Peer-to-Peer Law, Built on Bitcoin
نویسندگان
چکیده
منابع مشابه
شناسایی مبتنی بر میزبان کرم واره ها در شبکه های peer-to-peer
کرم واره ها (کرم های کامپیوتری)، به علت قابلیت انتشار مستقل و اثرات مخربی که می توانند بر جای بگذارند، یکی از بزرگترین تهدیدات شبکه محسوب می گردند. روش های تشخیص کرم واره باید از سرعت بالایی برخوردار بوده، نرخ خطای پایینی داشته و قابلیت تشخیص کرم واره ها ی جدید را نیز داشته باشند. شبکه های جدیدی مانند شبکه peer-to-peer (p2p)باعث به وجود آمدن زمینه جدیدی برای فعالیت کرم واره ها شده اند. کرم واره...
15 صفحه اولiShare - Open Internet Sharing Built on Peer-to-Peer and Web
This paper presents design concepts and implementation overview of an Internet-sharing system, iShare. iShare supports end users as well as providers of Internet resources in disseminating, accessing and using these resources, in a way that allows open participation. A fully decentralized organization allows providers to simply post their resources on any web page, imposing no restrictions on r...
متن کاملParadropper: A General-Purpose Global Computing Environment Built on Peer-to-Peer Overlay Network
We describe Paradropper, a general-purpose global computing system based on a peer-to-peer self-organizing overlay network. In Paradropper, the peer is organized into an overlay network with “small world” characteristics, and workload is well balanced among the peers according to their workload in a decentralized manner. Particularly, it not only supports embarrassing parallel computing mode, b...
متن کاملTAC: A Topology-Aware Chord-based Peer-to-Peer Network
Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...
متن کاملOn Democracy in Peer-to-Peer systems
The information flow inside a P2P network is highly dependent on the network structure. In order to ease the diffusion of relevant data toward interested peers, many P2P protocols gather similar nodes by putting them in direct contact. With this approach the similarity between nodes is computed in a pointto-point fashion: each peer individually identifies the nodes that share similar interests ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2015
ISSN: 1556-5068
DOI: 10.2139/ssrn.2573788