Peer-to-Peer Implementations
نویسنده
چکیده
Distributed computing represents an extremely cost-effective way to gain supercomputer-scale power to run certain types of compute-intensive applications. Remarkably, the majority of a PC’s time is spent doing nothing. The average PC is idle between 60 and 90%, even when it is being used. Distributed computing platforms split large computational problems into many small tasks and distribute those tasks together with the algorithm to PCs connected within a corporate network or to the Internet. Applications integrated today include codes that run ‘embarrassingly parallel’, such as docking of small molecules to proteins or Fourier analysis of radio signals. Monte Carlo simulations and applications exploring multidimensional parameter spaces also fall into this category. More recently, ‘divide and conquer’ algorithms such as sequence alignment codes have been implemented. Eventually, it will become possible to distribute many more classes of applications using a variety of techniques. Several large enterprises are currently deploying distributed computing technology. Very thorough standards in stability, security, manageability and scalability have to be met. The future will show a convergence and compatibility of different standards such as Globus and Entropia, leading to global computing grids with unprecedented computational capacity. Proceedings of the First International Conference on Peer-to-Peer Computing (P2P01) 0-7695-1503-7/02 $17.00 © 2002 IEEE
منابع مشابه
Explaining the characteristics of peer-to-peer learning: A qualitative study
Explaining the characteristics of peer-to-peer learning: A qualitative study Introduction: Learning through peers is an educational method. Explaining the characteristics of learning with the help of peers has not been done in a study, so the purpose of this study was to explain the characteristics of learning with the help of peers. Materials and Methods: This qualitative study was perfo...
متن کاملPeer Assessment in evaluation of Medical sciences students
Introduction: Recently, peer assessment is especially noticed as a progress evaluation method. Although it is a known method, it is a novel method in many countries that they use traditional methods. Then the topic of current review article is peer assessment in medical education. Methods: The documents related to peer assessment, advantages, disadvantages, applications and how use it extracte...
متن کاملRater Errors among Peer-Assessors: Applying the Many-Facet Rasch Measurement Model
In this study, the researcher used the many-facet Rasch measurement model (MFRM) to detect two pervasive rater errors among peer-assessors rating EFL essays. The researcher also compared the ratings of peer-assessors to those of teacher assessors to gain a clearer understanding of the ratings of peer-assessors. To that end, the researcher used a fully crossed design in which all peer-assessors ...
متن کاملEffect of Peer Performance, Future Competitive Performance, and Factors of Correlation with Peer Companies on Manipulation of Abnormal Real Operations
This study aimed to evaluate the effect of peer performance, future competitive performance and factors of correlation with peer companies on the manipulation of abnormal real operations. The research subjects included listed companies in Tehran Stock Exchange during 2013-2017. In total, 128 companies were selected as the statistical sample using systematic elimination approach. Peer performanc...
متن کاملTeacher-Assisted vs. Peer-Assisted Performances and L2 Development: A Mixed Methods Approach
The present study compared the impact of teacher-provided and peer-provided oral assistance in the acquisition of English wh-question forms. Participants were 90 female Iranian EFL learners who constituted the 3 groups of the study: teacherassisted, peer-assisted, and a control group. Participants in the experimental groups received assistance either from the teacher or a peer during task-based...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001