“Akin to Peer Gynt” – Remolding Peer in Adaptation
نویسندگان
چکیده
منابع مشابه
Self-Organizing Topology Adaptation in Peer-to-Peer Networks
The peers in a Peer-to-Peer (P2P) system arrange themselves in a virtual network called the overlay network. The overlay network sits above the underlying physical network and is used to search for resources and peers, and to route messages between peers. The topology of the overlay network is the graph whose vertices are the peers and whose edges are the connections between the peers. The choi...
متن کاملCoordinated Self-Adaptation in Large-Scale Peer-to-Peer Overlays
Self-adaptive systems typically rely on a closed control loop which detects when the current behavior deviates too much from the optimal one, determines new optimal values for system parameters, and applies changes to the system configuration. In decentralized systems, implementing each of these steps is challenging, especially when nodes need to coordinate their local configurations. In this p...
متن کاملAdaptation and Robustness in Peer-to-Peer Streaming
The rapid development of network communication infrastructure enables networked multimedia streaming applications ranging from on-demand video streaming to highly interactive video conferencing. Peer-to-Peer (P2P) technologies have emerged as a powerful and popular paradigm for bringing such emerging multimedia services to a large number of users. The essential advantage of P2P systems is that ...
متن کاملA Reflective Middleware to Support Peer-to-Peer Overlay Adaptation
As peer-to-peer systems are evolving from simplistic application specific overlays to middleware platforms hosting a range of potential applications it has become evident that increasingly configurable approaches are required to ensure appropriate overlay support is provided for divergent applications. This is exacerbated by the increasing heterogeneity of networked devices expected to host the...
متن کاملشناسایی مبتنی بر میزبان کرم واره ها در شبکه های peer-to-peer
کرم واره ها (کرم های کامپیوتری)، به علت قابلیت انتشار مستقل و اثرات مخربی که می توانند بر جای بگذارند، یکی از بزرگترین تهدیدات شبکه محسوب می گردند. روش های تشخیص کرم واره باید از سرعت بالایی برخوردار بوده، نرخ خطای پایینی داشته و قابلیت تشخیص کرم واره ها ی جدید را نیز داشته باشند. شبکه های جدیدی مانند شبکه peer-to-peer (p2p)باعث به وجود آمدن زمینه جدیدی برای فعالیت کرم واره ها شده اند. کرم واره...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European Journal of Scandinavian Studies
سال: 2020
ISSN: 2191-9402,2191-9399
DOI: 10.1515/ejss-2020-0003