نتایج جستجو برای: bit torrent

تعداد نتایج: 55711  

2011
Ansuman Mahapatra

Reputation management for peers in Bittorrent P2P network is very much important due to its open and anonymous nature. Some malicious peers distribute low quality or fake files in the network and pollute the environment. In this paper, we propose a fuzzy inference system to design P2P reputation management system which generates the reputation values for each torrent files by interacting with o...

Journal: :International Journal of Advanced Computer Science and Applications 2015

Journal: :Against the Grain 1992

Journal: :international journal of communications and information technology 2011
m. shafei m. rezaei s. tavakoli f. mohanna

in this paper, we propose a new full-fuzzy video ratecontrol algorithm (rca) for variable bit rate (vbr) videoapplications. the proposed rca provides high qualitycompressed video with a low degree computational complexity.by controlling the quantization parameter (qp) on a picturebasis, it produces vbr video bit streams. the proposed rcahas been implemented on the jm h.264/avc video codec andth...

Journal: :IEICE Transactions on Electronics 2016

2017
Julien I. E. Hoffman

Ventricular twisting, essential for cardiac function, is attributed to the contraction of myocardial helical fibers. The exact relationship between ventricular anatomy and function remains to be determined, but one commonly used explanatory model is the helical ventricular myocardial band (HVMB) model of Torrent-Guasp. This model has been successful in explaining many aspects of ventricular fun...

2012
Lin Liu Yinhu Li Siliang Li Ni Hu Yimin He Ray Pong Danni Lin Lihua Lu Maggie Law

With fast development and wide applications of next-generation sequencing (NGS) technologies, genomic sequence information is within reach to aid the achievement of goals to decode life mysteries, make better crops, detect pathogens, and improve life qualities. NGS systems are typically represented by SOLiD/Ion Torrent PGM from Life Sciences, Genome Analyzer/HiSeq 2000/MiSeq from Illumina, and ...

Journal: :Electronics 2022

A Distributed Denial-of-Service attack uses multiple sources operating in concert to a network or site. typical DDoS flood on website targets web server with valid requests, exhausting the server’s resources. The participants this are usually compromised/infected computers controlled by attackers. There several variations of kind attack, and torrent index poisoning is one. (DDoS) using poisonin...

Journal: :Computer Science Review 2016
Divya Saxena Vaskar Raychoudhury Neeraj Suri Christian Becker Jiannong Cao

Internet was developed as a packet data network where users and data sources (server) with specific IP addresses interacted over a pre-established communication channel. This model of client-server data communication has evolved into a peerto-peer mode of data sharing in recent times. Applications like, YouTube, Bit Torrent, social networks have revolutionized the idea of user generated content...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید