期刊文献+
共找到71篇文章
< 1 2 4 >
每页显示 20 50 100
Data Integration Strategy for Database Grids Based on P2P Framework 被引量:1
1
作者 WANG Guangqi SHEN Derong YU Ge ZHOU Wensheng LI Meifang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1182-1186,共5页
The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG... The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG based on Peer to Peer (P2P) framework, including the centralized data integration (CDI) strategy, the distributed data integration (DDI) strategy and the filter-based data integration (FDDI) strategy. CDI calls all the database grid services (DGSs) at a single node, DDI disperses the DGSs to multiple nodes, while FDDI schedules the data integration nodes based on filtering the keywords returned from DGSs. The performance of these three integration strategies are compared with and analyzed by simulation experiments. FDDI is more evident for filtering the keywords with data redundancy increasing. Through the reduction of large amount of data transportation, it effectively shortens the executing time for the task and improves its efficiency. 展开更多
关键词 database grid dada integration Peer to Peer p2p
下载PDF
Adaptive Trust Management Framework in P2P Grid Computing
2
作者 WANG Yinglong HU Jingzhu 《Wuhan University Journal of Natural Sciences》 CAS 2008年第1期33-36,共4页
In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties en... In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed. 展开更多
关键词 trust management POLICY REPUTATION proof of compliance p2p grid computing
下载PDF
Task scheduling scheme by checkpoint sharing and task duplication in P2P-based desktop grids
3
作者 Joon-Min Gil Young-Sik Jeong 《Journal of Central South University》 SCIE EI CAS 2014年第10期3864-3872,共9页
A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a res... A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a resource) is used as an intermediate result and executed in other peers via its duplication and transmission. As the checkpoint is close to a final result, the reduction of execution time for each task becomes higher, leading to reducing turnaround time. To evaluate the performance of our scheduling scheme in terms of transmission cost and execution time, an analytical model with an embedded Markov chain is presented. We also conduct simulations with a failure rate of tasks and compare the performance of our scheduling scheme with that of the existing scheme based on client-server architecture. Performance results show that our scheduling scheme is superior to the existing scheme with respect to the reduction of execution time and turnaround time. 展开更多
关键词 p2p-based desktop grids checkpoint sharing task duplication embedded Markov chain
下载PDF
How signaling and search costs affect information asymmetry in P2P lending:the economics of big data 被引量:6
4
作者 Jiaqi Yan Wayne Yu JLeon Zhao 《Financial Innovation》 2015年第1期279-289,共11页
In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based ... In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based financial technologies(Fintech)have been identified as important disruptive driving forces for this paradigm shift.In this paper,we take an information economics perspective to investigate how big data affects the transformation of the lending industry.By identifying how signaling and search costs are reduced by big data analytics for credit risk management of P2P lending,we discuss how information asymmetry is reduced in the big data era.Rooted in the lending business,we propose a theory on the economics of big data and outline a number of research opportunities and challenging issues. 展开更多
关键词 Lending industry p2p lending Big data Economics of big data Fintech information economics
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
5
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 information privacy propagation model EMAIL peer-to-peer p2p
下载PDF
PeerMD:A P2P Molecular Dynamics Simulation Framework Based on Web Services
6
作者 HUANG Baohua HE Lin +2 位作者 BAO Yang LI Zhuoya LI Ruixuan 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期471-474,共4页
PeerMD, a P2P molecular dynamics simulation frame-work based on Web services is proposed. It utilizes rich free CPU time and network bandwidth of P2P networks to provide enough resources for dynamics simulation of bio... PeerMD, a P2P molecular dynamics simulation frame-work based on Web services is proposed. It utilizes rich free CPU time and network bandwidth of P2P networks to provide enough resources for dynamics simulation of bio-macromolecule, and has resolved the problem that it is difficult to interoperate between heterogeneous peers in P2P environment through Web services. Structure of PeerMD is given. Function, input and output of molecular dynamics simulation Web service are defined. Processes of publishing, discovering and invoking of molecular dynamics simulation Web service based on multi-level SuperPeer are given. A protocol system of PeerMD is implemented on a basic P2P platform JXTA, and experimental simulations of tumor necrosis fact alpha (TNF-α) and two mutations of it are executed on the protocol system. Simulation results show that PeerMD can speed up molecular dynamics simulation perfectly. 展开更多
关键词 p2p Web services molecular dynamics
下载PDF
Greedysearch based service location in P2P networks
7
作者 Zhu Cheng Liu Zhong Zhang Weiming Yang Dongsheng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第4期886-893,共8页
A model is built to analyze the performance of service location based on greedy search in P2P networks. Hops and relative QoS index of the node found in a service location process are used to evaluate the performance ... A model is built to analyze the performance of service location based on greedy search in P2P networks. Hops and relative QoS index of the node found in a service location process are used to evaluate the performance as well as the probability of locating the top 5% nodes with highest QoS level. Both model and simulation results show that, the performance of greedy search based service location improves significantly with the increase of the average degree of the network. It is found that, if changes of both overlay topology and QoS level of nodes can be ignored during a location process, greedy-search based service location has high probability of finding the nodes with relatively high QoS in small number of hops in a big overlay network. Model extension under arbitrary network degree distribution is also studied. 展开更多
关键词 greedy-search service location p2p network.
下载PDF
An ALM Model for Streaming Media Service in P2P-SIP Network
8
作者 廖小飞 李德敏 +2 位作者 白恩健 蒋学芹 宋转 《Journal of Donghua University(English Edition)》 EI CAS 2012年第4期316-320,共5页
Application layer multicast (ALM) has been widely applied in Internet, as a substitute for IP multicast. However, it causes network load to increase because it adopts unlcast in data transmission, which limits the a... Application layer multicast (ALM) has been widely applied in Internet, as a substitute for IP multicast. However, it causes network load to increase because it adopts unlcast in data transmission, which limits the application. In this article, in order to improve the ALM performance in P2P-SIP network, an ALM model was proposed which reduced network load via merging messages in concast mode. Finally network simulations prove that this model has better benefit on single node load and average network load. Therefore, it is suitable for streaming media service in P2P-SIP Network. 展开更多
关键词 application layer multicast ALM peer-to-peer P2 P session initiation protocol (SIP) streamine media service
下载PDF
AR Display Method of a Person's Identifier near the Head on a Camera Screen Based on the GPS Information and Face Detection Using Ad hoc and P2P Networking
9
作者 Masahiro Gotou Kazumasa Takami 《Computer Technology and Application》 2016年第4期196-208,共13页
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ... The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments. 展开更多
关键词 Ad hoc networking AR (augmented reality) face detection GPS information person's identifier p2p communication smartphone.
下载PDF
Detecting P2P Botnet by Analyzing Macroscopic Characteristics with Fractal and Information Fusion
10
作者 SONG Yuanzhang 《China Communications》 SCIE CSCD 2015年第2期107-117,共11页
Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which... Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision. 展开更多
关键词 p2p botnet fractal information fusion CUSUM algorithm
下载PDF
Cluster based hierarchical resource searching model in P2P network 被引量:1
11
作者 Yang Ruijuan Liu Jian Tian Jingwen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期188-194,共7页
For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P... For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model. 展开更多
关键词 Communication and information system Resource-searching model in p2p network GNUTELLA CLUSTER Hierarchical network
下载PDF
A Model of Mobile P2P Network Architecture based on Agent 被引量:4
12
作者 Fan Chunxiao Liu Jie +1 位作者 Zhang Xiaoying Gong Changlu 《China Communications》 SCIE CSCD 2010年第1期50-56,共7页
A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then t... A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then they can access and transmit information peer to peer. An ontologybased semantic information description method is also proposed for the mobile wireless devices. The merit of this method is to enhance search efficiency. Moreover, a small system, called CellChat, has been implemented based on this model in the lab environment. Experimental results are provided to show that the benefi ts of the proposed method. This method will become an effective solution for mobile value-added services in 3G network. 展开更多
关键词 MOBILE p2p MOBILE VALUE-ADDED service AGENT ONTOLOGY
下载PDF
Improving Resilience against DDoS Attack in Unstructured P2P Networks 被引量:6
13
作者 马新新 赵洋 秦志光 《Journal of Electronic Science and Technology of China》 2007年第1期18-22,28,共6页
In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use ... In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of malicious nodes using the flooding search mechanism, the paper proposes a Markov-based evaluation model which exerts the trust and reputation mechanism to computing the level of trustworthy of nodes having the information requested by evaluation of the nodes' history behavior. Moreover, it can differentiate malicious nodes as early as possible for isolating and controlling the ones' message transmitted. The simulation results of the algorithm proposed show that it could effectively isolate malicious nodes, and hold back the transmission of vicious messages so that it could enhance tolerance of DDoS based on flooding in Guutella-like P2P network. 展开更多
关键词 TRUST REPUTATION distributed denial of service (DDoS) peer-to-peer p2p
下载PDF
A Chord-based resource scheduling approach in drug discovery grid
14
作者 陈曙东 Zhang Wenju  +2 位作者 Zhang Jun   Ma Fanyuan Shen Jianhua 《High Technology Letters》 EI CAS 2007年第1期36-41,共6页
This paper presents a resource scheduling approach in grid computing environment. Using P2P technology, this novel approach can schedule dynamic grid computing resources efficiently. Grid computing resources in differ... This paper presents a resource scheduling approach in grid computing environment. Using P2P technology, this novel approach can schedule dynamic grid computing resources efficiently. Grid computing resources in different domains are organized into a structured P2P overlay network. Available resource information is published in type of grid services. Task requests for computational resources are also presented as grid services. Problem of resources scheduling is translated into services discovery. Different from central scheduling approaches that collect available resources information, this Chord-based approach forwards task requests in the overlay network and discovers satisfied resources for these tasks. Using this approach, the computational resources of a grid system can be scheduled dynamically according to the real- time workload on each peer. Furthermore, the application of this approach is introduced into DDG, a grid system for drug discovery and design, to evaluate the performance. Experimental results show that computational resources of a grid system can be managed efficiently, and the system can hold a perfect load balance state and robustness. 展开更多
关键词 grid computing p2p CHORD resource scheduling
下载PDF
A Review of P2P Financial Research
15
作者 Shen Hongmei 《Journal of Contemporary Educational Research》 2018年第1期40-44,共5页
Since 2007,people's spending habits began to change:from cash to the bank card,from mobile phone to non-cash transactions,from traditional finance to network finance.And the rapid rise of emerging industries resul... Since 2007,people's spending habits began to change:from cash to the bank card,from mobile phone to non-cash transactions,from traditional finance to network finance.And the rapid rise of emerging industries results in many of the P2P Financial Corporation established,it makes the P2P platform trading volume continue to rise at an alarming rate.In this context,the industry self-discipline environment is like the mining of good and evil.The atmosphere was foul,bad phenomenon,investors difficult activist phenomenon,the phenomenon of credit default as one falls,another rises to a series of problems,such as serious absence of P2P financial supervision to promote the healthy and sustainable development,is a major problem for all participants,which must to be solved.Firstly,P2P development of management mode in the current situation in our country is discussed,and then it analyzes the P2P network of financial management platform,finally it proposes the existing problems in the relative countermeasures and suggestions of effective P2P financing mode,hoping to promote its advantages,overcoming the disadvantages of P2P. 展开更多
关键词 p2p NETWORK ECONOMY model information mechanism TRADITIONAL FINANCE
下载PDF
基于P-Grid的P2P信息共享系统的设计和实现 被引量:5
16
作者 夏素贞 杨德仁 曹静霞 《计算机应用》 CSCD 北大核心 2004年第B12期75-77,共3页
文中分析了现有P2P系统存在问题,深入研究了P Grid系统构建和信息搜索两方面技 术,设计实现了基于P Grid技术的完全对等的信息共享系统SharePeer。系统通过局域网运行测试, 分析表明SharePeer能在比较不稳定的环境中运行,并且具有... 文中分析了现有P2P系统存在问题,深入研究了P Grid系统构建和信息搜索两方面技 术,设计实现了基于P Grid技术的完全对等的信息共享系统SharePeer。系统通过局域网运行测试, 分析表明SharePeer能在比较不稳定的环境中运行,并且具有较高的搜索效率。 展开更多
关键词 SharePeer 节点 P—grid p2p 路径
下载PDF
Grid和P2P混合环境中一种基于信任的资源搜索机制 被引量:2
17
作者 周金洋 杨寿保 +1 位作者 郭磊涛 王莉苹 《计算机科学》 CSCD 北大核心 2005年第11期27-30,共4页
Grid和P2P两种分布式计算模式中的资源搜索算法均假设节点提供可靠的资源,但Grid和P2P混合计算环境的动态、异构、自组织等特点使得一些节点存在冒名和提供虚假服务等行为。本文对基于经验和最好邻居搜索机制进行改进,引入信任因子,提... Grid和P2P两种分布式计算模式中的资源搜索算法均假设节点提供可靠的资源,但Grid和P2P混合计算环境的动态、异构、自组织等特点使得一些节点存在冒名和提供虚假服务等行为。本文对基于经验和最好邻居搜索机制进行改进,引入信任因子,提出了基于信任的资源搜索机制。该机制有效抑制了欺骗行为,提高了资源搜索的可靠性和安全性。 展开更多
关键词 资源搜索 网格 对等网络 信任 信任值 搜索机制 grid 计算环境 p2p 混合
下载PDF
基于P2P和Web Service的数字图书馆资源共享框架研究 被引量:4
18
作者 赵捧未 马亭 窦永香 《信息资源管理学报》 2011年第2期55-58,共4页
针对现有数字图书馆框架体系存在的服务器易单点失效、负载不均衡、资源共享困难、异构信息仓储的互操作等问题,本文在较系统地分析P2P技术和Web Service技术的基础上,设计出一个基于P2P和Web Service技术的数字图书馆资源共享框架,并... 针对现有数字图书馆框架体系存在的服务器易单点失效、负载不均衡、资源共享困难、异构信息仓储的互操作等问题,本文在较系统地分析P2P技术和Web Service技术的基础上,设计出一个基于P2P和Web Service技术的数字图书馆资源共享框架,并对组成该框架的三层结构——P2P层、资源节点层、应用服务层予以详尽的阐述。 展开更多
关键词 p2p WEB service 数字图书馆 资源共享
下载PDF
P2P/Web Service与网格资源发现服务研究 被引量:1
19
作者 陈福 杨家海 +1 位作者 杨扬 熊曾刚 《计算机科学》 CSCD 北大核心 2008年第4期16-19,共4页
资源发现是网格计算技术一个重要的研究领域。本文根据经典的五层沙漏网格架构模型,结合P2P、Web Service技术,提出了一个网格资源发现模型。使用P2P网络计算模式,充分利用网络边缘的终端设备发现共享资源,可以大大提高发现速度,降低服... 资源发现是网格计算技术一个重要的研究领域。本文根据经典的五层沙漏网格架构模型,结合P2P、Web Service技术,提出了一个网格资源发现模型。使用P2P网络计算模式,充分利用网络边缘的终端设备发现共享资源,可以大大提高发现速度,降低服务器的负载。同时,使用了Web Service来发布网格结点提供的服务。本文中提出了该模型使用的通讯协议簇、模型的实现方法。本文具体的底层发现服务使用perl实现;使用Frontier-RPC发布服务和访问均已经实现。 展开更多
关键词 资源发现 网格 p2p WEB service
下载PDF
基于P2P网络的Web Services发现机制 被引量:1
20
作者 李娟 明德廷 邱晓红 《微电子学与计算机》 CSCD 北大核心 2010年第2期152-155,共4页
提出一种改进的两层混合式P2P网络模型,用该模型作为Web Services发现技术的底层网络.该网络模型主要在两方面进行改进:在网络结构方面提出CP节点分类策略和SP节点分组策略;在网络组织方面提出一种基于Web Services兴趣因子空间的节点... 提出一种改进的两层混合式P2P网络模型,用该模型作为Web Services发现技术的底层网络.该网络模型主要在两方面进行改进:在网络结构方面提出CP节点分类策略和SP节点分组策略;在网络组织方面提出一种基于Web Services兴趣因子空间的节点分布自调整策略. 展开更多
关键词 p2p WEB serviceS 聚类 兴趣因子空间
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部