, Frédéric / Mazauric, Dorian / Monteiro, Julian / Pérennes, Stéphane et al. | 2013
- 444
-
Tsunami: A parasitic, indestructible botnet on KadMemon, Ghulam / Li, Jun / Rejaie, Reza et al. | 2013
- 456
-
Peer-to-peer as an infrastructure serviceLiu, Jiangchuan / Xu, Ke / Xiong, Yongqiang / Ma, Dongchao / Shuang, Kai et al. | 2014
- 459
-
On the collaboration of different peer-to-peer traffic management schemasLiu, Xin / Wang, Haiyang / Zhang, Lei et al. | 2012
- 469
-
The performance and locality tradeoff in bittorrent-like file sharing systemsHuang, Wei / Wu, Chuan / Li, Zongpeng / Lau, Francis C.M. et al. | 2013
- 485
-
BufferBank: A distributed cache infrastructure for peer-to-peer applicationHuang, Bin / Sun, Zhigang / Chen, Hongyi / Mao, Jianbiao / Zhang, Ziwen et al. | 2012
- 497
-
A scalable P2P overlay based on arrangement graph with minimized overheadLu, Ssu-Hsuan / Li, Kuan-Ching / Lai, Kuan-Chou / Chung, Yeh-Ching et al. | 2013
- 511
-
A research on dynamic allocation of network resources based on P2P traffic planningMa, Dongchao / Wang, Xiaoliang / Chen, Wenlong / Yang, Shen / Ma, Li et al. | 2012
- 525
-
SocialTrust: Enabling long-term social cooperation in peer-to-peer servicesHu, Yusuo / Wang, Danqi / Zhong, Hui / Wu, Feng et al. | 2013
- 539
-
Improving sustainability of BitTorrent darknetsChen, Xiaowei / Chu, Xiaowen / Li, Zongpeng et al. | 2012
- 555
-
A comprehensive study of the use of advertisements as incentives in P2P streaming systemsWang, Bo-Chun / Chow, Alix L. H. / Golubchik, Leana et al. | 2012
- 572
-
An efficient ECC-based mechanism for securing network coding-based P2P content distributionHe, Heng / Li, Ruixuan / Xu, Zhiyong / Xiao, Weijun et al. | 2013
- 590
-
Modelling and performance analysis of content sharing and distribution in community networks with infrastructure supportAlasaad, Amr / Gopalakrishnan, Sathish / Leung, Victor C. M. et al. | 2012
- 611
-
Editor’s Note: Special issue on Technologies and Theories in P2P Converged Ubiquitous Networks| 2014
- 612
-
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environmentShin, Soobok / Shon, Taeshik / Yeh, Hongjin / Kim, Kangseok et al. | 2013
- 620
-
Anonymous proximity mobile payment (APMP)Almuairfi, Sadiq / Veeraraghavan, Prakash / Chilamkurti, Naveen / Park, Doo-Soon et al. | 2012
- 628
-
Router architecture evaluation for security networkChoi, Yungho / Kim, Lark-Kyo / Ahn, Hyungkeun / Park, Neungsoo et al. | 2012
- 636
-
Security analysis of block cipher Piccolo suitable for wireless sensor networksJeong, Kitae et al. | 2013
- 645
-
A novel method of mining network flow to detect P2P botnetsLin, Shu-Chiung / Chen, Patrick S. / Chang, Chia-Ching et al. | 2012
- 655
-
The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networksHwang, Ren-Junn / Huang, Loang-Shing et al. | 2012
- 665
-
A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systemsJung, Yung-Joon / Lim, Donghyouk / Koo, Yong Bon / Lee, Eun-Ser / Choi, Hoon et al. | 2013
- 676
-
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systemsWang, Wei-Jen / Huang, Cheng-Ta / Yang, Cheng-Hsing / Wang, Shiuh-Jeng et al. | 2013
- 687
-
Exposing mobile malware from the inside (or what is your mobile app really doing?)Damopoulos, Dimitrios / Kambourakis, Georgios / Gritzalis, Stefanos / Park, Sang Oh et al. | 2012
- 698
-
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networksKalkan, Kubra / Levi, Albert et al. | 2012
- 710
-
Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSNChen, Joy Iong-Zong / Lin, Chu-Hsing et al. | 2013
- 723
-
Image reversibility in data embedding on the basis of blocking-predictionsHsu, Fu-Hau / Wu, Min-Hao / Yang, Cheng-Hsing / Wang, Shiuh-Jeng et al. | 2013
- 737
-
Securing one-way hash chain based incentive mechanism for vehicular ad hoc networksPark, Joon-Sang / Beak, Seung Jun et al. | 2012
- 743
-
Low-priced and efficient replica detection framework for wireless sensor networksCho, Kwantae / Lee, Dong Hoon et al. | 2012