Works matching Peer-to-peer architecture (Computer networks)
Results: 1537
Distributed Reasoning in a Peer-to-Peer Setting: Application to the Semantic Web.
- Published in:
- Journal of Artificial Intelligence Research, 2006, v. 25, p. 269, doi. 10.1613/jair.1785
- By:
- Publication type:
- Article
A License Management Model for Peer-to-Peer Music Sharing.
- Published in:
- International Journal of Information Technology & Decision Making, 2002, v. 1, n. 3, p. 541, doi. 10.1142/S0219622002000348
- By:
- Publication type:
- Article
A blockchain-based privacy-preserving and access-control framework for electronic health records management.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 36, p. 84195, doi. 10.1007/s11042-024-18827-3
- By:
- Publication type:
- Article
A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 6, p. 8507, doi. 10.1007/s11042-022-13556-x
- By:
- Publication type:
- Article
Location-proximity-based clustering method for peer-to-peer multimedia streaming services with multiple sources.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 23051, doi. 10.1007/s11042-021-10985-y
- By:
- Publication type:
- Article
Gossip-Based Self-Organising Agent Societies and the Impact of False Gossip.
- Published in:
- Minds & Machines, 2013, v. 23, n. 4, p. 419, doi. 10.1007/s11023-013-9304-8
- By:
- Publication type:
- Article
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange.
- Published in:
- Fluctuation & Noise Letters, 2016, v. 15, n. 1, p. -1, doi. 10.1142/S0219477516500085
- By:
- Publication type:
- Article
Drivers and barriers of peer-to-peer accommodation stay - an exploratory study with American and Finnish travellers.
- Published in:
- Current Issues in Tourism, 2018, v. 21, n. 6, p. 703, doi. 10.1080/13683500.2016.1141180
- By:
- Publication type:
- Article
Blockchain zakat in zakat management organizations, is it necessary?
- Published in:
- Journal of Enterprise & Development (JED), 2023, v. 5, n. 3, p. 317, doi. 10.20414/jed.v5i3.7043
- By:
- Publication type:
- Article
THE CASE AGAINST COMBATING BITTORRENT PIRACY THROUGH MASS JOHN DOE COPYRIGHT INFRINGEMENT LAWSUITS.
- Published in:
- Michigan Law Review, 2012, v. 111, n. 2, p. 283
- By:
- Publication type:
- Article
File sharing beyond grabbing and running.
- Published in:
- Convergence: The Journal of Research into New Media Technologies, 2015, v. 21, n. 4, p. 437, doi. 10.1177/1354856514526314
- By:
- Publication type:
- Article
Consistency-based trust management in P2P networks.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 2, p. 631, doi. 10.3906/elk-1702-77
- By:
- Publication type:
- Article
IEC 61850-based parallel bus transfer scheme for industrial substations.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 5, p. 4339, doi. 10.3906/elk-1411-97
- By:
- Publication type:
- Article
Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 4, p. 2255, doi. 10.3906/elk-1402-304
- By:
- Publication type:
- Article
Optimal backup parent pools for resilient multicast trees on peer-to-peer networks.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. 5, p. 1338, doi. 10.3906/elk-1211-146
- By:
- Publication type:
- Article
Four-dimensional model for describing the status of peers in peer-to-peer distributed systems.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 6, p. 1646, doi. 10.3906/elk-1108-27
- By:
- Publication type:
- Article
Lamred: Location-Aware and Privacy Preserving Multi-Layer Resource Discovery for IoT.
- Published in:
- Acta Cybernetica, 2021, v. 25, n. 2, p. 319, doi. 10.14232/actacyb.289938
- By:
- Publication type:
- Article
Social Capital Production in a Virtual P3 Community.
- Published in:
- Journal of Consumer Research, 2008, v. 34, n. 6, p. 832, doi. 10.1086/523291
- By:
- Publication type:
- Article
Efficient allocation of data mining tasks in mobile environments.
- Published in:
- Concurrent Engineering: Research & Applications, 2013, v. 21, n. 3, p. 197, doi. 10.1177/1063293X13493449
- By:
- Publication type:
- Article
A reputation-based peer-to-peer architecture for semantic service discovery in distributed manufacturing environments.
- Published in:
- Concurrent Engineering: Research & Applications, 2012, v. 20, n. 3, p. 237, doi. 10.1177/1063293X12457402
- By:
- Publication type:
- Article
A Study of Parallel Data Mining in a Peer-to-Peer Network.
- Published in:
- Concurrent Engineering: Research & Applications, 2007, v. 15, n. 3, p. 281, doi. 10.1177/1063293X07083088
- By:
- Publication type:
- Article
BNS: A Detection System to Find Nodes in the Bitcoin Network.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 24, p. 4885, doi. 10.3390/math11244885
- By:
- Publication type:
- Article
A Framework of Global Credit-Scoring Modeling Using Outlier Detection and Machine Learning in a P2P Lending Platform.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 13, p. 2282, doi. 10.3390/math10132282
- By:
- Publication type:
- Article
FinTechs in China - with a special focus on peer to peer lending.
- Published in:
- BOFIT Policy Brief, 2017, n. 8, p. 3
- By:
- Publication type:
- Article
Digital Business Models for Peer-to-Peer Networks: Analysis and Economic Issue.
- Published in:
- Review of Network Economics, 2007, v. 6, n. 2, p. 194, doi. 10.2202/1446-9022.1117
- By:
- Publication type:
- Article
Utility maximization for bandwidth allocation in peer-to-peer file-sharing networks.
- Published in:
- Journal of Industrial & Management Optimization, 2020, v. 16, n. 3, p. 1099, doi. 10.3934/jimo.2018194
- By:
- Publication type:
- Article
Who has mental health problems? Comparing individual, social and psychiatric constructions of mental health.
- Published in:
- Social Psychiatry & Psychiatric Epidemiology, 2024, v. 59, n. 3, p. 443, doi. 10.1007/s00127-023-02474-4
- By:
- Publication type:
- Article
block/supply/chain.
- Published in:
- Australian Humanities Review, 2020, n. 66, p. 181
- By:
- Publication type:
- Article
In the Name of the System.
- Published in:
- Australian Humanities Review, 2020, n. 66, p. 175
- By:
- Publication type:
- Article
COPIA PRIVATĂ, ÎNTRE INTERESELE UTILIZATORILOR ŞI CELE ALE TITULARILOR DE DREPTURI.
- Published in:
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2013, n. 3, p. 9
- By:
- Publication type:
- Article
A novel mathematical model on Peer-to-Peer botnet.
- Published in:
- Journal of Measurement Science & Instrumentation, 2014, v. 5, n. 4, p. 62, doi. 10.3969/j.issn.1674-8042.2014.04.012
- By:
- Publication type:
- Article
Analysis and design of peer-assisted video-on-demand services.
- Published in:
- International Transactions in Operational Research, 2014, v. 21, n. 4, p. 559, doi. 10.1111/itor.12086
- By:
- Publication type:
- Article
Young Children and YouTube: A global phenomenon.
- Published in:
- Childhood Education, 2020, v. 96, n. 4, p. 72, doi. 10.1080/00094056.2020.1796459
- By:
- Publication type:
- Article
Growing distributed networks with arbitrary degree distributions.
- Published in:
- European Physical Journal B: Condensed Matter, 2007, v. 58, n. 2, p. 175, doi. 10.1140/epjb/e2007-00208-2
- By:
- Publication type:
- Article
Knowledge-based health service considering user convenience using hybrid Wi-Fi P2P.
- Published in:
- Information Technology & Management, 2016, v. 17, n. 1, p. 67, doi. 10.1007/s10799-015-0241-5
- By:
- Publication type:
- Article
Reward mechanisms for P2P VoIP networks.
- Published in:
- Information Technology & Management, 2010, v. 11, n. 2, p. 91, doi. 10.1007/s10799-010-0070-5
- By:
- Publication type:
- Article
METEOR-S WSDI: A Scalable P2P Infrastructure of Registries for Semantic Publication and Discovery of Web Services.
- Published in:
- Information Technology & Management, 2005, v. 6, n. 1, p. 17, doi. 10.1007/s10799-004-7773-4
- By:
- Publication type:
- Article
JXTA: A Technology Facilitating Mobile P2P Health Management System
- Published in:
- Osong Public Health & Research Perspectives, 2012, v. 3, n. 3, p. 165, doi. 10.1016/j.phrp.2012.04.008
- By:
- Publication type:
- Article
Task Allocation Methods and Optimization Techniques in Edge Computing: A Systematic Review of the Literature.
- Published in:
- Future Internet, 2023, v. 15, n. 8, p. 254, doi. 10.3390/fi15080254
- By:
- Publication type:
- Article
An ICN-Based IPFS High-Availability Architecture.
- Published in:
- Future Internet, 2022, v. 14, n. 5, p. 122, doi. 10.3390/fi14050122
- By:
- Publication type:
- Article
Systematic Evaluation of LibreSocial—A Peer-to-Peer Framework for Online Social Networks.
- Published in:
- Future Internet, 2020, v. 12, n. 9, p. 140, doi. 10.3390/fi12090140
- By:
- Publication type:
- Article
Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks.
- Published in:
- Future Internet, 2020, v. 12, n. 5, p. 92, doi. 10.3390/fi12050092
- By:
- Publication type:
- Article
Emerging Trends and Innovation Modes of Internet Finance—Results from Co-Word and Co-Citation Networks.
- Published in:
- Future Internet, 2020, v. 12, n. 3, p. 52, doi. 10.3390/fi12030052
- By:
- Publication type:
- Article
Reinforcement Learning Based Query Routing Approach for P2P Systems.
- Published in:
- Future Internet, 2019, v. 11, n. 12, p. 253, doi. 10.3390/fi11120253
- By:
- Publication type:
- Article
Structure and Anonymity of the Bitcoin Transaction Graph.
- Published in:
- Future Internet, 2013, v. 5, n. 2, p. 237, doi. 10.3390/fi5020237
- By:
- Publication type:
- Article
Personal Credit Risk Evaluation Model of P2P Online Lending Based on AHP.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 1, p. 83, doi. 10.3390/sym13010083
- By:
- Publication type:
- Article
Multi-Level P2P Traffic Classification Using Heuristic and Statistical-Based Techniques: A Hybrid Approach.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 12, p. 2117, doi. 10.3390/sym12122117
- By:
- Publication type:
- Article
Reliable Mobile Edge Service Offloading Based on P2P Distributed Networks.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 5, p. 821, doi. 10.3390/sym12050821
- By:
- Publication type:
- Article
Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 3, p. 35, doi. 10.3390/sym9030035
- By:
- Publication type:
- Article
A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 6, p. 40, doi. 10.3390/sym8060040
- By:
- Publication type:
- Article