An admission control scheme for P2P networks is proposed in this paper.
提出了一个P 2 P网络的准入控制方案。
This paper presents an adaptive search mechanism for mobile P2P networks.
给出一种移动P 2 P网络中的自适应搜索机制。
We first summarize the researches on the location awareness in P2P networks.
本文对P 2 P网络的位置知晓性进行了相关研究。
Therefore, it is very important to study the reputation models in P2P networks.
因此研究P2 P网络的信誉模型具有重要意义。
Theory of P2P networks ALM technology and stream media technique are summarized.
综述了P2P技术、应用层组播技术和流媒体技术。
These are called "hybrid" P2P networks and they centralize at least the list of users.
这些网络被称作为“杂交”P 2 P网络,它们至少会集中用户列表。
Unstructured and structured P2P networks are two typical topologies in P2P networking.
非结构化和结构化P 2 P网络是其中的两种基本拓扑类型。
This paper presents a game model of combination strategy for routing nodes in P2P networks.
针对这一问题,该文提出一种新型P2P网络路由节点的组合策略博弈模型。
We design a distributed access control model according to the character of the P2P networks.
针对P 2 P网络应用环境特点,提出了一种分布式安全访问控制模型。
Beyond measuring user activity on P2P networks, CView will not collect data on individual users.
除了监测P 2 P网络上的用户活动外,CView将不会收集单独用户数据。
However many things that could be accomplished by P2P networks are still in development or research.
但是很多可以通过P 2 P网络做到底的事情都还在开发或者研究中。
Therefore there has been talk of moving video streaming to P2P networks, to lessen the load on the Internet.
因此将流媒体视频转移到P2P网络中的呼声一直存在,以减少主干网的负荷。
Due to its distribution, on an equal and features high scalability, P2P networks have been widely welcomed.
P 2 P网络又称为对等网络,由于其具有诸如分布性、对等性和高扩展性等特点,受到了人们的广泛欢迎。
Certain high sharing nodes in unstructured P2P networks are vulnerable to counter congestion and bottlenecks.
无结构P 2 P网络中某些共享资源高的节点容易出现网络阻塞和瓶颈问题。
In this article, we discussed basic techniques and tools to extend JXTA and Jabber P2P networks to mobile peers.
在本文中,我们讨论了将JXTA和JabberP 2 P网络扩展至移动对等点所需的基本技术和工具。
How to search the resources in the P2P networks efficiently is the key problem when the P2P networks are developed.
如何高效地搜索P 2 P网络上的资源是P 2 P网络实现的最为关键的问题。
The key thing for the architecture of P2P networks is to achieve reliability, efficiency, scalability and portability.
P 2 P网络的关键结构是保证其可靠性,效率,可扩展性和可移植性。
P2P client, who gets video data form P2P networks and then sends the data to the media player, mainly works on ARM side.
P2P客户端的主要功能在ARM端实现,实时的从P2P网络中下载需要的视频数据,然后将得到的数据发送给播放器。
QBC algorithm is proposed and query based clustering method is implemented in P2P networks directed by historical query set.
本文提出QBC算法,利用历史查询向量集作为聚类依据,在结构化P 2 P网络中实现了基于查询的文档聚类。
The experimental results show that the method is effective to improve the performance of resource retrieval in P2P networks.
实验结果显示文中的拓扑优化方法大幅提高了资源搜索的整体性能。
Furthermore, when a node's malicious actions are found in P2P networks, the malicious nodes would be revoked out from P2P networks.
此外,该方案还具有当节点进入P 2 P网络后,如有恶意行为,网络能剔除这些恶意节点等特性。
In fact, I'd go so far as to guess that the majority of music people download via P2P networks is not music they would buy in stores.
事实上,我更相信,大部份通过P 2 P网络下载的音乐并不是他们愿意在商店购买的。
After analyzing some current protocols of network authentications and the characteristics in P2P networks, we propose a new model named P2PIBAS.
本文通过分析现有的认证技术及P2 P网络特性,提出了P 2 P下一个认证授权方案P 2pibas。
TOT ("tree of trust") is a simple distributed database with a hierarchical trust system, which uses existing P2P networks as the underlying layer.
是一个简单的分布式数据库,具有一个 分等级的信任系统,其在底层使用现有的P2P网络。
The new mechanism of trust is needed to enforce the reliability in P2P networks, and thus the research of the reputation degree looks quite important.
在P 2 P网络中需要有新的信任机制来加强系统的可靠性。因而对信誉度问题的研究就显得非常重要。
Unstructured P2P networks, high dynamic, self-organization, scalability and other features, makes the unstructured P2P networks more and more popular.
非结构化P2P网络的高动态、自组织、高扩展等特点,使得非结构化P2P网络迅速流行起来。
The improvement to the location awareness of P2P networks can reduce the traffic and the costs of network operators, improve the efficiency of networks.
对P2P网络位置知晓性进行研究和改进,可以减少网络冗余流量,改进网络效率,减少网络运营商的成本。
In the current Vanish prototype, however, the network's computer purge their memory every eight hours to simulate the key loss that would occur on P2P networks.
不过,目前在Vanish的原型中,网络中的计算机每八个小时就会清除内存,以此来模拟实际P 2 P网络中密匙丢失的过程。
But Pure P2P networks lack of information control and uniform standards, which makes it far more difficult for entrepreneurs to develop obvious business models.
但由于缺少有效的控制手段和统一的标准,在纯粹的P 2 P网络环境下开发电子商务协作模型应用是很困难的。
But Pure P2P networks lack of information control and uniform standards, which makes it far more difficult for entrepreneurs to develop obvious business models.
但由于缺少有效的控制手段和统一的标准,在纯粹的P 2 P网络环境下开发电子商务协作模型应用是很困难的。
应用推荐