期刊文献+
共找到612篇文章
< 1 2 31 >
每页显示 20 50 100
Topology-aware peer-to-peer overlay network for Ad-hoc 被引量:1
1
作者 WANG Shi-guo JI Hong +1 位作者 LI Ting MEI Jing-qing 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第1期111-115,共5页
The mismatch between the structured peer-to-peer (P2P) overlay network, which is based on Hashing, and the actual physical network, leads to query repeatedly passing through some nodes in the actual route when it is... The mismatch between the structured peer-to-peer (P2P) overlay network, which is based on Hashing, and the actual physical network, leads to query repeatedly passing through some nodes in the actual route when it is applied in Ad-hoc networks. An approach of getting an appropriate node identifier (ID) bearing its local physical information is proposed, in which the traditional theory of getting node ID through Hashing the node's Internet protocol (IP) address is abandoned, and a topology-aware overlay network suiting Ad-hoc networks is constructed. The simulation results show that the overlay network constructed in the proposed method can avoid the route being iteratively accessed. Meanwhile, it can effectively minimize the latency and improve the load balance. 展开更多
关键词 P2P CHORD TOPOLOGY-AWARE overlay network
原文传递
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
2
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
Radial basis function neural network and overlay sampling uniform design toward polylactic acid molecular weight prediction
3
作者 Jiawei Wu Zhihong Chen +2 位作者 Zhongwen Si Xiaoling Lou Junxian Yun 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第11期214-221,共8页
Polylactic acid(PLA)is a potential polymer material used as a substitute for traditional plastics,and the accurate molecular weight distribution range of PLA is strictly required in practical applications.Therefore,ex... Polylactic acid(PLA)is a potential polymer material used as a substitute for traditional plastics,and the accurate molecular weight distribution range of PLA is strictly required in practical applications.Therefore,exploring the relationship between synthetic conditions and PLA molecular weight is crucially important.In this work,direct polycondensation combined with overlay sampling uniform design(OSUD)was applied to synthesize the low molecular weight PLA.Then a multiple regression model and two artificial neural network models on PLA molecular weight versus reaction temperature,reaction time,and catalyst dosage were developed for PLA molecular weight prediction.The characterization results indicated that the low molecular weight PLA was efficiently synthesized under this method.Meanwhile,the experimental dataset acquired from OSUD successfully established three predictive models for PLA molecular weight.Among them,both artificial neural network models had significantly better predictive performance than the regression model.Notably,the radial basis function neural network model had the best predictive accuracy with only 11.9%of mean relative error on the validation dataset,which improved by 67.7%compared with the traditional multiple regression model.This work successfully predicted PLA molecular weight in a direct polycondensation process using artificial neural network models combined with OSUD,which provided guidance for the future implementation of molecular weight-controlled polymer's synthesis. 展开更多
关键词 Polylactic acid Molecular weight prediction overlay sampling uniform design Neural network model
下载PDF
Offloading Mobile Data from Cellular Networks Through Peer-to-Peer WiFi Communication:A Subscribe-and-Send Architecture 被引量:1
4
作者 芦效峰 HUI Pan Pietro Lio 《China Communications》 SCIE CSCD 2013年第6期35-46,共12页
Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g... Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO. 展开更多
关键词 mobile Internet cellular networks offioad opportunistic routing delay tolerant networks peer-to-peer WiFi
下载PDF
A Hierarchical Trust Model for Peer-to-Peer Networks 被引量:1
5
作者 Nehal Al-Otaiby Heba Kurdi Shiroq Al-Megren 《Computers, Materials & Continua》 SCIE EI 2019年第5期397-404,共8页
Trust has become an increasingly important issue given society’s growing reliance on electronic transactions.Peer-to-peer(P2P)networks are among the main electronic transaction environments affected by trust issues d... Trust has become an increasingly important issue given society’s growing reliance on electronic transactions.Peer-to-peer(P2P)networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers(users)and the inherent openness of these networks.A malicious peer can easily join a P2P network and abuse its peers and resources,resulting in a large-scale failure that might shut down the entire network.Therefore,a plethora of researchers have proposed trust management systems to mitigate the impact of the problem.However,due to the problem’s scale and complexity,more research is necessary.The algorithm proposed here,HierarchTrust,attempts to create a more reliable environment in which the selection of a peer provider of a file or other resource is based on several trust values represented in hierarchical form.The values at the top of the hierarchical form are more trusted than those at the lower end of the hierarchy.Trust,in HierarchTrust,is generally calculated based on the standard deviation.Evaluation via simulation showed that HierarchTrust produced a better success rate than the well-established EigenTrust algorithm. 展开更多
关键词 peer-to-peer network trust management REPUTATION malicious peers
下载PDF
Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks 被引量:1
6
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2021年第7期983-1001,共19页
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que... One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process. 展开更多
关键词 Mathematical model MANET P2P networks P2P MANET UNSTRUCTURED search algorithms peer-to-peer AD-HOC ooding random walk resource discovery content discovery mobile peer-to-peer broadcast PEER
下载PDF
Peer-to-Peer Networks 2 被引量:1
7
作者 Lin Yu 1,Cheng Shiduan 1,Li Qi 2 (1. Beijing University of Posts and Telecommunications,Beijing 100876, China 2. Peking University,Beijing 100088, China) 《ZTE Communications》 2006年第2期61-64,共4页
The development of network resources changes the network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted worldwide attention. The P2P architecture is ... The development of network resources changes the network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted worldwide attention. The P2P architecture is a type of distributed network in which all participants share their hardware resources and the shared resources can be directly accessed by peer nodes without going through any dedicated servers. The participants in a P2P network are both resource providers and resource consumers. This article on P2P networks is divided into two issues. In the previous issue, P2P architecture, network models and core search algorithms were introduced. The second part in this issue is analyzing the current P2P research and application situations, as well as the impacts of P2P on telecom operators and equipment vendors. 展开更多
关键词 peer-to-peer networks 2 WIDE IEEE NAPSTER SETI
下载PDF
Always-optimally-coordinated candidate selection algorithm for peer-to-peer files sharing system in mobile self-organized networks 被引量:1
8
作者 李曦 Ji Hong +1 位作者 Zheng Ruiming Li Ting 《High Technology Letters》 EI CAS 2009年第3期281-287,共7页
In order to improve the performance of peer-to-peer files sharing system under mobile distributed en- vironments, a novel always-optimally-coordinated (AOC) criterion and corresponding candidate selection algorithm ... In order to improve the performance of peer-to-peer files sharing system under mobile distributed en- vironments, a novel always-optimally-coordinated (AOC) criterion and corresponding candidate selection algorithm are proposed in this paper. Compared with the traditional min-hops criterion, the new approach introduces a fuzzy knowledge combination theory to investigate several important factors that influence files transfer success rate and efficiency. Whereas the min-hops based protocols only ask the nearest candidate peer for desired files, the selection algorithm based on AOC comprehensively considers users' preferences and network requirements with flexible balancing rules. Furthermore, its advantage also expresses in the independence of specified resource discovering protocols, allowing for scalability. The simulation results show that when using the AOC based peer selection algorithm, system performance is much better than the rain-hops scheme, with files successful transfer rate improved more than 50% and transfer time re- duced at least 20%. 展开更多
关键词 peer-to-peer files sharing system mobile self-organized network candidate selection fuzzy knowledge combination always-optimally-coordinated (AOC)
下载PDF
A "cluster" based search scheme in peer-to-peer network
9
作者 李振武 杨舰 +1 位作者 史旭东 白英彩 《Journal of Zhejiang University Science》 CSCD 2003年第5期549-554,共6页
This paper presents a "cluster" based search scheme in peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured feature. We designed an algorithm to... This paper presents a "cluster" based search scheme in peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured feature. We designed an algorithm to cluster peers that have similar interests. When receiving a query request, a peer will preferentially forward it to another peer which belongs to the same cluster and shares more similar interests. By this way search efficiency will be remarkably improved and at the same time good resilience against peer failure (the ability to withstand peer failure) is reserved. 展开更多
关键词 peer-to-peer network CLUSTER overlay Structured feature Request pathlength
下载PDF
SFES: A scalable, fault-tolerant, efficient search scheme in a peer-to-peer network
10
作者 李振武 杨舰 +1 位作者 史旭东 白英彩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第4期452-460,共9页
This paper presents SFES: a scalable, fault-tolerant, efficient search scheme in a peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured features. We desig... This paper presents SFES: a scalable, fault-tolerant, efficient search scheme in a peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured features. We designed an algorithm to cluster peers that have similar interests. When receiving a query request, a peer will preferentially forward it to another peer which belongs to the same cluster and shares more similar interests. By this method, search efficiency will be remarkably improved and at the same time good resistance against peer failure (the ability to withstand peer failure) is reserved. Keyword partial-match is supported, too. 展开更多
关键词 peer-to-peer network CLUSTER overlay STRUCTURED request path length
下载PDF
Performance of Fixed Channel Assignment for Uplink Transmission and Direct Peer-to-Peer Communications in Multihop Cellular Networks 被引量:1
11
作者 Peter Han Joo Chong 《Journal of Electronic Science and Technology of China》 2008年第3期257-263,共7页
In this paper, we propose a clustered multihop cellular network (cMCN) architecture and study its performance using fixed channel assignment (FCA) scheme for uplink transmission. The proposed cMCN using FCA can be... In this paper, we propose a clustered multihop cellular network (cMCN) architecture and study its performance using fixed channel assignment (FCA) scheme for uplink transmission. The proposed cMCN using FCA can be applied with some reuse factors. An analytical model based on Markov chain is developed to analyze its performance and validated through computer simulation. And then, we implement direct peer-to-peer communication (DC) in cMCN by considering more reasonable conditions in practice. DC means that two calls communicate directly instead of going through base stations. The results show that cMCN with FCA can reduce the call blocking probability significantly as compared with the traditional single-hop cellular networks with FCA and can be further reduced by using DC. 展开更多
关键词 hannel assignment mobile ad hoc networks multihop cellular networks peer-to-peer communications
下载PDF
A Credit-Based Approach for Overcoming Free-Riding Behaviour in Peer-to-Peer Networks
12
作者 Manal Hazazi Afnan Almousa +2 位作者 Heba Kurdi Shiroq Al-Megren Shada Alsalamah 《Computers, Materials & Continua》 SCIE EI 2019年第4期15-29,共15页
The underlying premise of peer-to-peer(P2P)systems is the trading of digital resources among individual peers to facilitate file sharing,distributed computing,storage,collaborative applications and multimedia streamin... The underlying premise of peer-to-peer(P2P)systems is the trading of digital resources among individual peers to facilitate file sharing,distributed computing,storage,collaborative applications and multimedia streaming.So-called free-riders challenge the foundations of this system by consuming resources from other peers without offering any resources in return,hindering resource exchange among peers.Therefore,immense effort has been invested in discouraging free-riding and overcoming the ill effects of such unfair use of the system.However,previous efforts have all fallen short of effectively addressing free-riding behaviour in P2P networks.This paper proposes a novel approach based on utilising a credit incentive for P2P networks,wherein a grace period is introduced during which free-riders must reimburse resources.In contrast to previous approaches,the proposed system takes into consideration the upload rate of peers and a grace period.The system has been thoroughly tested in a simulated environment,and the results show that the proposed approach effectively mitigates free-riding behaviour.Compared to previous systems,the number of downloads from free-riders decreased while downloads by contributing peers increased.The results also show that under longer grace periods,the number of downloads by fast peers(those reimbursing the system within the grace period)was greater than the number of downloads by slow peers. 展开更多
关键词 peer-to-peer network FREE-RIDING file sharing CREDIT
下载PDF
Collaborative work model based on peer-to-peer network
13
作者 JIANG Jian-zhong FU Li ZHANG Xuan-peng XU Chuan-yun 《Journal of Chongqing University》 CAS 2007年第2期130-134,共5页
In this paper, we incorporated peer-to-peer (P2P) concept with agent technology and put forward a collaborative work model based on peer-to-peer network (P2PCWM) after investigating into business demands of modern ent... In this paper, we incorporated peer-to-peer (P2P) concept with agent technology and put forward a collaborative work model based on peer-to-peer network (P2PCWM) after investigating into business demands of modern enterprises and problems prevailing in mainstream collaborative work systems based on central server. Theoretically, the P2PCWM can effectively overcome the problems in a conventional system with a central server and meet the practical demands of modern businesses. It is distinguished from other systems by its features of equality, openness, promptness, fairness, expandability and convenience. 展开更多
关键词 modern team COLLABORATION AGENT peer-to-peer dynamic project network
下载PDF
Peer-to-Peer Networks
14
作者 Lin Yu1, Cheng Shiduan1, LiQi2 (1 .Beijing University of Posts and Telecommunications, Beijing 100876, China 2. Peking University, Beijing 100088,China) 《ZTE Communications》 2006年第1期53-57,共5页
The development of network resources changes network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted world-wide attention. P2P architecture is a type ... The development of network resources changes network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted world-wide attention. P2P architecture is a type of distributed network in which all participants share their hardware resources and the shared resources can be directly accessed by peer nodes without the necessity of going through any dedicated servers. The participants in a P2P network are both resource providers and resource consumers. This article on P2P networks will be divided into two issues. In this issue, P2P architecture, network models and core search algorithms are introduced. And the second part in the next issue will analyze the current P2P research and application situations, as well as the impact of P2P on telecom operators and equipment vendors. 展开更多
关键词 NAPSTER DHT peer-to-peer networks NODE
下载PDF
Research on Traffic Identification Technologies for Peer-to-Peer Networks
15
作者 Zhou Shijie Qin Zhiguang Wu Chunjiang(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu,Sichuan 610054,China) 《ZTE Communications》 2007年第4期14-18,共5页
The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris... The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed. 展开更多
关键词 PEER NODE Research on Traffic Identification Technologies for peer-to-peer networks UDP TLI PAIR TCP
下载PDF
Peer-to-Peer Networking来自Artisoft的四颗新星
16
作者 Steve Rigney 党瑞平 《个人电脑》 1995年第7期139-140,共2页
随着您的网络增长,您需要工具来提供远程访问、存储管理、调制解调器共享和网络总体管理。但是用一堆分离的软件工具来执行这些工作很可能超出$1000——相当高的价格,特别是对小的对等通信的LANs。 Artisoft LANtastic
关键词 peer-to-peer 新星 实用程序 network 调制解调器共享 网络 通信包 对等通信 LANS 远程控制软件
下载PDF
一种动态网格Overlay Network拓扑优化蚁群算法 被引量:1
17
作者 曹怀虎 余镇危 潘耘 《计算机工程》 CAS CSCD 北大核心 2006年第5期41-42,54,共3页
如何提供丰富的通信交互是高级网格应用的关键问题,但是目前的网格技术还不能满足这一需求,提出了一种基于Overlay Network的网格架构来弥补这一不足,如何优化Overlay Network拓扑结构是该架构必须首先解决的重要问题,给出了一种动态环... 如何提供丰富的通信交互是高级网格应用的关键问题,但是目前的网格技术还不能满足这一需求,提出了一种基于Overlay Network的网格架构来弥补这一不足,如何优化Overlay Network拓扑结构是该架构必须首先解决的重要问题,给出了一种动态环境中拉各朗日蚁群优化算法DLagrAnt,计算的结果显示该算法具有更快的适应性和更小的开销。 展开更多
关键词 网格架构 overlay network 拓扑优化 蚁群算法
下载PDF
Construction of overlay network based on P2P technology in Grid environment 被引量:2
18
作者 庄艳艳 刘业 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期57-62,共6页
Based on the advantages of both Grid and peer-to-peer (P2P) networks, an overlay network in the Grid environment is constructed by P2P technologies by a modified version of the Chord protocol. In this mechanism, dif... Based on the advantages of both Grid and peer-to-peer (P2P) networks, an overlay network in the Grid environment is constructed by P2P technologies by a modified version of the Chord protocol. In this mechanism, different nodes' accesses to different resources are determined by their contribution. Therefore, the heterogeneous resources of virtual organizations in large-scale Grid can be effectively integrated, and the key node failure as well as system bottleneck in the traditional Grid environment is eliminated. The experimental results indicate that this management mechanism can achieve better average performance in the Grid environment and maintain the P2P characteristics as well. 展开更多
关键词 resource management Grid computing peer-to-peer environments overlay network
下载PDF
一种基于Overlay Network的自优化网格架构
19
作者 曹怀虎 余镇危 +1 位作者 王银燕 潘耘 《计算机工程与应用》 CSCD 北大核心 2005年第23期129-131,152,共4页
网格和OverlayNetwork已经引起研究领域和工业界的广泛关注,然而,工业、学术以及商业界的研究主要围绕网格的应用、服务和中间件,很少研究基础网络。论文提出了一种基于OverlayNetwork的自优化网格架构,并且展示了这一架构在数据管理领... 网格和OverlayNetwork已经引起研究领域和工业界的广泛关注,然而,工业、学术以及商业界的研究主要围绕网格的应用、服务和中间件,很少研究基础网络。论文提出了一种基于OverlayNetwork的自优化网格架构,并且展示了这一架构在数据管理领域的应用,如副本的生成、放置、访问优化、同步等等,这些都是利用部署在OverlayNetwork上独立的P2P组件协作实现的,并且所有组件是并发执行的,每一个组件根据自己的目标优化系统,通过很少交互且易处理的组件来完成优化,这个独立优化的方案与整体优化相比较,得到的结果相近,甚至更好,而且其复杂性更小。 展开更多
关键词 网格架构 overlay network 自优化 P2P组件
下载PDF
基于Overlay Network的网格虚拟端到端带宽分配问题研究
20
作者 曹怀虎 余镇危 +1 位作者 沙嘉祥 王银燕 《计算机科学》 CSCD 北大核心 2006年第3期54-57,共4页
提出了基于 Overlay Network 的服务网格(SGON)的概念,以此来生成和部署网络增值服务。带宽分配问题是在 Overlay Grid 上部署和运行增值服务的关键问题,为了解决这个问题,Overlay Grid 在已存在的数据传输网络的上部建立了一个逻辑的... 提出了基于 Overlay Network 的服务网格(SGON)的概念,以此来生成和部署网络增值服务。带宽分配问题是在 Overlay Grid 上部署和运行增值服务的关键问题,为了解决这个问题,Overlay Grid 在已存在的数据传输网络的上部建立了一个逻辑的端到端的服务传输基础,通过双边的服务水平协议(SLA),提供 QoS 约束的带宽。给出了包含 SLA、服务 QoS、流量需求分布、开销等因素的带宽分配问题的模型,同时提供了静态和动态带宽分配问题的分析模型和近似解,最后设计了一种启发式自适应在线动态带宽分配算法。实验仿真结果袁明,该算法是可行的。 展开更多
关键词 服务网格 overlay network 端到端QOS 带宽分配算法
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部